SlideShare a Scribd company logo
1 of 13
Download to read offline
Institut für Wirtschaftsinformatik/Informatik
5th International Conference on Information
Visualization Theory and Applications
Richard Müller1, Pascal Kovacs1, Jan Schilbach1, Ulrich
Eisenecker1, Dirk Zeckzer2, Gerik Scheuermann2
1Information Systems Institute
2Institute of Computer Science
University of Leipzig, Leipzig, Germany
January 5, 2014
A Structured Approach for Conducting a Series of Controlled
Experiments in Software Visualization
2
Institut für Wirtschaftsinformatik/Informatik
2D or 3D: State of the Art
© 2014 by R. Müller
 Scientific drivers
 Lack of empirical research in
software visualization
 Ongoing discourse: 2D vs. 3D
 Five papers about 3D software
visualizations at VISSOFT
2013
 Technical drivers
 Innovative methods to generate
software visualizations
 Increasing computing power
 Emerging technology
 High quality and low cost 3D
environments
3D-Vision Glasses and
Infrared Transmitter
3D-Vision Capable
Monitor or Projector
Quadro
GPU
3
Institut für Wirtschaftsinformatik/Informatik
A Series of Controlled Experiments
© 2014 by R. Müller
 A series of controlled
experiments is required
to determine the
circumstances when and
why a specific software
visualization is suitable
for a certain software
engineering task
Software
Visualization
User
Task
Software
Artifact
Represen-
tation
Navigation
&
Interaction
Implemen-
tation
4
Institut für Wirtschaftsinformatik/Informatik
Munzner‘s Model and its Extension
© 2014 by R. Müller
[Munzner 2009; Meyer, Sedlmair, Munzner 2012]
Block Guideline
5
Institut für Wirtschaftsinformatik/Informatik
Domain Specific Adaption of Munzner’s
Extended Model for Software Visualization
© 2014 by R. Müller
6
Institut für Wirtschaftsinformatik/Informatik
Possible Instantiations (1/3)
Factor/Sub-
Factor
Examples for Possible Instantiations
User
Role
Background
Knowledge
Circumstances
Manager, Requirements Engineer, Architect, Developer, Tester,
Maintainer, Reengineer, Documenter, Consultant, Team, Researcher
Age, Gender, Color Blindness, Ability of Stereoscopic Viewing
Education, Programming Experience, Domain Knowledge
Occupation, Familiarity with Study Object/Tools
Task
Problem Development, Maintenance, Re-Engineering, Reverse Engineering,
Software Process Management, Marketing, Test, Documentation
Operation Retrieve Value, Filter, Compute Derived Value, Find Extremum, Sort,
Determine Range, Characterize Distribution, Find Anomalies, Cluster,
Correlate
© 2014 by R. Müller
7
Institut für Wirtschaftsinformatik/Informatik
Possible Instantiations (2/3)
Factor/Sub-
Factor
Examples for Possible Instantiations
Software
Artifact
Type
Size
Aspect
Requirements, Architecture, Source Code, Stack Trace, Revision History
Small, Medium, Large
Structure, Behavior, Evolution
Representation
Dimensionality
Technique
2D, 2.5D, Augmented 2D, Adapted 2D, Inherent 3D
Graph, Tree, Abstract/Real World Metaphor,
Decorational/Representational Animation
© 2014 by R. Müller
8
Institut für Wirtschaftsinformatik/Informatik
Possible Instantiations (3/3)
Factor/Sub-
Factor
Examples for Possible Instantiations
Navigation &
Interaction
Technique
Input
Output
Overview, Zoom, Filter, Details-on-Demand, Relate, History, Extract
Keyboard, Mouse, Gamepad, Flystick, Kinect, Touch Device, Leap
Motion, Brain-Computer Interface
Paper, Monitor, Projector, Virtual Reality Environment, Oculus Rift
Implementation
Algorithm
Platform Dep.
Automation
Radial Layout, Balloon Layout, Treemap, Information Cube, Cone Tree
Platform
Platform Independent, Platform Dependent
Full, Semi, Manual
Data Famix, Dynamix, Hismo
© 2014 by R. Müller
9
Institut für Wirtschaftsinformatik/Informatik
Example Experiment: Overview
 Research question
 Does an inherent 3D software visualization reduce time to solve
software engineering tasks, compared to a 2D software visualization?
 Dependent variable
 time
 Independent variable
 dimensionality
 Between-subjects design
 control group (2D), experimental group (3D)
© 2014 by R. Müller
10
Institut für Wirtschaftsinformatik/Informatik
Example Experiment: Detail
© 2014 by R. Müller
User
Role
Background
Knowledge
Developer
Color Blindness, Ability of
Stereoscopic Viewing
Education, Programming
Experience, Domain
Knowledge (Virtual Reality,
Touch Devices, 3D)
Task
Problem Find a Bug,
Identify a Dominating Class
Operation Retrieve Value, Filter, Find
Extremum, Find Anomalies,
Correlate
Software Artifact
Type
Size
Aspect
Source Code
Medium
Structure
Representation
Dimensionality
Technique
2D vs. Inherent 3D
Graph (Nested Node-Link
Technique)
Navigation & Interaction
Technique
Input
Output
Overview, Zoom, Filter,
Relate
Touch Device
Virtual Reality Environment
Implementation
Algorithm
Platform Dep.
Automation
Force Directed Layout
Plaform Independent
Full
Data Abstraction Famix
Vary different factors in different experiments
while keeping other relevant factors constant or
measure their influence on the result
11
Institut für Wirtschaftsinformatik/Informatik
Summary and Conclusion
 The structured approach to conduct a series of controlled
experiments in software visualization is based on Munzner‘s model
and its extension
 The approach…
 Provides a comprehensive overview of relevant influence factors and
their possible interactions
 Helps to plan new experiments, to categorize previous experiments and
to assess their results
 Supports researchers to identify research gaps
© 2014 by R. Müller
12
Institut für Wirtschaftsinformatik/Informatik
Your questions…
© 2014 by R. Müller
13
Institut für Wirtschaftsinformatik/Informatik
References
 Meyer, M., Sedlmair, M. & Munzner, T., 2012. The four-level nested model revisited: blocks
and guidelines. In Workshop on BEyond time and errors: novel evaLuation methods for
Information Visualization (BELIV). pp. 1–6.
 Munzner, T., 2009. A nested model for visualization design and validation. IEEE
Transactions on Visualization and Computer Graphics, 15(6), pp.921–928.
© 2014 by R. Müller

More Related Content

Similar to A Structured Approach for Conducting a Series of Controlled Experiments in Software Visualization [IVAPP 2014]

MediaVis VISSOFT 2017
MediaVis VISSOFT 2017MediaVis VISSOFT 2017
MediaVis VISSOFT 2017Leonel Merino
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overviewjennhunter
 
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfMachine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfCarlos Paredes
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehnabati
 
Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios
 Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios
Redes de sensores sem fio autonômicas: abordagens, aplicações e desafiosPET Computação
 
OpenVis Conference Report Part 1 (and Introduction to D3.js)
OpenVis Conference Report Part 1 (and Introduction to D3.js)OpenVis Conference Report Part 1 (and Introduction to D3.js)
OpenVis Conference Report Part 1 (and Introduction to D3.js)Keiichiro Ono
 
Real-Time Metamodeling in the Web Browser
Real-Time Metamodeling in the Web BrowserReal-Time Metamodeling in the Web Browser
Real-Time Metamodeling in the Web BrowserMichael Derntl
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningIRJET Journal
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensSirris
 
Bridging Concepts and Practice in eScience via Simulation-driven Engineering
Bridging Concepts and Practice in eScience via Simulation-driven EngineeringBridging Concepts and Practice in eScience via Simulation-driven Engineering
Bridging Concepts and Practice in eScience via Simulation-driven EngineeringRafael Ferreira da Silva
 
2013 Lecture 5: AR Tools and Interaction
2013 Lecture 5: AR Tools and Interaction 2013 Lecture 5: AR Tools and Interaction
2013 Lecture 5: AR Tools and Interaction Mark Billinghurst
 
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEPREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEIRJET Journal
 
Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Henry Muccini
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentationpbihler
 
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)Radu Marinescu
 
A Survey Paper on Controlling Computer using Hand Gestures
A Survey Paper on Controlling Computer using Hand GesturesA Survey Paper on Controlling Computer using Hand Gestures
A Survey Paper on Controlling Computer using Hand GesturesIRJET Journal
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
 
A Generic Framework for Executable Gestural Interaction Models
A Generic Framework for Executable Gestural Interaction ModelsA Generic Framework for Executable Gestural Interaction Models
A Generic Framework for Executable Gestural Interaction ModelsTom Mens
 

Similar to A Structured Approach for Conducting a Series of Controlled Experiments in Software Visualization [IVAPP 2014] (20)

MediaVis VISSOFT 2017
MediaVis VISSOFT 2017MediaVis VISSOFT 2017
MediaVis VISSOFT 2017
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overview
 
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfMachine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios
 Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios
Redes de sensores sem fio autonômicas: abordagens, aplicações e desafios
 
OpenVis Conference Report Part 1 (and Introduction to D3.js)
OpenVis Conference Report Part 1 (and Introduction to D3.js)OpenVis Conference Report Part 1 (and Introduction to D3.js)
OpenVis Conference Report Part 1 (and Introduction to D3.js)
 
IDS 2013 - ROSKO 3
IDS 2013 - ROSKO 3IDS 2013 - ROSKO 3
IDS 2013 - ROSKO 3
 
Real-Time Metamodeling in the Web Browser
Real-Time Metamodeling in the Web BrowserReal-Time Metamodeling in the Web Browser
Real-Time Metamodeling in the Web Browser
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine Learning
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
 
Bridging Concepts and Practice in eScience via Simulation-driven Engineering
Bridging Concepts and Practice in eScience via Simulation-driven EngineeringBridging Concepts and Practice in eScience via Simulation-driven Engineering
Bridging Concepts and Practice in eScience via Simulation-driven Engineering
 
2013 Lecture 5: AR Tools and Interaction
2013 Lecture 5: AR Tools and Interaction 2013 Lecture 5: AR Tools and Interaction
2013 Lecture 5: AR Tools and Interaction
 
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEPREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
 
Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentation
 
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
 
Lopez
LopezLopez
Lopez
 
A Survey Paper on Controlling Computer using Hand Gestures
A Survey Paper on Controlling Computer using Hand GesturesA Survey Paper on Controlling Computer using Hand Gestures
A Survey Paper on Controlling Computer using Hand Gestures
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
A Generic Framework for Executable Gestural Interaction Models
A Generic Framework for Executable Gestural Interaction ModelsA Generic Framework for Executable Gestural Interaction Models
A Generic Framework for Executable Gestural Interaction Models
 

Recently uploaded

Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 

Recently uploaded (20)

Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 

A Structured Approach for Conducting a Series of Controlled Experiments in Software Visualization [IVAPP 2014]

  • 1. Institut für Wirtschaftsinformatik/Informatik 5th International Conference on Information Visualization Theory and Applications Richard Müller1, Pascal Kovacs1, Jan Schilbach1, Ulrich Eisenecker1, Dirk Zeckzer2, Gerik Scheuermann2 1Information Systems Institute 2Institute of Computer Science University of Leipzig, Leipzig, Germany January 5, 2014 A Structured Approach for Conducting a Series of Controlled Experiments in Software Visualization
  • 2. 2 Institut für Wirtschaftsinformatik/Informatik 2D or 3D: State of the Art © 2014 by R. Müller  Scientific drivers  Lack of empirical research in software visualization  Ongoing discourse: 2D vs. 3D  Five papers about 3D software visualizations at VISSOFT 2013  Technical drivers  Innovative methods to generate software visualizations  Increasing computing power  Emerging technology  High quality and low cost 3D environments 3D-Vision Glasses and Infrared Transmitter 3D-Vision Capable Monitor or Projector Quadro GPU
  • 3. 3 Institut für Wirtschaftsinformatik/Informatik A Series of Controlled Experiments © 2014 by R. Müller  A series of controlled experiments is required to determine the circumstances when and why a specific software visualization is suitable for a certain software engineering task Software Visualization User Task Software Artifact Represen- tation Navigation & Interaction Implemen- tation
  • 4. 4 Institut für Wirtschaftsinformatik/Informatik Munzner‘s Model and its Extension © 2014 by R. Müller [Munzner 2009; Meyer, Sedlmair, Munzner 2012] Block Guideline
  • 5. 5 Institut für Wirtschaftsinformatik/Informatik Domain Specific Adaption of Munzner’s Extended Model for Software Visualization © 2014 by R. Müller
  • 6. 6 Institut für Wirtschaftsinformatik/Informatik Possible Instantiations (1/3) Factor/Sub- Factor Examples for Possible Instantiations User Role Background Knowledge Circumstances Manager, Requirements Engineer, Architect, Developer, Tester, Maintainer, Reengineer, Documenter, Consultant, Team, Researcher Age, Gender, Color Blindness, Ability of Stereoscopic Viewing Education, Programming Experience, Domain Knowledge Occupation, Familiarity with Study Object/Tools Task Problem Development, Maintenance, Re-Engineering, Reverse Engineering, Software Process Management, Marketing, Test, Documentation Operation Retrieve Value, Filter, Compute Derived Value, Find Extremum, Sort, Determine Range, Characterize Distribution, Find Anomalies, Cluster, Correlate © 2014 by R. Müller
  • 7. 7 Institut für Wirtschaftsinformatik/Informatik Possible Instantiations (2/3) Factor/Sub- Factor Examples for Possible Instantiations Software Artifact Type Size Aspect Requirements, Architecture, Source Code, Stack Trace, Revision History Small, Medium, Large Structure, Behavior, Evolution Representation Dimensionality Technique 2D, 2.5D, Augmented 2D, Adapted 2D, Inherent 3D Graph, Tree, Abstract/Real World Metaphor, Decorational/Representational Animation © 2014 by R. Müller
  • 8. 8 Institut für Wirtschaftsinformatik/Informatik Possible Instantiations (3/3) Factor/Sub- Factor Examples for Possible Instantiations Navigation & Interaction Technique Input Output Overview, Zoom, Filter, Details-on-Demand, Relate, History, Extract Keyboard, Mouse, Gamepad, Flystick, Kinect, Touch Device, Leap Motion, Brain-Computer Interface Paper, Monitor, Projector, Virtual Reality Environment, Oculus Rift Implementation Algorithm Platform Dep. Automation Radial Layout, Balloon Layout, Treemap, Information Cube, Cone Tree Platform Platform Independent, Platform Dependent Full, Semi, Manual Data Famix, Dynamix, Hismo © 2014 by R. Müller
  • 9. 9 Institut für Wirtschaftsinformatik/Informatik Example Experiment: Overview  Research question  Does an inherent 3D software visualization reduce time to solve software engineering tasks, compared to a 2D software visualization?  Dependent variable  time  Independent variable  dimensionality  Between-subjects design  control group (2D), experimental group (3D) © 2014 by R. Müller
  • 10. 10 Institut für Wirtschaftsinformatik/Informatik Example Experiment: Detail © 2014 by R. Müller User Role Background Knowledge Developer Color Blindness, Ability of Stereoscopic Viewing Education, Programming Experience, Domain Knowledge (Virtual Reality, Touch Devices, 3D) Task Problem Find a Bug, Identify a Dominating Class Operation Retrieve Value, Filter, Find Extremum, Find Anomalies, Correlate Software Artifact Type Size Aspect Source Code Medium Structure Representation Dimensionality Technique 2D vs. Inherent 3D Graph (Nested Node-Link Technique) Navigation & Interaction Technique Input Output Overview, Zoom, Filter, Relate Touch Device Virtual Reality Environment Implementation Algorithm Platform Dep. Automation Force Directed Layout Plaform Independent Full Data Abstraction Famix Vary different factors in different experiments while keeping other relevant factors constant or measure their influence on the result
  • 11. 11 Institut für Wirtschaftsinformatik/Informatik Summary and Conclusion  The structured approach to conduct a series of controlled experiments in software visualization is based on Munzner‘s model and its extension  The approach…  Provides a comprehensive overview of relevant influence factors and their possible interactions  Helps to plan new experiments, to categorize previous experiments and to assess their results  Supports researchers to identify research gaps © 2014 by R. Müller
  • 12. 12 Institut für Wirtschaftsinformatik/Informatik Your questions… © 2014 by R. Müller
  • 13. 13 Institut für Wirtschaftsinformatik/Informatik References  Meyer, M., Sedlmair, M. & Munzner, T., 2012. The four-level nested model revisited: blocks and guidelines. In Workshop on BEyond time and errors: novel evaLuation methods for Information Visualization (BELIV). pp. 1–6.  Munzner, T., 2009. A nested model for visualization design and validation. IEEE Transactions on Visualization and Computer Graphics, 15(6), pp.921–928. © 2014 by R. Müller