Detecting Design Patterns in Object-Oriented Design Models by Using a Graph Mining Approach

被引:10
作者
Oruc, Murat [1 ]
Akal, Fuat [1 ]
Sever, Hayri [1 ]
机构
[1] Hacettepe Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
2016 FOURTH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION - CONISOFT 2016 | 2016年
关键词
Software project; design pattern; subgraph mining; object-oriented;
D O I
10.1109/CONISOFT.2016.26
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Object-oriented design patterns are frequently used in real-world applications. Detection of design patterns is essential for comprehension of the intent and design of a software project. This paper presents a graph-mining approach for detecting design patterns. Our approach is based on searching input design patterns in the space of model graph of the source code by isomorphic sub-graph search method. We developed a tool called DesPaD to apply our pattern detection approach in an automated-way. We successfully detected 23 GoF design patterns in the demo source code of the Applied Java Patterns book and also obtained encouraging results out of our experiments that we conducted on JUnit 3.8, JUnit 4.1 and Java AWT open source projects.
引用
收藏
页码:115 / 121
页数:7
相关论文
共 22 条
[1]  
[Anonymous], 1995, DESIGN PATTERNS ELEM
[2]   Object-oriented design patterns recovery [J].
Antoniol, G ;
Casazza, G ;
Di Penta, M ;
Fiutem, R .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 59 (02) :181-196
[3]  
Dong J, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P765
[4]  
Gravino Carmine, 2011, 2011 18th Working Conference on Reverse Engineering, P67, DOI 10.1109/WCRE.2011.18
[5]  
GUEHENEUC Y, 2004, P 11 WORK C REV ENG
[6]  
Gueheneuc Y.G., 2007, P 1 EUROPLOP FOC GRO
[7]   DeMIMA:: A multilayered approach for design pattern identification [J].
Gueheneuc, Yann-Gael ;
Antoniol, Giuliano .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (05) :667-684
[8]  
Heuzeroth Dirk, 2003, P 11 IEEE INT WORKSH
[9]  
Larman C., 2001, Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process, V2nd
[10]  
Lee H., 2008, INT J SECURITY ITS A, V2