-
1
-
-
84872302992
-
-
http://wiki.eclipse.org/WTP/Conventions of bug priority and severity#How to set Severity and Priority.
-
-
-
-
3
-
-
79960167703
-
Coping with an open bug repository
-
J. Anvik, L. Hiew, and G. C. Murphy, "Coping with an open bug repository," in ETX, 2005, pp. 35-39.
-
(2005)
ETX
, pp. 35-39
-
-
Anvik, J.1
Hiew, L.2
Murphy, G.C.3
-
4
-
-
77949403731
-
What makes a good bug report?
-
N. Bettenburg, S. Just, A. Schröter, C. Weiss, R. Premraj, and T. Zimmermann, "What makes a good bug report?" in SIGSOFT FSE, 2008, pp. 308-318.
-
(2008)
SIGSOFT FSE
, pp. 308-318
-
-
Bettenburg, N.1
Just, S.2
Schröter, A.3
Weiss, C.4
Premraj, R.5
Zimmermann, T.6
-
5
-
-
84855458979
-
Improving automated documentation to code traceability by combining retrieval techniques
-
X. Chen and J. C. Grundy, "Improving automated documentation to code traceability by combining retrieval techniques," in ASE, 2011, pp. 223-232.
-
(2011)
ASE
, pp. 223-232
-
-
Chen, X.1
Grundy, J.C.2
-
6
-
-
85149612939
-
Fast effective rule induction
-
W. Cohen, "Fast effective rule induction," in ICML, 1995.
-
(1995)
ICML
-
-
Cohen, W.1
-
7
-
-
46449115142
-
Automatic bug triage using text categorization
-
D. Cubranic and G. C. Murphy, "Automatic Bug Triage Using Text Categorization," in SEKE, 2004, pp. 92-97.
-
(2004)
SEKE
, pp. 92-97
-
-
Cubranic, D.1
Murphy, G.C.2
-
8
-
-
16244376195
-
Tree-based methods for classifying software failures
-
P. Francis, D. Leon, and M. Minch, "Tree-based methods for classifying software failures," in ISSRE, 2004.
-
(2004)
ISSRE
-
-
Francis, P.1
Leon, D.2
Minch, M.3
-
9
-
-
77953738151
-
Identifying security bug reports via text mining: An industrial case study
-
M. Gegick, P. Rotella, and T. Xie, "Identifying security bug reports via text mining: An industrial case study," in MSR, 2010, pp. 11-20.
-
(2010)
MSR
, pp. 11-20
-
-
Gegick, M.1
Rotella, P.2
Xie, T.3
-
10
-
-
77954731882
-
Supporting program comprehension with source code summarization
-
S. Haiduc, J. Aponte, and A. Marcus, "Supporting program comprehension with source code summarization," in ICSE (2), 2010, pp. 223-226.
-
(2010)
ICSE
, Issue.2
, pp. 223-226
-
-
Haiduc, S.1
Aponte, J.2
Marcus, A.3
-
11
-
-
53349117770
-
Modeling bug report quality
-
P. Hooimeijer and W. Weimer, "Modeling bug report quality," in ASE, 2007, pp. 34-43.
-
(2007)
ASE
, pp. 34-43
-
-
Hooimeijer, P.1
Weimer, W.2
-
12
-
-
84855421322
-
AutoODC: Automated generation of orthogonal defect classifications
-
L. Huang, V. Ng, I. Persing, R. Geng, X. Bai, and J. Tian, "AutoODC: Automated generation of orthogonal defect classifications," in ASE, 2011.
-
(2011)
ASE
-
-
Huang, L.1
Ng, V.2
Persing, I.3
Geng, R.4
Bai, X.5
Tian, J.6
-
13
-
-
53349154094
-
Automated duplicate detection for bug tracking systems
-
N. Jalbert and W. Weimer, "Automated duplicate detection for bug tracking systems," in DSN, 2008.
-
(2008)
DSN
-
-
Jalbert, N.1
Weimer, W.2
-
14
-
-
84864263674
-
Predicting the severity of a reported bug
-
A. Lamkanfi, S. Demeyer, E. Giger, and B. Goethals, "Predicting the severity of a reported bug," in MSR, 2010.
-
(2010)
MSR
-
-
Lamkanfi, A.1
Demeyer, S.2
Giger, E.3
Goethals, B.4
-
15
-
-
79955150350
-
Comparing mining algorithms for predicting the severity of a reported bug
-
A. Lamkanfi, S. Demeyer, Q. Soetens, and T. Verdonck, "Comparing mining algorithms for predicting the severity of a reported bug," in CSMR, 2011.
-
(2011)
CSMR
-
-
Lamkanfi, A.1
Demeyer, S.2
Soetens, Q.3
Verdonck, T.4
-
16
-
-
34548080780
-
-
New York NY USA: Cambridge University Press
-
C. D. Manning, P. Raghavan, and H. Schtze, Introduction to Information Retrieval. New York, NY, USA: Cambridge University Press, 2008, pp. 232-233.
-
(2008)
Introduction to Information Retrieval
, pp. 232-233
-
-
Manning, C.D.1
Raghavan, P.2
Schtze, H.3
-
17
-
-
0037925467
-
Recovering documentation-to-source-code traceability links using latent semantic indexing
-
A. Marcus and J. I. Maletic, "Recovering documentation-to-source- code traceability links using latent semantic indexing," in ICSE, 2003, pp. 125-137.
-
(2003)
ICSE
, pp. 125-137
-
-
Marcus, A.1
Maletic, J.I.2
-
18
-
-
57849151225
-
Automated severity assessment of software defect reports
-
T. Menzies and A. Marcus, "Automated severity assessment of software defect reports," in ICSM, 2008.
-
(2008)
ICSM
-
-
Menzies, T.1
Marcus, A.2
-
19
-
-
84872339436
-
-
Www.openoffice.org/qa/ooQAReloaded/Docs/QA-Reloaded-ITguide. html#priorities.
-
-
-
-
20
-
-
0037587321
-
Automated support for classifying software failure reports
-
A. Podgurski, D. Leon, P. Francis, W. Masri, M. Minch, J. Sun, and B. Wang, "Automated support for classifying software failure reports," in Proceedings of the 25th International Conference on Software Engineering, 2003, pp. 465-475.
-
(2003)
Proceedings of the 25th International Conference on Software Engineering
, pp. 465-475
-
-
Podgurski, A.1
Leon, D.2
Francis, P.3
Masri, W.4
Minch, M.5
Sun, J.6
Wang, B.7
-
21
-
-
18744388867
-
Simple BM25 extension to multiple weighted fields
-
S. Robertson, H. Zaragoza, and M. Taylor, "Simple BM25 Extension to Multiple Weighted Fields," in Proceedings of the thirteenth ACM international conference on Information and knowledge management, 2004, pp. 42-49.
-
(2004)
Proceedings of the Thirteenth ACM International Conference on Information and Knowledge Management
, pp. 42-49
-
-
Robertson, S.1
Zaragoza, H.2
Taylor, M.3
-
22
-
-
34548795892
-
Detection of duplicate defect reports using natural language processing
-
P. Runeson, M. Alexandersson, and O. Nyholm, "Detection of duplicate defect reports using natural language processing," in ICSE, 2007, pp. 499-510.
-
(2007)
ICSE
, pp. 499-510
-
-
Runeson, P.1
Alexandersson, M.2
Nyholm, O.3
-
23
-
-
33744804744
-
Bug report networks: Varieties, strategies, and impacts in a f/oss development community
-
R. J. Sandusky, L. Gasser, and G. Ripoche, "Bug report networks: Varieties, strategies, and impacts in a f/oss development community," in International Workshop on Mining Software Repositories, 2004, pp. 80-84.
-
(2004)
International Workshop on Mining Software Repositories
, pp. 80-84
-
-
Sandusky, R.J.1
Gasser, L.2
Ripoche, G.3
-
24
-
-
79959898406
-
Automatically detecting and describing high level actions within methods
-
G. Sridhara, L. L. Pollock, and K. Vijay-Shanker, "Automatically detecting and describing high level actions within methods," in ICSE, 2011, pp. 101-110.
-
(2011)
ICSE
, pp. 101-110
-
-
Sridhara, G.1
Pollock, L.L.2
Vijay-Shanker, K.3
-
25
-
-
84872285868
-
-
Www.ils.unc.edu/∼keyeg/java/porter/PorterStemmer.java.
-
-
-
-
26
-
-
84855424476
-
Towards more accurate retrieval of duplicate bug reports
-
C. Sun, D. Lo, S.-C. Khoo, and J. Jiang, "Towards more accurate retrieval of duplicate bug reports," in ASE, 2011.
-
(2011)
ASE
-
-
Sun, C.1
Lo, D.2
Khoo, S.-C.3
Jiang, J.4
-
27
-
-
77954706970
-
A discriminative model approach for accurate duplicate bug report retrieval
-
C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo, "A discriminative model approach for accurate duplicate bug report retrieval," in ICSE, 2010.
-
(2010)
ICSE
-
-
Sun, C.1
Lo, D.2
Wang, X.3
Jiang, J.4
Khoo, S.-C.5
-
28
-
-
79959897209
-
Fuzzy set-based automatic bug triaging
-
A. Tamrawi, T. T. Nguyen, J. Al-Kofahi, and T. N. Nguyen, "Fuzzy set-based automatic bug triaging," in ICSE, 2011, pp. 884-887.
-
(2011)
ICSE
, pp. 884-887
-
-
Tamrawi, A.1
Nguyen, T.T.2
Al-Kofahi, J.3
Nguyen, T.N.4
-
29
-
-
84872289973
-
Fuzzy set-based automatic bug triaging
-
A. Tamrawi, T. T. Nguyen, J. M. Al-Kofahi, and T. N. Nguyen, "Fuzzy set-based automatic bug triaging," in ICSE, 2011.
-
(2011)
ICSE
-
-
Tamrawi, A.1
Nguyen, T.T.2
Al-Kofahi, J.M.3
Nguyen, T.N.4
-
30
-
-
34547617682
-
Optimisation methods for ranking functions with multiple parameters
-
M. Taylor, H. Zaragoza, N. Craswell, S. Robertson, and C. Burges, "Optimisation methods for ranking functions with multiple parameters," in Int. Conf. on Information and Knowledge Mgmt (CIKM), 2006.
-
(2006)
Int. Conf. on Information and Knowledge Mgmt (CIKM)
-
-
Taylor, M.1
Zaragoza, H.2
Craswell, N.3
Robertson, S.4
Burges, C.5
-
31
-
-
57349172049
-
An approach to detecting duplicate bug reports using natural language and execution information
-
X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun, "An approach to detecting duplicate bug reports using natural language and execution information," in ICSE, 2008, pp. 461-470.
-
(2008)
ICSE
, pp. 461-470
-
-
Wang, X.1
Zhang, L.2
Xie, T.3
Anvik, J.4
Sun, J.5
-
32
-
-
78650768202
-
Microsoft cambridge at trec 13: Web and hard tracks
-
H. Zaragoza, N. Craswell, M. J. Taylor, S. Saria, and S. E. Robertson, "Microsoft cambridge at trec 13: Web and hard tracks," in TREC, 2004.
-
(2004)
TREC
-
-
Zaragoza, H.1
Craswell, N.2
Taylor, M.J.3
Saria, S.4
Robertson, S.E.5
|