2012 34th International Conference on Software Engineering (ICSE) 2012
DOI: 10.1109/icse.2012.6227109
|View full text |Cite
|
Sign up to set email alerts
|

How much does unused code matter for maintenance?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 17 publications
0
18
0
2
Order By: Relevance
“…We expect this effect to be small, since developers told us there are no such mechanisms. The collection procedure itself has shown to be working with sufficient accuracy in earlier research [9,8].…”
Section: Threats To Validitymentioning
confidence: 95%
See 1 more Smart Citation
“…We expect this effect to be small, since developers told us there are no such mechanisms. The collection procedure itself has shown to be working with sufficient accuracy in earlier research [9,8].…”
Section: Threats To Validitymentioning
confidence: 95%
“…For calculating change coverage (see the following section), we use profiling data from an ephemeral profiler [21] as in our earlier work [8,9]. The profiler does not record how often a method was called, just whether it was called during a fixed time interval.…”
Section: Starting Pointmentioning
confidence: 99%
“…‚ Usage data collected by an ephemeral profiler 2 [19]. The resulting log files list the executed methods 3 . ‚ Source code of the software system 4 .…”
Section: Inputmentioning
confidence: 99%
“…This could produce less unused methods, which leads to less unused features. However, this profiler was used for several years in the environment under consideration (see [3], [21], [22]) without significant or visible errors. Therefore, we are confident that the errors introduced are small, if existent.…”
Section: E Threats To Validitymentioning
confidence: 99%
See 1 more Smart Citation