Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Analysis of Bug Triage using Data Preprocessing (Reduction) Techniques

by G. Parthasarathy, D.C. Tomar, Blessy John
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 9
Year of Publication: 2015
Authors: G. Parthasarathy, D.C. Tomar, Blessy John
10.5120/ijca2015903002

G. Parthasarathy, D.C. Tomar, Blessy John . Analysis of Bug Triage using Data Preprocessing (Reduction) Techniques. International Journal of Computer Applications. 125, 9 ( September 2015), 8-15. DOI=10.5120/ijca2015903002

@article{ 10.5120/ijca2015903002,
author = { G. Parthasarathy, D.C. Tomar, Blessy John },
title = { Analysis of Bug Triage using Data Preprocessing (Reduction) Techniques },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 9 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number9/22458-2015903002/ },
doi = { 10.5120/ijca2015903002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:05.809762+05:30
%A G. Parthasarathy
%A D.C. Tomar
%A Blessy John
%T Analysis of Bug Triage using Data Preprocessing (Reduction) Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 9
%P 8-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the bug triage we have an unavoidable step of fixing the bugs which helps in correctly assigning a developer to a new bug. Text classification and binary classification techniques are applied to decrease the time cost in manual work and to enhance the working of automatic bug triage. We address the problem of data reduction and hence we combine the instance selection and the feature selection algorithms to simultaneously reduce the data scale and enhance the accuracy of the bug reports in the bug triage. We determine a predictive model to perform the algorithms which adds on to prioritize the developer to a new bug by extracting attributes and the bug data set from the historical table. By leveraging data mining techniques, mining software repositories can uncover interesting information in software repositories and solve real-world software problem like Eclipse, Mozilla and GNOME.

References
  1. J. Anvik, L. Hiew, and G. C. Murphy, “Who should fix this bug?” in Proc. 28th Int. Conf. Softw. Eng., May 2006, pp. 361–370.
  2. S. Artzi, A. Kie_ zun, J. Dolby, F. Tip, D. Dig, A. Paradkar,
  3. and M. D.Ernst, “Finding bugs in web applications using dynamic test generation and explicit-state model checking,” IEEE Softw., vol. 36,no. 4, pp. 474–494, Jul./Aug.2010.
  4. A.Lamkanfi, S. Demeyer, E. Giger, and B. Goethals,
  5. “Predicting the severity of a reported bug,” in Proc. 7th IEEE Working Conf. Mining Softw. Repositories, May 2010, pp. 1–10.
  6. X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun, “An approach to detecting duplicate bug reports using natural language and execution information,” in Proc. 30th Int. Conf. Softw. Eng., May 2008,pp. 461–470.
  7. J. Xuan, H. Jiang, Z. Ren, andW. Zou, “Developer prioritization in bug repositories,” in Proc. 34th Int. Conf. Softw. Eng., 2012, pp. 25–35.
  8. Jifeng Xuan, He Jiang, “Towards effective bug triage with software dropping techniques”, IEEE Transactions on Knowledge and Data Engineering, Vol 27, No.1 Jan 2015.
  9. J.R. Mendez, E.L Iglesias, F.Fdez Riverola, F.Diaz, “Tokenizing, Stemming and Stop word removal on Anti spam filtering Domain”, CAEPIA 2005, LNAI4177,pp.449- 458,2006.
  10. C. C. Aggarwal and P. Zhao, “Towards graphical models for text processing,” Knowl. Inform. Syst., vol. 36, no. 1, pp. 1– 21, 2013.
  11. V. Bolon-Canedo, N. Sanchez-Maro no, and A. Alonso-Betanzos, “A review of feature selection methods on synthetic data,” Knowl. Inform. Syst., vol. 34, no. 3, pp.483–519,2013.
  12. Guyon and A. Elisseeff, “An introduction to variable and feature selection,” J. Mach. Learn. Res., vol. 3, pp. 1157–1182, 2003.
  13. Y. Fu, X. Zhu, and B. Li, “A survey on instance selection for active learning,” Knowl. Inform. Syst., vol. 35, no. 2, pp. 249–283, 2013.
  14. H. Brighton and C. Mellish, “Advances in instance selection for instance-based learning algorithms,” Data Mining Knowl. Discovery, vol. 6, no. 2, pp. 153–172, Apr. 2002.
  15. J. A. Olvera-Lopez, J. A.Carrasco-Ochoa, J. F. Martınez-Trinidad, and J. Kittler, “A review of instance selection methods,” Artif. Intell. Rev., vol. 34, no. 2, pp. 133–143, 2010.
  16. Mozilla. (2014). [Online]. Available: http://mozilla.org/
  17. Eclipse. (2014). [Online]. Available: http://eclipse.org/.
  18. G.Parthasarathy and D.C Tomar, “ Sentiment analysis of Journal Citations from citatation databases, IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Bug Triage Data Reduction in bug report preprocessing the bug report Fixing Bugs