skip to main content
10.1145/1985374.1985389acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Which code construct metrics are symptoms of post release failures?

Published:24 May 2011Publication History

ABSTRACT

Software metrics, such as code complexity metrics and code churn metrics, are used to predict failures. In this paper we study a specific set of metrics called code construct metrics and relate them to post release failures. We use the values of the code construct metrics for each file to characterize that file. We analyze the code construct metrics along with the post release failure data on the files (that splits the files into two classes: files with post release failures and files without post release failures). In our analysis we compare a file with post release failure to a set of files without post release failures, that have similar characteristics. In our comparison we identify which code construct metric, more often than the others, differs the most between these two classes of files. The goal of our research is to find out which code construct metrics can perhaps be used as symptoms of post release failures. In this paper we analyzed the code construct metrics of Eclipse 2.0, 2.1, and 3.0. Our results indicate that MethodInvocation, QualifiedName, and SimpleName, are the code constructs that differentiates the two classes of files the most and hence are the key symptoms/indicators of a file with post release failures in these versions of Eclipse.

References

  1. D. C. Arnold, D. H. Ahn, B. R. de Supinski, G. L. Lee, B. P. Miller, M. Schulz, "Stack Trace Analysis for Large Scale Debugging," Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International, vol., no., pp.1--10, 26--30. March 2007Google ScholarGoogle Scholar
  2. T. M. Chilimbi, B. Liblit, K. Mehra, A. V. Nori, K. Vaswani, "HOLMES: Effective statistical debugging via efficient path profiling," Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on, vol., no., pp. 34--44, 16--24. May 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Fowler, "Refactoring: Improving the Design of Existing Code," 1st ed. Addison-Wesley, June 1999.Google ScholarGoogle Scholar
  4. S. Hangal, M. S. Lam, "Tracking Down Software Bugs Using Automatic Anomaly Detection," 24th International Conference on Software Engineering, 2002, pp. 291--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Khomh, M. D. Penta, and Y. G. Gueheneuc, "An Exploratory Study of the Impact of Code Smells on Software Change-proneness," 16th Working Conference on Reverse Engineering, 2009, pp. 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Marinescu, "Detection strategies: Metrics-based rules for detecting design flaws," in Proceedings of the 20th International Conference on Software Maintenance, 2004, pp. 350--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Zimmermann, R. Premraj, A. Zeller, "Predicting Defects for Eclipse," Third International Workshop on Predictor Models in Software Engineering (PROMISE'07: ICSE Workshops 2007), pp.9--16, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Which code construct metrics are symptoms of post release failures?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WETSoM '11: Proceedings of the 2nd International Workshop on Emerging Trends in Software Metrics
      May 2011
      90 pages
      ISBN:9781450305938
      DOI:10.1145/1985374

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 May 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader