Published May 15, 2024 | Version v1
Dataset Open

Surpassing Threshold Barriers: Evaluating the Efficacy of Nature-Inspired Algorithms in Detecting Applied Refactorings

Description

This page is provided as supplementary material for the article: Surpassing Threshold Barriers: Evaluating the Efficacy of Nature-Inspired Algorithms in Detecting Applied Refactorings. More specifically, we provide the results, the refactorings detected by each tool, as a downloadable JSON file. 

Results.json: You can access the results comparing ACA with RefDetect, RefactoringMiner, NSGA-II, and the Greedy algorithm.

  • Overview of JSON Template: Each entry in this file provides details about commits, including their SHA-1 hash, GitHub URL, and an exhaustive list of refactorings identified in that specific commit. Refactorings are defined by their type (e.g., 'RenameClass') and are accompanied by detailed descriptions of the refactoring. Additionally, the entry specifies the tools that detected the refactoring, such as 'ACA' and 'RefactoringMiner.' The validation field indicates whether the refactoring was confirmed, using 'TP' for true positive and 'FP' for false positive. Optional comment information may be also included.

Times.xlsx: The Excel file containing the time taken by each tool to identify refactoring in each commit.

Results.xlsx: The Excel file contains precision, recall, and F-score metrics for all identified refactoring types.

Files

Results.json

Files (2.3 MB)

Name Size Download all
md5:34835c1df49ebd0f0a114440af6043c6
2.3 MB Preview Download
md5:c0b8ec023f6a975f1816996002d96776
17.7 kB Download
md5:9ef5bf4453d99537e0043f59e1201eab
55.6 kB Download