Locating core modules through the association between software source structure and execution

Sang Moo Huh, Woo Je Kim

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

To improve software quality, the source code that composes software has to be improved, and improving the important code that largely affects the software quality should be a cost-effective method. Static analysis defines important codes as those that occupy important positions in the source network, while dynamic analysis defines important codes as those with high execution frequency. However, neither method analyzes the association between network structure and execution frequency, and both have their disadvantages. Thus, this study analyzed the association between source network structure and execution frequency to solve their disadvantages. The source function of Notepad++ was analyzed, and the function ranking was derived using the association between network structure and execution frequency. For verification, the Spearman correlation between the newly derived function ranking and the function ranking of the network and execution frequency obtained with the conventional method was measured. By measuring the Spearman correlation, the newly derived function ranking had strong correlations with execution frequency and included the network structure’s characteristics. Moreover, similar to the Pareto principle, the analysis showed that 20% of Notepad++‘s functions could be categorized as important functions, largely affecting the software’s quality.

Original languageEnglish
Article number1685
Pages (from-to)1-15
Number of pages15
JournalApplied Sciences (Switzerland)
Volume11
Issue number4
DOIs
StatePublished - 2 Feb 2021

Keywords

  • Data envelopment analysis (DEA)
  • Execution frequency
  • Notepad++
  • Pareto principle
  • Social network analysis (SNA)
  • Software profiling
  • Software quality

Fingerprint

Dive into the research topics of 'Locating core modules through the association between software source structure and execution'. Together they form a unique fingerprint.

Cite this