DOI QR코드

DOI QR Code

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis)

사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구

  • 허상무 (서울과학기술대학교 IT정책대학원 산업정보시스템) ;
  • 김우제 (서울과학기술대학교 글로벌융합산업공학과)
  • Received : 2018.04.18
  • Accepted : 2018.06.14
  • Published : 2018.09.30

Abstract

To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

Keywords

References

  1. Adler, N., L. Friedman, and Z. Sinuany-Stern, "Review of ranking methods in the data envelopment analysis context", European Journal of Operational Research, Vol.140, No.2, 2002, 249-265. https://doi.org/10.1016/S0377-2217(02)00068-1
  2. Allen, F.E., "Control flow analysis", In ACM Sigplan Notices, Vol.5, No.7, 1970, 1-19. https://doi.org/10.1145/390013.808479
  3. Banker, R.D., A. Charnes, and W.W. Cooper, "Some models for estimating technical and scale inefficiencies in Data Envelopment Analysis", Management Science, Vol.30, No.9, 1984, 1078-1092. https://doi.org/10.1287/mnsc.30.9.1078
  4. Charnes, A., W.W. Cooper, and E. Rhodes, "Measuring the efficiency of decision making units", European Journal of Operational Research, Vol.2, No.6, 1978, 429-444. https://doi.org/10.1016/0377-2217(78)90138-8
  5. Choi, M.S. and W.J. Kim, "A Study on an Evaluation Method for LCD TV products using Hybrid AHP/DEA Model", Dept. of Information and Industrial Engineering Graduate School of Industry and Engineering Seoul National University of Technology, 2007.
  6. Cooper, W.W., L.M. Seiford, and J. Zhu, "Data envelopment analysis. In Handbook on data envelopment analysis", Springer, Boston, MA, 2004, 1-39.
  7. Ferrante, J., K.J. Ottenstein, and J.D. Warren, "The program dependence graph and It's use in optimization", ACM Transactions on Programming Languages and Systems (TOPLAS), Vol.9, No.3, 1987, 319-349. https://doi.org/10.1145/24039.24041
  8. Hall, N.R. and S. Preiser, "Combined network complexity measures", IBM Journal of Research and Development, Vol.28, No.1, 1984, 15-27. https://doi.org/10.1147/rd.281.0015
  9. Henry, S. and D. Kafura, "Software structure metrics based on information flow", IEEE transactions on Software Engineering, No. 5, 1981, 510-518.
  10. Kim, B.H., S.Y. Han, and Y.C. Kim, "Design of Advanced HITS Algorithm by Suitability for Importance-Evaluation of Web-Documents", The Journal of Society for e-Business Studies, Vol.8, No.2, 2003, 23-31.
  11. Kim, Y.H. and Y.J. Kim, "Social Network Analysis", PARKYOUNGSA, 2016.
  12. Lommerse, G., F. Nossin, L. Voinea, and A. Telea, "The visual code navigator : An interactive toolset for source code investigation", In Information Visualization, INFOVIS IEEE Symposium, 2005, 24-31.
  13. Mancoridis, S., B.S. Mitchell, C. Rorres, Y. Chen, and E.R. Gansner, "Using automatic clustering to produce high-level system organizations of source code", In Program Comprehension, IWPC 1998, Proceedings, 6th International Workshop, 1998, 45-52.
  14. McCabe, T.J., "A complexity measure", IEEE Transactions on Software Engineering, No.4, 1976, 308-320.
  15. Nagappan, N. and T. Ball, "Using software dependencies and churn metrics to predict field failures : An empirical case study", In Empirical Software Engineering and Measurement, ESEM First International Symposium on, IEEE, 2007, 364-373.
  16. Pinzger, M., K. Graefenhain, P. Knab, and H.C. Gall, "A tool for visual understanding of source code dependencies", In Program Comprehension, ICPC 2008, The 16th IEEE International Conference on, IEEE, 2008, 254-259.
  17. Rico, D.F., "How to estimate ROI for inspections, PSP sm, TSP sm, SW-CMM ISO 9000, and CMMI sm", The DOD Software Tech News, Vol.5, No.4, 2002, 23-31.
  18. Seo, K.S. and H.M. Ahn, "Urban railway train operation efficiency studies using DEA", Autumn Conference & Annual Meeting of the The Korean Society For Railway, 2016, 456-449.
  19. Singer, J., C. Tjortjis, and M. Ward, "Using software metrics to evaluate static single assignment form in GCC", University of Ioannina-Greece, University of Western Macedonia-Greece, 2010.
  20. Van Den Brink, C. and S.W. Han, "Application of social network analysis for analyzing the relationships between root and direct causes of defects", Modern Applied Science, Vol.9, No.12, 2015, 12-20. https://doi.org/10.5539/mas.v9n12p12
  21. Vanhatalo, J., H. Volzer, and F. Leymann, "Faster and more focused control-flow analysis for business process models through SESE decomposition", International Conference on Service-Oriented Computing, Springer, Berlin, Heidelberg, 2007, 43-55.
  22. Wikipedia, "Social Network Analysis", 2018, Available at https://en.wikipedia.org/wiki/Social_network_analysis (Accessed June 12, 2018.)
  23. Zafarani, R., M.A. Abbasi, and H. Liu, "Social media mining: an introduction", Cambridge University Press, 2014.
  24. Zanetti, M.S., I. Scholtes, C.J. Tessone, and F. Schweitzer, "Categorizing bugs with social networks : A case study on four open source software communities", In Proceedings of the 2013 International Conference on Software Engineering, IEEE Press, 2013, 1032-1041.
  25. Zimmermann, T. and N. Nagappan, "Predicting defects using network analysis on dependency graphs", Software Engineering, 2008, ICSE'08, ACM/IEEE 30th International Conference on, IEEE, 2008, 531-540.