-
1
-
-
70349105844
-
Is it a bug or an enhancement?: A text-based approach to classify change requests
-
G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y.-G. Guéhéneuc. Is it a bug or an enhancement?: a text-based approach to classify change requests. In CASCON, 2008.
-
(2008)
CASCON
-
-
Antoniol, G.1
Ayari, K.2
Penta, M.D.3
Khomh, F.4
Guéhéneuc, Y.-G.5
-
2
-
-
34247101896
-
Who should fix this bug?
-
J. Anvik, L. Hiew, and G. Murphy. Who should fix this bug? In ICSE, pages 361-370, 2006.
-
(2006)
ICSE
, pp. 361-370
-
-
Anvik, J.1
Hiew, L.2
Murphy, G.3
-
3
-
-
77949403731
-
What makes a good bug report?
-
N. Bettenburg, S. Just, A. Schröter, C. Weiss, R. Premraj, and T. Zimmermann. What makes a good bug report? In SIGSOFT '08/FSE-16, pages 308-318, 2008.
-
(2008)
SIGSOFT '08/FSE-16
, pp. 308-318
-
-
Bettenburg, N.1
Just, S.2
Schröter, A.3
Weiss, C.4
Premraj, R.5
Zimmermann, T.6
-
4
-
-
77949389948
-
Fair and balanced?: Bias in bug-fix datasets
-
C. Bird, A. Bachmann, E. Aune, J. Duffy, A. Bernstein, V. Filkov, and P. T. Devanbu. Fair and balanced?: bias in bug-fix datasets. In ESEC/SIGSOFT FSE, pages 121-130, 2009.
-
(2009)
ESEC/SIGSOFT FSE
, pp. 121-130
-
-
Bird, C.1
Bachmann, A.2
Aune, E.3
Duffy, J.4
Bernstein, A.5
Filkov, V.6
Devanbu, P.T.7
-
5
-
-
78751553147
-
Linkster: Enabling efficient manual inspection and annotation of mined data
-
C. Bird, A. Bachmann, F. Rahman, and A. Bernstein. Linkster: enabling efficient manual inspection and annotation of mined data. In SIGSOFT FSE, pages 369-370, 2010.
-
(2010)
SIGSOFT FSE
, pp. 369-370
-
-
Bird, C.1
Bachmann, A.2
Rahman, F.3
Bernstein, A.4
-
8
-
-
33745817438
-
Combining SVMs with various feature selection strategies
-
I. Guyon, S. Gunn, M. Nikravesh, and L. Zadeh, editors, Springer
-
Y.-W. Chen and C.-J. Lin. Combining SVMs with various feature selection strategies. In I. Guyon, S. Gunn, M. Nikravesh, and L. Zadeh, editors, Feature extraction, foundations and applications. Springer, 2006.
-
(2006)
Feature Extraction, Foundations and Applications
-
-
Chen, Y.-W.1
Lin, C.-J.2
-
9
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20(3):273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
11
-
-
67650809815
-
Extraction of bug localization benchmarks from history
-
V. Dallmeier and T. Zimmermann. Extraction of bug localization benchmarks from history. In ASE, pages 433-436, 2007.
-
(2007)
ASE
, pp. 433-436
-
-
Dallmeier, V.1
Zimmermann, T.2
-
12
-
-
84855461930
-
Finding relevant answers in software forums
-
S. Gottipati, D. Lo, and J. Jiang. Finding relevant answers in software forums. In ASE, 2011.
-
(2011)
ASE
-
-
Gottipati, S.1
Lo, D.2
Jiang, J.3
-
14
-
-
34548793480
-
Predicting faults from cached history
-
S. Kim, T. Zimmermann, E. J. Whitehead Jr., and A. Zeller. Predicting faults from cached history. In ICSE, pages 489-498, 2007.
-
(2007)
ICSE
, pp. 489-498
-
-
Kim, S.1
Zimmermann, T.2
Whitehead Jr., E.J.3
Zeller, A.4
-
15
-
-
70449976317
-
WYSIWIB: A declarative approach to finding protocols and bugs in Linux code
-
June
-
J. L. Lawall, J. Brunel, R. R. Hansen, H. Stuart, G. Muller, and N. Palix. WYSIWIB: A declarative approach to finding protocols and bugs in Linux code. In DSN, pages 43-52, June 2009.
-
(2009)
DSN
, pp. 43-52
-
-
Lawall, J.L.1
Brunel, J.2
Hansen, R.R.3
Stuart, H.4
Muller, G.5
Palix, N.6
-
16
-
-
84880798303
-
Learning to classify text using positive and unlabeled data
-
X. Li and B. Liu. Learning to classify text using positive and unlabeled data. In IJCAI, 2003.
-
(2003)
IJCAI
-
-
Li, X.1
Liu, B.2
-
17
-
-
57749182418
-
Source code retrieval for bug localization using latent dirichlet allocation
-
S. Lukins, N. Karft, and E. Letha. Source code retrieval for bug localization using latent dirichlet allocation. In WCRE, 2008.
-
(2008)
WCRE
-
-
Lukins, S.1
Karft, N.2
Letha, E.3
-
20
-
-
18144387283
-
An information retrieval approach to concept location in source code
-
A. Marcus, A. Sergeyev, V. Rajlich, and J. Maletic. An information retrieval approach to concept location in source code. In WCRE, pages 214-223, 2004.
-
(2004)
WCRE
, pp. 214-223
-
-
Marcus, A.1
Sergeyev, A.2
Rajlich, V.3
Maletic, J.4
-
21
-
-
0034513916
-
Identifying reasons for software changes using historic databases
-
A. Mockus and L. G. Votta. Identifying reasons for software changes using historic databases. In ICSM, pages 120-130, 2000.
-
(2000)
ICSM
, pp. 120-130
-
-
Mockus, A.1
Votta, L.G.2
-
22
-
-
77954721050
-
Recurring bug fixes in object-oriented programs
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen. Recurring bug fixes in object-oriented programs. In ICSE (1), pages 315-324, 2010.
-
(2010)
ICSE
, Issue.1
, pp. 315-324
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
23
-
-
77952224331
-
Documenting and automating collateral evolutions in Linux device drivers
-
Y. Padioleau, J. Lawall, R. R. Hansen, and G. Muller. Documenting and automating collateral evolutions in Linux device drivers. In EuroSys, pages 247-260, 2008.
-
(2008)
EuroSys
, pp. 247-260
-
-
Padioleau, Y.1
Lawall, J.2
Hansen, R.R.3
Muller, G.4
-
24
-
-
34748874667
-
Understanding collateral evolution in Linux device drivers
-
Y. Padioleau, J. L. Lawall, and G. Muller. Understanding collateral evolution in Linux device drivers. In EuroSys, pages 59-71, 2006.
-
(2006)
EuroSys
, pp. 59-71
-
-
Padioleau, Y.1
Lawall, J.L.2
Muller, G.3
-
25
-
-
79953094728
-
Faults in Linux: Ten years later
-
N. Palix, G. Thomas, S. Saha, C. Calvès, J. Lawall, and G. Muller. Faults in Linux: Ten years later. In ASPLOS, pages 305-318, 2011.
-
(2011)
ASPLOS
, pp. 305-318
-
-
Palix, N.1
Thomas, G.2
Saha, S.3
Calvès, C.4
Lawall, J.5
Muller, G.6
-
26
-
-
79952954542
-
Text mining support for software requirements: Traceability assurance
-
D. Port, A. P. Nikora, J. H. Hayes, and L. Huang. Text mining support for software requirements: Traceability assurance. In HICSS, pages 1-11, 2011.
-
(2011)
HICSS
, pp. 1-11
-
-
Port, D.1
Nikora, A.P.2
Hayes, J.H.3
Huang, L.4
-
27
-
-
84864234443
-
Retrieval from software libraries for bug localization: A comparative study of generic and composite text models
-
S. Rao and A. Kak. Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In MSR, 2011.
-
(2011)
MSR
-
-
Rao, S.1
Kak, A.2
-
28
-
-
34548795892
-
Detection of duplicate defect reports using natural language processing
-
P. Runeson, M. Alexandersson, and O. Nyholm. Detection of duplicate defect reports using natural language processing. In ICSE, pages 499-510, 2007.
-
(2007)
ICSE
, pp. 499-510
-
-
Runeson, P.1
Alexandersson, M.2
Nyholm, O.3
-
30
-
-
80053460449
-
The constrained weight space svm:learning with ranked features
-
K. Small, B. Wallace, C. Brodley, and T. Trikalinos. The constrained weight space svm:learning with ranked features. In ICML, 2011.
-
(2011)
ICML
-
-
Small, K.1
Wallace, B.2
Brodley, C.3
Trikalinos, T.4
-
31
-
-
84860392802
-
Application of swarm techniques to requirements tracing
-
H. Sultanov, J. H. Hayes, and W.-K. Kong. Application of swarm techniques to requirements tracing. Requir. Eng., 16(3):209-226, 2011.
-
(2011)
Requir. Eng.
, vol.16
, Issue.3
, pp. 209-226
-
-
Sultanov, H.1
Hayes, J.H.2
Kong, W.-K.3
-
32
-
-
84855424476
-
Towards more accurate retrieval of duplicate bug reports
-
C. Sun, D. Lo, S.-C. Khoo, and J. Jiang. Towards more accurate retrieval of duplicate bug reports. In ASE, 2011.
-
(2011)
ASE
-
-
Sun, C.1
Lo, D.2
Khoo, S.-C.3
Jiang, J.4
-
33
-
-
77954706970
-
A discriminative model approach for accurate duplicate bug report retrieval
-
C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo. A discriminative model approach for accurate duplicate bug report retrieval. In ICSE, pages 45-54, 2010.
-
(2010)
ICSE
, pp. 45-54
-
-
Sun, C.1
Lo, D.2
Wang, X.3
Jiang, J.4
Khoo, S.-C.5
-
34
-
-
79951730859
-
Detecting duplicate bug report using character n-gram-based features
-
A. Sureka and P. Jalote. Detecting duplicate bug report using character n-gram-based features. In APSEC, pages 366-374, 2010.
-
(2010)
APSEC
, pp. 366-374
-
-
Sureka, A.1
Jalote, P.2
-
35
-
-
79959897812
-
aComment: Mining annotations from comments and code to detect interupt related concurrency bugs
-
L. Tan, Y. Zhou, and Y. Padioleau. aComment: mining annotations from comments and code to detect interupt related concurrency bugs. In ICSE, pages 11-20, 2011.
-
(2011)
ICSE
, pp. 11-20
-
-
Tan, L.1
Zhou, Y.2
Padioleau, Y.3
-
36
-
-
77957860728
-
Extracting paraphrases of technical terms from noisy parallel software corpora
-
X. Wang, D. Lo, J. Jiang, L. Zhang, and H. Mei. Extracting paraphrases of technical terms from noisy parallel software corpora. In Proc. of the 47th Annual Meeting of the Assoc. for Computational Linguistics (ACL), 2009.
-
Proc. of the 47th Annual Meeting of the Assoc. for Computational Linguistics (ACL), 2009
-
-
Wang, X.1
Lo, D.2
Jiang, J.3
Zhang, L.4
Mei, H.5
-
37
-
-
57349172049
-
An approach to detecting duplicate bug reports using natural language and execution information
-
X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun. An approach to detecting duplicate bug reports using natural language and execution information. In ICSE, pages 461-470, 2008.
-
(2008)
ICSE
, pp. 461-470
-
-
Wang, X.1
Zhang, L.2
Xie, T.3
Anvik, J.4
Sun, J.5
-
38
-
-
80053202000
-
Relink: Recovering links between bugs and changes
-
R. Wu, H. Zhang, S. Kim, and S.-C. Cheung. Relink: recovering links between bugs and changes. In SIGSOFT FSE, pages 15-25, 2011.
-
(2011)
SIGSOFT FSE
, pp. 15-25
-
-
Wu, R.1
Zhang, H.2
Kim, S.3
Cheung, S.-C.4
-
39
-
-
77952208003
-
Inferring resource specifications from natural language API documentation
-
H. Zhong, L. Zhang, T. Xie, and H. Mei. Inferring resource specifications from natural language API documentation. In ASE, pages 307-318, 2009.
-
(2009)
ASE
, pp. 307-318
-
-
Zhong, H.1
Zhang, L.2
Xie, T.3
Mei, H.4
|