Proceedings of the 22nd International Conference on Software Engineering - ICSE '00 2000
DOI: 10.1145/337180.337200
|View full text |Cite
|
Sign up to set email alerts
|

Data mining library reuse patterns using generalized association rules

Abstract: In this paper, we show how data mining can be used to discover library reuse patterns in existing applications. Specifically, we consider the problem of discovering library classes and member functions that are typically reused in combination by application classes. This paper improves upon our earlier research using "association rules" [8] by taking into account the inheritance hierarchy using "generalized association rules". This turns out to be a non-trivial but worthwhile endeavor.By browsing generalized a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
2

Year Published

2001
2001
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(17 citation statements)
references
References 11 publications
0
15
0
2
Order By: Relevance
“…Michail [10] presented an approach based on itemset and association-rule mining to uncover entities such as components, classes, and functions that occur frequently together in library usages. Similar to the work presented here, Li et al [7] addresses the question of extracting rules and violations of typical usages of function calls in a system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Michail [10] presented an approach based on itemset and association-rule mining to uncover entities such as components, classes, and functions that occur frequently together in library usages. Similar to the work presented here, Li et al [7] addresses the question of extracting rules and violations of typical usages of function calls in a system.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, researchers [7,8,10] have applied datamining techniques, specifically frequent-pattern mining algorithms, to the problem of uncovering/discovering call-usage patterns from the source code of large systems. The result is a set of rules that describe frequently occurring call-usage patterns within a system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Die Mustererkennung wird zum Teil mit einer anschließenden Filterung anhand dynamischer Information über das Protokoll kombiniert, um Verhaltenseigenschaften bei der Suche miteinzubeziehen [82]. Auch Data-Mining-Techniken kommen zum Einsatz [85].…”
Section: Dekompositionunclassified
“…That is, they form latent programming rules that seldom exist outside the minds of developers. Such rules have been found to be potentially useful for tasks such as identification of standard library/API usages and fault location [4][5][6]. Violations of these rules can be very difficult to uncover, report to issue-tracking systems, and fix unless the rules are explicitly documented.…”
Section: Introductionmentioning
confidence: 99%