Reference Hub7
Quantifying Reuse in OSS: A Large-Scale Empirical Study

Quantifying Reuse in OSS: A Large-Scale Empirical Study

Eleni Constantinou, Apostolos Ampatzoglou, Ioannis Stamelos
Copyright: © 2014 |Volume: 5 |Issue: 3 |Pages: 19
ISSN: 1942-3926|EISSN: 1942-3934|EISBN13: 9781466656079|DOI: 10.4018/IJOSSP.2014070101
Cite Article Cite Article

MLA

Constantinou, Eleni, et al. "Quantifying Reuse in OSS: A Large-Scale Empirical Study." IJOSSP vol.5, no.3 2014: pp.1-19. http://doi.org/10.4018/IJOSSP.2014070101

APA

Constantinou, E., Ampatzoglou, A., & Stamelos, I. (2014). Quantifying Reuse in OSS: A Large-Scale Empirical Study. International Journal of Open Source Software and Processes (IJOSSP), 5(3), 1-19. http://doi.org/10.4018/IJOSSP.2014070101

Chicago

Constantinou, Eleni, Apostolos Ampatzoglou, and Ioannis Stamelos. "Quantifying Reuse in OSS: A Large-Scale Empirical Study," International Journal of Open Source Software and Processes (IJOSSP) 5, no.3: 1-19. http://doi.org/10.4018/IJOSSP.2014070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Reuse is an established software development practice, whose benefits have attracted the attention of researchers and practitioners. In order for software reuse to advance from an opportunistic activity to a well-defined, systematic state of practice, the reuse phenomenon should be empirically studied in a real-world environment. To this end, OSS projects consist a fitting context for this purpose. In this paper, the authors aim at assessing the: (a) strategy and intensity of reuse activities in OSS development, (b)effect of reuse activities on design quality, (c) modification of reuse decisions from a chronological viewpoint and (d) effect of these modifications on software design quality. In order to achieve these goals, the authors performed a large-scale embedded multi-case study on 1,111 Java projects, extracted from Google Code repository. The results of the case study provide a valuable insight on reuse processes in OSS development, that can be exploited by both researchers and practitioners.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.