Advertisement
Advertisement

More Related Content

Advertisement

More from Raffi Khatchadourian(20)

Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software

  1. Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software Raffi Khatchadourian, Ohio State University Joint work with Phil Greenwood and Awais Rashid, Lancaster University, UK and Guoqing Xu, Ohio State University Work in progress at University of Tokyo with Hidehiko Masuhara
  2. Motivation
  3. Motivation • Software changes over time:
  4. Motivation • Software changes over time: • Requirements evolve
  5. Motivation • Software changes over time: • Requirements evolve • New platforms emerge (e.g., mobile devices)
  6. Motivation • Software changes over time: • Requirements evolve • New platforms emerge (e.g., mobile devices) • Frameworks change(e.g., XML vs. annotation-based)
  7. Motivation
  8. Motivation Changing and/or maintaining large, complex software systems can be non-trivial: Tedious: May require changing many lines of code. Error-prone: Changes may be implemented incorrectly. May miss opportunities to produce Omission-prone: better code.
  9. Motivation Changing and/or maintaining large, complex software systems can be non-trivial: Tedious: May require changing many lines of code. Error-prone: Changes may be implemented incorrectly. May miss opportunities to produce Omission-prone: better code.
  10. Motivation Changing and/or maintaining large, complex software systems can be non-trivial: Tedious: May require changing many lines of code. Error-prone: Changes may be implemented incorrectly. May miss opportunities to produce Omission-prone: better code.
  11. Motivation Changing and/or maintaining large, complex software systems can be non-trivial: Tedious: May require changing many lines of code. Error-prone: Changes may be implemented incorrectly. May miss opportunities to produce Omission-prone: better code.
  12. Approach
  13. Approach • Approaches made to provide mechanical assistance in evolution tasks.
  14. Approach • Approaches made to provide mechanical assistance in evolution tasks. • Typically in the form of plug-ins to IDEs.
  15. Approach • Approaches made to provide mechanical assistance in evolution tasks. • Typically in the form of plug-ins to IDEs. • Ease the burden of software maintenance and evolution.
  16. Approach Restrict workspace to only • Approaches made to displays elements provide mechanical relevant to the assistance in evolution task tasks. • Typically in the form of plug-ins to IDEs. • Ease the burden of software maintenance and evolution.
  17. Approach Restrict workspace to only • Approaches made to displays elements provide mechanical relevant to the assistance in evolution task tasks. • Typically in the form of plug-ins to IDEs. Restructure •code the burden of Ease while preserving semantics (i.e., software maintenance and evolution. refactoring)
  18. Goal and Outline
  19. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software.
  20. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software. • Will present:
  21. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software. • Will present: • Existing work on altering broken pointcut expressions using an automated technique.
  22. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software. • Will present: Pointcut Rejuvenation • Existing work on altering broken pointcut expressions using an automated technique.
  23. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software. • Will present: • Existing work on altering broken pointcut expressions using an automated technique. • Current work on automatically detecting broken pointcuts as the developer is typing.
  24. Goal and Outline • Develop techniques to mechanically alleviate the burden caused by fragile pointcuts in Aspect- Oriented software. • Will present: • Existing work on altering broken pointcut expressions using an automated technique. • Current work on automatically detecting broken pointcuts as the developer is typing. Pointcut Change Prediction
  25. Crosscutting Concerns in Software
  26. Crosscutting Concerns in Software • Crosscutting concerns (CCCs) affect many heterogenous modules of a typical software system.
  27. Crosscutting Concerns in Software • Crosscutting concerns (CCCs) affect many heterogenous modules of a typical software system. • Code is usually:
  28. Crosscutting Concerns in Software • Crosscutting concerns (CCCs) affect many heterogenous modules of a typical software system. • Code is usually: • Scattered throughout many modules.
  29. Crosscutting Concerns in Software • Crosscutting concerns (CCCs) affect many heterogenous modules of a typical software system. • Code is usually: • Scattered throughout many modules. • Tangled with unrelated modules.
  30. Crosscutting Concerns in Software • Crosscutting concerns (CCCs) affect many heterogenous modules of a typical software system. • Code is usually: • Scattered throughout many modules. • Tangled with unrelated modules. include logging, Classic CCCs synchronization, authentication.
  31. Aspect-Oriented Programming
  32. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs:
  33. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice.
  34. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts:
  35. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution.
  36. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. Base code
  37. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. • Denote where a CCC applies.
  38. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. • Denote where a CCC applies. • Advice is:
  39. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. • Denote where a CCC applies. • Advice is: • Bound to a pointcut.
  40. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. • Denote where a CCC applies. • Advice is: • Bound to a pointcut. • Executed whenever control reaches any join point selected by the pointcut.
  41. Aspect-Oriented Programming • Aspect-Oriented Programming (AOP) enables localized implementations of CCCs: Focus of today’s talk • CCC implementations encapsulated in advice. • Pointcuts: • Predicate-like expressions over well-defined (join) points in a program’s execution. • Denote where a CCC applies. • Advice is: • Bound to a pointcut. • Executed whenever control reaches any join point selected by the pointcut.
  42. Example Base Code package p; class A { int f; void m1() { int a = f + 1; } void m2() { int b = f + 2; } void n() { f = 3; } }
  43. Example Base Code package p; class A { int f; void m1() { int a = f + 1; } void m2() { int b = f + 2; } void n() { f = 3; } }
  44. Example Base Code package p; class A { • Two methods whose int f; name begins with the character m. void m1 m1() { int a = f + 1; } void m2 m2() { int b = f + 2; } void n() { f = 3; } }
  45. Example Base Code package p; class A { • Two methods whose int f; name begins with the character m. void m1() { int a = f + 1; • One method whose name } does not begin with the character m. void m2() { int b = f + 2; } void n n() { f = 3; } }
  46. Example Base Code package p; class A { • Two methods whose int f; f name begins with the character m. void m1() { int a = f + 1; • One method whose name } does not begin with the character m. void m2() { int b = f + 2; • Method bodies of m1 and } m2 read from a field f. void n() { f = 3; } }
  47. Example Base Code package p; class A { • Two methods whose int f; f name begins with the character m. void m1() { int a = f + 1; • One method whose name } does not begin with the character m. void m2() { int b = f + 2; • Method bodies of m1 and } m2 read from a field f. void n() { f = 3; • Method body of n writes } to field f. }
  48. Pointcut Example pointcut mayBeFragile() : execution(* m*(..));
  49. Pointcut Example pointcut mayBeFragile() : execution(* m*(..)); • Selects m1() and m2() but not n().
  50. Pointcut Example pointcut mayBeFragile() : execution(* m*(..)); • Selects m1() and m2() but not n(). • Assume that correct join points are selected.
  51. Pointcut Example pointcut mayBeFragile() : execution(* m*(..)); • Selects m1() and m2() but not n(). • Assume that correct join points are selected. CCC applies to m1 and m2 but not p.
  52. Pointcut Properties
  53. Pointcut Properties • A pointcut is robust if it is able to continue to capture the intended join points in future base code versions without being altered.
  54. Pointcut Properties • A pointcut is robust if it is able to continue to capture the intended join points in future base code versions without being altered. • Otherwise, it is fragile.
  55. void p() { int d = f + 4; A new method } is added to the base code
  56. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); W ha ta po bo int ut cu th t? e
  57. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); • Same pointcut selects m1() and m2() but not n() and p().
  58. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); • Same pointcut selects m1() and m2() but not n() and p(). • Assume CCC applies to p().
  59. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); • Same pointcut selects m1() and m2() but not n() and p(). • Assume CCC applies to p(). • mayBeFragile() is fragile!
  60. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); • Same pointcut selects m1() and m2() but not n() and p(). • Assume CCC applies to p(). • mayBeFragile() is fragile! • p() silently fall out of pointcut’s scope.
  61. void p() { int d = f + 4; } pointcut mayBeFragile() : execution(* m*(..)); • Same pointcut selects m1() and m2() but not n() and p(). • Assume CCC applies to p(). • mayBeFragile() is fragile! • p() silently fall out of pointcut’s scope. • May be difficult to identify in large base codes.
  62. Phase I: Leverage Structural Commonality
  63. Phase I: Leverage Structural Commonality • Build a Concern Graph [Robillard, Murphy ’02]. m1 gets declares f gets m2 declares A sets declares n
  64. Phase I: Leverage Structural Commonality • Build a Concern Graph [Robillard, Murphy ’02]. • Extract commonalities between currently selected join points. m1 gets declares f gets m2 declares A sets declares n
  65. Phase I: Leverage Structural Commonality • Build a Concern Graph [Robillard, Murphy ’02]. • Extract commonalities between currently selected join points. • Find common sinks and sources in the graph. m1 gets (A,declares,?) declares f (?,gets, f) gets m2 declares A sets declares n
  66. Evaluating Patterns [Dagenais, Breu, Warr, Robillard ’07] (?,gets, f) (A,declares,?) m1 gets declares f gets m2 declares A sets declares n
  67. Evaluating Patterns [Dagenais, Breu, Warr, Robillard ’07] (?,gets, f) (A,declares,?) {m1,m2} m1 gets declares f gets m2 declares A sets declares n
  68. Evaluating Patterns [Dagenais, Breu, Warr, Robillard ’07] (?,gets, f) (A,declares,?) 100% confidence! {m1,m2} m1 gets declares f gets m2 declares A sets declares n
  69. Evaluating Patterns [Dagenais, Breu, Warr, Robillard ’07] (?,gets, f) (A,declares,?) 100% confidence! {m1,m2} {m1,m2,n} m1 gets declares f gets m2 declares A sets declares n
  70. Evaluating Patterns [Dagenais, Breu, Warr, Robillard ’07] (?,gets, f) (A,declares,?) 100% 66% confidence! confidence {m1,m2} {m1,m2,n} m1 gets declares f gets m2 declares A sets declares n
  71. Storing patterns for Phase II (?,gets, f) (A,declares,?) 100% 66% confidence! confidence XML
  72. Storing patterns for Phase II XML
  73. It’s a little more complicated ...
  74. It’s a little more complicated ... • Pattern evaluation is done on several other different levels.
  75. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation:
  76. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut.
  77. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut. • Another dimension is the β evaluation:
  78. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut. • Another dimension is the β evaluation: • Considers the completeness of the structural relationship expressed by the pattern compared to relationships expressed by the pointcut.
  79. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut. • Another dimension is the β evaluation: • Considers the completeness of the structural relationship expressed by the pattern compared to relationships expressed by the pointcut. • Lastly, there is an abstractness evaluation:
  80. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut. • Another dimension is the β evaluation: • Considers the completeness of the structural relationship expressed by the pattern compared to relationships expressed by the pointcut. • Lastly, there is an abstractness evaluation: • Considers the ratio of wild-cards (?) to concrete elements in the pattern as patterns can be arbitrarily deep.
  81. It’s a little more complicated ... • Pattern evaluation is done on several other different levels. • Previously illustrated the α evaluation: • Considers the strength of the structural relationships between elements produced by the pattern and those selected by the pointcut. • Another dimension is the β evaluation: • Considers the completeness of the structural relationship expressed by the pattern compared to relationships expressed by the pointcut. • Lastly, there is an abstractness evaluation: • Considers the ratio of wild-cards (?) to concrete elements in the pattern as patterns can be arbitrarily deep. • All three dimensions are combined to produce a patterns confidence value.
  82. SACTIONS OF SOFTWARE ENGINEERING, VOL. X, NO. Y, Z 20AB  0 if | Match (ˆ , Paths ( C G + ))| = 0 π err (ˆ , PCE) = π |PCE ∩ Match (ˆ , Paths ( C G + ))| π 1 − otherwise | Match (ˆ , Paths ( C G ))| π +  1 if |PCE| = 0 err (ˆ , PCE) = π |PCE ∩ Match (ˆ , Paths ( C G + ))| π 1 − otherwise |PCE|  1 if |ˆ | = 0 π abs (ˆ ) = π |ˆ | − |W(ˆ )| π π 1 − otherwise |ˆ | π conf (ˆ , PCE) = π 1 − [err (ˆ , PCE)(1 − abs (ˆ )) + err (ˆ , PCE) abs (ˆ )] π π π π Pattern attribute equations. allSpeed). Thus, the err rate for this pattern projection of wild card elements contained e PCE found on line 3 of Figure 2, which selects π . Likewise, |W(ˆ )| represents the number o ˆ π ution of methods DieselEngine.increase(Fuel) and elements contained within pattern π . Then, t ˆ
  83. All join points
  84. All join points Pointcut
  85. All join points Pointcut Pattern
  86. All join points Pointcut Pattern α
  87. All join points Pointcut β Pattern α
  88. All join points Pointcut β Pattern α A ? ? ? ?
  89. All join points Pointcut β Pattern α A ? ? ? ? abs
  90. Phase II: Expression Recovery
  91. Phase II: Expression Recovery void p() { int d = f + 4; A new method } is added to the base code
  92. Phase II: Expression Recovery void p() { int d = f + 4; A new method } is added to the base code m1 gets declares f gets m2 declares A sets declares gets n declares p
  93. Phase II: Expression Recovery void p() { int d = f + 4; A new method } is added to the base code m1 (?,gets, f) gets (A,declares,?) declares f gets m2 declares A sets declares gets n declares XML p
  94. (?,gets, f)
  95. (?,gets, f) {m1,m2,p}
  96. (?,gets, f) 100% confidence! {m1,m2,p}
  97. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p}
  98. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2}
  99. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p}
  100. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?)
  101. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) {m1,m2,n,p}
  102. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) 66% confidence {m1,m2,n,p}
  103. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p}
  104. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2}
  105. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2} = {n,p}
  106. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2} = {n,p} p is suggested with (100 + 66) / 2 ≈ 83% confidence
  107. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2} = {n,p} p is suggested with (100 + 66) / 2 ≈ 83% confidence n is suggested with 66% confidence
  108. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2} = {n,p} p is suggested with (100 + 66) / 2 ≈ 83% confidence n is suggested with 66% confidence execution(* m*(..)) || execution (* p())
  109. (?,gets, f) execution(* m*(..)) 100% confidence! {m1,m2,p} {m1,m2} = {p} (A,declares,?) execution(* m*(..)) 66% confidence {m1,m2,n,p} {m1,m2} = {n,p} p is suggested with (100 + 66) / 2 ≈ 83% Suggestions confidence n is suggested with 66% confidence sorted by confidence in IDE execution(* m*(..)) || execution (* p())
  110. mplementation Implementation
  111. Evaluation: Phase I subject KL. cls. PC shd. KP. α β t (s) AJHotDraw 21.8 298 32 90 3.36 0.32 0.06 101 Ants 1.57 33 22 297 1.25 0.15 0.23 43 Bean 0.12 2 2 4 0.02 0.24 0.23 4 Contract4J 10.7 199 15 350 1.80 0.26 0.44 115 DCM 1.68 29 8 343 2.47 0.15 0.45 4 Figure 0.10 5 1 6 0.02 0.11 0.45 8 Glassbox 26.0 430 55 208 2.62 0.1 0.29 228 HealthWatcher 5.72 76 27 122 1.00 0.21 0.16 22 Cactus 7.57 93 4 222 2.15 0.21 0.52 8 LoD 1.59 29 5 164 0.54 0.15 0.41 46 MobilePhoto 3.80 52 25 25 0.78 0.23 0.00 11 MySQLa 44.0 187 2 3016 17.6 0.12 0.58 379 NullCheck 1.47 27 1 112 0.10 0.17 0.55 293 N-Version 0.55 15 4 9 0.08 0.19 0.24 1 Quicksort 0.07 3 4 7 0.06 0.19 0.15 3 RacerAJ 0.58 13 4 9 0.02 0.23 0.09 5 RecoveryCache 0.22 3 4 14 0.07 0.11 0.21 6 Spacewar 1.42 21 9 58 0.23 0.15 0.22 37 StarJ-Pool 38.2 511 1 3 0.07 0.25 0.00 75 Telecom 0.28 10 4 5 0.03 0.21 0.02 7 Tetris 1.04 8 18 27 0.50 0.16 0.01 14 TollSystem 5.20 88 35 85 1.68 0.26 0.06 20 Tracing 0.37 5 16 132 0.68 0.17 0.4 1 Totals: 174 2137 298 5308 37.1 0.18 0.16 1431
  112. Evaluation: Phase I subject KL. cls. PC shd. KP. α β t (s) AJHotDraw 21.8 298 32 90 3.36 0.32 0.06 101 Ants 1.57 33 22 297 1.25 0.15 0.23 43 Bean 0.12 2 2 4 0.02 0.24 0.23 4 Contract4J 10.7 199 15 350 1.80 0.26 0.44 115 DCM 1.68 29 8 343 2.47 0.15 0.45 4 Figure 0.10 5 1 6 0.02 0.11 0.45 8 Glassbox 26.0 430 55 208 2.62 0.1 0.29 228 HealthWatcher 5.72 76 27 122 1.00 0.21 0.16 22 Cactus 7.57 93 4 222 2.15 0.21 0.52 8 LoD 1.59 29 5 164 0.54 0.15 0.41 46 MobilePhoto 3.80 52 25 25 0.78 0.23 0.00 11 MySQLa 44.0 187 2 3016 17.6 0.12 0.58 379 NullCheck 1.47 27 1 112 0.10 0.17 0.55 293 N-Version 0.55 15 4 9 0.08 0.19 0.24 1 Quicksort 0.07 3 4 7 0.06 0.19 0.15 3 RacerAJ 0.58 13 4 9 0.02 0.23 0.09 5 RecoveryCache 0.22 3 4 14 0.07 0.11 0.21 6 Spacewar 1.42 21 9 58 0.23 0.15 0.22 37 StarJ-Pool 38.2 511 1 3 0.07 0.25 0.00 75 Telecom 0.28 10 4 5 0.03 0.21 0.02 7 Tetris 1.04 8 18 27 0.50 0.16 0.01 14 TollSystem 5.20 88 35 85 1.68 0.26 0.06 20 Tracing 0.37 5 16 132 0.68 0.17 0.4 1 Totals: 174 2137 298 5308 37.1 0.18 0.16 1431
  113. Evaluation: Phase I subject KL. cls. PC shd. KP. α β t (s) AJHotDraw 21.8 298 32 90 3.36 0.32 0.06 101 Ants 1.57 33 22 297 1.25 0.15 0.23 43 Bean 0.12 2 2 4 0.02 0.24 0.23 4 Contract4J 10.7 199 15 350 1.80 0.26 0.44 115 DCM 1.68 29 8 343 2.47 0.15 0.45 4 Figure 0.10 5 1 6 0.02 0.11 0.45 8 Glassbox 26.0 430 55 208 2.62 0.1 0.29 228 HealthWatcher 5.72 76 27 122 1.00 0.21 0.16 22 Cactus 7.57 93 4 222 2.15 0.21 0.52 8 LoD 1.59 29 5 164 0.54 0.15 0.41 46 MobilePhoto 3.80 52 25 25 0.78 0.23 0.00 11 MySQLa 44.0 187 2 3016 17.6 0.12 0.58 379 NullCheck 1.47 27 1 112 0.10 0.17 0.55 293 N-Version 0.55 15 4 9 0.08 0.19 0.24 1 Quicksort 0.07 3 4 7 0.06 0.19 0.15 3 RacerAJ 0.58 13 4 9 0.02 0.23 0.09 5 4.8 secs per RecoveryCache Spacewar 0.22 1.42 3 21 4 9 14 0.07 0.11 0.21 58 0.23 0.15 0.22 6 37 pointcut StarJ-Pool Telecom 38.2 511 0.28 10 1 4 3 0.07 0.25 0.00 5 0.03 0.21 0.02 75 7 Tetris 1.04 8 18 27 0.50 0.16 0.01 14 TollSystem 5.20 88 35 85 1.68 0.26 0.06 20 Tracing 0.37 5 16 132 0.68 0.17 0.4 1 Totals: 174 2137 298 5308 37.1 0.18 0.16 1431
  114. Evaluation: Phase 2
  115. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects.
  116. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects. • Rejuvenated pointcuts (49 in total) over major releases (20 in total).
  117. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects. • Rejuvenated pointcuts (49 in total) over major releases (20 in total). • Maximum pattern length set to 2 edges.
  118. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects. • Rejuvenated pointcuts (49 in total) over major releases (20 in total). • Maximum pattern length set to 2 edges. • Able to identify 93% of new shadows introduced in later versions that were not selected by previous pointcut representations.
  119. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects. • Rejuvenated pointcuts (49 in total) over major releases (20 in total). • Maximum pattern length set to 2 edges. • Able to identify 93% of new shadows introduced in later versions that were not selected by previous pointcut representations. • On average, 3.97 suggestions appeared before true positives.
  120. Evaluation: Phase 2 • Applied to 3 multi-versioned AspectJ projects. • Rejuvenated pointcuts (49 in total) over major releases (20 in total). • Maximum pattern length set to 2 edges. • Able to identify 93% of new shadows introduced in later versions that were not selected by previous pointcut representations. • On average, 3.97 suggestions appeared before true positives. • On average, 10.95 secs. required to rejuvenate a pointcut.
  121. Future work
  122. Future work • Improve performance
  123. Future work • Improve performance • Use graph reduction techniques [Robillard, Murphy, ’02].
  124. Future work • Improve performance • Use graph reduction techniques [Robillard, Murphy, ’02]. • Faster engine (e.g., PROLOG-based).
  125. Future work • Improve performance • Use graph reduction techniques [Robillard, Murphy, ’02]. • Faster engine (e.g., PROLOG-based). • Less conservative analysis (e.g., RTA, VTA).
  126. Future work • Improve performance • Use graph reduction techniques [Robillard, Murphy, ’02]. • Faster engine (e.g., PROLOG-based). • Less conservative analysis (e.g., RTA, VTA). • Dynamic analysis for dynamic pointcuts.
  127. Future work • Improve performance • Use graph reduction techniques [Robillard, Murphy, ’02]. • Faster engine (e.g., PROLOG-based). • Less conservative analysis (e.g., RTA, VTA). • Dynamic analysis for dynamic pointcuts. • Faster intermediate representations (e.g., Soot/ABC).
  128. More Future Work
  129. More Future Work • Additional language features:
  130. More Future Work • Additional language features: • Inter-type declarations.
  131. More Future Work • Additional language features: • Inter-type declarations. • Advice code analysis.
  132. More Future Work • Additional language features: • Inter-type declarations. • Advice code analysis. • Additional forms of commonality:
  133. More Future Work • Additional language features: • Inter-type declarations. • Advice code analysis. • Additional forms of commonality: • Source code version repository history information.
  134. More Future Work • Additional language features: • Inter-type declarations. • Advice code analysis. • Additional forms of commonality: • Source code version repository history information. • For example, several methods may have been committed together in one SVN version.
  135. Downloads • Tool research prototype publicly available at http:// code.google.com/p/rejuvenate-pc. • Research related material publicly available at http:// sites.google.com/site/pointcutrejuvenation.

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. Changing a method to accommodate a new parameter requires changing the method declaration for each method in the type hierarchy, examining other methods in the hierarchy to assure they are not being overridden, and altering each method invocation site scattered throughout the source code.\n\nHashMap iterator is fail-safe while Hashtable enumerator isn't. If you change the map while iterating, you'll know.\n\n
  7. Changing a method to accommodate a new parameter requires changing the method declaration for each method in the type hierarchy, examining other methods in the hierarchy to assure they are not being overridden, and altering each method invocation site scattered throughout the source code.\n\nHashMap iterator is fail-safe while Hashtable enumerator isn't. If you change the map while iterating, you'll know.\n\n
  8. Changing a method to accommodate a new parameter requires changing the method declaration for each method in the type hierarchy, examining other methods in the hierarchy to assure they are not being overridden, and altering each method invocation site scattered throughout the source code.\n\nHashMap iterator is fail-safe while Hashtable enumerator isn't. If you change the map while iterating, you'll know.\n\n
  9. Changing a method to accommodate a new parameter requires changing the method declaration for each method in the type hierarchy, examining other methods in the hierarchy to assure they are not being overridden, and altering each method invocation site scattered throughout the source code.\n\nHashMap iterator is fail-safe while Hashtable enumerator isn't. If you change the map while iterating, you'll know.\n\n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. Advice is not explicitly invoked.\n
  28. Advice is not explicitly invoked.\n
  29. Advice is not explicitly invoked.\n
  30. Advice is not explicitly invoked.\n
  31. Advice is not explicitly invoked.\n
  32. Advice is not explicitly invoked.\n
  33. Advice is not explicitly invoked.\n
  34. Advice is not explicitly invoked.\n
  35. Advice is not explicitly invoked.\n
  36. Advice is not explicitly invoked.\n
  37. Advice is not explicitly invoked.\n
  38. Advice is not explicitly invoked.\n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  70. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  71. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  72. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  73. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  74. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  75. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  76. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  77. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  78. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  79. Definition of fragile is the the PCE continues to select the desired join points as base-code evolves without a change in its textual representation.\n
  80. \n
  81. \n
  82. \n
  83. \n
  84. \n
  85. \n
  86. \n
  87. \n
  88. \n
  89. \n
  90. \n
  91. \n
  92. \n
  93. \n
  94. \n
  95. \n
  96. \n
  97. \n
  98. \n
  99. \n
  100. \n
  101. \n
  102. \n
  103. \n
  104. \n
  105. \n
  106. \n
  107. \n
  108. \n
  109. \n
  110. \n
  111. \n
  112. \n
  113. \n
  114. \n
  115. \n
  116. \n
  117. \n
  118. \n
  119. \n
  120. \n
  121. \n
  122. \n
  123. \n
  124. \n
  125. \n
  126. \n
  127. \n
  128. \n
  129. \n
  130. \n
  131. \n
  132. \n
  133. \n
  134. \n
  135. \n
  136. \n
  137. \n
  138. \n
  139. \n
  140. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  141. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  142. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  143. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  144. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  145. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  146. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  147. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  148. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  149. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  150. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  151. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  152. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  153. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  154. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  155. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  156. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  157. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  158. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  159. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  160. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  161. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  162. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  163. There’s also the reverse situation where selected join points may no longer belong in the scope of the pointcut. We won’t discuss that today for brevity.\n
  164. \n
  165. \n
  166. \n
  167. \n
  168. \n
  169. \n
  170. \n
  171. \n
  172. \n
  173. \n
  174. \n
  175. \n
  176. \n
  177. \n
  178. \n
  179. \n
  180. \n
  181. \n
  182. \n
  183. \n
  184. \n
  185. \n
Advertisement