Journal of Software: Evolution and Process

Cover image for Vol. 25 Issue 11

Special Issue: Special section on ICSM 2011

November 2013

Volume 25, Issue 11

Pages 1137–1224

Issue edited by: James Cordy, Paolo Tonella

  1. Editorial

    1. Top of page
    2. Editorial
    3. Special Issue Papers
    1. You have free access to this content
      Special section on ICSM 2011 (pages 1137–1138)

      James R. Cordy and Paolo Tonella

      Version of Record online: 16 MAY 2013 | DOI: 10.1002/smr.1600

  2. Special Issue Papers

    1. Top of page
    2. Editorial
    3. Special Issue Papers
    1. An empirical study of faults in late propagation clone genealogies (pages 1139–1165)

      Liliane Barbour, Foutse Khomh and Ying Zou

      Version of Record online: 16 MAY 2013 | DOI: 10.1002/smr.1597

      Thumbnail image of graphical abstract

      This work examines the characteristics of late propagation in three long-lived software systems using the SIMIAN, CCFINDER, and NICAD clone detection tools. We define eight types of late propagation and compare them to other forms of clone evolution. Our results not only verify that late propagation is more harmful to software systems but also establish that some specific types of late propagations are more harmful than others.

    2. Evaluating test-to-code traceability recovery methods through controlled experiments (pages 1167–1191)

      Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia and David Binkley

      Version of Record online: 22 NOV 2012 | DOI: 10.1002/smr.1573

      Thumbnail image of graphical abstract

      Until now the evaluation of test-to-code traceability recovery methods has been limited to experiments assessing their tracing accuracy rather than the actual support these methods provide to software engineers during traceability recovery tasks. We present the results of two controlled experiments carried out to evaluate the support given by SCOTCH during traceability recovery, when compared with other traceability recovery methods. The results indicate that SCOTCH is able to sensibly improving the accuracy of software engineers during test-to-code traceability recovery tasks.

    3. How developers perform feature location tasks: a human-centric and process-oriented exploratory study (pages 1193–1224)

      Jinshui Wang, Xin Peng, Zhenchang Xing and Wenyun Zhao

      Version of Record online: 28 APR 2013 | DOI: 10.1002/smr.1593

      Thumbnail image of graphical abstract

      In this paper, we report an exploratory study of feature location process, consisting of three experiments in which developers were given unfamiliar systems and asked to complete six feature location tasks. Our study suggests that feature location process can be understood hierarchically at three levels of granularity: phase, pattern, and action. Furthermore, our statistical analysis shows that these feature location phases, patterns, and actions can be effectively imparted to junior developers and consequently improve their performance on feature location tasks.

SEARCH

SEARCH BY CITATION