1 / 10

Evaluating C++ Design Pattern Miner Tools

Evaluating C++ Design Pattern Miner Tools. Lajos Jenő Fülöp 1 , Tamás Gyovai 2 and Rudolf Ferenc 1 1 Department of Software Engineering University of Szeged, Hungary 2 evosoft Hungary Ltd. Motivation. There are many design pattern miner tools They differ in several aspects

olympe
Download Presentation

Evaluating C++ Design Pattern Miner Tools

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Evaluating C++ Design Pattern Miner Tools Lajos Jenő Fülöp1, Tamás Gyovai2 and Rudolf Ferenc1 1 Department of Software Engineering University of Szeged, Hungary 2 evosoft Hungary Ltd.

  2. Motivation • There are many design pattern miner tools • They differ in several aspects • Pattern descriptions • Target software representation • Matching algorithm • They should be evaluated and compared • We performed experiments on 4 real life open-source systems Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  3. Evaluated tools • Maisa • Measures software quality at design level • University of Helsinki • CrocoPat • Relational computation • Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland • University of California at Berkeley, USA • Brandenburg University of Technology at Cottbus, Germany • Columbus • Framework for source code analysis and quality assurance • FrontEndART Ltd. • University of Szeged • Nokia Research Center Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  4. Evaluation framework • We search for pattern instances in the source code • Each tool has its own • pattern description language and • representation of the facts extracted from the source code • Columbus provides the same data for the tools Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  5. Analyzed projects • Four open source systems from different domains Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  6. Experiments • Three main aspects • Number of design pattern instances found • Pattern mining speed • Memory requirements Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  7. Number of pattern instances found (Mozilla) Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  8. Speed (Mozilla) Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  9. Memory requirements (in megabytes) Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

  10. Summary • Differences were caused by • Different descriptions of design patterns • Precision of pattern descriptions • Differences in algorithms • To do … • „Strict” design pattern catalog • Evaluation benchmark • More test systems • Involving further tools Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006)

More Related