• No results found

[PDF] Top 20 SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION

Has 10000 "SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION" found on our website. Below are the top 20 most common "SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION".

SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION

SUMMARIZATION OF BUG REPORTS USING FEATURE EXTRACTION

... Centroid method is used to measure the weight of each sentence and categorize the sentence with is more specific to the bug report. In this, each unit of text is represented as a weighted vector of TF and IDF ... See full document

6

Automatic Summarization of Bug Reports and Bug Triage classification

Automatic Summarization of Bug Reports and Bug Triage classification

... for bug reports. It reports on the creation of an annotated corpus of 36 bug reports chosen from four different ...for bug reports scores the highest on standard measures. ... See full document

5

Dependency Grammar Based Feature Extraction for Text Summarization

Dependency Grammar Based Feature Extraction for Text Summarization

... identified using the POS tagger that is a necessary component of most text analysis systems, as it assigns a syntax class ...the feature extraction and structure extraction phase to generate ... See full document

8

Automatic Summarization of Bug Reports and Bug Triage classification

Automatic Summarization of Bug Reports and Bug Triage classification

... avoided. Bug triage is a necessary step in an software company, in this step a correct developer should be assigned for fixing the ...automatic bug triage is ...and feature selection methods to ... See full document

5

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer

... a bug locator which is a method for retrieving the ...the bug report and the source code file using the vector space representation ...When bug is received we will be computing the similarity ... See full document

6

An Automated Approach for Mapping Bug Reports to Source Code and Bug Triaging

An Automated Approach for Mapping Bug Reports to Source Code and Bug Triaging

... between bug report and source code file we use machine learning ...of bug reports and corresponding bug ids which indicates the semantic similarity between bug reports and source ... See full document

8

Feature-based Opinion Summarization: A Survey

Feature-based Opinion Summarization: A Survey

... comparative feature- based statistical ...preprocessing, feature extraction, followed by sentiment classification and ...tagging using Link Grammar Parser, frequently occurring nouns (N) and ... See full document

5

DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM

DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM

... Automated bug report clustering and classification plays a significant role in managing, assigning, and understanding the bug ...in bug report classification is the inadequate amount of labeled ... See full document

11

Automatic Bug Triage using Data Reduction & Domain Specific Bug Classification

Automatic Bug Triage using Data Reduction & Domain Specific Bug Classification

... new bug to a software developer manually ...accurate. Feature and Instance Extraction are applied randomly to reduce the noisy and redundant ...the bug manager will be slightly diminished ... See full document

5

An Approach for Predicting Bug Triage using Data Reduction Methods

An Approach for Predicting Bug Triage using Data Reduction Methods

... the bug data set. For given a bug data set, all these attributes are extracted to determine the features of the bug data ...a bug data set, ...the bug data set, ...direct ... See full document

6

Automatic Text Summarization using Features Extraction and Fuzzy Logic Scoring

Automatic Text Summarization using Features Extraction and Fuzzy Logic Scoring

... text summarization which aims to address the information overload problem by extracting the most important information from a document and which can help a reader to decide whether it is relevant or ...content ... See full document

7

Enhancement and Feature Extraction of Fundus Images

Enhancement and Feature Extraction of Fundus Images

... Macula is the normal feature of a retina. It is the functional center of the retina. It gives us the ability to see and provides the best color vision. As seen in fig.3 the retina image undergoes various ... See full document

5

A Survey on Mapping Bug Reports to Relevant Files: A Ranking Model, A Fine Grained Benchmark, A Feature Evaluation

A Survey on Mapping Bug Reports to Relevant Files: A Ranking Model, A Fine Grained Benchmark, A Feature Evaluation

... the bug-fixing history, the code modification history, and also the file dependency ...a bug report, the ranking score of every supply file is computed as a weighted combination of associate array of ... See full document

5

A Technique to Reduce Bug Data for Effective Bug Triage

A Technique to Reduce Bug Data for Effective Bug Triage

... a bug repository plays a vital role in managing software ...a bug repository, a bug is kept up as a bug report, textual description of reproducing the bug and updates according to the ... See full document

6

Fear vs  Hope: Do Discrete Emotions Mediate Message Frame Effectiveness In Genetic Cancer Screening Appeals

Fear vs Hope: Do Discrete Emotions Mediate Message Frame Effectiveness In Genetic Cancer Screening Appeals

... Results of Table 3.2 and Table 3.3 are derived from bag-of-words method and distributed representation method respectively. After removing symbols, numbers, stop-words and other low- frequency words, the average size of ... See full document

95

Learning to Rank Relevant Files for Bug Reports Using Domain knowledge, Replication and Extension of a Learning-to-Rank Approach

Learning to Rank Relevant Files for Bug Reports Using Domain knowledge, Replication and Extension of a Learning-to-Rank Approach

... the bug reports and source code files to be converted into vectors of term weights, first they need to be preprocessed and cleaned; put into a format that the machine learning algorithms will ...stemmed ... See full document

53

An Experimental Analysis of Feature Based Blind Steganalysis Techniques

An Experimental Analysis of Feature Based Blind Steganalysis Techniques

... the feature extraction technique ...of feature extraction and the data mining ...techniques reports in Wavelet features (Farid, 2002; Lyu et ...Markov’s feature (Shi et ... See full document

21

Analysis of Handwritten Hindi Character Recognition using Advanced Feature Extraction Technique and Back propagation Neural Network

Analysis of Handwritten Hindi Character Recognition using Advanced Feature Extraction Technique and Back propagation Neural Network

... Gradient input values, 8- Directional Gradient input values and 16- Directional Gradient input values respectively. Character has been taken in 32x32 pixels i.e.1024 neurons as an input. At hidden layer 12 hidden units ... See full document

8

ENHANCE INTRUSION DETECTION CAPABILITIES VIA WEIGHTED CHI SQUARE, DISCRETIZATION 
AND SVM

ENHANCE INTRUSION DETECTION CAPABILITIES VIA WEIGHTED CHI SQUARE, DISCRETIZATION AND SVM

... a feature based on ...the feature weights learning and an intelligent selection approach was exploited to improve the classification ...on feature selection were presented ... See full document

20

News Recommendation Systems Using Web Mining: A Study

News Recommendation Systems Using Web Mining: A Study

... trend using the click patterns of the general public, instead of only using the user’s own ...approach using Bayesian frameworks to predict users’ current news interest based on the click patterns of ... See full document

7

Show all 10000 documents...