Method and Apparatus for Finding Long Methods in Code

ABSTRACT

A method and apparatus are disclosed for finding overlong source code segments (e.g., methods) by evaluating input source code segments for a plurality of predetermined code metric values in order to identify candidate source code segments (e.g., non-autogenerated methods) which do not meet a first code metric value and to assess each candidate source code segment against a second code metric value to identify different sets of candidate source code segments (e.g., test methods and normal methods) so that each set of candidate source code segments may be assessed against a tailored set of code length thresholds to identify any overlong source code segment having a code length which meets or exceeds at least two of the tailored set of code length thresholds.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention is directed in general to field of informationprocessing. In one aspect, the present invention relates generally to asoftware program development tool, method, and apparatus in a dataprocessing system.

Description of the Related Art

Computer programmers, developers, coders and/or software engineerswrite, test, debug, and maintain computer software or code instructions,called computer programs, which computers must follow to perform theirfunctions. When writing or making changes to computer program to addressnew or unique technical challenges, programmers often create new,original and unique programming source code which can, unfortunately,suffer from performance limitations and other sub-optimalities. Forexample, a programmer's unique source code may include a number ofundetected software bugs or vulnerabilities or otherwise suffer from lowquality or robustness. These problems can be exacerbated as he code isupdated or new features are added, with the resulting increases in codelength and complexity creating additional opportunities for potentialproblems, like possible bugs, unused code, complicated code, redundantcode, code smells, bad practices, and so on. These problems can beaddressed with development tools which analyze the code to improve andreduce defects by inspecting the source code (e.g., C, C++ andObjective-C) to identify potential problems and apply code refactoringtechniques to address the identified problems by improving nonfunctionalattributes of the software (e.g., code readability and simplicity)through restructuring of the code's internal structure without changingits external behavior. For example, in class-based programming orobject-oriented programming environments, a programming “method” oftenstarts out as being well-written, but as additional code lines andcomplexity are added to include more and more functionality, the methodbecomes harder to maintain, understand, debug or reuse. While there arerefactoring tools available for detecting long methods in source code(e.g., PMD, JDeodorant, FindBugs, Understand, and Source Making), suchtools typically define a single line count threshold value that iscompared against the total number of lines in the method or the totalcode lines (i.e., no non-blank lines) when assessing whether a methodexceeds the code length threshold. As a result, the large number ofmethods being flagged as overlong make the identified resultsnon-actionable and/or include numerous false positives in this approach.And while the use of source code analyzer tools is considered a bestpractice for software development, the existing solutions are extremelydifficult at a practical level by virtue of the difficulty in accuratelyand efficiently identifying overlong methods.

SUMMARY OF THE INVENTION

A system, apparatus, and methodology are described for efficientlyidentifying code smells in a method, class, code, or entity (a.k.a.,code segment) to improve source code performance, reuse and/ormaintainability by automating the actionable identification andprioritization of overlong code segments for refactoring treatment.Rather than evaluating the total number of non-blank code lines in eachcode segment against a single threshold value, selected embodiments ofthe present disclosure apply a plurality of filters and tailored codelength thresholds to each code segment in the submitted source code toeliminate certain code segments as long segment candidates, to reducetheir effective code length, and/or to evaluate the computed effectivecode length against the tailored code length thresholds which may beindividually configurable by the programmer. Selected embodiments of thedisclosed system, apparatus, and methodology use machine learning,natural language processing (NLP), and/or artificial intelligence (AI)in combination with static and/or dynamic code analysis techniques toautomatically analyze code segments for excessive length and yieldprioritized code refactoring opportunities. As a preliminary step, eachinput code segment is automatically assessed for predetermined codemetrics for use in determining whether the code segment is overlong. Forexample, each input code segment may be assessed by applying one or morecode analysis tools to determine if the code segment is autogenerated,to determine if the code segment is a test method or normal method, todetermine if the code segment includes anonymous or local classes, todetermine the maximum nesting level of the code segment, to determinethe number of linearly independent paths through the code segment interms of the number of conditional branches included therein (e.g.,cyclomatic complexity or modified cyclomatic complexity), and/or todetermine a statement count for the code segment. Based on thepredetermined code metrics assessed for each code segment, theautogenerated code segment and/or any portion of code segment that is ananonymous or local class may be removed or filtered from considerationas an overlong code segment. In addition, any code segments which areidentified as test methods may be assessed against a first tailored setof code length thresholds which are larger than a second tailored codelength thresholds used to assess code segments identified as normalmethods since test methods are less likely to have code-length relatederrors. For example, each of the tailored sets of code length thresholdsmay include a lower limit and an upper, hard limit so that a codesegment having an effective code length that is smaller than the lowerlimit will not be flagged as overlong, while a code segment having aneffective code length that is meets or exceeds the upper hard limit willbe flagged as overlong. As for code segments having effective codelengths between the lower and upper limits, the code segment may beidentified as overlong only if specified thresholds for the maximumnesting, conditional branch, and statement count are exceeded. As aresult of assessing the input code segments in the submitted sourcecode, the programmer may be presented with one or more flagged codesegments which are prioritized as long methods for possible refactoring.

The objects, advantages and other novel features of the presentinvention will be apparent from the following detailed description whenread in conjunction with the appended claims and attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention may be understood, and its numerous objects,features and advantages obtained, when the following detaileddescription of a preferred embodiment is considered in conjunction withthe following drawings.

FIG. 1 is a simplified block diagram of a data processing system fordetecting and reporting long methods in accordance with selectedembodiments of the present disclosure.

FIG. 2 illustrates a simplified flow chart showing the logic fordetecting overlong methods in accordance selected embodiments of thepresent disclosure.

FIG. 3 is a simplified block diagram of a general-purpose computer inaccordance with selected embodiments of the present disclosure.

DETAILED DESCRIPTION

A long code segment detection engine, methodology, and apparatus aredescribed for efficiently and accurately identifying overlong codesegments in a method, class, code, or entity by filtering code linesand/or code segments based on predetermined code metrics that areassessed against tailored sets of code length threshold limits toidentify and recommend code segments for refactoring treatment bydevelopers. In disclosing the claimed method and system for identifyingoverlong code segments by using specific rules, rather than humans, toclassify code segments by assembling a plurality of code lengththreshold limits, computing predetermined code metrics for each codesegment, and evaluating the predetermined code metrics against the codelength threshold limits, there is disclosed an improvement incomputer-related technology that uses a combined order of specific rulesthat renders information into a specific format that is then used andapplied to create desired results in the form of identified overlongcode segments

While various details are set forth in the following description, itwill be appreciated that the present invention may be practiced withoutthese specific details. For example, selected aspects are shown in blockdiagram form, rather than in detail, in order to avoid obscuring thepresent invention. Some portions of the detailed descriptions providedherein are presented in terms of algorithms or operations on data withina computer memory. Such descriptions and representations are used bythose skilled in the data processing arts to describe and convey thesubstance of their work to others skilled in the art. In general, analgorithm refers to a self-consistent sequence of steps leading to adesired result, where a “step” refers to a manipulation of physicalquantities which may, though need not necessarily, take the form ofelectrical or magnetic signals capable of being stored, transferred,combined, compared, and otherwise manipulated. It is common usage torefer to these signals as bits, values, elements, symbols, characters,terms, numbers, or the like. These and similar terms may be associatedwith the appropriate physical quantities and are merely convenientlabels applied to these quantities. Unless specifically stated otherwiseas apparent from the following discussion, it is appreciated thatthroughout the description, discussions using terms such as processing,computing, calculating, determining, displaying or the like, refer tothe action and processes of a computer system, or similar electroniccomputing device, that manipulates and/or transforms data represented asphysical, electronic and/or magnetic quantities within the computersystem's registers and memories into other data similarly represented asphysical quantities within the computer system memories or registers orother such information storage, transmission or display devices.

Referring now to FIG. 1, a simplified block diagram illustrates anexemplary data processing system 100 for generating automaticallyidentifying and prioritizing overlong code segments (e.g., long methods)with one or more server/computer systems 110 and associated databasestorage devices 130 which may be connected together over a suitableconnection link 120 or network, such as a private wide area network(WAN) or the Internet (not shown), to evaluate input source code 131that is input by a program developer 101. In some illustrativeembodiments, the server/computer system 110 may be embodied as aQuestion Answering (QA) system to use NLP, machine learning, and/orartificial intelligence processing techniques which are augmented withthe mechanisms of the illustrative embodiments described hereafter. In aQA system implementation, a long method detection engine 113 and/or longmethod reporting engine 117 may be embodied as a computer program storedin memory 112 which uses one or more processors 111 to query astructured or unstructured knowledge or information in the knowledgedatabase 130 which includes input source code files 131, one or morelong method detection rules 135-138, and the resulting identified longmethods 139. Thus stored in memory 112, the long method detection andreporting engines 113, 117 may be configured to assess input source codefiles (e.g., Methods A-C 132-134) against the long method detectionrules 136-138 for purposes of prioritizing and reporting an identifiedlong method (e.g., Method B 140) as a candidate for refactoringtreatment. The configuring of the long method detection and reportingengines 113, 117 may include providing application specific hardware,firmware, and/or software to implement one or more control logic modules114-117 to facilitate the performance of the operations and generationof the outputs described herein with regard to the illustrativeembodiments. In addition or in the alternative, the configuring of thelong method detection and reporting engines 113, 117 may include storingsoftware applications in one or more storage devices and loaded intomemory of a computing device, such as server 110, for causing one ormore hardware processors (e.g., 111) of the computing device to executethe software applications that configure the processors to perform theoperations and generate the outputs described herein with regard to theillustrative embodiments. Moreover, any combination of applicationspecific hardware, firmware, software applications executed on hardware,or the like, may be used without departing from the spirit and scope ofthe illustrative embodiments.

As will be appreciated, once the server/computer system 110 isconfigured to implement the long method detection and/or reportingengines 113, 117, the server/computer system 110 becomes a specializedcomputing device specifically configured to implement the mechanisms ofthe illustrative embodiments and is not a general purpose computingdevice. Moreover, as described hereafter, the implementation of themechanisms of the illustrative embodiments improves the functionality ofthe computing device and provides a useful and concrete result thatfacilitates identification and prioritization of long code segments forrefactoring recommendations to a program developer 101 by applying themethod/line filter 136 to each of the input source code files 132-134 toidentify normal methods and test methods whose effective code lengthmeasures are separately evaluated against tailored code limit thresholds115 at modules 137, 138 using a plurality of code metric measuresextracted from each input source code file by one or more metric modules114, thereby recommending an identified overlong source code file 140for presentation to the program developer for refactoring treatment.

As a preliminary step in identifying overlong code segments 140 from thecode segments 132-134 in an input source code file 131, the long methoddetection engine 113 may include one or metric modules 114 which applyNLP or machine learning techniques to assess each code segment (e.g.,Method A 132) for predetermined code metrics for use in determiningwhether the code segment is overlong. For example, a first metric module114 may assess the input code segment to determine if the code segmentis autogenerated or not, such as by automatically searching the codesegment comment(s) for an “autogenerated” reference or the like. Inaddition, a second metric module 114 may also be configured to use anNLP or machine learning process to determine if the code segment is atest method or normal method, such as by automatically searching thecode segment name or annotations for a “test” reference or the like,thereby classifying the code segment as a “test” segment (which is lesslikely to have functional errors) or a “normal” segment (which is morelikely to have functional errors). In addition, a third metric module114 may be configured to identify any anonymous or local classes on thecode segment and to determine the total length of such classes in thecode segment, such as by automatically invoking a code analysis tool,such as Understand, to analyze the code segment to identifyanonymous/local class lines which will be excluded from the effectivecode length computation for the code segment. In addition, the metricmodule 114 may be configured to determine other code metrics, such asthe maximum nesting level, modified cyclomatic complexity, or statementcount of the code segment, such as by using Understand or similarintegrated development environment tools.

Once the predetermined code metrics measures are extracted from an inputcode segment, the long method detection engine 113 may be furtherconfigured to identify or retrieve a plurality of code length limitthreshold values 115 from memory 112 and/or from the knowledge base 130.For example, the code length limit threshold values 115 may include afirst tailored set of code length thresholds for application againstidentified test methods, such as a lower test limit (e.g.,Test_Method_Length_Lower_Limit or “TMLLL”), upper test limit (e.g.,Test_Method_Length_Hard_Limit or “TMLHL”), and/or statement count limit(e.g., Test_Method_Statement_Threshold or “TMST”). In addition, the codelength limit threshold values 115 may include a second tailored set ofcode length thresholds for application against identified regular ornormal methods, such as a lower normal threshold value (e.g.,Method_Length_Lower_Limit or “MLLL”), upper normal threshold value,(e.g., Method_Length_Hard_Limit or “MLHL”), and/or normal statementcount limit (e.g., Method_Statement_Count_Threshold or “MSCT”). The codelength limit threshold values 115 may also include additional codelength threshold limits, such as an upper limit cyclomatic complexity(e.g., Cyclomatic_Complexity_Threshold or “CCT”) and/or upper limit formaximum nexting (e.g., Max_Nesting_Limit or “MNL”). As will beappreciated, the values of the code length limit threshold values 115are configurable by the program developer 101 to provide differentiatedtreatment to different types or classes of code segments

With the code metrics and thresholds retrieved, the long methoddetection engine 113 may be further configured to include a long methoddetector module 116 which applies the long method detection rules 135 asa heuristic engine to identify the overlong code segments (e.g., MethodB 140) from the input source code segments 131. To this end, the longmethod detector module 116 may apply a filter detection rule 136 tofilter the autogenerated code segment(s) and/or any portion(s) of codesegment(s) that are anonymous or local classes from consideration as anoverlong code segment. For example, the filter detection rule 136 may beapplied to determine that an autogenerated method is not, by definition,an overlong method. In addition or the in alternative, the filterdetection rule 136 may be applied to measure the effective code linelength of a method by removing the number of lines for any anonymous orlocal class from the computed code line length for a method. Inaddition, the long method detector module 116 may apply a firstcomparison detection rule 137 to detect overlong normal methods bycomparing the effective code line length L_(EFF) for a normal method tolower and upper normal threshold values (e.g., MLLL and MLHL) so thatany normal method is identified as overlong if either (1) its effectivecode line length L_(EFF) exceeds the upper normal threshold value MLHL,or (2) its effective code line length L_(EFF) exceeds the lower normalthreshold value MLLL and a plurality of additional code length metricmeasures (e.g., normal statement count, modified cyclomatic complexity,maximum nesting) exceed corresponding threshold limits (e.g., MSCT, CCT,and MNL). The long method detector module 116 may also apply a secondcomparison detection rule 138 to detect overlong test methods bycomparing the effective code line length L_(EFF) for a test method tolower and upper normal threshold values (e.g., TMLLL and TMLHL) so thatany test method is identified as overlong if either (1) its effectivecode line length L_(EFF) exceeds the upper test threshold value TMLHL,or (2) its effective code line length L_(EFF) exceeds the lower testthreshold value TMLLL and a plurality of additional code length metricmeasures (e.g., normal statement count, modified cyclomatic complexity,maximum nesting) exceed corresponding threshold limits (e.g., TMST, CCT,and MNL).

As will be appreciated, the performance and accuracy of the long methoddetector module 116 and applied long method detection rules 135 willdepend on the values of the different code length threshold limits. Forexample, the code length threshold limits used to assess normal methodsmay he set to smaller values than the code length threshold limits fortest methods since test methods are less likely to have code-lengthrelated errors. For similar reasons, the statement count thresholdlimits for normal methods should generally be smaller than the statementcount threshold limits for test methods. Though it will be appreciatedthat the configurable threshold limits may be adjusted to meet theindividual requirements of any input source code being evaluated, it hasbeen discovered through testing and analysis that the followingthreshold limits provide good performance in efficiently identifyingoverlong methods:

-   _METHOD_LENGTH_LOWER_LIMIT=75-   _METHOD_STATEMENT_COUNT_THRESHOLD=55-   _METHOD_LENGTH_HARD_LIMIT=150-   _CYCLOMATIC_COMPLEXITY_THRESHOLD=2-   _MAX_NESTING_LIMIT=2-   _TEST_METHOD_LENGTH_LOWER_LIMIT=90-   _TEST_METHOD_STATEMENT_THRESHOLD=70-   _TEST_METHOD_LENGTH_HARD_LIMIT=150

Once the overlong code segments are identified or flagged, theserver/computer system 110 may be configured to include a long methodreporting engine 117 which generates a prioritized listing of theoverlong code segments for review by the program developer 101. Inprioritizing the identified long methods, the long method reportingengine 117 may be configured to calculate a “PRIORITY” value todetermine which detected long method should be fixed first. In selectedembodiments, the “PRIORITY” value may be calculated as the product ofthe number of statement lines in the method (e.g.,NUMBER_OF_STATEMENT_LINES_IN_METHOD) and one or more scaling factors,depending on whether the method is a test method. For example, a first“PRIORITY” value for each long method may be calculated by applying afirst maximum nesting scaling factor (e.g.,(1.0+MAXIMUM_NESTING_IN_METHOD)/4.0)), to the number of method statementlines. In addition, a second or updated “PRIORITY” value may becalculated for each long method that is a test method by applying asecond scaling factor (e.g., ⅓) to the previously calculated first“PRIORITY” value. In this way, the “PRIORITY” values for each identifiedlong method that have the higher values will be identified as having themore severe length violations. While these scaling factors providesuitable examples for implementations of the long method reportingengine 117, it will be appreciated that other scaling factors may beused based on analysis of length violations in open source projects orother proprietary code bases. However generated, the “PRIORITY” valuesoutput may be stored along with other information relating to theidentified long methods, and the reporting engine 117 may also issue areport that provides the results of the long method detection analysisto the user in the form of a ranked list of overlong code segments, eachidentified by the code segment name, alone or in combination withinformation specifying the code segment's length, statement count,cyclomatic complexity, maximum nesting value, location of the codesegment (e.g., starting and ending lines), and/or the name of thedeveloper for the code segment. In selected embodiments, long methodreporting engine 117 is operative to generate one or more reports basedon the analysis results received from long method detection engine 113.While the presentation of each report can be arranged in any suitablefashion to efficiently convey a prioritized ranking of overlong codesegments along with related code length metric information, alone or incombination with analysis recommendations to reduce the code length ofany identified code segments.

To provide a contextual understanding for selected embodiments of thepresent disclosure, reference is now made to FIG. 2 which illustrates asimplified detection workflow 200 showing the logic for detectingoverlong methods from input source code using the following pseudocode:

- Calculate all the metrics for each method that are defined above - Getthe values of the thresholds described above - If method isautogenerated : - Return False - Set anonymous_length = length ofanonymous/local classes in the method - effective_length = method_length− anonymous_length - If method is a test method: - Ifeffective_length >= TEST_METHOD_LENGTH_HARD_LIMIT: - Return True - Ifeffective_length >= TEST_METHOD_LENGTH_LOWER_LIMIT and effective_length< TEST_METHOD_LENGTH_HARD_LIMIT : - If maximum nesting of method >=MAX_NESTING_LIMIT and modified cyclomatic complexity of method >=CYCLOMATIC_COMPLEXITY_THRESHOLD and total statement lines in themethod >= TEST_METHOD_STATEMENT_THRESHOLD - Return True - Else: - Ifeffective_length >= METHOD_LENGTH_HARD_LIMIT: - Return True - Ifeffective_length >= METHOD_LENGTH_LOWER_LIMIT and effective_length <METHOD_LENGTH_HARD_LIMIT : - If maximum nesting of method >=MAX_NESTING_LIMIT and modified cyclomatic complexity of method >=CYCLOMATIC_COMPLEXITY_THRESHOLD and total statement lines in themethod >= METHOD_STATEMENT_COUNT_THRESHOLD - Return True - Return False

As will be appreciated, the depicted detection workflow 200 may beimplemented in whole or in part with a data. processing system (such asshown in FIG. 1) and/or a single integrated circuit (e.g., asystem-on-chip) or a plurality of integrated circuits to implement oneor more processors with local memory and database storage that areinterconnected and interoperate using any suitable techniques withoutdeparting from the present invention.

However implemented, the detection workflow 200 receives input sourcecode (block 201) having one or more code segments (e.g., methods) whichmay be checked into the system as source code and binary files createdby the program developer. An additional input to the detection work flow200 is the threshold limit values that may be retrieved from theknowledge base or memory (block 202). In selected embodiments, theretrieved threshold values are configurably specified as limits forevaluating normal methods, including a defined Method_Length_Lower_Limit(MLLL), Method_Length_Hard_Limit, and Method_Statement_Count_Threshold(MSCT). In addition, the retrieved threshold values may alsoconfigurably specify limits for evaluating test methods with aTest_Method_Length_Lower_Limit (TMLLL), Test_Method_Length_Hard_Limit(TMLHL), and Test_Method_Statement_Threshold (TMST). Finally, theretrieved threshold values may also configurably specify limits forevaluating any test or normal methods in terms of aCyclomatic_Complexity_Threshold (CCT) and Max_Nesting_Limit (MNL).

Upon check-in to the detection workflow 200, the input source code isautomatically assessed (at block 204) by applying one or more codeanalysis tools to each method contained therein to determine if themethod meets predetermined code metrics. While any suitable codeassessment techniques may be used, selected embodiments may employ NLPprocessing to determine if the method is autogenerated, to determine ifthe method is a test method or normal method, to determine if the methodincludes anonymous or local classes, to determine the maximum nestinglevel of the method, to evaluate the modified cyclometric complexity ofthe method, and/or to determine a statement count for the method. Forexample, predetermined code metrics at step 204 may be calculated withone or more metric modules 114 from the long method detection engine 113shown in FIG. 1, and then passed to the long method detector moduleengine 117 which in turn applies one or more of the long methoddetection rules 135.

In a first example detection rule, the input source code may be prunedor filtered (at block 206) by using one or more of the predeterminedcode metrics to identify and remove any autogenerated methods fromconsideration as candidate long methods. While any suitable filteringapproach may be used, selected embodiments may employ NLP processingtechniques to break an input method or code segment into tokens (e.g.,tokenized source code) which are passed to the long method detectionmodule 116 which applies the method filter detection rule 136 to detectany autogenerated methods, such as by automatically searching thetokenized source code comment(s) for an “autogenerated” reference or thelike. If an autogenerated method is detected (affirmative outcome todetection step 206), the method is filtered out from the pool ofcandidate long methods (e.g., Return False 226). However, for methodsthat are not autogenerated (negative outcome to detection step 206), thedetection workflow 200 proceeds to the next processing steps forcomputing an effective code line length measure L_(EFF) for each method.

In order to compute the effective code line length measure L_(EFF) for amethod (at block 209), a second detection rule may be applied which usesone or more of the predetermined code metrics to determine if the codesegment includes anonymous or local classes, in which case the number ofcode lines corresponding to the anonymous or local class(es) are removedfrom the total method length. As will be appreciated, any suitablecomputational approach may be used to determine the effective code linelength measure L_(EFF), such as by employing any desired code analysistool to determine a code length measure (Anon_Length) of the number ofcode lines in any detected anonymous or local classes in the method(block 207). In similar fashion, suitable code analysis tools can beused to determine the total code length measure (Method_Length) of themethod (block 208). and then determine the difference therebetween asthe effective code line length measure L_(EFF)=Method_Length−Anon_Length(block 209).

Once the effective code line length measure L_(EFF) for a method isdetermined at step 209, the detection workflow 200 then proceeds todetermine whether the method is a test method or normal method (block210), such as by applying a third detection rule which uses one or moreof the predetermined code metrics to detect “test” references. To thisend, selected embodiments may employ NLP processing techniques toidentify “test” methods (affirmative outcome to detection step 210) or“normal” methods (negative outcome to detection step 210), such as byautomatically searching the method name or the tokenized source codeannotations for a “test” reference or the like.

For each test method (affirmative outcome to detection step 210), themethod is compared to an upper hard limit (block 212), such as bycomparing the computed effective code line length measure L_(EFF) to anupper hard limit (e.g., TMLHL). If the test method length meets orexceeds the upper hard limit (affirmative outcome to detection step212), the method is flagged as a candidate long method (e.g., ReturnTrue 219), but if not (negative outcome to detection step 212), themethod length is compared to an lower limit (block 214), such as bycomparing the computed effective code line length measure L_(EFF) to anlower limit (e.g., TMLLL). If the method length does not meet or exceedthe lower test limit (e.g., L_(EFF)<TMLLL) (negative outcome todetection step 214), the method is filtered out from the pool ofcandidate long methods (e.g., Return False 218). However, if the methodlength meets or exceeds the lower test limit and is smaller than theupper hard limit (affirmative outcome to detection step 214), thedetection workflow 200 proceeds to the complexity condition check step216 which checks one or more method complexity code metrics againstspecified threshold limits. For example, the processing at step 216 mayemploy NLP or machine learning techniques to check the test method'smaximum nesting metric (e.g., MAXNEXTING) against a maximum nestingthreshold limit (e.g., MNL), to check the test method's modifiedcyclomatic complexity metric (e.g., CCM) against a maximum cyclomaticcomplexity threshold limit (e.g., CCT), and to check the test method'sstatement count/line metric (e.g., SC) against a test method statementthreshold limit (e.g., TMST). If the test method complexity code metricsall meet or exceed the corresponding complexity threshold limits(affirmative outcome to detection step 216), the method is flagged as acandidate long method (e.g., Return True 219), but if not (negativeoutcome to detection step 216), the method is filtered out from the poolof candidate long methods (e.g., Return False 218). Upon return of any“false” or “true” flag for a method, the next method is processed insequence by returning to step 204.

A similar set of processing steps is applied to each detected normalmethod (negative outcome to detection step 210), albeit with differentthreshold limit values that may be individually configured. For example,each detected normal method is compared to an upper hard limit (block220), such as by comparing the computed effective code line lengthmeasure L_(EFF) to an upper hard limit (e.g., MLHL) which may be smallerthan the upper hard limit (e.g., TMLHL). If the method length meets orexceeds the upper hard limit (affirmative outcome to detection step220), the method is flagged as a candidate long method (e.g., ReturnTrue 219), but if not (negative outcome to detection step 220), themethod length is compared to an lower limit (block 222), such as bycomparing the computed effective code line length measure L_(EFF) to anlower limit (e.g., MLLL) which may be smaller than the lower test limit(TMLLL). If the method length does not meet or exceed the lower limit(e.g., L_(EFF)<MLLL) (negative outcome to detection step 222). themethod is filtered out from the pool of candidate long methods (e.g.,Return False 226). However, if the method length meets or exceeds thelower limit and is smaller than the upper hard limit (affirmativeoutcome to detection step 222), the detection workflow 200 proceeds tothe complexity condition check step 224 which checks one or more methodcomplexity code metrics against specified threshold limits. For example,the processing at step 224 may employ NLP or machine learning techniquesto check the method's maximum nesting metric (e.g., MAXNEXTING) againsta maximum nesting threshold limit (e.g., MNL), to check the method'smodified cyclomatic complexity metric (e.g., CCM) against a maximumcyclomatic complexity threshold limit (e.g., CCT), and to check themethod's statement count/line metric (e.g., SC) against a methodstatement count threshold limit (e.g., MSCT). If the “normal” methodcomplexity code metrics all meet or exceed the corresponding complexitythreshold limits (affirmative outcome to detection step 224), the methodis flagged as a candidate long method (e.g., Return True 219), but ifnot (negative outcome to detection step 224), the method is filtered outfrom the pool of candidate long methods (e.g., Return False 226). Uponreturn of any “false” or “true” flag for a method, the next method isprocessed in sequence by returning to step 204.

As described hereinabove, any long methods identified at step 219 may befurther processed to prioritize the severity of the length violation. Inan example implementation, each candidate long method may be prioritizedby calculating a “PRIORITY” value to determine which detected longmethod should be fixed first. For example, a first “PRIORITY” value maybe calculated as the product of the number of statement lines in themethod and a first maximum nexting scaling factor, as set forth below:

PRIORITY=NUMBER_OF_STATEMENT_LINES_IN_METHOD*((1.0+MAXIMUM_NESTING_IN_METHOD)/4.0).

In addition, a second or updated “PRIORITY” value may be calculated foreach long method that is a test method by applying a second scalingfactor to the previously calculated first “PRIORITY” value, as set forthbelow:

PRIORITY=PRIORITY/3.0).

In this way, the “PRIORITY” values for each identified long method thathave the higher values will be identified as having the more severelength violations. While these scaling factors provide suitable examplesfor implementations of the prioritization of long method reporting, itwill be appreciated that other scaling factors may be used based onanalysis of length violations in open source projects or otherproprietary code bases.

Embodiments of the system and method for identifying overlong codesegments can be implemented on a computer system, such as ageneral-purpose computer 300 illustrated in FIG. 3. As disclosed thecomputer 300 includes input user device(s) 316, such as a keyboardand/or mouse, which are coupled to a bi-directional system bus 308. Theinput user device(s) 316 are used for introducing user input to thecomputer system 300 and communicating that user input to processor 302.The computer system 300 may also include a video memory 304, main memory306, and mass storage 318, all coupled to bi-directional system bus 308along with input user device(s) 316 and processor 302. The mass storage318 may include both fixed and removable media, such as other availablemass storage technology. Bus 308 may contain, for example, 32 addresslines for addressing video memory 304 or main memory 306. The system bus308 may also include, for example, an n-bit data bus for transferringdata between and among the components, such as CPU 302, main memory 306,video memory 314, and mass storage 318, where “n” is, for example, 32 or64. Alternatively, multiplex data/address lines may be used instead ofseparate data and address lines.

The computer 300 may also include I/O device(s) 310 which provideconnections to peripheral devices, such as a printer, and may alsoprovide a direct connection to remote server computer systems via atelephone link or to the Internet via an ISP. I/O device(s) 310 may alsoinclude a network interface device to provide a direct connection toremote server computer systems via a direct network link to the Internetvia a POP (point of presence). Such connection may be made using, forexample, wireless techniques, including digital cellular telephoneconnection, Cellular Digital Packet Data (CDPD) connection, digitalsatellite data connection or the like. Examples of I/O devices includemodems, sound and video devices, and specialized communication devicessuch as the aforementioned network interface.

Computer programs and data are generally stored as instructions and datain mass storage 318 until loaded into main memory 306 for execution.Computer programs may also be in the form of electronic signalsmodulated in accordance with the computer program and data communicationtechnology when transferred via a network. The method and functionsrelating to system and method for applying a one or more filters andtailored code length thresholds to each code segment in the submittedsource code to eliminate certain code segments as long segmentcandidates, to reduce their effective code length, and/or to evaluatethe computed effective code length against the tailored code lengththresholds may be implemented in a computer program for a long methoddetection engine 305.

The processor 302, in one embodiment, is a microprocessor manufacturedby Motorola Inc. of Illinois, Intel Corporation of California, orAdvanced Micro Devices of California. However, any other suitable singleor multiple microprocessors or microcomputers may be utilized. Mainmemory 306 is comprised of dynamic random access memory (DRAM). Videomemory 304 is a dual-ported video random access memory. One port of thevideo memory 304 is coupled to video amplifier or driver 312. The videoamplifier 312 is used to drive the display 314. Video amplifier 312 iswell known in the art and may be implemented by any suitable means. Thiscircuitry converts pixel data stored in video memory 304 to a rastersignal suitable for use by display 314. Display 314 is a type of monitorsuitable for displaying graphic images.

By now, it will be appreciated that there is disclosed herein a system,method, apparatus, and computer program product for enhancing operablefunctionality of a software program by performing a method at a devicehaving a processor and memory for finding long methods in source code.As disclosed, the system, method, apparatus, and computer programreceive a plurality of input source code segments from the softwareprogram submitted by a developer. Subsequently, the device evaluateseach of the plurality of input source code segments for a plurality ofpredetermined code metric values. In selected embodiments, the eachinput source code segments is evaluated for a first code metric value(which indicates whether said input source code segment isautogenerated), a second code metric value (which indicates whether saidinput source code segment is a test code segment), a third code metricvalue (indicating a cyclomatic complexity of the input source codesegment), a fourth code metric value (indicating a maximum nesting valueof said input source code segment), and a fifth code metric value(indicating a statement count value for said input source code segment).Using the first code metric value, the device identifies one or morecandidate source code segments from the plurality of input source codesegments by removing any code segment (e.g., an autogenerated codesegment) that meets the first code metric value. Once identified, eachcandidate source code segment is assessed against the second code metricvalue to identify a first set of candidate source code segments (e.g.,test methods) that contain the second code metric value and a second setof candidate code segments (e.g., normal methods) that do not containthe second predetermined code metric value. The first set of candidatesource code segments is assessed against a first tailored set of codelength thresholds (e.g., TMLHL, TMLL, MNL, CCT, TMST) to identify anyoverlong source code segment in the first set of candidate source codesegments having a code length which meets or exceeds at least two of thefirst tailored set of code length thresholds, where the code length foreach candidate source code segment may be computed as an effective codelength by subtracting any code lines for anonymous or local classes inthe candidate source code segment from the total code lines for thecandidate source code segment. For example, the assessment of the firstset of candidate source code segments may be performed by comparing thecode length for each test method in the first set of test methodsagainst a first lower code length threshold and first upper code lengththreshold to identify a first overlong test method having a code length(1) which meets or exceeds the first lower code length threshold and thefirst upper code length threshold or (2) which meets or exceeds thefirst lower code length threshold and which also has at least one of thethird code metric value exceeding a cyclomatic complexity threshold, thefourth code metric value exceeding a maximum nesting threshold, and forthe fifth code metric value exceeding a statement count threshold. Insimilar fashion, the second set of candidate source code segments may beassessed against a second tailored set of code length thresholds (e.g.,MLHL, MLLL, MNL, CCT, MSCT) which is different from the first tailoredset of code length thresholds to identify any overlong source codesegment in the second set of candidate source code segments having acode length which meets or exceeds at least two of the second tailoredset of code length thresholds. In selected embodiments, the second setof candidate source code segments may be assessed by comparing the codelength for each normal method in the second set of normal methodsagainst a second lower code length threshold and second upper codelength threshold to identify a second overlong normal method having acode length (1) which meets or exceeds the second lower code lengththreshold and the second upper code length threshold or (2) which meetsor exceeds the second lower code length threshold and which also has atleast one of the third code metric value exceeding a cyclomaticcomplexity threshold, the fourth code metric value exceeding a maximumnesting threshold, and for the fifth code metric value exceeding astatement count threshold. Based on the foregoing, the device may reporta prioritized list of any overlong source code segments that meets orexceeds at least two of the first tailored set of code length thresholdsor at least two of the second tailored set of code length thresholds forrecommended refactoring treatment by the developer. In selectedembodiments, the each identified overlong source code segment may beprioritized by calculating a corresponding priority value as a productof at least a first scaling factor and a first quantity identifying howmany statement lines are in the overlong source code segment code.

The present invention may be a system, a method, and/or a computerprogram product such that selected embodiments include software thatperforms certain tasks. The software discussed herein may includescript, batch, or other executable files. The software may be stored ona machine-readable or computer-readable storage medium, and is otherwiseavailable to direct the operation of the computer system as describedherein and claimed below. In one embodiment, the software uses a localor database memory to implement the data transformation and datastructures so as to automatically identify and prioritize overlong codesegments for refactoring opportunities, improve the quality androbustness of software, and generate more readable, reliable, smaller,and robust code with less effort. The local or database memory used forstoring firmware or hardware modules in accordance with an embodiment ofthe invention may also include a semiconductor-based memory, which maybe permanently, removably or remotely coupled to a microprocessorsystem. Other new and various types of computer-readable storage mediamay be used to store the modules discussed herein. Additionally, thoseskilled in the art will recognize that the separation of functionalityinto modules is for illustrative purposes. Alternative embodiments maymerge the functionality of multiple software modules into a singlemodule or may impose an alternate decomposition of functionality ofmodules. For example, a software module for calling sub-modules may bedecomposed so that each sub-module performs its function and passescontrol directly to another sub-module.

In addition, selected aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.), or anembodiment combining software and/or hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form ofcomputer program product embodied in a computer readable storage mediumor media having computer readable program instructions thereon forcausing a processor to carry out aspects of the present invention. Thusembodied, the disclosed system, a method, and/or a computer programproduct is operative to improve the design, functionality andperformance of software programs by automatically detecting andrecommending overlong code segments for refactoring opportunities in thesoftware program.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a dynamic or static random access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), a magnetic storage device, a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a Public SwitchedCircuit Network (PSTN), a packet-based network, a personal area network(PAN), a local area network (LAN), a wide area network (WAN), a wirelessnetwork, or any suitable combination thereof. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Python, Visual Basic.net,Ruby, Smalltalk, C++ or the like, and conventional proceduralprogramming languages, such as the “C” programming language, HypertextPrecursor (PHP), or similar programming languages. The computer readableprogram instructions may execute entirely on the user's computer, partlyon the user's computer, as a stand-alone software package, partly on theuser's computer and partly on a remote computer or entirely on theremote computer or server or cluster of servers. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a sub-system, module, segment,or portion of instructions, which comprises one or more executableinstructions for implementing the specified logical function(s). In somealternative implementations, the functions noted in the block may occurout of the order noted in the figures. For example, two blocks shown insuccession may, in fact, be executed substantially concurrently, or theblocks may sometimes be executed in the reverse order, depending uponthe functionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The computer system described above is for purposes of example only, andmay be implemented in any type of computer system or programming orprocessing environment, or in a computer program, alone or inconjunction with hardware. Various embodiments of the present may alsobe implemented in software stored on a computer-readable medium andexecuted as a computer program on a general purpose or special purposecomputer. For clarity, only those aspects of the system germane to theinvention are described, and product details well known in the art areomitted. For the same reason, the computer hardware is not described infurther detail. It should thus be understood that the invention is notlimited to any specific computer language, program, or computer. Thesystem and method for finding overlong code segments may be implementedin any type of computer system or programming or processing environment.It is contemplated that the system and method for identifying andprioritizing overlong code segments might be run on a stand-alonecomputer system, such as the one described above. The system and methodfor identifying and prioritizing overlong code segments might also berun from a server computer systems system that can be accessed by aplurality of client computer systems interconnected over an intranetnetwork. Finally, the system and method for identifying and prioritizingoverlong code segments projects may be run from a server computer systemthat is accessible to clients over the Internet.

Benefits, other advantages, and solutions to problems have beendescribed above with regard to specific embodiments. However, thebenefits, advantages, solutions to problems, and any element(s) that maycause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as a critical, required, or essentialfeature or element of any or all the claims. As used herein, the terms“comprises,” “comprising,” or any other variation thereof, are intendedto cover a non-exclusive inclusion, such that a process, method,article, or apparatus that comprises a list of elements does not includeonly those elements but may include other elements not expressly listedor inherent to such process, method, article, or apparatus.

What is claimed is:
 1. A method performed by a device having a processorand memory for enhancing operable functionality of a software program,comprising: receiving, by the device, a plurality of input source codesegments from the software program submitted by a developer; evaluating,by the device, each of the plurality of input source code segments for aplurality of predetermined code metric values; identifying, by thedevice, one or more candidate source code segments from the plurality ofinput source code segments by removing one or more code segments thatmeet a first code metric value; assessing, by the device, each of theone or more candidate source code segments against a second code metricvalue to identify a first set of candidate source code segments thatcontain the second code metric value and a second set of candidate codesegments that do not contain the second predetermined code metric value;assessing the first set of candidate source code segments against afirst tailored set of code length thresholds to identify any overlongsource code segment in the first set of candidate source code segmentshaving a code length which meets or exceeds at least two of the firsttailored set of code length thresholds; and assessing the second set ofcandidate source code segments against a second tailored set of codelength thresholds which is different from the first tailored set of codelength thresholds to identify any overlong source code segment in thesecond set of candidate source code segments having a code length whichmeets or exceeds at least two of the second tailored set of code lengththresholds.
 2. The method of claim 1, further comprising reporting, bythe device, a prioritized. list of any overlong source code segmentsthat meets or exceeds at least two of the first tailored set of codelength thresholds or at least two of the second tailored set of codelength thresholds for recommended refactoring treatment by thedeveloper.
 3. The method of claim 1, where evaluating each of theplurality of input source code segments for the plurality ofpredetermined code metric values comprises evaluating each input sourcecode segment for the first code metric value which indicates whethersaid input source code segment is autogenerated, for the second codemetric value which indicates whether said input source code segment is atest code segment, for a third code metric value indicating a cyclomaticcomplexity of the input source code segment, for a fourth code metricvalue indicating a maximum nesting value of said input source codesegment, and for a fifth code metric value indicating a statement countvalue for said input source code segment.
 4. The method of claim 3,where identifying one or more candidate source code segments comprisesremoving any autogenerated input source code segment that meets thefirst code metric value.
 5. The method of claim 3, where assessing eachof the one or more candidate source code segments comprises identifyinga first set of test methods that contain the second code metric valueand a second set normal methods that do not contain the secondpredetermined code metric value.
 6. The method of claim 1, furthercomprising computing the code length for each candidate source codesegment as an effective code length by subtracting any code lines foranonymous or local classes in the candidate source code segment from thetotal code lines for the candidate source code segment.
 7. The method ofclaim 5, where assessing the first set of candidate source code segmentscomprises comparing a code length for each test method in the first setof test methods against a first lower code length threshold and firstupper code length threshold to identify a first overlong test methodhaving a code length (1) which meets or exceeds the first lower codelength threshold and the first upper code length threshold or (2) whichmeets or exceeds the first lower code length threshold and which alsohas at least one of the third code metric value exceeding a cyclomaticcomplexity threshold, the fourth code metric value exceeding a maximumnesting threshold, and for the fifth code metric value exceeding astatement count threshold.
 8. The method of claim 7, where assessing thesecond set of candidate source code segments comprises comparing a codelength for each normal method in the second set of normal methodsagainst a second lower code length threshold and second upper codelength threshold to identify a second overlong normal method having acode length (1) which meets or exceeds the second lower code lengththreshold and the second upper code length threshold or (2) which meetsor exceeds the second lower code length threshold and which also has atleast one of the third code metric value exceeding a cyclomaticcomplexity threshold, the fourth code metric value exceeding a maximumnesting threshold, and for the fifth code metric value exceeding astatement count threshold.
 9. The method of claim 1, further comprisingprioritizing each identified overlong source code segment by calculatinga corresponding priority value as a product of at least a first scalingfactor and a first quantity identifying how many statement lines are inthe overlong source code segment code.
 10. A computer program productcomprising at least one recordable medium having stored thereonexecutable instructions and data which, when executed by at least oneprocessing device, cause the at least one processing device to: receivea plurality of input source code segments from the software programsubmitted by a developer; evaluate each of the plurality of input sourcecode segments for a plurality of predetermined code metric values;identify one or more candidate source code segments from the pluralityof input source code segments by removing one or more code segments thatmeet a first code metric value; assess each of the one or more candidatesource code segments against a second code metric value to identify afirst set of candidate source code segments that contain the second codemetric value and a second set of candidate code segments that do notcontain the second predetermined code metric value; assess the first setof candidate source code segments against a first tailored set of codelength thresholds to identify any overlong source code segment in thefirst set of candidate source code segments having a code length whichmeets or exceeds at least two of the first tailored set of code lengththresholds; and assess the second set of candidate source code segmentsagainst a second tailored set of code length thresholds which isdifferent from the first tailored set of code length thresholds toidentify any overlong source code segment in the second set of candidatesource code segments having a code length which meets or exceeds atleast two of the second tailored set of code length thresholds.
 11. Thecomputer program product of claim 10, wherein the computer readableprogram, when executed on the system, causes the at least one processingdevice to report a prioritized list of any overlong source code segmentsthat meets or exceeds at least two of the first tailored set of codelength thresholds or at least two of the second tailored set of codelength thresholds for recommended refactoring treatment by thedeveloper.
 12. The computer program product of claim 10, wherein thecomputer readable program, when executed on the system, causes the atleast one processing device to evaluate each of the plurality of inputsource code segments for the plurality of predetermined code metricvalues by evaluating each input source code segment for the first codemetric value which indicates whether said input source code segment isautogenerated, for the second code metric value which indicates whethersaid input source code segment is a test code segment, for a third codemetric value indicating a cyclomatic complexity of the input source codesegment, for a fourth code metric value indicating a maximum nestingvalue of said input source code segment, and for a fifth code metricvalue indicating a statement count value for said input source codesegment.
 13. The computer program product of claim 12, wherein thecomputer readable program, when executed on the system, causes the atleast one processing device to identify one or more candidate sourcecode segments by removing any autogenerated input source code segmentthat meets the first code metric value.
 14. The computer program productof claim 12, wherein the computer readable program, when executed on thesystem, causes the at least one processing device to assess each of theone or more candidate source code segments by identifying a first set oftest methods that contain the second code metric value and a second setnormal methods that do not contain the second predetermined code metricvalue.
 15. The computer program product of claim 10, wherein thecomputer readable program, when executed on the system, causes the atleast one processing device to compute the code length for eachcandidate source code segment as an effective code length by subtractingany code lines for anonymous or local classes in the candidate sourcecode segment from the total code lines for the candidate source codesegment.
 16. The computer program product of claim 14, wherein thecomputer readable program, when executed on the system, causes the atleast one processing device to assess the first set of candidate sourcecode segments by comparing a code length for each test method in thefirst set of test methods against a first lower code length thresholdand first upper code length threshold to identify a first overlong testmethod having a code length (1) which meets or exceeds the first lowercode length threshold and the first upper code length threshold or (2)which meets or exceeds the first lower code length threshold and whichalso has at least one of the third code metric value exceeding acyclomatic complexity threshold, the fourth code metric value exceedinga maximum nesting threshold, and for the fifth code metric valueexceeding a statement count threshold.
 17. The computer program productof claim 16, wherein the computer readable program, when executed on thesystem, causes the at least one processing device to assess the secondset of candidate source code segments by comparing a code length foreach normal method in the second set of normal methods against a secondlower code length threshold and second upper code length threshold toidentify a second overlong normal method having a code length (1) whichmeets or exceeds the second lower code length threshold and the secondupper code length threshold or (2) which meets or exceeds the secondlower code length threshold and which also has at least one of the thirdcode metric value exceeding a cyclomatic complexity threshold, thefourth code metric value exceeding a maximum nesting threshold, and forthe fifth code metric value exceeding a statement count threshold. 18.The computer program product of claim 10, wherein the computer readableprogram, when executed on the system, causes the at least one processingdevice to prioritize each identified overlong source code segment bycalculating a corresponding priority value as a product of at least afirst scaling factor and a first quantity identifying how many statementlines are in the overlong source code segment code.
 19. A systemcomprising: one or more processors; a memory coupled to at least one ofthe processors; and a set of instructions stored in the memory andexecuted by at least one of the processors to enhance operablefunctionality of a software program by identifying overlong source codesegments, wherein the set of instructions are executable to performactions of: receiving a plurality of input source code segments from thesoftware program submitted by a developer; evaluating each of theplurality of input source code segments for a plurality of predeterminedcode metric values; identifying one or more candidate source codesegments from the plurality of input source code segments by removingone or more code segments that meet a first code metric value; assessingeach of the one or more candidate source code segments against a secondcode metric value to identify a first set of candidate source codesegments that contain the second code metric value and a second set ofcandidate code segments that do not contain the second predeterminedcode metric value; assessing the first set of candidate source codesegments against a first tailored set of code length thresholds toidentify any overlong source code segment in the first set of candidatesource code segments having a code length which meets or exceeds atleast two of the first tailored set of code length thresholds; assessingthe second set of candidate source code segments against a secondtailored set of code length thresholds which is different from the firsttailored set of code length thresholds to identify any overlong sourcecode segment in the second set of candidate source code segments havinga code length which meets or exceeds at least two of the second tailoredset of code length thresholds; and reporting a prioritized list of anyoverlong source code segments that meets or exceeds at least two of thefirst tailored set of code length thresholds or at least two of thesecond tailored set of code length thresholds for recommendedrefactoring treatment by the developer.
 20. The system of claim 19,where evaluating each of the plurality of input source code segments forthe plurality of predetermined code metric values comprises evaluatingeach input source code segment for the first code metric value whichindicates whether said input source code segment is autogenerated, forthe second code metric value which indicates whether said input sourcecode segment is a test code segment, for a third code metric valueindicating a cyclomatic complexity of the input source code segment, fora fourth code metric value indicating a maximum nesting value of saidinput source code segment, and for a fifth code metric value indicatinga statement count value for said input source code segment.
 21. Thesystem of claim 20, where identifying one or more candidate source codesegments comprises removing any autogenerated input source code segmentthat meets the first code metric value.
 22. The system of claim 20,where assessing each of the one or more candidate source code segmentscomprises identifying a first set of test methods that contain thesecond code metric value and a second set normal methods that do notcontain the second predetermined code metric value.
 23. The system ofclaim 22, where assessing the first set of candidate source codesegments comprises comparing a code length for each test method in thefirst set of test methods against a first lower code length thresholdand first upper code length threshold to identify a first overlong testmethod having a code length (1) which meets or exceeds the first lowercode length threshold and the first upper code length threshold or (2)which meets or exceeds the first lower code length threshold and whichalso has at least one of the third code metric value exceeding acyclomatic complexity threshold, the fourth code metric value exceedinga maximum nesting threshold, and for the fifth code metric valueexceeding a statement count threshold.
 24. The system of claim 23, whereassessing the second set of candidate source code segments comprisescomparing a code length for each normal method in the second set ofnormal methods against a second lower code length threshold and secondupper code length threshold to identify a second overlong normal methodhaving a code length (1) which meets or exceeds the second lower codelength threshold and the second upper code length threshold or (2) whichmeets or exceeds the second lower code length threshold and which alsohas at least one of the third code metric value exceeding a cyclomaticcomplexity threshold, the fourth code metric value exceeding a maximumnesting threshold, and for the fifth code metric value exceeding astatement count threshold.
 25. The system of claim 20, where the set ofinstructions are executable to perform actions of prioritizing eachidentified overlong source code segment by calculating a correspondingpriority value as a product of at least a first scaling factor and afirst quantity identifying how many statement lines are in the overlongsource code segment code.