• No results found

bug reports

A Survey on Mapping Bug Reports to Relevant Files: A Ranking Model, A Fine Grained Benchmark, A Feature Evaluation

A Survey on Mapping Bug Reports to Relevant Files: A Ranking Model, A Fine Grained Benchmark, A Feature Evaluation

... novel bug report is received, developers generally have to be compelled to be compelled to breed the bug and perform code reviews to hunt out the cause, a way that will be tedious and time ...the bug ...

5

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer

... a bug locator which is a method for retrieving the ...the bug report and the source code file using the vector space representation ...When bug is received we will be computing the similarity between ...

6

Automatic Summarization of Bug Reports and Bug Triage classification

Automatic Summarization of Bug Reports and Bug Triage classification

... access bug reports in a projects bug repository, including understanding how previous changes have been made and understanding multiple aspects of particular ...entire bug reports, in ...

5

Survey on Types of Bug Reports and General Classification Techniques in Data Mining

Survey on Types of Bug Reports and General Classification Techniques in Data Mining

... data. Bug tracking systems are made to manage bug reports, which are collected from various ...These bug reports are needed to be labeled as security bug reports or non ...

6

A Way to Deal with Perceiving Copy of Bug Reports by Utilizing Execution of Data

A Way to Deal with Perceiving Copy of Bug Reports by Utilizing Execution of Data

... Software bug is an important issue in Software ...is bug perceiving copy. Aim of bug perceiving copy is to assign correctly a developer to a new bug, to decrease the time cost in manual ...

7

IJCSMC, Vol. 3, Issue. 3, March 2014, pg.549 – 556 RESEARCH ARTICLE AN EXPLORATORY STUDY OF DUPLICATE BUG REPORTS IN OSS PROJECTS

IJCSMC, Vol. 3, Issue. 3, March 2014, pg.549 – 556 RESEARCH ARTICLE AN EXPLORATORY STUDY OF DUPLICATE BUG REPORTS IN OSS PROJECTS

... Software size was meant in term of Lines of Code (LOC) that software project had. LOC taken is number of line of code at the time when data is collected. Comment and blank lines were discarded, only code lines are taken. ...

8

A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation based Bug Reports generation

A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation based Bug Reports generation

... another bug report is gotten, designers normally need to recreate the bug and perform code audits to discover the reason, a procedure that can be repetitive and ...the bug would empower designers to ...

7

Learning to Rank Relevant Files for Bug Reports Using Domain knowledge, Replication and Extension of a Learning-to-Rank Approach

Learning to Rank Relevant Files for Bug Reports Using Domain knowledge, Replication and Extension of a Learning-to-Rank Approach

... their Bug Localization ...the Bug Localization ...important bug-fixing information for older ...a bug may not even exist in the fixed version of the source ...1054 bug reports ...

53

SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION

SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION

... a bug that needs to be summarized, initially the bug reports are passed to the noise reduction ...the bug report is classified into question, investigative sentence, code fragment and other ...

6

Automatic Summarization of Bug Reports and Bug Triage classification

Automatic Summarization of Bug Reports and Bug Triage classification

... the bug triage which is very expensive and even takes long span of ...uses bug repositories and this repositories consist of bug data which helps developers to handle bug updates according to ...

5

An Automated Approach for Mapping Bug Reports to Source Code and Bug Triaging

An Automated Approach for Mapping Bug Reports to Source Code and Bug Triaging

... between bug report and source code file we use machine learning ...of bug reports and corresponding bug ids which indicates the semantic similarity between bug reports and source ...

8

Learning from evolving data streams: online triage of bug reports

Learning from evolving data streams: online triage of bug reports

... issue reports us- ing an issue tracker ...issue reports: Mozilla was receiving almost 300 reports per day in 2006 (Anvik et ...those reports and triage them, that is decide which component ...

10

Improved Approach for Predicting the Bug Triage Using Data Reduction Methods

Improved Approach for Predicting the Bug Triage Using Data Reduction Methods

... for bug triage, and to reduce the scale and improve the quality of bug ...the bug dimension and the word ...lesser bug data with fewer bug reports and fewer words than the ...

6

Efficient and Dynamic Bug Report Prediction Using Mining Techniques

Efficient and Dynamic Bug Report Prediction Using Mining Techniques

... repositories, bug reports, design and code artifacts ...a bug report, an approach that can identify whether the bug is a configuration bug could help developers reduce debugging ...

9

Examine Effective Bug Triage with Software Data Reduction Techniques

Examine Effective Bug Triage with Software Data Reduction Techniques

... bug reports and lesser number of words than the original bug data. Although data is reduced it provides similar information as it is in the original bug data. The results of four instance ...

6

Improving Developer Profiling and Ranking to Enhance Bug Report Assignment

Improving Developer Profiling and Ranking to Enhance Bug Report Assignment

... particular bug report based on how closely the developer’s expertise aligns with the information identified in the ...and bug reports previously completed by the ...a bug report, it fails to ...

77

An Effective and Accurate Bug Triage System with Software Data Reduction Techniques

An Effective and Accurate Bug Triage System with Software Data Reduction Techniques

... A Bug storehouse assumes an essential part in overseeing programming ...open bug archive that permits both engineers and clients to submit deserts or issues in the product, propose conceivable improvements, ...

6

What's in a bug report?

What's in a bug report?

... of bug localisation [27, ...on bug fixing and maintenance - often reported to be in excess of 50% - which represents a significant cost to the software industry [21, ...[8]. Bug localisation ...

10

Title: A PROJECTED SOFTWARE REPLICA FOR CREEPY-CRAWLY TRACKING SYSTEM

Title: A PROJECTED SOFTWARE REPLICA FOR CREEPY-CRAWLY TRACKING SYSTEM

... A bug vault (a normal programming archive, for putting away points of interest of bugs), assumes a critical part in overseeing programming ...convey bug vaults (additionally called bug following ...

6

STATISTICAL PROBABILITY BUG TRACKING SYSTEM USING NAIVE BYES IN DATA MINING

STATISTICAL PROBABILITY BUG TRACKING SYSTEM USING NAIVE BYES IN DATA MINING

... While implementing a range of improvements may be ideal, bug tracking systems may instead prefer to specialize, thus providing a rich set of choices. This would be a healthy change to the current situation where ...

11

Show all 8021 documents...

Related subjects