0% Complete
Home
/
13th International Conference on Computer and Knowledge Engineering
An Exploratory Study of the Relationship between SATD and Other Software Development Activities
Authors :
Shima Esfandiari
1
Ashkan Sami
2
1- Shiraz university
2- Shiraz university
Keywords :
Self-Admitted Technical Debt،Repository mining،Software refactoring،Bug fixing
Abstract :
Technical Debt is a common issue that arises when short-term gains are prioritized over long-term costs, leading to a degradation in the quality of the code. Self-Admitted Technical Debt (SATD) is a specific type of Technical Debt that involves documenting code to remind developers of its debt. Previous research has explored various aspects of SATD, including detection methods, distribution, and its impact on software quality. To better understand SATD, one comprehension technique is to examine its co-occurrence with other activities, such as refactoring and bug fixing. This study investigates the relationship between removing and adding SATD and activities such as refactoring, bug fixing, adding new features, and testing. To do so, we analyzed 77 open-source Java projects using TODO/FIXME/XXX removal or addition in inline comments as indicators of SATD. We examined the co-occurrence of SATD with each activity in each project through chi-square and odds ratio evaluations. Our results show that SATD removal occurs simultaneously with refactoring in 95% of projects, while its addition occurs in 89% of projects. Furthermore, we found that three types of refactoring - "move class", "remove method", and "move attribute" - occur more frequently in the presence of SATD. However, their distribution is similar in projects with and without SATD.
Papers List
List of archived papers
An Exploratory Study of the Relationship between SATD and Other Software Development Activities
Shima Esfandiari - Ashkan Sami
Detecting Non-Spherical Clusters Using Modified CURE Algorithm
Arezou Safdari - Pedram Salehpour
MIPS-Core Application Specific Instruction-Set Processor for IDEA Cryptography − Comparison between Single-Cycle and Multi-Cycle Architectures
Ahmad Ahmadi - Reza Faghih Mirzaee
Improvement of Credit Scoring by LSTM Autoencoder Model
Milad Sattari Maleki - Seyedeh Niusha Motevallian - Faezehsadat Hosseini - Mohammad Sabokrou - Hamidreza Soltanalizadeh Maleki
Decentralized Federated Learning in IoT Environments: A Hierarchical Approach
Majid Mohammadpour - Seyedakbar Mostafavi
Optimizing Question-Answering Framework Through Integration of Text Summarization Model and Third-Generation Generative Pre-Trained Transformer
Ervin Gubin Moung - Toh Sin Tong - Maisarah Mohd Sufian - Valentino Liaw - Ali Farzamnia - Farashazillah Yahya
PowerLinear Activation Functions with application to the first layer of CNNs
Kamyar Nasiri - Kamaledin Ghiasi-Shirazi
Analysis of Address Lifespans in Bitcoin and Ethereum
Amir Mohammad Karimi Mamaghan - Amin Setayesh - Behnam Bahrak
CSI-Based Human Activity Recognition using Convolutional Neural Networks
Parisa Fard Moshiri - Mohammad Nabati - Reza Shahbazian - Seyed Ali Ghorashi
Low-Cost and Hardware Efficient Implementation of Pooling Layers for Stochastic CNN Accelerators
Mobin Vaziri - Hadi Jahanirad
more
Samin Hamayesh - Version 42.4.1