Skip to main content

Towards Mining Norms in Open Source Software Repositories

  • Conference paper
  • First Online:
Book cover Agents and Data Mining Interaction (ADMI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8316))

Included in the following conference series:

Abstract

Extracting norms from computer-mediated human interactions is gaining popularity since huge volume of data is available from which norms can be extracted. Open source communities offer exciting new application opportunities for extracting norms since such communities involve developers from different geographical regions, background and cultures. Investigating the types of norms that exist in open source projects and their efficacy (i.e. the usage of norms) in enabling smoother functioning however has not received much attention from the normative multi-agent systems (NorMAS) community. This paper makes two contributions in this regard. First, it presents norm compliance results from a case study involving three open source Java projects. Second, it presents an architecture for mining norms from open source projects. It also discusses the opportunities presented by the domain of software repositories for the study of norms. In particular, it points towards how norms can be mined by leveraging and extending prior work in the areas of Normative Multi-Agent Systems (NorMAS) and mining software repositories.

An early (short) draft of this paper appears as a working paper (an informal publication) at Otago (http://otago.ourarchive.ac.nz/handle/10523/2101) and was orally presented at the 2012 Dagstuhl seminar on NorMAS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A extensive review of the work in MSR can be found from the “Bibliography on Mining Software Engineering Data” available at http://ase.csc.ncsu.edu/dmse.

  2. 2.

    Refer to http://source.android.com/source/code-style.html for the coding guidelines for Android development.

  3. 3.

    http://portals.apache.org/development/code-standards.html

  4. 4.

    https://sites.google.com/a/android.com/opensource/submit-patches/code-style-guide

  5. 5.

    http://checkstyle.sourceforge.net/

  6. 6.

    http://archive.msdn.microsoft.com/sourceanalysis

  7. 7.

    The new convention could emerge based on discussions.

  8. 8.

    http://ant.apache.org, version 1.8.4.

  9. 9.

    http://struts.apache.org, version 2.3.4.

  10. 10.

    Phases 1 and 2 of the norm life-cycle are complete at this stage.

  11. 11.

    http://ode.apache.org, version 1.3.5.

  12. 12.

    http://checkstyle.sourceforge.net/availablechecks.html

  13. 13.

    There could be reasons such as internalized (non-explicit) norms that could have operated in the ODE project which are similar to the explicit norms.

  14. 14.

    http://www.opencalais.com

  15. 15.

    http://www.alchemyapi.com

  16. 16.

    In this example only two artifacts, the email message and the log are involved. But in practice, several different types of documents may need to be traversed to find the relevant information. Techniques developed in the field of MSR (e.g. [1, 13]) can be employed for cross-linking documents.

References

  1. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR ’06, pp. 137–143. ACM, New York (2006)

    Google Scholar 

  2. Boogerd, C., Moonen, L.: Assessing the value of coding standards: an empirical study. In: ICSM, pp. 277–286 (2008)

    Google Scholar 

  3. Butler, S., Wermelinger, M., Yu, Y., Sharp, H.: Mining java class naming conventions. In: ICSM, pp. 93–102 (2011)

    Google Scholar 

  4. Cao, L., Gorodetsky, V., Mitkas, P.A.: Agent mining: the synergy of agents and data mining. IEEE Intell. Syst. 24(3), 64–72 (2009)

    Article  Google Scholar 

  5. Cao, L., Weiss, G., Yu, P.S.: A brief introduction to agent mining. Auton. Agents Multi-Agent Syst. 25, 419–424 (2012)

    Article  Google Scholar 

  6. Criado, N., Argente, E., Botti, V.J.: Open issues for normative multi-agent systems. AI Commun. 24(3), 233–264 (2011)

    MathSciNet  Google Scholar 

  7. Fellbaum, C.: WordNet: An Electronic Lexical Database. Bradford Books, Cambridge (1998)

    MATH  Google Scholar 

  8. Hassan, A.E.: The road ahead for mining software repositories. In: The 24th IEEE International Conference on Software Maintenance, Frontiers of Software Maintenance, pp. 48–57, October 2008

    Google Scholar 

  9. Kapser, C., Godfrey, M.W.: Cloning considered harmful considered harmful. In: Proceedings of the 13th Working Conference on Reverse Engineering, pp. 19–28. IEEE Computer Society, Washington, DC (2006)

    Google Scholar 

  10. Kargupta, H., Hamzaoglu, I., Stafford, B.: Scalable, distributed data mining-an agent architecture. In: Proceedings Third International Conference on Knowledge Discovery and Data Mining, pp. 211–214 (1997)

    Google Scholar 

  11. Kooti, F., Yang, H., Cha, M., Krishna Gummadi, P., Mason, W.A.: The emergence of conventions in online social networks. In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, 4–7 June 2012

    Google Scholar 

  12. Li, H.X., Chosler, R.: Application of multilayered multi-agent data mining architecture to bank domain. In: International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 6721–6724, September 2007

    Google Scholar 

  13. Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: Proceedings of the 28th International Conference on Software Engineering, ICSE ’06, pp. 452–461. ACM, New York (2006)

    Google Scholar 

  14. Savarimuthu, B.T.R., Cranefield, S.: Norm creation, spreading and emergence: a survey of simulation models of norms in multi-agent systems. Multiagent Grid Syst. 7(1), 21–54 (2011)

    Google Scholar 

  15. Savarimuthu, B.T.R., Cranefield, S., Purvis, M.A., Purvis, M.K.: Obligation norm identification in agent societies. J. Artif. Soc. Soc. Simul. 13(4), 3 (2010)

    Google Scholar 

  16. Savarimuthu, B.T.R., Cranefield, S., Purvis, M.A., Purvis, M.K.: Identifying prohibition norms in agent societies. Artif. Intell. Law 21, 1–46 (2012)

    Article  Google Scholar 

  17. Weber, S.: The Success of Open Source. Harvard University Press, Harvard (2004)

    Google Scholar 

  18. Wieringa, R.J., Meyer, J.-J.Ch.: Applications of deontic logic in computer science: a concise overview. In: Wieringa, R., Meyer, J.-J.Ch. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 17–40. Wiley, New York (1994)

    Google Scholar 

  19. Zimmermann, T., Weisgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, ICSE ’04, pp. 563–572. IEEE Computer Society, Washington, DC (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bastin Tony Roy Savarimuthu .

Editor information

Editors and Affiliations

Appendix

Appendix

Basic information about the three projects are provided in Fig. 4. Columns 3 and 4 show the version numbers of the projects considered and the total number of violations observed (including the five categories of violations presented in the case study).

Fig. 4.
figure 4

Basic project information of the projects considered in the case study

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Savarimuthu, B.T.R., Dam, H.K. (2014). Towards Mining Norms in Open Source Software Repositories. In: Cao, L., Zeng, Y., Symeonidis, A., Gorodetsky, V., Müller, J., Yu, P. (eds) Agents and Data Mining Interaction. ADMI 2013. Lecture Notes in Computer Science(), vol 8316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55192-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55192-5_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55191-8

  • Online ISBN: 978-3-642-55192-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics