2015 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2015
DOI: 10.1109/icsm.2015.7332511
|View full text |Cite
|
Sign up to set email alerts
|

Validating metric thresholds with developers: An early result

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…This table shows the percentage of classes in each repository that follow the proposed relative thresholds. For instance, the relative threshold for NOM is [80,16] and we can observe that 95% of the classes in Storm have 16 methods or less, i.e., Storm respects the relative threshold for NOM. We can also observe that only libGDX does not follow the relative threshold proposed to NOM.…”
Section: Resultsmentioning
confidence: 91%
See 1 more Smart Citation
“…This table shows the percentage of classes in each repository that follow the proposed relative thresholds. For instance, the relative threshold for NOM is [80,16] and we can observe that 95% of the classes in Storm have 16 methods or less, i.e., Storm respects the relative threshold for NOM. We can also observe that only libGDX does not follow the relative threshold proposed to NOM.…”
Section: Resultsmentioning
confidence: 91%
“…Since penalty 1 = 0 (due to the 100% of compliance), we have that ComplianceRatePenalty [85,17] = 0.89. As can be observed in Figure 3.3, ComplianceRateP enalty returns zero for the following pairs [p, k]: [75,7], [75,8], [75,9], [80,8], [80,9]. Based on our tiebreaker criteria, we select the result with the highest p and then the one with the lowest k, i.e., [80,8], which leads to the following relative threshold: 80% of the classes should have NOA ≤ 8…”
Section: Illustrative Examplementioning
confidence: 99%
“…Based on this assumption, various unsupervised methods have been proposed to determine the metric thresholds according to different threshold criteria, such as Alves et al's ranking method, 6 Ferreira et al's method, 7 Vale et al's method, 8 and Oliveira et al's method. 9 For example, in the study of Alves et al, 6 the measurement data for different software systems are pooled and aggregated, and the threshold's derivation method investigates a reasonable percentage of the source code volume and the metric's variability between systems. The segmented thresholds are derived by choosing the percentage, such as 70%, 80%, and 90%, of the overall code.…”
Section: Metric Thresholds In Defect Predictionmentioning
confidence: 99%
“…Specifically, the unsupervised learning methods, which in general start from the minimum value of each metric and search for a candidate threshold toward the large value, assume that the larger the value of each metric is, the more likely the class is to be defective, that is, each metric is positively correlated with defect‐proneness. Based on this assumption, various unsupervised methods have been proposed to determine the metric thresholds according to different threshold criteria, such as Alves et al's ranking method, 6 Ferreira et al's method, 7 Vale et al's method, 8 and Oliveira et al's method 9 . For example, in the study of Alves et al, 6 the measurement data for different software systems are pooled and aggregated, and the threshold's derivation method investigates a reasonable percentage of the source code volume and the metric's variability between systems.…”
Section: Related Workmentioning
confidence: 99%
“…There are several solutions to calculate software metrics thresholds proposed in the literature [1], [18], [17], [8], [4], [23], [15], [13], [14], [5]. We summarize their characteristics and limitations in Section II.…”
Section: Introductionmentioning
confidence: 99%