Analyzing the structure of Java software systems by weighted K-core decomposition
Statistical properties of un-weighted software networks have been extensively studied. However, software networks in their nature should be weighted. Understanding the properties enclosed in the weighted software networks can lead to better software engineering practices. In this paper, we construct...
Uloženo v:
| Vydáno v: | Future generation computer systems Ročník 83; s. 431 - 444 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.06.2018
|
| Témata: | |
| ISSN: | 0167-739X, 1872-7115 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Statistical properties of un-weighted software networks have been extensively studied. However, software networks in their nature should be weighted. Understanding the properties enclosed in the weighted software networks can lead to better software engineering practices. In this paper, we construct a set of weighted software networks from real-world Java software systems and empirically investigate their topological properties by using weighted k-core decomposition. First, we investigate the static topological properties of the weighted k-core structure, and find that small value of the graph coreness is a property shared by many software systems, the distribution of weighted coreness follows a power law with an exponential cutoff, and weighted coreness and node degree are closely correlated with their spearman correlation coefficients larger than 0.94. Second, we analyze the evolving topological properties of the weighted k-core structure, including the graph coreness, size of the main core, and new members and vanishing members of the main core. Empirical results show that the graph coreness will keep relatively stable unless the system undergoes major changes, size of the main core keeps stable in its evolution, and new members or vanishing members of a main core are from or go to the shells very near the corresponding main cores. Finally, we apply the weighted k-core decomposition method to identify the key classes, and find that, compared with other nine approaches, our approach performs best in the whole set of subject systems according to the average ranking of the Friedman test. It can identify a majority of classes deemed important. This work could help developers to improve software understanding, propose new metrics for software measurement and evaluate the quality of the system in development.
•We propose an approach to empirically investigate the static and evolving topological properties enclosed in the weighted software networks by using weighted k-core decomposition.•We propose a weighted software network to represent the topological structure of a software system at the class level, which uses the coupling frequencies to assign weights to the edges.•Our approach is illustrated using a set of 16 open source software systems and several interesting observations are obtained. |
|---|---|
| AbstractList | Statistical properties of un-weighted software networks have been extensively studied. However, software networks in their nature should be weighted. Understanding the properties enclosed in the weighted software networks can lead to better software engineering practices. In this paper, we construct a set of weighted software networks from real-world Java software systems and empirically investigate their topological properties by using weighted k-core decomposition. First, we investigate the static topological properties of the weighted k-core structure, and find that small value of the graph coreness is a property shared by many software systems, the distribution of weighted coreness follows a power law with an exponential cutoff, and weighted coreness and node degree are closely correlated with their spearman correlation coefficients larger than 0.94. Second, we analyze the evolving topological properties of the weighted k-core structure, including the graph coreness, size of the main core, and new members and vanishing members of the main core. Empirical results show that the graph coreness will keep relatively stable unless the system undergoes major changes, size of the main core keeps stable in its evolution, and new members or vanishing members of a main core are from or go to the shells very near the corresponding main cores. Finally, we apply the weighted k-core decomposition method to identify the key classes, and find that, compared with other nine approaches, our approach performs best in the whole set of subject systems according to the average ranking of the Friedman test. It can identify a majority of classes deemed important. This work could help developers to improve software understanding, propose new metrics for software measurement and evaluate the quality of the system in development.
•We propose an approach to empirically investigate the static and evolving topological properties enclosed in the weighted software networks by using weighted k-core decomposition.•We propose a weighted software network to represent the topological structure of a software system at the class level, which uses the coupling frequencies to assign weights to the edges.•Our approach is illustrated using a set of 16 open source software systems and several interesting observations are obtained. |
| Author | Pan, Weifeng Liu, Jing Hu, Bo Li, Bing Ma, Yutao |
| Author_xml | – sequence: 1 givenname: Weifeng surname: Pan fullname: Pan, Weifeng email: wfpan@mail.zjgsu.edu.cn organization: School of Computer Science and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, China – sequence: 2 givenname: Bing surname: Li fullname: Li, Bing email: bingli@whu.edu.cn organization: International School of Software, Wuhan University, Wuhan 430072, China – sequence: 3 givenname: Jing surname: Liu fullname: Liu, Jing email: j_liu@whu.edu.cn organization: State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China – sequence: 4 givenname: Yutao surname: Ma fullname: Ma, Yutao email: ytma@whu.edu.cn organization: State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China – sequence: 5 givenname: Bo surname: Hu fullname: Hu, Bo email: bob_hu@kingdee.com organization: Kingdee Research, Kingdee International Software Group Co. Ltd., Shenzhen, Guangdong 518057, China |
| BookMark | eNqFkM9KAzEQxoNUsFbfwENeYNdks900HoRS_F8QQcFbyGYnbUq7KUnasj69WerJg15mYOb7fcx852jQuhYQuqIkp4RW16vc7OLOQ14QynMicsLECRrSCS8yTul4gIZJxjPOxOcZOg9hRUhSMjpEb9NWrbsv2y5wXAIO0e90b4Wdwc9qr3BwJh5UGoQuRNgEXHf4AHaxjNDgl0y7tGpAu83WBRutay_QqVHrAJc_fYQ-7u_eZ4_Z_PXhaTadZ5qRKmac64qNa2UU06YUTVVXEyDK8EqlWhBTFFXdlBNaVqI0RjBKikIJzhhwaghjI3Rz9NXeheDBSG2j6i-IXtm1pET24ciVPIYj-3AkETKFk-DyF7z1dqN89x92e8QgPba34GXQFloNjfWgo2yc_dvgG25shMA |
| CitedBy_id | crossref_primary_10_1145_3688844 crossref_primary_10_1016_j_asoc_2020_106158 crossref_primary_10_1155_2020_4960439 crossref_primary_10_1007_s10586_017_1694_6 crossref_primary_10_1016_j_jag_2023_103349 crossref_primary_10_1109_TSE_2020_3042553 crossref_primary_10_4018_IJWSR_2019010102 crossref_primary_10_1155_2020_7279420 crossref_primary_10_1016_j_physrep_2019_10_004 crossref_primary_10_1155_2020_5102897 crossref_primary_10_3390_axioms11050205 crossref_primary_10_1109_ACCESS_2021_3105475 crossref_primary_10_1155_2020_3748383 crossref_primary_10_1109_TSE_2019_2892959 crossref_primary_10_1016_j_cja_2018_04_011 crossref_primary_10_1155_2020_9234042 crossref_primary_10_3390_e24050652 crossref_primary_10_1155_2022_5106001 crossref_primary_10_1155_2020_3428604 crossref_primary_10_1155_2021_6734248 crossref_primary_10_1109_ACCESS_2021_3058450 crossref_primary_10_1016_j_future_2018_03_001 crossref_primary_10_1155_2020_5346498 crossref_primary_10_1155_2020_5712461 crossref_primary_10_1155_2020_4984375 crossref_primary_10_1155_2020_6038619 crossref_primary_10_1016_j_jksuci_2022_04_009 crossref_primary_10_1007_s10586_017_1353_y crossref_primary_10_1109_TSE_2022_3140599 crossref_primary_10_1155_2019_1495676 crossref_primary_10_1109_ACCESS_2021_3068570 crossref_primary_10_1016_j_ins_2020_07_037 crossref_primary_10_1155_2020_5670215 crossref_primary_10_1109_ACCESS_2021_3054852 |
| Cites_doi | 10.1088/1367-2630/14/8/083030 10.1109/ACCESS.2017.2706943 10.1145/1134285.1134502 10.1103/PhysRevE.68.046116 10.1007/s00354-014-0405-6 10.1145/1060710.1060716 10.1007/s11390-010-9399-9 10.3934/nhm.2008.3.371 10.1145/359619.359631 10.1142/S0218127408020537 10.1016/j.physa.2016.11.002 10.1147/sj.282.0294 10.1007/s11390-010-9398-x 10.1109/ACCESS.2016.2639563 10.1016/j.jnca.2015.11.017 10.1109/32.748920 10.1016/j.ins.2009.12.010 10.1109/TSE.2007.1019 10.1007/s11424-011-0319-z 10.1007/s11390-011-0176-1 10.3390/e18050178 10.1504/IJCAT.2013.056914 10.1016/j.jnca.2016.10.002 10.1016/j.physa.2013.01.035 10.1109/IIH-MSP.2008.294 10.1109/TSMCB.2008.2008102 10.1109/CSMR.2005.12 10.1142/S0219525915500046 10.1016/j.ins.2013.05.014 10.1016/0164-1212(93)90077-B 10.1016/j.jnca.2016.11.018 10.1002/smr.370 10.1016/0164-1212(94)90099-X 10.1109/32.295895 10.1080/00018730601170527 10.1007/s11634-010-0079-y 10.1007/s11227-009-0299-0 10.1142/S0218194014500235 10.1109/TIFS.2016.2569063 10.1016/j.ins.2007.01.021 |
| ContentType | Journal Article |
| Copyright | 2017 Elsevier B.V. |
| Copyright_xml | – notice: 2017 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.future.2017.09.039 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7115 |
| EndPage | 444 |
| ExternalDocumentID | 10_1016_j_future_2017_09_039 S0167739X17320940 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-77c635bafa3cf49d6b68e0af76a0af20f226bd4814694ff931022a9733e71f033 |
| ISICitedReferencesCount | 36 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000428833500039&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-739X |
| IngestDate | Tue Nov 18 22:10:56 EST 2025 Sat Nov 29 02:59:44 EST 2025 Fri Feb 23 02:30:14 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Software networks Program comprehension Static analysis Weighted k-core decomposition |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-77c635bafa3cf49d6b68e0af76a0af20f226bd4814694ff931022a9733e71f033 |
| PageCount | 14 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_future_2017_09_039 crossref_primary_10_1016_j_future_2017_09_039 elsevier_sciencedirect_doi_10_1016_j_future_2017_09_039 |
| PublicationCentury | 2000 |
| PublicationDate | June 2018 2018-06-00 |
| PublicationDateYYYYMMDD | 2018-06-01 |
| PublicationDate_xml | – month: 06 year: 2018 text: June 2018 |
| PublicationDecade | 2010 |
| PublicationTitle | Future generation computer systems |
| PublicationYear | 2018 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Li, Chen, Ge, Hao, Zhao (b15) 2014; 24 Meyer, Siy, Bhowmick (b32) 2014; 17 Pan, Li, Ma, Qin, Zhou (b16) 2010; 25 Myers (b5) 2003; 68 Li, Zhao, Cai, Xu, Ai (b41) 2013; 392 Turnu, Concas, Marchesi, Tonelli (b6) 2013; 245 Yang, Wang, Bhuiyan, Choo (b2) 2017; 86 Prokhorenko, Choo, Ashman (b19) 2016; 11 Li, Henry (b49) 1993; 23 Batagelj, Zaversnik (b11) 2011; 5 Sedgewick (b31) 1978; 21 Briand, Daly, Wüst (b22) 1999; 25 Li, Ma, Liu, Ding (b40) 2008; 38 Prokhorenko, Choo, Ashman (b18) 2016; 286 A. Zaidman, T. Calders, S. Demeyer, J. Paredaens, Applying webmining techniques to execution traces to support the program comprehension process, in: Proceedings of the 9th European Conference on Software Maintenance and Reengineering, CSMR’05, Manchester, UK, 2005, pp. 134–142. Quick, Choo (b1) 2017; 86 Ma, He, Li, Liu, Zhou (b10) 2010; 25 Abreu, Carapuca (b47) 1994; 26 Ricardo, Berthier (b37) 1999 Zaidman, Demeyer (b27) 2008; 20 Corbi (b29) 1990; 28 AI-Garadi, Varathan, Ravana (b3) 2017; 468 Wang, Lu, Zhou, Xu (b35) 2011; 5 Li, Hao, Chen, Ge, Zhao (b42) 2014; 32 core analysis, in: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP’08, Harbin, China, 2008, pp. 954–957. Pan, Li, Ma, Liu (b46) 2012; 40 Steidl, Hummel, Juergens (b33) 2012 Zhang, Zhao, Cai, Liu, Zhou (b12) 2010; 53 Alvarez-Hamelin, Dall’Asta, Barrat, Vespignani (b23) 2008; 3 Jenkins, Kirk (b50) 2007; 177 F. Perin, L. Renggli, J. Ressia, Ranking software artifacts. in: Proceedings of 4th Workshop on FAMIX and Moose in Software Reengineering, FAMOOSr’10, 2010, pp. 1–4. Khan, Wahab, Herawan, Mujtaba, Danjuma, AI-Garadi (b4) 2016; 4 H.C. Gall, M. Lanza, Software evolution: Analysis and visualization, in: Proceedings of the 28th International Conference on Software Engineering, ICSE’06, Shanghai, China, 2006, pp. 1055–1056. Hu, Kong, Ren, Choo (b21) 2017; 5 Li, Hao, Chen, Ge, Zhao (b43) 2016; 18 Chidamber, Kemerer (b48) 1994; 20 Concas, Marchesi, Pinna, Serra (b8) 2007; 33 H.H. Zhang, H. Zhao, W. Cai, M. Zhao, G.L. Luo, Visualization and cognition of large-scale software structure using the Costa, Rodrigues, Travieso, Boas (b24) 2007; 56 Jiang, Ju, Wang, Li, Zhang, Liu (b36) 2015; 43 Wen, Dromey, Kirk (b44) 2009; 39 Pan, Li, Ma, Liu (b9) 2011; 24 Prokhorenko, Choo, Ashman (b20) 2016; 60 Spinellis (b30) 2003 Liu, Lü, He, Li, TSE (b51) 2008; 18 Pan, Li (b45) 2012; 43 Potanin, Noble, Frean, Biddle (b7) 2005; 48 Pan, Jiang, Xu (b25) 2013; 48 García, Fernández, Luengo, Herrera (b39) 2010; 18 Zhang, Zhou, Zhang (b38) 2011; 26 Li, Zhao, Xu, Li, Li, Wang (b13) 2010; 38 Garas, Schweitzer, Havlin (b17) 2012; 14 Li (10.1016/j.future.2017.09.039_b15) 2014; 24 Ma (10.1016/j.future.2017.09.039_b10) 2010; 25 Li (10.1016/j.future.2017.09.039_b49) 1993; 23 Pan (10.1016/j.future.2017.09.039_b46) 2012; 40 Zhang (10.1016/j.future.2017.09.039_b12) 2010; 53 García (10.1016/j.future.2017.09.039_b39) 2010; 18 Wen (10.1016/j.future.2017.09.039_b44) 2009; 39 Khan (10.1016/j.future.2017.09.039_b4) 2016; 4 Liu (10.1016/j.future.2017.09.039_b51) 2008; 18 Li (10.1016/j.future.2017.09.039_b42) 2014; 32 Concas (10.1016/j.future.2017.09.039_b8) 2007; 33 Li (10.1016/j.future.2017.09.039_b43) 2016; 18 Quick (10.1016/j.future.2017.09.039_b1) 2017; 86 Li (10.1016/j.future.2017.09.039_b13) 2010; 38 Spinellis (10.1016/j.future.2017.09.039_b30) 2003 Alvarez-Hamelin (10.1016/j.future.2017.09.039_b23) 2008; 3 Briand (10.1016/j.future.2017.09.039_b22) 1999; 25 10.1016/j.future.2017.09.039_b14 Meyer (10.1016/j.future.2017.09.039_b32) 2014; 17 Abreu (10.1016/j.future.2017.09.039_b47) 1994; 26 Costa (10.1016/j.future.2017.09.039_b24) 2007; 56 Prokhorenko (10.1016/j.future.2017.09.039_b18) 2016; 286 Yang (10.1016/j.future.2017.09.039_b2) 2017; 86 Pan (10.1016/j.future.2017.09.039_b9) 2011; 24 Li (10.1016/j.future.2017.09.039_b40) 2008; 38 Myers (10.1016/j.future.2017.09.039_b5) 2003; 68 Pan (10.1016/j.future.2017.09.039_b16) 2010; 25 Chidamber (10.1016/j.future.2017.09.039_b48) 1994; 20 10.1016/j.future.2017.09.039_b26 Prokhorenko (10.1016/j.future.2017.09.039_b19) 2016; 11 Zhang (10.1016/j.future.2017.09.039_b38) 2011; 26 Turnu (10.1016/j.future.2017.09.039_b6) 2013; 245 10.1016/j.future.2017.09.039_b28 Potanin (10.1016/j.future.2017.09.039_b7) 2005; 48 Zaidman (10.1016/j.future.2017.09.039_b27) 2008; 20 Batagelj (10.1016/j.future.2017.09.039_b11) 2011; 5 Sedgewick (10.1016/j.future.2017.09.039_b31) 1978; 21 Corbi (10.1016/j.future.2017.09.039_b29) 1990; 28 Wang (10.1016/j.future.2017.09.039_b35) 2011; 5 Pan (10.1016/j.future.2017.09.039_b45) 2012; 43 Jiang (10.1016/j.future.2017.09.039_b36) 2015; 43 10.1016/j.future.2017.09.039_b34 Ricardo (10.1016/j.future.2017.09.039_b37) 1999 Li (10.1016/j.future.2017.09.039_b41) 2013; 392 Garas (10.1016/j.future.2017.09.039_b17) 2012; 14 AI-Garadi (10.1016/j.future.2017.09.039_b3) 2017; 468 Hu (10.1016/j.future.2017.09.039_b21) 2017; 5 Steidl (10.1016/j.future.2017.09.039_b33) 2012 Jenkins (10.1016/j.future.2017.09.039_b50) 2007; 177 Pan (10.1016/j.future.2017.09.039_b25) 2013; 48 Prokhorenko (10.1016/j.future.2017.09.039_b20) 2016; 60 |
| References_xml | – volume: 43 start-page: 4339 year: 2012 end-page: 4347 ident: b45 article-title: Software quality measurement based on error propagation analysis in software networks publication-title: J. Central South Univ. (Science and Technology) – volume: 18 start-page: 605 year: 2008 end-page: 613 ident: b51 article-title: Characterizing the structural quality of general complex software networks publication-title: Int. J. Bifurcation Chaos – volume: 33 start-page: 687 year: 2007 end-page: 708 ident: b8 article-title: Power-laws in a large object-oriented software system publication-title: IEEE Trans. Softw. Eng. – volume: 17 start-page: 1550004 year: 2014 ident: b32 article-title: Identifying important classes of large software systems through publication-title: Adv. Complex Syst. – volume: 25 start-page: 91 year: 1999 end-page: 121 ident: b22 article-title: A unified framework for coupling measurement in object-oriented systems publication-title: IEEE Trans. Softw. Eng. – volume: 38 start-page: 805 year: 2008 end-page: 814 ident: b40 article-title: Advances in the studies on complex networks of software systems publication-title: Adv. Mech. – volume: 40 start-page: 2456 year: 2012 end-page: 2465 ident: b46 article-title: Test case prioritization based on complex software networks publication-title: Chin. J. Electron. – volume: 5 start-page: 891 year: 2011 end-page: 903 ident: b35 article-title: Identifying key classes using publication-title: J. Frontiers Comput. Sci. Technol. – volume: 48 start-page: 185 year: 2013 end-page: 194 ident: b25 article-title: Refactoring packages of object-oriented software using genetic algorithm based community detection technique publication-title: Int. J. Comput. Appl. Technol. – volume: 20 start-page: 387 year: 2008 end-page: 417 ident: b27 article-title: Automatic identification of key classes in a software system using webmining techniques publication-title: J. Softw. Maint. and Evolution: Research and Practice – reference: A. Zaidman, T. Calders, S. Demeyer, J. Paredaens, Applying webmining techniques to execution traces to support the program comprehension process, in: Proceedings of the 9th European Conference on Software Maintenance and Reengineering, CSMR’05, Manchester, UK, 2005, pp. 134–142. – volume: 14 start-page: 083030 year: 2012 ident: b17 article-title: A publication-title: New J. Phys. – volume: 23 start-page: 111 year: 1993 end-page: 122 ident: b49 article-title: Object-oriented metrics that predict maintainability publication-title: J. Syst. Softw. – year: 2003 ident: b30 publication-title: Code Reading: The Open Source Perspective – volume: 86 start-page: 24 year: 2017 end-page: 33 ident: b1 article-title: Pervasive social networking forensics: Intelligence and evidence from mobile device extracts publication-title: J. Netw. Comput. Appl. – volume: 5 start-page: 8752 year: 2017 end-page: 8762 ident: b21 article-title: A branch history directed heuristic search for effective binary level dynamic symbolic execution publication-title: IEEE Access – volume: 25 start-page: 1184 year: 2010 end-page: 1201 ident: b10 article-title: A hybrid set of complexity metrics for large-scale object-oriented software systems publication-title: J. Comput. Sci. Tech. – volume: 60 start-page: 95 year: 2016 end-page: 112 ident: b20 article-title: Web application protection techniques: A taxonomy publication-title: J. Netw. Comput. Appl. – volume: 48 start-page: 99 year: 2005 end-page: 103 ident: b7 article-title: Scale-free geometry in OO programs publication-title: Commun. ACM – volume: 32 start-page: 271 year: 2014 end-page: 296 ident: b42 article-title: Symmetric preferential attachment for new vertices attaching to software networks publication-title: New Gener. Comput. – volume: 24 start-page: 1068 year: 2011 end-page: 1082 ident: b9 article-title: Multi-granularity evolution analysis of software using complex network theory publication-title: J. Syst. Sci. Complex. – volume: 5 start-page: 129 year: 2011 end-page: 145 ident: b11 article-title: Generalized cores publication-title: Adv. Data Anal. Classif. – reference: -core analysis, in: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP’08, Harbin, China, 2008, pp. 954–957. – volume: 56 start-page: 167 year: 2007 end-page: 242 ident: b24 article-title: Characterization of complex networks: A survey of measurements publication-title: Adv. Phys. – volume: 28 start-page: 294 year: 1990 end-page: 306 ident: b29 article-title: Program understanding: Challenge for the 90s publication-title: IBM Syst. J. – volume: 26 start-page: 87 year: 1994 end-page: 96 ident: b47 article-title: Candidate metrics for object-oriented software within a taxonomy framework publication-title: J. Syst. Softw. – volume: 392 start-page: 2025 year: 2013 end-page: 2037 ident: b41 article-title: A modular attachment mechanism for software network evolution publication-title: Physica A – volume: 38 start-page: 2635 year: 2010 end-page: 2643 ident: b13 article-title: Research on hierarchy of large-scale software macro-topology base on publication-title: Chin. J. Electron. – volume: 11 start-page: 1847 year: 2016 end-page: 1861 ident: b19 article-title: Intent-based extensible real-time PHP supervision framework publication-title: IEEE Trans. Inf. Forensics Secur. – reference: H.H. Zhang, H. Zhao, W. Cai, M. Zhao, G.L. Luo, Visualization and cognition of large-scale software structure using the – volume: 4 start-page: 9614 year: 2016 end-page: 9624 ident: b4 article-title: Virtual community detection through the association between prime nodes in online social networks and its application to ranking algorithms publication-title: IEEE Access – year: 1999 ident: b37 publication-title: Modern Information Retrieval – volume: 26 start-page: 767 year: 2011 end-page: 777 ident: b38 article-title: Tag-aware recommender systems: A state-of-the-art survey publication-title: J. Comput. Sci. Tech. – start-page: 93 year: 2012 end-page: 102 ident: b33 article-title: Using network analysis for recommendation of central software classes publication-title: Proceedings of the 19th Working Conference on Reverse Engineering (WCRE’12) – volume: 43 start-page: 2062 year: 2015 end-page: 2068 ident: b36 article-title: Measuring the importance of classes using uio sequence publication-title: Acta Electronica Sin. – volume: 20 start-page: 476 year: 1994 end-page: 493 ident: b48 article-title: A metrics suite for object-oriented design publication-title: IEEE Trans. Softw. Eng. – volume: 177 start-page: 2587 year: 2007 end-page: 2601 ident: b50 article-title: Software architecture graphs as complex networks: A novel parttion scheme to measure stability and evolution publication-title: Inform. Sci. – volume: 468 start-page: 278 year: 2017 end-page: 288 ident: b3 article-title: Identification of influential spreaders in online social networks using interaction weighted k-core decomposition method publication-title: Physica A – volume: 286 start-page: 59 year: 2016 end-page: 78 ident: b18 article-title: Context-oriented web application protection model publication-title: Appl. Math. Comput. – volume: 39 start-page: 648 year: 2009 end-page: 657 ident: b44 article-title: Software engineering and scale-free networks publication-title: IEEE Trans. Syst. Man Cybernetics B (Cybernetics) – volume: 25 start-page: 1202 year: 2010 end-page: 1213 ident: b16 article-title: Measuring structural quality of object-oriented softwares via bug propagation analysis on weighted software networks publication-title: J. Comput. Sci. Tech. – volume: 86 start-page: 59 year: 2017 end-page: 71 ident: b2 article-title: Hypergraph partitioning for social networks based on information entropy modularity publication-title: J. Netw. Comput. Appl. – volume: 3 start-page: 371 year: 2008 end-page: 394 ident: b23 article-title: -core decomposition of Internet graphs: Hierarchies, self-similarity and measurement biases publication-title: Netw. Heterog. Media – volume: 21 start-page: 847 year: 1978 end-page: 857 ident: b31 article-title: Implementing quicksort programs publication-title: Commun. ACM – volume: 18 start-page: 178 year: 2016 ident: b43 article-title: Multi-level formation of complex software systems publication-title: Entropy – reference: H.C. Gall, M. Lanza, Software evolution: Analysis and visualization, in: Proceedings of the 28th International Conference on Software Engineering, ICSE’06, Shanghai, China, 2006, pp. 1055–1056. – reference: F. Perin, L. Renggli, J. Ressia, Ranking software artifacts. in: Proceedings of 4th Workshop on FAMIX and Moose in Software Reengineering, FAMOOSr’10, 2010, pp. 1–4. – volume: 68 start-page: 046116 year: 2003 ident: b5 article-title: Software systems as complex networks: Structure, function, and evolvability of software collaboration graphs publication-title: Phys. Rev. E – volume: 53 start-page: 352 year: 2010 end-page: 369 ident: b12 article-title: Using the publication-title: J. Supercomput. – volume: 18 start-page: 2044 year: 2010 end-page: 2064 ident: b39 article-title: Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power publication-title: Inform. Sci. – volume: 24 start-page: 617 year: 2014 end-page: 634 ident: b15 article-title: Extraction and analysis of crucial fraction in software networks publication-title: Int. J. Softw. Eng. Knowl. Eng. – volume: 245 start-page: 290 year: 2013 end-page: 303 ident: b6 article-title: The fractal dimension of software networks as a global quality metric publication-title: Inform. Sci. – volume: 14 start-page: 083030 year: 2012 ident: 10.1016/j.future.2017.09.039_b17 article-title: A k-shell decomposition method for weighted networks publication-title: New J. Phys. doi: 10.1088/1367-2630/14/8/083030 – year: 1999 ident: 10.1016/j.future.2017.09.039_b37 – volume: 5 start-page: 8752 year: 2017 ident: 10.1016/j.future.2017.09.039_b21 article-title: A branch history directed heuristic search for effective binary level dynamic symbolic execution publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2706943 – ident: 10.1016/j.future.2017.09.039_b26 doi: 10.1145/1134285.1134502 – volume: 68 start-page: 046116 year: 2003 ident: 10.1016/j.future.2017.09.039_b5 article-title: Software systems as complex networks: Structure, function, and evolvability of software collaboration graphs publication-title: Phys. Rev. E doi: 10.1103/PhysRevE.68.046116 – ident: 10.1016/j.future.2017.09.039_b34 – volume: 38 start-page: 805 year: 2008 ident: 10.1016/j.future.2017.09.039_b40 article-title: Advances in the studies on complex networks of software systems publication-title: Adv. Mech. – volume: 32 start-page: 271 year: 2014 ident: 10.1016/j.future.2017.09.039_b42 article-title: Symmetric preferential attachment for new vertices attaching to software networks publication-title: New Gener. Comput. doi: 10.1007/s00354-014-0405-6 – volume: 38 start-page: 2635 year: 2010 ident: 10.1016/j.future.2017.09.039_b13 article-title: Research on hierarchy of large-scale software macro-topology base on k-core publication-title: Chin. J. Electron. – volume: 48 start-page: 99 year: 2005 ident: 10.1016/j.future.2017.09.039_b7 article-title: Scale-free geometry in OO programs publication-title: Commun. ACM doi: 10.1145/1060710.1060716 – volume: 43 start-page: 2062 year: 2015 ident: 10.1016/j.future.2017.09.039_b36 article-title: Measuring the importance of classes using uio sequence publication-title: Acta Electronica Sin. – volume: 25 start-page: 1202 year: 2010 ident: 10.1016/j.future.2017.09.039_b16 article-title: Measuring structural quality of object-oriented softwares via bug propagation analysis on weighted software networks publication-title: J. Comput. Sci. Tech. doi: 10.1007/s11390-010-9399-9 – volume: 3 start-page: 371 year: 2008 ident: 10.1016/j.future.2017.09.039_b23 article-title: k-core decomposition of Internet graphs: Hierarchies, self-similarity and measurement biases publication-title: Netw. Heterog. Media doi: 10.3934/nhm.2008.3.371 – volume: 21 start-page: 847 year: 1978 ident: 10.1016/j.future.2017.09.039_b31 article-title: Implementing quicksort programs publication-title: Commun. ACM doi: 10.1145/359619.359631 – volume: 18 start-page: 605 year: 2008 ident: 10.1016/j.future.2017.09.039_b51 article-title: Characterizing the structural quality of general complex software networks publication-title: Int. J. Bifurcation Chaos doi: 10.1142/S0218127408020537 – volume: 468 start-page: 278 year: 2017 ident: 10.1016/j.future.2017.09.039_b3 article-title: Identification of influential spreaders in online social networks using interaction weighted k-core decomposition method publication-title: Physica A doi: 10.1016/j.physa.2016.11.002 – volume: 28 start-page: 294 year: 1990 ident: 10.1016/j.future.2017.09.039_b29 article-title: Program understanding: Challenge for the 90s publication-title: IBM Syst. J. doi: 10.1147/sj.282.0294 – volume: 25 start-page: 1184 year: 2010 ident: 10.1016/j.future.2017.09.039_b10 article-title: A hybrid set of complexity metrics for large-scale object-oriented software systems publication-title: J. Comput. Sci. Tech. doi: 10.1007/s11390-010-9398-x – volume: 4 start-page: 9614 year: 2016 ident: 10.1016/j.future.2017.09.039_b4 article-title: Virtual community detection through the association between prime nodes in online social networks and its application to ranking algorithms publication-title: IEEE Access doi: 10.1109/ACCESS.2016.2639563 – volume: 60 start-page: 95 year: 2016 ident: 10.1016/j.future.2017.09.039_b20 article-title: Web application protection techniques: A taxonomy publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.11.017 – volume: 25 start-page: 91 year: 1999 ident: 10.1016/j.future.2017.09.039_b22 article-title: A unified framework for coupling measurement in object-oriented systems publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/32.748920 – volume: 18 start-page: 2044 year: 2010 ident: 10.1016/j.future.2017.09.039_b39 article-title: Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power publication-title: Inform. Sci. doi: 10.1016/j.ins.2009.12.010 – volume: 33 start-page: 687 year: 2007 ident: 10.1016/j.future.2017.09.039_b8 article-title: Power-laws in a large object-oriented software system publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2007.1019 – volume: 24 start-page: 1068 year: 2011 ident: 10.1016/j.future.2017.09.039_b9 article-title: Multi-granularity evolution analysis of software using complex network theory publication-title: J. Syst. Sci. Complex. doi: 10.1007/s11424-011-0319-z – volume: 26 start-page: 767 year: 2011 ident: 10.1016/j.future.2017.09.039_b38 article-title: Tag-aware recommender systems: A state-of-the-art survey publication-title: J. Comput. Sci. Tech. doi: 10.1007/s11390-011-0176-1 – volume: 18 start-page: 178 year: 2016 ident: 10.1016/j.future.2017.09.039_b43 article-title: Multi-level formation of complex software systems publication-title: Entropy doi: 10.3390/e18050178 – volume: 5 start-page: 891 year: 2011 ident: 10.1016/j.future.2017.09.039_b35 article-title: Identifying key classes using h-index and its variants publication-title: J. Frontiers Comput. Sci. Technol. – volume: 286 start-page: 59 year: 2016 ident: 10.1016/j.future.2017.09.039_b18 article-title: Context-oriented web application protection model publication-title: Appl. Math. Comput. – volume: 48 start-page: 185 year: 2013 ident: 10.1016/j.future.2017.09.039_b25 article-title: Refactoring packages of object-oriented software using genetic algorithm based community detection technique publication-title: Int. J. Comput. Appl. Technol. doi: 10.1504/IJCAT.2013.056914 – volume: 86 start-page: 59 year: 2017 ident: 10.1016/j.future.2017.09.039_b2 article-title: Hypergraph partitioning for social networks based on information entropy modularity publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.10.002 – volume: 392 start-page: 2025 year: 2013 ident: 10.1016/j.future.2017.09.039_b41 article-title: A modular attachment mechanism for software network evolution publication-title: Physica A doi: 10.1016/j.physa.2013.01.035 – year: 2003 ident: 10.1016/j.future.2017.09.039_b30 – volume: 40 start-page: 2456 year: 2012 ident: 10.1016/j.future.2017.09.039_b46 article-title: Test case prioritization based on complex software networks publication-title: Chin. J. Electron. – ident: 10.1016/j.future.2017.09.039_b14 doi: 10.1109/IIH-MSP.2008.294 – volume: 39 start-page: 648 year: 2009 ident: 10.1016/j.future.2017.09.039_b44 article-title: Software engineering and scale-free networks publication-title: IEEE Trans. Syst. Man Cybernetics B (Cybernetics) doi: 10.1109/TSMCB.2008.2008102 – ident: 10.1016/j.future.2017.09.039_b28 doi: 10.1109/CSMR.2005.12 – start-page: 93 year: 2012 ident: 10.1016/j.future.2017.09.039_b33 article-title: Using network analysis for recommendation of central software classes – volume: 17 start-page: 1550004 year: 2014 ident: 10.1016/j.future.2017.09.039_b32 article-title: Identifying important classes of large software systems through k-core decomposition publication-title: Adv. Complex Syst. doi: 10.1142/S0219525915500046 – volume: 245 start-page: 290 year: 2013 ident: 10.1016/j.future.2017.09.039_b6 article-title: The fractal dimension of software networks as a global quality metric publication-title: Inform. Sci. doi: 10.1016/j.ins.2013.05.014 – volume: 23 start-page: 111 year: 1993 ident: 10.1016/j.future.2017.09.039_b49 article-title: Object-oriented metrics that predict maintainability publication-title: J. Syst. Softw. doi: 10.1016/0164-1212(93)90077-B – volume: 86 start-page: 24 year: 2017 ident: 10.1016/j.future.2017.09.039_b1 article-title: Pervasive social networking forensics: Intelligence and evidence from mobile device extracts publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.11.018 – volume: 20 start-page: 387 year: 2008 ident: 10.1016/j.future.2017.09.039_b27 article-title: Automatic identification of key classes in a software system using webmining techniques publication-title: J. Softw. Maint. and Evolution: Research and Practice doi: 10.1002/smr.370 – volume: 26 start-page: 87 year: 1994 ident: 10.1016/j.future.2017.09.039_b47 article-title: Candidate metrics for object-oriented software within a taxonomy framework publication-title: J. Syst. Softw. doi: 10.1016/0164-1212(94)90099-X – volume: 20 start-page: 476 year: 1994 ident: 10.1016/j.future.2017.09.039_b48 article-title: A metrics suite for object-oriented design publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/32.295895 – volume: 56 start-page: 167 year: 2007 ident: 10.1016/j.future.2017.09.039_b24 article-title: Characterization of complex networks: A survey of measurements publication-title: Adv. Phys. doi: 10.1080/00018730601170527 – volume: 5 start-page: 129 year: 2011 ident: 10.1016/j.future.2017.09.039_b11 article-title: Generalized cores publication-title: Adv. Data Anal. Classif. doi: 10.1007/s11634-010-0079-y – volume: 53 start-page: 352 year: 2010 ident: 10.1016/j.future.2017.09.039_b12 article-title: Using the k-core decomposition to analyze the static structure of large-scale software systems publication-title: J. Supercomput. doi: 10.1007/s11227-009-0299-0 – volume: 43 start-page: 4339 year: 2012 ident: 10.1016/j.future.2017.09.039_b45 article-title: Software quality measurement based on error propagation analysis in software networks publication-title: J. Central South Univ. (Science and Technology) – volume: 24 start-page: 617 year: 2014 ident: 10.1016/j.future.2017.09.039_b15 article-title: Extraction and analysis of crucial fraction in software networks publication-title: Int. J. Softw. Eng. Knowl. Eng. doi: 10.1142/S0218194014500235 – volume: 11 start-page: 1847 year: 2016 ident: 10.1016/j.future.2017.09.039_b19 article-title: Intent-based extensible real-time PHP supervision framework publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2569063 – volume: 177 start-page: 2587 year: 2007 ident: 10.1016/j.future.2017.09.039_b50 article-title: Software architecture graphs as complex networks: A novel parttion scheme to measure stability and evolution publication-title: Inform. Sci. doi: 10.1016/j.ins.2007.01.021 |
| SSID | ssj0001731 |
| Score | 2.3786352 |
| Snippet | Statistical properties of un-weighted software networks have been extensively studied. However, software networks in their nature should be weighted.... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 431 |
| SubjectTerms | Program comprehension Software networks Static analysis Weighted [formula omitted]-core decomposition |
| Title | Analyzing the structure of Java software systems by weighted K-core decomposition |
| URI | https://dx.doi.org/10.1016/j.future.2017.09.039 |
| Volume | 83 |
| WOSCitedRecordID | wos000428833500039&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001731 issn: 0167-739X databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwELa20EMvtPQhaGnlQ2-rVAk2sX0EBOKtqqLt9hTZji0tQlnELsuWX8_4lU2hgnLoxYqszSSb-TTzeTyeQegzsznXzIXedFlmtNBlxtWGyrjghVZMi9L3jPxxxE5O-GAgvvZ6s3QWZnrOmobPZuLiv6oa5kDZ7ujsE9TdCoUJuAalwwhqh_GfFO_LjNykU1ChPqzbJQBWeCCnsj8Gw3vt8r1CEeexI6DXPkAK3POwn7m6lv3auFzzmNDVJbC7vgaJa7xsInZ07AuR5M03pbxB-2mG1kT36BJ_fPbA1rA7c-Wh1Jk69oz219VEjrpRiYLPs6dSoBIMMCO-TW5raTnpmEoarX_wujRUgbxn0ENs4exLqLDiUvFYqEsr5g4sbdrf8WtttmFKZDurgpTKSalyUYGUZ2hxnW0IsIeLm_s7g4PWixcs9rKM_yMdu_S5gfff5u-0pkNVTl-hpbjGwJsBG8uoZ5rX6GXq34GjOX-DvrVQwQAV3EIFjyx2UMEJKjiqFqvfOEEFH2IPFfwHVN6i77s7p9t7WeyxkWlYLE5gcaWBcippJdGWirpUJTe5tKyUMK7nFui5qqkLFAtqrSAuQiAFI8SwwuaEvEMLzagxKwjXShVCMqYMgTUqNWDaCTVUstzWkmm1ikj6RJWOBehdH5Tz6iEFraKsvesiFGB55Pcsff0qkshADiuA1IN3vn_ikz6gF3Pkr6EFUJL5iJ7r6WQ4vvwU8XQL8pCYUQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analyzing+the+structure+of+Java+software+systems+by+weighted+K+-core+decomposition&rft.jtitle=Future+generation+computer+systems&rft.au=Pan%2C+Weifeng&rft.au=Li%2C+Bing&rft.au=Liu%2C+Jing&rft.au=Ma%2C+Yutao&rft.date=2018-06-01&rft.issn=0167-739X&rft.volume=83&rft.spage=431&rft.epage=444&rft_id=info:doi/10.1016%2Fj.future.2017.09.039&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_future_2017_09_039 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |