메뉴 건너뛰기




Volumn , Issue , 2012, Pages 386-396

Identifying Linux bug fixing patches

Author keywords

[No Author keywords available]

Indexed keywords

BUG FIXES; BUG-FIXING; LINUX KERNEL; SECURE EXECUTION;

EID: 84864224043     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2012.6227176     Document Type: Conference Paper
Times cited : (147)

References (40)
  • 1
    • 70349105844 scopus 로고    scopus 로고
    • Is it a bug or an enhancement?: A text-based approach to classify change requests
    • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y.-G. Guéhéneuc. Is it a bug or an enhancement?: a text-based approach to classify change requests. In CASCON, 2008.
    • (2008) CASCON
    • Antoniol, G.1    Ayari, K.2    Penta, M.D.3    Khomh, F.4    Guéhéneuc, Y.-G.5
  • 2
    • 34247101896 scopus 로고    scopus 로고
    • Who should fix this bug?
    • J. Anvik, L. Hiew, and G. Murphy. Who should fix this bug? In ICSE, pages 361-370, 2006.
    • (2006) ICSE , pp. 361-370
    • Anvik, J.1    Hiew, L.2    Murphy, G.3
  • 5
    • 78751553147 scopus 로고    scopus 로고
    • Linkster: Enabling efficient manual inspection and annotation of mined data
    • C. Bird, A. Bachmann, F. Rahman, and A. Bernstein. Linkster: enabling efficient manual inspection and annotation of mined data. In SIGSOFT FSE, pages 369-370, 2010.
    • (2010) SIGSOFT FSE , pp. 369-370
    • Bird, C.1    Bachmann, A.2    Rahman, F.3    Bernstein, A.4
  • 8
    • 33745817438 scopus 로고    scopus 로고
    • Combining SVMs with various feature selection strategies
    • I. Guyon, S. Gunn, M. Nikravesh, and L. Zadeh, editors, Springer
    • Y.-W. Chen and C.-J. Lin. Combining SVMs with various feature selection strategies. In I. Guyon, S. Gunn, M. Nikravesh, and L. Zadeh, editors, Feature extraction, foundations and applications. Springer, 2006.
    • (2006) Feature Extraction, Foundations and Applications
    • Chen, Y.-W.1    Lin, C.-J.2
  • 9
    • 34249753618 scopus 로고
    • Support-vector networks
    • C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20(3):273-297, 1995.
    • (1995) Machine Learning , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 11
    • 67650809815 scopus 로고    scopus 로고
    • Extraction of bug localization benchmarks from history
    • V. Dallmeier and T. Zimmermann. Extraction of bug localization benchmarks from history. In ASE, pages 433-436, 2007.
    • (2007) ASE , pp. 433-436
    • Dallmeier, V.1    Zimmermann, T.2
  • 12
    • 84855461930 scopus 로고    scopus 로고
    • Finding relevant answers in software forums
    • S. Gottipati, D. Lo, and J. Jiang. Finding relevant answers in software forums. In ASE, 2011.
    • (2011) ASE
    • Gottipati, S.1    Lo, D.2    Jiang, J.3
  • 15
    • 70449976317 scopus 로고    scopus 로고
    • WYSIWIB: A declarative approach to finding protocols and bugs in Linux code
    • June
    • J. L. Lawall, J. Brunel, R. R. Hansen, H. Stuart, G. Muller, and N. Palix. WYSIWIB: A declarative approach to finding protocols and bugs in Linux code. In DSN, pages 43-52, June 2009.
    • (2009) DSN , pp. 43-52
    • Lawall, J.L.1    Brunel, J.2    Hansen, R.R.3    Stuart, H.4    Muller, G.5    Palix, N.6
  • 16
    • 84880798303 scopus 로고    scopus 로고
    • Learning to classify text using positive and unlabeled data
    • X. Li and B. Liu. Learning to classify text using positive and unlabeled data. In IJCAI, 2003.
    • (2003) IJCAI
    • Li, X.1    Liu, B.2
  • 17
    • 57749182418 scopus 로고    scopus 로고
    • Source code retrieval for bug localization using latent dirichlet allocation
    • S. Lukins, N. Karft, and E. Letha. Source code retrieval for bug localization using latent dirichlet allocation. In WCRE, 2008.
    • (2008) WCRE
    • Lukins, S.1    Karft, N.2    Letha, E.3
  • 20
    • 18144387283 scopus 로고    scopus 로고
    • An information retrieval approach to concept location in source code
    • A. Marcus, A. Sergeyev, V. Rajlich, and J. Maletic. An information retrieval approach to concept location in source code. In WCRE, pages 214-223, 2004.
    • (2004) WCRE , pp. 214-223
    • Marcus, A.1    Sergeyev, A.2    Rajlich, V.3    Maletic, J.4
  • 21
    • 0034513916 scopus 로고    scopus 로고
    • Identifying reasons for software changes using historic databases
    • A. Mockus and L. G. Votta. Identifying reasons for software changes using historic databases. In ICSM, pages 120-130, 2000.
    • (2000) ICSM , pp. 120-130
    • Mockus, A.1    Votta, L.G.2
  • 23
    • 77952224331 scopus 로고    scopus 로고
    • Documenting and automating collateral evolutions in Linux device drivers
    • Y. Padioleau, J. Lawall, R. R. Hansen, and G. Muller. Documenting and automating collateral evolutions in Linux device drivers. In EuroSys, pages 247-260, 2008.
    • (2008) EuroSys , pp. 247-260
    • Padioleau, Y.1    Lawall, J.2    Hansen, R.R.3    Muller, G.4
  • 24
    • 34748874667 scopus 로고    scopus 로고
    • Understanding collateral evolution in Linux device drivers
    • Y. Padioleau, J. L. Lawall, and G. Muller. Understanding collateral evolution in Linux device drivers. In EuroSys, pages 59-71, 2006.
    • (2006) EuroSys , pp. 59-71
    • Padioleau, Y.1    Lawall, J.L.2    Muller, G.3
  • 26
    • 79952954542 scopus 로고    scopus 로고
    • Text mining support for software requirements: Traceability assurance
    • D. Port, A. P. Nikora, J. H. Hayes, and L. Huang. Text mining support for software requirements: Traceability assurance. In HICSS, pages 1-11, 2011.
    • (2011) HICSS , pp. 1-11
    • Port, D.1    Nikora, A.P.2    Hayes, J.H.3    Huang, L.4
  • 27
    • 84864234443 scopus 로고    scopus 로고
    • Retrieval from software libraries for bug localization: A comparative study of generic and composite text models
    • S. Rao and A. Kak. Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In MSR, 2011.
    • (2011) MSR
    • Rao, S.1    Kak, A.2
  • 28
    • 34548795892 scopus 로고    scopus 로고
    • Detection of duplicate defect reports using natural language processing
    • P. Runeson, M. Alexandersson, and O. Nyholm. Detection of duplicate defect reports using natural language processing. In ICSE, pages 499-510, 2007.
    • (2007) ICSE , pp. 499-510
    • Runeson, P.1    Alexandersson, M.2    Nyholm, O.3
  • 30
    • 80053460449 scopus 로고    scopus 로고
    • The constrained weight space svm:learning with ranked features
    • K. Small, B. Wallace, C. Brodley, and T. Trikalinos. The constrained weight space svm:learning with ranked features. In ICML, 2011.
    • (2011) ICML
    • Small, K.1    Wallace, B.2    Brodley, C.3    Trikalinos, T.4
  • 31
    • 84860392802 scopus 로고    scopus 로고
    • Application of swarm techniques to requirements tracing
    • H. Sultanov, J. H. Hayes, and W.-K. Kong. Application of swarm techniques to requirements tracing. Requir. Eng., 16(3):209-226, 2011.
    • (2011) Requir. Eng. , vol.16 , Issue.3 , pp. 209-226
    • Sultanov, H.1    Hayes, J.H.2    Kong, W.-K.3
  • 32
    • 84855424476 scopus 로고    scopus 로고
    • Towards more accurate retrieval of duplicate bug reports
    • C. Sun, D. Lo, S.-C. Khoo, and J. Jiang. Towards more accurate retrieval of duplicate bug reports. In ASE, 2011.
    • (2011) ASE
    • Sun, C.1    Lo, D.2    Khoo, S.-C.3    Jiang, J.4
  • 33
    • 77954706970 scopus 로고    scopus 로고
    • A discriminative model approach for accurate duplicate bug report retrieval
    • C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo. A discriminative model approach for accurate duplicate bug report retrieval. In ICSE, pages 45-54, 2010.
    • (2010) ICSE , pp. 45-54
    • Sun, C.1    Lo, D.2    Wang, X.3    Jiang, J.4    Khoo, S.-C.5
  • 34
    • 79951730859 scopus 로고    scopus 로고
    • Detecting duplicate bug report using character n-gram-based features
    • A. Sureka and P. Jalote. Detecting duplicate bug report using character n-gram-based features. In APSEC, pages 366-374, 2010.
    • (2010) APSEC , pp. 366-374
    • Sureka, A.1    Jalote, P.2
  • 35
    • 79959897812 scopus 로고    scopus 로고
    • aComment: Mining annotations from comments and code to detect interupt related concurrency bugs
    • L. Tan, Y. Zhou, and Y. Padioleau. aComment: mining annotations from comments and code to detect interupt related concurrency bugs. In ICSE, pages 11-20, 2011.
    • (2011) ICSE , pp. 11-20
    • Tan, L.1    Zhou, Y.2    Padioleau, Y.3
  • 37
    • 57349172049 scopus 로고    scopus 로고
    • An approach to detecting duplicate bug reports using natural language and execution information
    • X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun. An approach to detecting duplicate bug reports using natural language and execution information. In ICSE, pages 461-470, 2008.
    • (2008) ICSE , pp. 461-470
    • Wang, X.1    Zhang, L.2    Xie, T.3    Anvik, J.4    Sun, J.5
  • 38
    • 80053202000 scopus 로고    scopus 로고
    • Relink: Recovering links between bugs and changes
    • R. Wu, H. Zhang, S. Kim, and S.-C. Cheung. Relink: recovering links between bugs and changes. In SIGSOFT FSE, pages 15-25, 2011.
    • (2011) SIGSOFT FSE , pp. 15-25
    • Wu, R.1    Zhang, H.2    Kim, S.3    Cheung, S.-C.4
  • 39
    • 77952208003 scopus 로고    scopus 로고
    • Inferring resource specifications from natural language API documentation
    • H. Zhong, L. Zhang, T. Xie, and H. Mei. Inferring resource specifications from natural language API documentation. In ASE, pages 307-318, 2009.
    • (2009) ASE , pp. 307-318
    • Zhong, H.1    Zhang, L.2    Xie, T.3    Mei, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.