Cloning Practices: Why Developers Clone and What can be Changed

Gang Zhang starts of by making some fun: Cloning is evil! However, developers keep cloning. Gang’s cites a study that shows that 5 to 20% of code is still clones. So the authors started to wonder: why do people clone and what can we do to improve it? We know a lot of reasons already: Read more about Cloning Practices: Why Developers Clone and What can be Changed[…]

How Often Do Unintended Inconsistencies Happen? Deriving Modification Patterns and Detecting Overlooked Code Fragments

What anĀ intriguingĀ title! Let’s go. Yoshiki Higo argus that it often happens that when a method changes, it often happens that some invocations are forgotten. We can use grep of clone detection tools, but both have limitations. Yoshiki proposes to mine the history of a system, to derive ‘modification patterns’: pieces of code that are often Read more about How Often Do Unintended Inconsistencies Happen? Deriving Modification Patterns and Detecting Overlooked Code Fragments[…]

Leveraging Natural Language Analysis of Software: Achievements, Challenges, and Opportunities

Second ICSM keynote by Lori Pollock. She starts out by saying software is like a car in many ways: It can break We want new features We want it to go faster It gets more and more complicated under the hood Thus: we need ‘power tools’ to fix and upgrade our software. In software, the Read more about Leveraging Natural Language Analysis of Software: Achievements, Challenges, and Opportunities[…]

Incremental Reengineering and Migration of a 40 Year Old Airport Operations System

Judging just by the title, this should be a very interesting talk! The migration project (from a legacy COBOL system to a Java SOA system) was tried three times before and failed and it was decided that a big bang migration was not possible. There were several different user groups: office users, outdoor users and Read more about Incremental Reengineering and Migration of a 40 Year Old Airport Operations System[…]

Structured Approach to Assess Third-Party Library Usage

Many software systems relay on third party libraries and if you do you should care about quality of those libraries and also of the use of those libraries, says Veronika Bauer. Often, when assessing maintainability of a system however, efforts are mainly targeted at own code base and not at libraries. This is why the Read more about Structured Approach to Assess Third-Party Library Usage[…]