Identifying Important Packages of Object-Oriented Software Using Weighted k-Core Decomposition

Journal of Intelligent Systems 23 (4):461-476 (2014)

Abstract
Identifying important entities in software systems has many implications for effective resource allocation. Complex network research opens new opportunities for identifying important entities from software networks. However, the existing methods only focus on identifying important classes. Little work has been done on the identification of important packages. Moreover, the metrics they used to quantify the class importance are only designed for unweighted software networks and cannot fit in with the weighted software networks. To overcome these limitations, in this article, we introduce the weighted k-core decomposition method to identify the important packages. First, we use a weighted software network to describe packages and their internal dependencies. Second, we use Wk-core to partition a software network into a layered structure. Then, the packages that are denoted by the nodes within the main core are the identified important packages. To evaluate our method, we use a variant of the susceptible–infectious–recovered model to examine the spreading influence of the nodes in six real weighted software networks. The results show that our method can well identify influential nodes, better than other four methods. Furthermore, we demonstrate our method on two software networks and show that the important packages identified by our method are more meaningful from a software engineering perspective when compared with the other methods.
Keywords No keywords specified (fix it)
Categories (categorize this paper)
ISBN(s)
DOI 10.1515/jisys-2014-0015
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 47,299
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

SP2MN: A Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
Toward a Profile of Student Software Piraters.Ronald R. Sims, Hsing K. Cheng & Hildy Teegen - 1996 - Journal of Business Ethics 15 (8):839 - 849.
Software Quality and Group Performance.Yuk Kuen Wong - 2009 - AI and Society 23 (4):559-573.
Software is an Abstract Artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.

Analytics

Added to PP index
2017-01-12

Total views
6 ( #1,006,075 of 2,290,952 )

Recent downloads (6 months)
2 ( #581,637 of 2,290,952 )

How can I increase my downloads?

Downloads

My notes

Sign in to use this feature