{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:52:05Z","timestamp":1753887125479,"version":"3.41.2"},"reference-count":39,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T00:00:00Z","timestamp":1567036800000},"content-version":"vor","delay-in-days":240,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572371","61702378"],"award-info":[{"award-number":["61572371","61702378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Software stability means the resistance to the amplification of changes in software. It has become one of the most important attributes that affect maintenance cost. To control the maintenance cost, many approaches have been proposed to measure software stability. However, it is still a very difficult task to evaluate the software stability especially when software becomes very large and complex. In this paper, we propose to characterize software stability via change propagation simulation. First, we propose a class coupling network (CCN) to model software structure at the class level. Then, we analyze the change propagation process in the CCN by using a simulation way, and by doing so, we develop a novel metric, <jats:italic>S<\/jats:italic><jats:italic>S<\/jats:italic> (software stability), to measure software stability. Our <jats:italic>S<\/jats:italic><jats:italic>S<\/jats:italic> metric is validated theoretically using the widely accepted Weyuker\u2019s properties and empirically using a set of open source Java software systems. The theoretical results show that our <jats:italic>S<\/jats:italic><jats:italic>S<\/jats:italic> metric satisfies most of Weyuker\u2019s properties with only two exceptions, and the empirical results show that our metric is an effective indicator for software quality improvement and class importance. Empirical results also show that our approach has the ability to be applied to large software systems.<\/jats:p>","DOI":"10.1155\/2019\/9414162","type":"journal-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T23:31:31Z","timestamp":1567121491000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Characterizing Software Stability via Change Propagation Simulation"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6355-1385","authenticated-orcid":false,"given":"Weifeng","family":"Pan","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Chunlai","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Bi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,8,29]]},"reference":[{"volume-title":"Software Engineering: A Practitioner\u2019s Approach","year":"1992","author":"Pressman R. S.","key":"e_1_2_9_1_2"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232544"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234503"},{"volume-title":"Software Metrics: A Rigorous and Practical Approach","year":"1996","author":"Fenton N. E.","key":"e_1_2_9_4_2"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.130"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.046116"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1060710.1060716"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1019"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-011-0319-z"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-009-0054-y"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.006"},{"key":"e_1_2_9_12_2","first-page":"2456","article-title":"Test case prioritization based on complex software networks","volume":"40","author":"Pan W.-F.","year":"2012","journal-title":"Acta Electronica Sinica"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.6178"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"KungD. GaoJ. HsiaP. WenF. ToyoshimaY. andChenC. Change impact identification in object-oriented software maintenance Proceedings of the IEEE International Conference on Software Maintenance (ICSM \u203294) 1994 Victoria Canada IEEE 202\u2013211.","DOI":"10.1109\/ICSM.1994.336774"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(99)00088-9"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"GrosserD. SahraouiH. A. andValtchevP. An analogy-based approach for predicting design stability of Java classes Proceedings of the 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (Metric \u203203) 2003 Sydney Australia 252\u2013262 https:\/\/doi.org\/10.1109\/METRIC.2003.1232472.","DOI":"10.1109\/METRIC.2003.1232472"},{"key":"e_1_2_9_17_2","unstructured":"RatiuD. DucasseS. GirbaT. andMarinescuR. Using history information to improve design flaws detection Proceedings of the 8th European Conference on Software Maintenance and Reengineering (CSMR \u203204) 2004 Tampere Finland 223\u2013232."},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0552"},{"key":"e_1_2_9_19_2","unstructured":"ShaikI. AbdelmoezW. GunnalanR. ShereshevskyM. ZeidA. AmmarH. H. MiliA. andFuhrmanC. Using change propagation probabilities to assess quality attributes of software architectures Proceedings of the IEEE International Conference on Computer Systems and Applications (ICCSA \u203206) March 2006 Dubai UAE 704\u2013711 2-s2.0-33750797410."},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127408020537"},{"key":"e_1_2_9_21_2","unstructured":"LiL. QianG. andZhangL. Evaluation of software change propagation using simulation Proceedings of the WRI World Congress on Software Engineering (WCSE \u203209) May 2009 Xiamen China 28\u201333 2-s2.0-72849138236."},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.00440"},{"key":"e_1_2_9_23_2","first-page":"1599","article-title":"Quantifying the stability of software systems via simulation in dependency networks","volume":"5","author":"Pan W.","year":"2011","journal-title":"International Journal of Computer and Systems Engineering"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2010.0050"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2414917"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.10.4.441-453"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-016-0573-6"},{"key":"e_1_2_9_28_2","first-page":"1","volume-title":"Cluster Computing","author":"Pan W.","year":"2017"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.748920"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0206"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.87287"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.917526"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.177371"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.735"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.112"},{"key":"e_1_2_9_37_2","first-page":"891","article-title":"Identifying key classes using h-index and its variants","volume":"5","author":"Wang M. S.","year":"2011","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.370"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525914500064"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/9414162.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/9414162.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/9414162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:42:12Z","timestamp":1723030932000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/9414162"}},"subtitle":[],"editor":[{"given":"Dimitri","family":"Volchenkov","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/9414162"],"URL":"https:\/\/doi.org\/10.1155\/2019\/9414162","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2019-02-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9414162"}}