Recovering Android Bad Smells from Android Applications

被引:3
|
作者
Ghulam Rasool
Azhar Ali
机构
[1] COMSATS University Islamabad,Department of Compute Science
关键词
Smart phone; Mobile software applications; Android smells; Software quality; Code refactoring;
D O I
暂无
中图分类号
学科分类号
摘要
The demand for Android mobile software applications is continuously increasing with the evolution of technology and new enriching features to make the life of people easy and comfortable. The mobile-based software applications are frequently updated as compared to other web and desktop applications. Due to these frequent updating cycles, the developers sometimes make changes in a rush which leads to poor design choices known as antipatterns or code bad smells. Code bad smells degrade the performance of applications and make evolution difficult. The recovery of bad smells from mobile software applications is still at infancy but it is a very important research realm that requires the attention of researchers and practitioners. The results of recovery may be used for comprehension, maintenance, reengineering, evolution and refactoring of these applications. Most state-of-the-art approaches focused on the detection of code bad smells from object-oriented applications and they target only a few code smells. We present a novel approach supplemented with tool support to recover 25 Android code bad smells from Android-specific software applications. We evaluate our approach by performing experiments on 4 open source and 3 industrial Android-specific software applications and measure accuracy using standard metrics.
引用
收藏
页码:3289 / 3315
页数:26
相关论文
共 50 条
  • [1] Recovering Android Bad Smells from Android Applications
    Rasool, Ghulam
    Ali, Azhar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3289 - 3315
  • [2] Understanding Code Smells in Android Applications
    Mannan, Umme Ayda
    Ahmed, Iftekhar
    Almurshed, Rana Abdullah M.
    Dig, Danny
    Jensen, Carlos
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 225 - 236
  • [3] Security Smells in Android
    Ghafari, Mohammad
    Gadient, Pascal
    Nierstrasz, Oscar
    2017 IEEE 17TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2017, : 121 - 130
  • [4] Android code smells: From introduction to refactoring
    Habchi, Sarra
    Moha, Naouel
    Rouvoy, Romain
    JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 177
  • [5] RunDroid: Recovering Execution Call Graphs for Android Applications
    Yuan, Yujie
    Xu, Lihua
    Xiao, Xusheng
    Podgurski, Andy
    Zhu, Huibiao
    ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 949 - 953
  • [6] Refactoring Android-specific Energy Smells: A Plugin for Android Studio
    Iannone, Emanuele
    Pecorelli, Fabiano
    Di Nucci, Dario
    Palomba, Fabio
    De Lucia, Andrea
    2020 IEEE/ACM 28TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, ICPC, 2020, : 451 - 455
  • [7] Security code smells in Android ICC
    Pascal Gadient
    Mohammad Ghafari
    Patrick Frischknecht
    Oscar Nierstrasz
    Empirical Software Engineering, 2019, 24 : 3046 - 3076
  • [8] Incorporating Android Code Smells into Java']Java Static Code Metrics for Security Risk Prediction of Android Applications
    Gong, Ai
    Zhong, Yi
    Zou, Weiqin
    Shi, Yangyang
    Fang, Chunrong
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 30 - 40
  • [9] Security code smells in Android ICC
    Gadient, Pascal
    Ghafari, Mohammad
    Frischknecht, Patrick
    Nierstrasz, Oscar
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (05) : 3046 - 3076
  • [10] On the Survival of Android Code Smells in the Wild
    Habchi, Sarra
    Rouvoy, Romain
    Moha, Naouel
    2019 IEEE/ACM 6TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2019), 2019, : 87 - 98