Conference Paper

SUITE 2009: First international workshop on search-driven development - users, infrastructure, tools and evaluation.

DOI: 10.1109/ICSE-COMPANION.2009.5071054 Conference: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume
Source: DBLP

ABSTRACT SUITE is a new workshop series that specifically
focuses on exploring the notion of search as a
fundamental activity during software development.
The goal of the workshop is to bring researchers and
practitioners with special interest on search
technology for software developers together.
Participants will have broad range of expertise in
topics ranging from building software tools and
infrastructure, Information Retrieval, user studies
and Human-computer interaction, benchmarking and
evaluation. The first edition of SUITE is held in
conjunction with the 31st International Conference
in Software Engineering (May 16th, 2009. Vancouver,
Canada).

0 Bookmarks
 · 
61 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode and some additional information. For whoever wanting to integrate this jar in her own project, it is important to determine the license(s) of the code from which the jar archive was produced, as this affects the way that such component can be used. This paper proposes an automatic approach to determine the license of jar archives, combining the use of a code-search engine with the automatic classification of licenses contained in textual flies enclosed in the jar. Results of an empirical study performed on 37 jars - from 17 different systems - indicate that this approach is able to successfully infer the jar licenses in over 95% of the cases, but that in many cases the license in textual flies may differ from the one of the classes contained in the jar.
    Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on; 06/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper sketches a research path that seeks to examine the search for suitable code problem, based on the observation that when code retargeting is included within a code search activity, developers can justify the suitability of these results upfront and thus reduce their searching efforts looking for suitable code. To support this observation, this paper introduces the Snippet Retargeting Approach, or simply SNIPR. SNIPR complements code search with code retargeting capabilities. These capabilities' intent is to help expedite the process of determining if a found example is a best fit. They do that by allowing developers to explore code modification ideas in place, without requiring to leave the search interface. With SNIPR, developers engage in a virtuous loop where they find code, retarget code, and select only code choices they can justify as suitable. This assures immediate feedback on retargeted examples and thus saves valuable time searching for appropriate code.
    Software Engineering (ICSE), 2013 35th International Conference on; 01/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, users must be able to trust it, thus trustability of code search results is just as important as their relevance. In this paper, we introduce a trustability metric to help users assess the quality of code search results and therefore ease the cost-benefit analysis they undertake trying to find suitable integration candidates. The proposed trustability metric incorporates both user votes and cross-project activity of developers to calculate a "karma" value for each developer. Through the karma value of all its developers a project is ranked on a trustability scale. We present JBender, a proof-of-concept code search engine which implements our trustability metric and we discuss preliminary results from an evaluation of the prototype.
    02/2010;

Full-text (2 Sources)

View
22 Downloads
Available from
May 28, 2014