Skip to content

AlbertSGS/appendix-reevaluating

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 

Repository files navigation

Appendix for "Reevaluating the Defect Proneness of Atoms of Confusion in Java Systems"

You can find a list of AoC types, what a human-readable AST is, project and language factors in AoC and a discussion on the relation between AoC and technical debt in this appendix.

List of AoC Types

Note: our study only concerns the AoC types marked with *. We group the Removed Indentation AoC with the Indentation AoC, and omit Arithmetic as Logic, Constant Variables, and Dead, Unreachable, Repeated since Langhout and Aniche [3] Gopstein et al. [2] considered them as not confusing.

AoC Types Abbr. Example Transformed
Arithmetic as Logic AL (n - 3) * (m - 4) != 0 n != 3 && m != 4
*Change of Literal Encoding CLE int n = 5 & 11; int n = 0b0101 & 0b1011
*Conditional Operator CO int n = (m == 3) ? 2 : 1;
int n;
if (m == 3) {
  n = 2;
} else {
  n = 1;
}
Constant Variables CV n = m; n = 5;
Dead, Unreachable, Repeated DUR n = 1; n = 2; n = 2
*Indentation Ind
int m, n;
if (n == 2)
  m = 3;
  m = 1;
int m, n;
if (n == 2)
  m = 3;
m = 1;
*Infix Operator Precedence IOP int n = 2 - 4 / 2 int n = 2 - (4 / 2)
*Logic as Control Flow LCF boolean test = n == m && ++n > 0 || ++m > 0;
if (n == m) {
  ++n;
} else {
  ++m;
}
*Ommitted Curly Braces OCB if(n <= 0) n++; n++; if(n <= 0) {n++;} n++;
*Post Increment/Decrement PostID
int n = 2;
int m = 3 + n++;
int n = 2;
int m = n + 3;
n++;
*Pre Increment/Decrement PostID
int n = 2;
int m = ++n - 2;
int n = 2;
n = n + 1;
int m = n - 2;
Removed Indentation RI
while (m > 0)
  m--;
  n++;
while (m > 0)
  m--;
n++;
*Repurposed Variables RV
int v1[] = new int[5];
v1[4] = 3;

while (v1[4] > 0) {
  v1[3 - v1[4]] = v1[4];
  v1[4] = v1[4] - 1;
}
int v1[] = new int[5];
int n = 5;

while (n > 0) {
  v1[3 - v1[4]] = v1[4];
  a = a - 1;
}
*Type Conversion TC
int n = 4;
char c = (char) n;
int n = 4;
char c = Character.forDigit(n, 10);

What is a Human-Visible AST? Why do we need it?

Gopstein ea. [2] searched for AoC described in the following way:

We searched for atoms in the portion of the abstract syntax tree (AST) which is visible in the source (e.g. we do not search parts of the tree generated by the preprocessor). We also search code that doesn’t directly result in AST nodes (e.g. preprocessor directive definitions). We call this slightly modified version of the AST the ‘human-visible AST’, as it is meant to replicate what a programmer can see directly when reading a program.

Their analyses deals with ratios, and project size should not affect these anlysis. Therefore, the count of AoC is divided by the number of AST nodes to mitigate the effect of commit size on the results.

To the best of our judgement, the Java Lexer tokens resemble C/C++ AST nodes the most, and they are also available to use with the Java AoC detection tool [3]. Therefore, we choose the Java Lexer tokens to mitigate the effect of PR size.

Project- and Language-specific Factors in AoC

In this section, we list a few examples of AoC in different projects and languages to elaborate on how they affect the appearances of AoCs.

Project-specific examples

In this section, we show that developers follow project-specific guidelines and conventions, thus affecting which AoCs are changed more often. Here, we show one example from the Elasticsearch project and another from the Shardingsphere project.

In our paper, we discover that the developers in the Elasticsearch project make frequent changes to the Conditional Operator AoC. To be specific, the project use the function randomBoolean() which, as the name suggests, generates a random Boolean value, as the condition in a ternary conditional operator expression. Such ternary expressions are frequently used in their testing files. In other words, the Conditional Operator AoCs help the developer with their debugging. The process of debugging itself is already lengthy and difficult, and the use of ternary operators helps shorten the process. With proper formatting, it would not be as confusing.

As for the Shardingsphere project, they had frequent changes to the Pre-Increment/Decrement AoCs, but mostly to two expressions: ++sequenceID and ++currentSequenceID, which were all removed during a major refactoring of the code base.

The two examples above show that when considering the relations between AoC changes and other factors, we should also consider project-specific factors.

Language-specific examples

In this section, we show that the appearances of AoCs differ due to different languages. Here, we show one example in the Apache's Kafka project which is written primarily in Java, and another from Gopstein et al.'s study [2]

In PR #11393 of the Kafka project, a discussion revolved around code such as the following:

Eventually, they decide to change the data type of parameters version to short to prevent casting from short to int. However, the Type Casting AoCs was probably not added "accidentally". In PR #12135, a developer justified added such a conversion to the codebase as follows:

and they justified their choice of this "unsafe type conversion":

This is because Java's default type is int -- i.e. line 36/37 above would take the value 0/1 as int. So we basically need to either do the conversion in each line of 36/37 above, or just do the conversion once here.

This goes to show that the Type Conversion AoCs would occur more frequently in Java projects.

On the other hand, in C/C++ projects, the Macro Operator Precedence AoCs appear often. Gopstein et al. [2] described in their paper that the following macro was frequently used in Linux:

#define ABS(x) ((x) < 0? (-x) : (x))

This is logically incorrect since, when x is an expression instead of a number, the result would be incorrect. For example, let x = 1-2. The corect result would be 1, but if we substitute x into the expression above, it looks like

#define ABS(1-2) ((1-2) < 0? (-1-2) : (1-2))

which will evaluate to -3. This goes to show that the Macro Operator Precedence AoCs would occur more frequently in C/C++ projects.

Are AoCs related to technical debt?

It has been statistically shown that AoCs are usually preserved after PRs[1], and we have shown that the presence of AoCs is not correlated with the presence of bugs. Therefore, it is unlikely that AoCs are related to technical debt.

Let us consider two things. First, AoCs are not defects themselves. They are just snippets of code that are potentially confusing to developers. Developers do not need to invest large amounts of resources to make changes to them, since they do not pose actual threats to the software system. Second, as the open-source project evolves, and developers become more senior and familiar with the repository, it is less likely that they would consider AoCs an issue, as discussed above. In turn, it is unlikely that they would invest resources to remove them.

Hence, we claim that AoCs are not related to technical debt.

References

[1] V. Bogachenkova, L. Nguyen, F. Ebert, A. Serebrenik and F. Castor. 2022. Evaluating Atoms of Confusion in the Context of Code Reviews. 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME). Limassol, Cyprus, 2022, pp. 404-408. https://doi.org/10.1109/ICSME55016.2022.00048.

[2] D. Gopstein, H. Zhou, P. Frankl, and J. Cappos. 2018. Prevalence of Confusing Code in Software Projects: Atoms of Confusion in the Wild. In Proceedings of the 15th International Conference on Mining Software Repositories (Gothenburg, Sweden) (MSR ’18). Association for Computing Machinery, New York, NY, USA, 281–291. https://doi.org/10.1145/3196398.3196432

[3] C. Langhout and M. Aniche. 2021. Atoms of Confusion in Java. In 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC). IEEE, New York, NY, USA, 25–35. https://doi.org/10.1109/ICPC52881.2021.00012

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published