Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 31107

Select areas to restrict search in scientific publication database:
On Measuring the Reusability Proneness of Mobile Applications
The abnormal increase in the number of applications available for download in Android markets is a good indication that they are being reused. However, little is known about their real reusability potential. A considerable amount of these applications is reported as having a poor quality or being malicious. Hence, in this paper, an approach to measure the reusability potential of classes in Android applications is proposed. The approach is not meant specifically for this particular type of applications. Rather, it is intended for Object-Oriented (OO) software systems in general and aims also to provide means to discard the classes of low quality and defect prone applications from being reused directly through inheritance and instantiation. An empirical investigation is conducted to measure and rank the reusability potential of the classes of randomly selected Android applications. The results obtained are thoroughly analyzed in order to understand the extent of this potential and the factors influencing it.
Digital Object Identifier (DOI):


[1] Abebe, S. L., Kessler, F. B., Haiduc, S., Tonella, P. and Marcus, A. "The Effect of Lexicon Bad Smells on Concept Location in Source Code,” Proceedings of the 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 125 – 134, 2011.
[2] Al-Dallal, J. and Morasca, S. "Predicting object-oriented class reuse-proneness using internal quality attributes,” Empirical Software Engineering, vol. 19, no. 4, pp. 775-821, 2014.
[3] Al-Dallal, J. and Briand, L. C. "A Precise method-method interaction-based cohesion metric for object-oriented classes,” ACM Transactions on Software Engineering and Methodology, vol. 21, no. 2, 8:1-8:34, 2012.
[4] Android, the world's most popular mobile platform,, April 2014.
[5] Anquetil, N. and Lethbdige, T. "Assessing the Relevance of Identifier Names in Legacy System,” In Proc of the Centre for Advanced Studies on Collaborative Research Conference, 1998.
[6] Appbrain,, April 2014
[7] Bertoa, M. F., Troya, J. M. andVallecillo, A. "Measuring the usability of software components,” The Journal of Systems and Software, vol. 79, pp.427–439, 2006.
[8] CCCC,, April 2014.
[9] Chidamber, S. and Kemerer, C. "A Metrics Suite for Object Oriented Design,” IEEE Transactions on Software Engineering, vol. 20, no. 6, pp. 476-493, 1994.
[10] CKJM,, April 2014.
[11] Crussell, J., Gibler, C. and Chen, H. "AnDarwin: Scalable Detection of Semantically Similar Android Applications,” Lecture Notes in Computer Science, pp. 182-199, 2013.
[12] Crussell, J., Gibler, C. and Chen, H. "Attack of the Clones: Detecting Cloned Applications on Android Markets,” Proceedings of the 17th European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 7459, pp. 37-54, 2012.
[13] Darcy, D. and Kemerer, C. "OO Metrics in Practice,” IEEE Software, vol. 22, no. 6, pp. 17-19, 2005.
[14] Dex2jar,, April 2014.
[15] Enck, W., Ongtang, M. and McDaniel,P. "On Lightweight Mobile Phone Application Certification,” Proceeding of the 16th ACM conference on Computer and communications security, pp. 235-245, 2009.
[16] Google Play,, April 2014.
[17] Grosser, D., Sahraoui, H. A. and Valtchev, O. "An analogy-based approach for predicting design stability of Java classes,” Proceedings of the 9th International Software Metrics Symposium, pp. 252-262, 2003.
[18] Gui, G. and Scott, P. D. "Coupling and cohesion measures for evaluation of component reusability,” Proceedings of the 2006 international workshop on Mining software repositories, pp. 18 – 21, 2006.
[19] Gyimothy, T., Ferenc, R. and Siket, I. "Empirical Validation of Object-Oriented Metrics on Open Source Software for Fault Prediction,” IEEE Transactions on Software Engineering, vol. 31, no. 10, pp. 897-910, 2005.
[20] Haefliger, S., Von-Krogh, G. and Spaeth, S. "Code Reuse in Open Source Software,” Management Science, vol. 54, no. 1, pp. 180-193, 2008.
[21] Hanna, S., Huang, L., Wu, E., Li, S., Chen, C. and Song, D. "Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications Detection of Intrusions and Malware, and Vulnerability Assessment,” Lecture Notes in Computer Science. Vol. 7591, pp. 62-81, 2013.
[22] Heinemann, L., Deissenboeck, F., Gleirscher, M., Hummel, B. and Irlbeck, M. "On the extent and nature of software reuse in open source Java projects,” Proceedings of the 12th international conference on Top productivity through software reuse, Klaus Schmid (Ed.). Springer-Verlag, pp. 207-222, 2011.
[23] Heitlager, I., Kuipers, T. and Visser, J. "A Practical Model for Measuring Maintainability,” Proceedings of the 6th International Conference on Quality of Information and Communications Technology, pp. 30–39, 2007.
[24] JAD,, April 2014.
[25] Khomh, F., Di-Penta, M., Gueheneuc, Y.G. and Antoniol, G. "An exploratory study of the impact of antipatterns on class change- and fault-proneness,” Empirical Software Engineering, vol. 17, no. 3, pp. 243-275, 2012.
[26] Linares-Vasquez, M., Bavota, G., Bernal-Cardenas, C., Penta, M. D., Oliveto, R. and Poshyvanyk,D. "Api change and fault proneness: A threat to the success of android apps,” Proceedings of the 9th Joint Meeting of the European Software Engineering Conference and the 21st ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 477-487, 2013.
[27] Lee, V., Schneider, H. and Schell, R. Mobile Applications: Architecture, Design, and Development, 1st edition, Prentice Hall, 2004.
[28] Lee, Y. and Chang, K. H. "Reusability and maintainability metrics for object-oriented software,”Proceedings of the ACM-SE 38th annual on Southeast regional conference, pp.88-94, 2000.
[29] McDonnell, T., Ray, B.and Kim, M. "An Empirical Study of API Stability and Adoption in the Android Ecosystem,” Proceeding of the 29th IEEE International Conference on Software Maintenance, pp. 70-79, 2013.
[30] Minelli, R. and Lanza, M. "Software Analytics for Mobile Applications – Insights & Lessons Learned,” Proceeding of the European Conference on Software Maintenance and Reengineering, pp. 144-153, 2013.
[31] Mohagheghi, P., Conradi, R., Killi, O.M. and Schwarz, H. "An empirical study of software reuse vs. defect-density and stability,” Proceedings of the 26th International Conference on Software Engineering, pp. 282 - 291, 2004.
[32] Navarro, G. "A Guided Tour to Approximate String Matching,” ACM Computing Surveys, vol. 33, no. 1, pp. 31–88, 2001.
[33] Reussner, R. H., Schmidt, H. W. and Poernomo, I. H. "Reliability prediction for component-based software architectures,” The Journal of Systems and Software, vol. 66, pp. 241–252, 2003.
[34] Ruiz, I. J. M., Nagappan, M., Adams, B. and Hassan, A. E."Understanding Reuse in the Android Market,” Proceedings of IEEE 20th International Conference on Program Comprehension, Germany, pp.113–122, 2012.
[35] Subramanyam, R. and Krishnan, M. "Empirical analysis of CK metrics for object-oriented design complexity: implications for software defects,” IEEE Transactions on Software Engineering, vol. 29, no. 4, pp. 297–310, 2003.
[36] Syer, D., Adams, B., Zou, Y. and Hassan, A. "Exploring the development of micro-apps: A case study on the blackberry and android platforms,” Proceedings of the 11th IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 55-64, 2011.
[37] Taibi, F. "Empirical Analysis of the Reusability of Object-Oriented Program Code in Open-Source Software,” International Journal of Computer, Information, System and Control Engineering, vol. 8, no. 1, pp. 114 – 120, 2014.
[38] Washizaki, H., Yamamoto, H. and Fukazawa, Y. "A metrics suite for measuring reusability of software components,” Proceedings of the 9th Software Metrics Symposium, pp. 211-223, 2003.
[39] Zhou, W., Zhou, Y., Grace, M., Jiang, X. and Zou, S. "Fast, scalable detection of Piggybacked mobile applications,” Proceedings of the 3rd ACM conference on Data and application security and privacy, pp. 185-196, 2013.
[40] Zhou, Y. and Leung, H. "Empirical Analysis of Object-Oriented Design Metrics for Predicting High and Low Severity Faults,” IEEE Transactions on Software Engineering, vol. 32, no. 10, pp. 771-789, 2006.
Vol:15 No:03 2021Vol:15 No:02 2021Vol:15 No:01 2021
Vol:14 No:12 2020Vol:14 No:11 2020Vol:14 No:10 2020Vol:14 No:09 2020Vol:14 No:08 2020Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007