Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3003733.3003777acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Evolution of method invocation and object instantiation patterns in a PHP ecosystem

Published: 10 November 2016 Publication History
  • Get Citation Alerts
  • Abstract

    PHP is one of the most frequently used scripting languages for server-side programming, since approximately 75% of successful web applications have been developed with PHP. The main benefits of PHP are its low learning curve and the rich variety of dynamic features that it offers. These benefits have contributed towards the development of a large community of programmers around PHP, which in turn created a vast ecosystem of applications and frameworks. In this study we have empirically investigated ten famous PHP frameworks / applications and over 240 MLOC in order to explore their internal structure. More specifically, we present some demographics on method invocation and object instantiation patterns, empowered by the dynamic nature of the PHP language. To present the results we employ statistical methods inspired by ecology. In particular, we explore the diversity and dominance of these patterns, by using the Shannon-Wiener diversity index and a Dominance index that has been originally developed for Plankton. The main conclusion of our study is that the employment of the patterns, is related to developers, and therefore we can observe normality and repetition with small diversions.

    References

    [1]
    I. F. Spellerberg and P. J. Fedor, "A tribute to Claude Shannon (1916-2001) and a plea for more rigorous use of species richness, species diversity and the 'Shannon-Wiener' Index," Glob. Ecol. Biogeogr., vol. 12, no. 3, pp. 177--179, 2003.
    [2]
    C. J. Krebs, Ecological Methodology. New York: Harper Collins Publishers, 1989.
    [3]
    Z.-L. Xu and C. Li, "Horizontal distribution and dominant species of heteropods in the East China Sea," J. Plankton Res., vol. 27, no. 4, pp. 373--382, 2005.
    [4]
    K. Li, J. Yin, L. Huang, and Z. Lin, "Seasonal variations in diversity and abundance of surface ichthyoplankton in the northern South China Sea," Acta Oceanol. Sin., vol. 33, no. 12, pp. 145--154, 2014.
    [5]
    M. Hills, "Evolution of dynamic feature usage in PHP," in 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015, pp. 525--529.
    [6]
    M. Hills, "Variable Feature Usage Patterns in PHP (T).," in ASE, 2015, pp. 563--573.
    [7]
    L. Eshkevari, F. D. Santos, J. R. Cordy, and G. Antoniol, "Are PHP applications ready for Hack?," in 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015, pp. 63--72.
    [8]
    J. R. Cordy, "The TXL Source Transformation Language," Sci Comput Program, vol. 61, no. 3, pp. 190--210, Aug. 2006.
    [9]
    T. Amanatidis and A. Chatzigeorgiou, "Studying the Evolution of PHP Web Applications," Inf Softw Technol, vol. 72, no. C, pp. 48--67, Apr. 2016.
    [10]
    B. Wang, L. Chen, W. Ma, Z. Chen, and B. Xu, "An empirical study on the impact of Python dynamic features on change-proneness.," in SEKE, 2015, pp. 134--139.
    [11]
    O. Callaú, R. Robbes, É. Tanter, and D. Röthlisberger, "How Developers Use the Dynamic Features of Programming Languages: The Case of Smalltalk," in Proceedings of the 8th Working Conference on Mining Software Repositories, New York, NY, USA, 2011, pp. 23--32.

    Cited By

    View all
    • (2023)An Enhanced Static Taint Analysis Approach to Detect Input Validation VulnerabilityJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.01.00935:2(682-701)Online publication date: Feb-2023

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PCI '16: Proceedings of the 20th Pan-Hellenic Conference on Informatics
    November 2016
    449 pages
    ISBN:9781450347891
    DOI:10.1145/3003733
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Greek Com Soc: Greek Computer Society
    • TEI: Technological Educational Institution of Athens

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. PHP
    2. method invocation
    3. object creation
    4. scripting languages
    5. software maintenance

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    PCI '16
    PCI '16: 20th Pan-Hellenic Conference on Informatics
    November 10 - 12, 2016
    Patras, Greece

    Acceptance Rates

    Overall Acceptance Rate 190 of 390 submissions, 49%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)An Enhanced Static Taint Analysis Approach to Detect Input Validation VulnerabilityJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.01.00935:2(682-701)Online publication date: Feb-2023

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media