Standard

SATT: Tailoring Code Metric Thresholds for Different Software Architectures. / Aniche, Mauricio; Treude, Christoph; Zaidman, Andy; van Deursen, Arie; Gerosa, Marco Aurélio.

16th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2016. p. 41-50.

Research output: Scientific - peer-reviewConference contribution

Harvard

Aniche, M, Treude, C, Zaidman, A, van Deursen, A & Gerosa, MA 2016, SATT: Tailoring Code Metric Thresholds for Different Software Architectures. in 16th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, pp. 41-50, 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (Scam 2016), Raleigh, NC, United States, 2-3 October. DOI: 10.1109/SCAM.2016.19

APA

Aniche, M., Treude, C., Zaidman, A., van Deursen, A., & Gerosa, M. A. (2016). SATT: Tailoring Code Metric Thresholds for Different Software Architectures. In 16th International Working Conference on Source Code Analysis and Manipulation (SCAM). (pp. 41-50). IEEE. DOI: 10.1109/SCAM.2016.19

Vancouver

Aniche M, Treude C, Zaidman A, van Deursen A, Gerosa MA. SATT: Tailoring Code Metric Thresholds for Different Software Architectures. In 16th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE. 2016. p. 41-50. Available from, DOI: 10.1109/SCAM.2016.19

Author

Aniche, Mauricio; Treude, Christoph; Zaidman, Andy; van Deursen, Arie; Gerosa, Marco Aurélio / SATT: Tailoring Code Metric Thresholds for Different Software Architectures.

16th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2016. p. 41-50.

Research output: Scientific - peer-reviewConference contribution

BibTeX

@inbook{3992a2cc700244ed8e58f45027a81993,
title = "SATT: Tailoring Code Metric Thresholds for Different Software Architectures",
author = "Mauricio Aniche and Christoph Treude and Andy Zaidman and {van Deursen}, Arie and Gerosa, {Marco Aurélio}",
year = "2016",
doi = "10.1109/SCAM.2016.19",
pages = "41--50",
booktitle = "16th International Working Conference on Source Code Analysis and Manipulation (SCAM)",
publisher = "IEEE",
address = "United States",

}

RIS

TY - CHAP

T1 - SATT: Tailoring Code Metric Thresholds for Different Software Architectures

AU - Aniche,Mauricio

AU - Treude,Christoph

AU - Zaidman,Andy

AU - van Deursen,Arie

AU - Gerosa,Marco Aurélio

PY - 2016

Y1 - 2016

N2 - Code metric analysis is a well-known approach for assessing the quality of a software system. However, current tools and techniques do not take the system architecture (e.g., MVC, Android) into account. This means that all classes are assessed similarly, regardless of their specific responsibilities. In this paper, we propose SATT (Software Architecture Tailored Thresholds), an approach that detects whether an architectural role is considerably different from others in the system in terms of code metrics, and provides a specific threshold for that role. We evaluated our approach on 2 different architectures (MVC and Android) in more than 400 projects. We also interviewed 6 experts in order to explain why some architectural roles are different from others. Our results shows that SATT can overcome issues that traditional approaches have, especially when some architectural role presents very different metric values than others.

AB - Code metric analysis is a well-known approach for assessing the quality of a software system. However, current tools and techniques do not take the system architecture (e.g., MVC, Android) into account. This means that all classes are assessed similarly, regardless of their specific responsibilities. In this paper, we propose SATT (Software Architecture Tailored Thresholds), an approach that detects whether an architectural role is considerably different from others in the system in terms of code metrics, and provides a specific threshold for that role. We evaluated our approach on 2 different architectures (MVC and Android) in more than 400 projects. We also interviewed 6 experts in order to explain why some architectural roles are different from others. Our results shows that SATT can overcome issues that traditional approaches have, especially when some architectural role presents very different metric values than others.

U2 - 10.1109/SCAM.2016.19

DO - 10.1109/SCAM.2016.19

M3 - Conference contribution

SP - 41

EP - 50

BT - 16th International Working Conference on Source Code Analysis and Manipulation (SCAM)

PB - IEEE

ER -

ID: 12555763