{"id":1341,"date":"2017-07-07T09:00:28","date_gmt":"2017-07-07T00:00:28","guid":{"rendered":"http:\/\/www.sa.c.titech.ac.jp\/?p=1341"},"modified":"2026-03-26T21:31:04","modified_gmt":"2026-03-26T12:31:04","slug":"%e7%a0%94%e7%a9%b6%e7%99%ba%e8%a1%a8-identifying-core-objects-for-trace-summarization-using-reference-relations-and-access-analysis","status":"publish","type":"post","link":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/archives\/1341","title":{"rendered":"[\u7814\u7a76\u767a\u8868] Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis"},"content":{"rendered":"<p>\u5c0f\u6797\u7814 D2\u306e\u91ce\u7530 \u8a13\u5e83\u3055\u3093\u304c\u3001\u30a4\u30bf\u30ea\u30a2\u306e\u30c8\u30ea\u30ce\u3067\u958b\u50ac\u3055\u308c\u305f <a href=\"https:\/\/www.computer.org\/web\/compsac2017\">IEEE 41st Annual Computer Software and Applications Conference (COMPSAC 2017)<\/a> \u306b\u3066\u7814\u7a76\u6210\u679c\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>COMPSAC2017\u306e\u30d5\u30eb\u30da\u30fc\u30d1\u63a1\u629e\u7387\u306f 21.9% \u3067\u3057\u305f\uff0e<\/p>\n<blockquote><p>\u8457\u8005\uff1a\u00a0Kunihiro Noda (TokyoTech), Takashi Kobayashi (TokyoTech), Tatsuya Toda (Nihon Unisys, Ltd.), and Noritoshi Atsumi (Kyoto Univ.)<br \/>\n\u984c\u76ee\uff1a Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis<br \/>\n\u63b2\u8f09\u8a8c\uff1a <img decoding=\"async\" src=\"\/wp-content\/uploads\/2017\/07\/DSC_2152.jpg\" alt=\"\" height=\"1024\" class=\"aligncenter size-full wp-image-1352\" \/>Proc. IEEE COMPSAC&#8217;17  pp.13-22<br \/>\n\u6982\u8981\uff1a<\/p>\n<p>Behaviors of an object-oriented system can be visualized as reverse-engineered sequence diagrams from execution traces. This approach is a valuable tool for program comprehension tasks. However, owing to the massiveness of information contained in an execution trace, a reverse-engineered sequence diagram is often afflicted by a scalability issue. To address this issue, we present in this paper a method for identifying core objects for trace summarization by reference relations and access analysis. We detect and eliminate temporary objects that are trivial for a system, and then estimate the importance of non-trivial objects. By grouping objects with a focus on highly important ones (i.e., core objects), we visualize the system&#8217;s behavior in terms of intergroup interactions. Consequently, we obtain a readable size of a reverse-engineered sequence diagram containing the system&#8217;s key behavior. We implemented our technique in our tool and evaluated it by using traces from open-source software systems. The results showed that our reverse-engineered sequence diagrams contained only less than 30 lifelines, whereas the original diagrams (no abstraction methods were applied) contained approximately 1,000 to 3,000 lifelines. Our proposed method achieved significant reduction of the horizontal size of the diagram and is expected to be a valuable tool for program comprehension.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>\u5c0f\u6797\u7814 D2\u306e\u91ce\u7530 \u8a13\u5e83\u3055\u3093\u304c\u3001\u30a4\u30bf\u30ea\u30a2\u306e\u30c8\u30ea\u30ce\u3067\u958b\u50ac\u3055\u308c\u305f IEEE 41st Annual Computer Software and Applications Conference (COMPSAC 2017) \u306b [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1341","post","type-post","status-publish","format-standard","hentry","category-research"],"_links":{"self":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/posts\/1341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/comments?post=1341"}],"version-history":[{"count":7,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/posts\/1341\/revisions"}],"predecessor-version":[{"id":2972,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/posts\/1341\/revisions\/2972"}],"wp:attachment":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/media?parent=1341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/categories?post=1341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/ja\/wp-json\/wp\/v2\/tags?post=1341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}