TY - GEN
T1 - SATT
T2 - 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016
AU - Aniche, Mauricio
AU - Treude, Christoph
AU - Zaidman, Andy
AU - Deursen, Arie Van
AU - Gerosa, Marco Aurelio
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/12
Y1 - 2016/12/12
N2 - Code metric analysis is a well-known approach for assessing the quality of a software system. However, current tools and techniques do not take the system architecture (e.g., MVC, Android) into account. This means that all classes are assessed similarly, regardless of their specific responsibilities. In this paper, we propose SATT (Software Architecture Tailored Thresholds), an approach that detects whether an architectural role is considerably different from others in the system in terms of code metrics, and provides a specific threshold for that role. We evaluated our approach on 2 different architectures (MVC and Android) in more than 400 projects. We also interviewed 6 experts in order to explain why some architectural roles are different from others. Our results shows that SATT can overcome issues that traditional approaches have, especially when some architectural role presents very different metric values than others.
AB - Code metric analysis is a well-known approach for assessing the quality of a software system. However, current tools and techniques do not take the system architecture (e.g., MVC, Android) into account. This means that all classes are assessed similarly, regardless of their specific responsibilities. In this paper, we propose SATT (Software Architecture Tailored Thresholds), an approach that detects whether an architectural role is considerably different from others in the system in terms of code metrics, and provides a specific threshold for that role. We evaluated our approach on 2 different architectures (MVC and Android) in more than 400 projects. We also interviewed 6 experts in order to explain why some architectural roles are different from others. Our results shows that SATT can overcome issues that traditional approaches have, especially when some architectural role presents very different metric values than others.
UR - http://www.scopus.com/inward/record.url?scp=85010748371&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85010748371&partnerID=8YFLogxK
U2 - 10.1109/SCAM.2016.19
DO - 10.1109/SCAM.2016.19
M3 - Conference contribution
AN - SCOPUS:85010748371
T3 - Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016
SP - 41
EP - 50
BT - Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 October 2016 through 3 October 2016
ER -