Crossover Designs in Software Engineering Experiments: Benefits and Perils

被引:102
作者
Vegas, Sira [1 ]
Apa, Cecilia [2 ]
Juristo, Natalia [1 ,3 ]
机构
[1] Univ Politecn Madrid, Esceula Tecn Super Ingn Informat, Campus Montegancedo S-N, E-28660 Madrid, Spain
[2] Univ Republica, Fac Ingn, Inst Comp, Julio Herrera & Reissig 565, Montevideo 11300, Uruguay
[3] Univ Oulu, Dept Proc Informat, SF-90100 Oulu, Finland
关键词
Experimental software engineering; controlled experiment; data analysis; crossover design; carryover; 2-TREATMENT; FAMILY;
D O I
10.1109/TSE.2015.2467378
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In experiments with crossover design subjects apply more than one treatment. Crossover designs are widespread in software engineering experimentation: they require fewer subjects and control the variability among subjects. However, some researchers disapprove of crossover designs. The main criticisms are: the carryover threat and its troublesome analysis. Carryover is the persistence of the effect of one treatment when another treatment is applied later. It may invalidate the results of an experiment. Additionally, crossover designs are often not properly designed and/or analysed, limiting the validity of the results. In this paper, we aim to make SE researchers aware of the perils of crossover experiments and provide risk avoidance good practices. We study how another discipline (medicine) runs crossover experiments. We review the SE literature and discuss which good practices tend not to be adhered to, giving advice on how they should be applied in SE experiments. We illustrate the concepts discussed analysing a crossover experiment that we have run. We conclude that crossover experiments can yield valid results, provided they are properly designed and analysed, and that, if correctly addressed, carryover is no worse than other validity threats.
引用
收藏
页码:120 / 135
页数:16
相关论文
共 38 条
[1]   Assessing the Effectiveness of Sequence Diagrams in the Comprehension of Functional Requirements: Results from a Family of Five Experiments [J].
Abrahao, Silvia ;
Gravino, Carmine ;
Insfran, Emilio ;
Scanniello, Giuseppe ;
Tortora, Genoveffa .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (03) :327-342
[2]  
[Anonymous], 2002, CROSSOVER TRIALS CLI
[3]  
[Anonymous], 1998, GUID IND E9 STAT PRI
[4]  
[Anonymous], 1990, Software Testing Techniques
[5]   COMPARING THE EFFECTIVENESS OF SOFTWARE TESTING STRATEGIES [J].
BASILI, VR ;
SELBY, RW .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (12) :1278-1296
[6]   The impact of identifier style on effort and comprehension [J].
Binkley, Dave ;
Davis, Marcia ;
Lawrie, Dawn ;
Maletic, Jonathan I. ;
Morrell, Christopher ;
Sharif, Bonita .
EMPIRICAL SOFTWARE ENGINEERING, 2013, 18 (02) :219-276
[7]   A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [J].
Ceccato, Mariano ;
Di Penta, Massimiliano ;
Falcarin, Paolo ;
Ricca, Filippo ;
Torchiano, Marco ;
Tonella, Paolo .
EMPIRICAL SOFTWARE ENGINEERING, 2014, 19 (04) :1040-1074
[8]  
Cleophas T. J., 1999, HUMAN EXPT METHODOLO
[9]  
Cornfield J., 1976, BIOST EP ADV COMM M
[10]  
DANGELO G, 2001, J BIOPHARM STAT, V11, P27