An Empirical Validation of the Benefits of Adhering to the Law of Demeter

Yi Guo, Michael Würsch, E. Giger, H. Gall
{"title":"An Empirical Validation of the Benefits of Adhering to the Law of Demeter","authors":"Yi Guo, Michael Würsch, E. Giger, H. Gall","doi":"10.1109/WCRE.2011.36","DOIUrl":null,"url":null,"abstract":"The Law of Demeter formulates the rule-of-thumb that modules in object-oriented program code should \"only talk to their immediate friends\". While it is said to foster information hiding for object-oriented software, solid empirical evidence confirming the positive effects of following the Law of Demeter is still lacking. In this paper, we conduct an empirical study to confirm that violating the Law of Demeter has a negative impact on software quality, in particular that it leads to more bugs. We implement an Eclipse plugin to calculate the amount of violations of both the strong and the weak form of the law in five Eclipse sub-projects. Then we discover the correlation between violations of the law and the bug-proneness and perform a logistic regression analysis of three sub-projects. We also combine the violations with other OO metrics to build up a model for predicting the bug-proneness for a given class. Empirical results show that violations of the Law of Demeter indeed highly correlate with the number of bugs and are early predictor of the software quality. Based on this evidence, we conclude that obeying the Law of Demeter is a straight-forward approach for developers to reduce the number of bugs in their software.","PeriodicalId":350863,"journal":{"name":"2011 18th Working Conference on Reverse Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 18th Working Conference on Reverse Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCRE.2011.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

The Law of Demeter formulates the rule-of-thumb that modules in object-oriented program code should "only talk to their immediate friends". While it is said to foster information hiding for object-oriented software, solid empirical evidence confirming the positive effects of following the Law of Demeter is still lacking. In this paper, we conduct an empirical study to confirm that violating the Law of Demeter has a negative impact on software quality, in particular that it leads to more bugs. We implement an Eclipse plugin to calculate the amount of violations of both the strong and the weak form of the law in five Eclipse sub-projects. Then we discover the correlation between violations of the law and the bug-proneness and perform a logistic regression analysis of three sub-projects. We also combine the violations with other OO metrics to build up a model for predicting the bug-proneness for a given class. Empirical results show that violations of the Law of Demeter indeed highly correlate with the number of bugs and are early predictor of the software quality. Based on this evidence, we conclude that obeying the Law of Demeter is a straight-forward approach for developers to reduce the number of bugs in their software.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
坚持得墨忒耳法则益处的实证验证
德墨忒耳法则制定了一个经验法则,即面向对象程序代码中的模块应该“只与它们最直接的朋友对话”。虽然据说它促进了面向对象软件的信息隐藏,但仍然缺乏确凿的经验证据来证实遵循得墨忒耳定律的积极影响。在本文中,我们进行了实证研究,以证实违反得墨忒耳定律会对软件质量产生负面影响,特别是会导致更多的bug。我们实现了一个Eclipse插件来计算五个Eclipse子项目中违反法律的强形式和弱形式的数量。然后,我们发现了违法行为与漏洞倾向之间的相关性,并对三个子项目进行了逻辑回归分析。我们还将违规与其他OO指标结合起来,以建立一个模型,用于预测给定类的bug倾向。经验结果表明,违反德墨忒耳定律确实与bug的数量高度相关,并且是软件质量的早期预测指标。基于这些证据,我们得出结论,遵守德墨忒耳定律是开发人员减少软件中bug数量的直接方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code Renovation by Machine-Assisted Program Transformation in Production Reporting and Integration Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions An Exploratory Study of Software Reverse Engineering in a Security Context Analyzing the Source Code of Multiple Software Variants for Reuse Potential
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1