Abstract
Extracting norms from computer-mediated human interactions is gaining popularity since huge volume of data is available from which norms can be extracted. Open source communities offer exciting new application opportunities for extracting norms since such communities involve developers from different geographical regions, background and cultures. Investigating the types of norms that exist in open source projects and their efficacy (i.e. the usage of norms) in enabling smoother functioning however has not received much attention from the normative multi-agent systems (NorMAS) community. This paper makes two contributions in this regard. First, it presents norm compliance results from a case study involving three open source Java projects. Second, it presents an architecture for mining norms from open source projects. It also discusses the opportunities presented by the domain of software repositories for the study of norms. In particular, it points towards how norms can be mined by leveraging and extending prior work in the areas of Normative Multi-Agent Systems (NorMAS) and mining software repositories.
An early (short) draft of this paper appears as a working paper (an informal publication) at Otago (http://otago.ourarchive.ac.nz/handle/10523/2101) and was orally presented at the 2012 Dagstuhl seminar on NorMAS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A extensive review of the work in MSR can be found from the “Bibliography on Mining Software Engineering Data” available at http://ase.csc.ncsu.edu/dmse.
- 2.
Refer to http://source.android.com/source/code-style.html for the coding guidelines for Android development.
- 3.
- 4.
- 5.
- 6.
- 7.
The new convention could emerge based on discussions.
- 8.
http://ant.apache.org, version 1.8.4.
- 9.
http://struts.apache.org, version 2.3.4.
- 10.
Phases 1 and 2 of the norm life-cycle are complete at this stage.
- 11.
http://ode.apache.org, version 1.3.5.
- 12.
- 13.
There could be reasons such as internalized (non-explicit) norms that could have operated in the ODE project which are similar to the explicit norms.
- 14.
- 15.
- 16.
References
Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR ’06, pp. 137–143. ACM, New York (2006)
Boogerd, C., Moonen, L.: Assessing the value of coding standards: an empirical study. In: ICSM, pp. 277–286 (2008)
Butler, S., Wermelinger, M., Yu, Y., Sharp, H.: Mining java class naming conventions. In: ICSM, pp. 93–102 (2011)
Cao, L., Gorodetsky, V., Mitkas, P.A.: Agent mining: the synergy of agents and data mining. IEEE Intell. Syst. 24(3), 64–72 (2009)
Cao, L., Weiss, G., Yu, P.S.: A brief introduction to agent mining. Auton. Agents Multi-Agent Syst. 25, 419–424 (2012)
Criado, N., Argente, E., Botti, V.J.: Open issues for normative multi-agent systems. AI Commun. 24(3), 233–264 (2011)
Fellbaum, C.: WordNet: An Electronic Lexical Database. Bradford Books, Cambridge (1998)
Hassan, A.E.: The road ahead for mining software repositories. In: The 24th IEEE International Conference on Software Maintenance, Frontiers of Software Maintenance, pp. 48–57, October 2008
Kapser, C., Godfrey, M.W.: Cloning considered harmful considered harmful. In: Proceedings of the 13th Working Conference on Reverse Engineering, pp. 19–28. IEEE Computer Society, Washington, DC (2006)
Kargupta, H., Hamzaoglu, I., Stafford, B.: Scalable, distributed data mining-an agent architecture. In: Proceedings Third International Conference on Knowledge Discovery and Data Mining, pp. 211–214 (1997)
Kooti, F., Yang, H., Cha, M., Krishna Gummadi, P., Mason, W.A.: The emergence of conventions in online social networks. In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, 4–7 June 2012
Li, H.X., Chosler, R.: Application of multilayered multi-agent data mining architecture to bank domain. In: International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 6721–6724, September 2007
Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: Proceedings of the 28th International Conference on Software Engineering, ICSE ’06, pp. 452–461. ACM, New York (2006)
Savarimuthu, B.T.R., Cranefield, S.: Norm creation, spreading and emergence: a survey of simulation models of norms in multi-agent systems. Multiagent Grid Syst. 7(1), 21–54 (2011)
Savarimuthu, B.T.R., Cranefield, S., Purvis, M.A., Purvis, M.K.: Obligation norm identification in agent societies. J. Artif. Soc. Soc. Simul. 13(4), 3 (2010)
Savarimuthu, B.T.R., Cranefield, S., Purvis, M.A., Purvis, M.K.: Identifying prohibition norms in agent societies. Artif. Intell. Law 21, 1–46 (2012)
Weber, S.: The Success of Open Source. Harvard University Press, Harvard (2004)
Wieringa, R.J., Meyer, J.-J.Ch.: Applications of deontic logic in computer science: a concise overview. In: Wieringa, R., Meyer, J.-J.Ch. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 17–40. Wiley, New York (1994)
Zimmermann, T., Weisgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, ICSE ’04, pp. 563–572. IEEE Computer Society, Washington, DC (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Basic information about the three projects are provided in Fig. 4. Columns 3 and 4 show the version numbers of the projects considered and the total number of violations observed (including the five categories of violations presented in the case study).
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Savarimuthu, B.T.R., Dam, H.K. (2014). Towards Mining Norms in Open Source Software Repositories. In: Cao, L., Zeng, Y., Symeonidis, A., Gorodetsky, V., Müller, J., Yu, P. (eds) Agents and Data Mining Interaction. ADMI 2013. Lecture Notes in Computer Science(), vol 8316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55192-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-55192-5_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55191-8
Online ISBN: 978-3-642-55192-5
eBook Packages: Computer ScienceComputer Science (R0)