[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2487085.2487089guideproceedingsArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article
Free access

Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation

Published: 18 May 2013 Publication History

Abstract

Large software development projects receive many bug reports and each of these reports needs to be triaged. An important step in the triage process is the assignment of the report to a developer. Most previous efforts towards improving bug report assignment have focused on using an activity-based approach. We address some of the limitations of activity-based approaches by proposing a two-phased location-based approach where bug report assignment recommendations are based on the predicted location of the bug. The proposed approach utilizes a noun extraction process on several information sources to determine bug location information and a simple term weighting scheme to provide a bug report assignment recommendation. We found that by using a location-based approach, we achieved an accuracy of 89.41% and 59.76% when recommending five developers for the Eclipse and Mozilla projects, respectively.

References

[1]
G. Jeong, S. Kim, and T. Zimmermann, "Improving bug triage with bug tossing graphs," in Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, ser. ESEC/FSE '09. New York, NY, USA: ACM, 2009, pp. 111-120.
[2]
J. Anvik and G. C. Murphy, "Reducing the effort of bug report triage: Recommenders for development-oriented decisions," ACM Trans. Softw. Eng. Methodol., vol. 20, no. 3, pp. 10:1-10:35, Aug. 2011.
[3]
K. Crowston, J. Howison, and H. Annabi, "Information systems success in free and open source software development: theory and measures," Software Process: Improvement and Practice, vol. 11, no. 2, pp. 123- 148, 2006.
[4]
T. Zimmermann, R. Premraj, N. Bettenburg, S. Just, A. Schroter, and C. Weiss, "What makes a good bug report?" Software Engineering, IEEE Transactions on, vol. 36, no. 5, pp. 618-643, sept.-oct. 2010.
[5]
P. Runeson, M. Alexandersson, and O. Nyholm, "Detection of duplicate defect reports using natural language processing," in ICSE '07: Proceedings of the 29th international conference on Software Engineering. Washington, DC, USA: IEEE Computer Society, 2007, pp. 499-510.
[6]
X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun, "An approach to detecting duplicate bug reports using natural language and execution information," in ICSE '08: Proceedings of the 30th international conference on Software engineering. New York, NY, USA: ACM, 2008, pp. 461-470.
[7]
D. Cubranic and G. C. Murphy, "Automatic bug triage using text categorization." in SEKE'04, 2004, pp. 92-97.
[8]
J. Anvik, L. Hiew, and G. C. Murphy, "Who should fix this bug?" in ICSE '06: Proceedings of the 28th international conference on Software engineering. New York, NY, USA: ACM, 2006, pp. 361-370.
[9]
O. Baysal, M. Godfrey, and R. Cohen, "A bug you like: A framework for automated assignment of bugs," in Program Comprehension, 2009. ICPC '09. IEEE 17th International Conference on, May 2009, pp. 297 -298.
[10]
G. Canfora and L. Cerulo, "How software repositories can help in resolving a new change request," in In Workshop on Empirical Studies in Reverse Engineering, 2005.
[11]
D. Matter, A. Kuhn, and O. Nierstrasz, "Assigning bug reports using a vocabulary-based expertise model of developers," in Mining Software Repositories, 2009. MSR '09. 6th IEEE International Working Conference on, May 2009, pp. 131-140.
[12]
P. Bhattacharya, I. Neamtiu, and C. R. Shelton, "Automated, highly-accurate, bug assignment using machine learning and tossing graphs," J. Syst. Softw., vol. 85, no. 10, pp. 2275-2292, Oct. 2012.
[13]
S. K. Lukins, N. A. Kraft, and L. H. Etzkorn, "Bug localization using latent dirichlet allocation," Information and Software Technology, vol. 52, no. 9, pp. 972-990, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0950584910000650
[14]
J. Zhou, H. Zhang, and D. Lo, "Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports," in Software Engineering (ICSE), 2012 34th International Conference on, june 2012, pp. 14-24.
[15]
A. E. Hassan and R. C. Holt, "The top ten list: Dynamic fault prediction," in Proceedings of the 21st IEEE International Conference on Software Maintenance, ser. ICSM '05. Washington, DC, USA: IEEE Computer Society, 2005, pp. 263-272.
[16]
D. Izquierdo-Cortazar, A. Capiluppi, and J. Gonzalez-Barahona, "Are developers fixing their own bugs?: Tracing bug-fixing and bugseeding committers," International Journal of Open Source Software and Processes (IJOSSP), vol. 3, no. 2, pp. 23-42, 2011.
[17]
A. Tamrawi, T. T. Nguyen, J. Al-Kofahi, and T. N. Nguyen, "Fuzzy set-based automatic bug triaging: Nier track," in Proc. 33rd Int Software Engineering (ICSE) Conf, 2011, pp. 884-887.
[18]
G. Capobianco, A. D. Lucia, R. Oliveto, A. Panichella, and S. Panichella, "Improving ir-based traceability recovery via noun-based indexing of software artifacts," Journal of Software: Evolution and Process, pp. n/an/a, 2012.
[19]
S. Sarawagi, "Information extraction," Found. Trends databases, vol. 1, pp. 261-377, March 2008.
[20]
S. L. Abebe and P. Tonella, "Natural language parsing of program element names for concept extraction," in Proc. IEEE 18th Int Program Comprehension (ICPC) Conf, 2010, pp. 156-159.
[21]
S. Butler, M. Wermelinger, Y. Yu, and H. Sharp, "Improving the tokenisation of identifier names," in Proc. 25th European Conf. on Object-Oriented Programming, ser. LNCS, vol. 6813. Springer, 2011, pp. 130-154.
[22]
A. Bachmann and A. Bernstein, "Software process data quality and characteristics: a historical view on open and closed source projects," in Proceedings of the joint international and annual ERCIM workshops on Principles of software evolution (IWPSE) and software evolution (Evol) workshops, ser. IWPSE-Evol '09. New York, NY, USA: ACM, 2009, pp. 119-128.
[23]
D. W. McDonald and M. S. Ackerman, "Expertise recommender: a flexible recommendation system and architecture," in Proceedings of the 2000 ACM conference on Computer supported cooperative work, ser. CSCW '00. New York, NY, USA: ACM, 2000, pp. 231-240.
[24]
J. Anvik and G. C. Murphy, "Determining implementation expertise from bug reports," in Proceedings of the Fourth International Workshop on Mining Software Repositories, ser. MSR '07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 2-.
[25]
D. Schuler and T. Zimmermann, "Mining usage expertise from version archives," in Proceedings of the 2008 international working conference on Mining software repositories, ser. MSR '08. New York, NY, USA: ACM, 2008, pp. 121-124.
[26]
R. Shokripour, M. Khansari, and Z. M. Kasirun, "Automatic bug assignment using history of packages," in ICSIE 2011: Proceedings of the 2011 International Conference on Software and Information Engineering. Kuala Lumpur, Malaysia: ASME, June 2011, accepted.
[27]
H. Kagdi, M. Gethers, D. Poshyvanyk, and M. Hammad, "Assigning change requests to software developers," Journal of Software Maintenance and Evolution: Research and Practice, 2011.
[28]
A. Mockus and J. D. Herbsleb, "Expertise browser: a quantitative approach to identifying expertise," in Proceedings of the 24th International Conference on Software Engineering, ser. ICSE '02. New York, NY, USA: ACM, 2002, pp. 503-512.
[29]
H. Kagdi and D. Poshyvanyk, "Who can help me with this change request?" in Program Comprehension, 2009. ICPC '09. IEEE 17th International Conference on, may 2009, pp. 273-277.
[30]
M. Linares-Vasquez, K. Hossen, H. Dang, H. Kagdi, M. Gethers, and D. Poshyvanyk, "Triaging incoming change requests: Bug or commit history, or code authorship?" in Software Maintenance (ICSM), 2012 28th IEEE International Conference on, sept. 2012, pp. 451-460.

Cited By

View all
  • (2021)Fast Outage Analysis of Large-scale Production Clouds with Service Correlation MiningProceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00085(885-896)Online publication date: 22-May-2021
  • (2019)DeepTriageProceedings of the ACM India Joint International Conference on Data Science and Management of Data10.1145/3297001.3297023(171-179)Online publication date: 3-Jan-2019
  • (2019)An empirical investigation of incident triage for online service systemsProceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice10.1109/ICSE-SEIP.2019.00020(111-120)Online publication date: 27-May-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
MSR '13: Proceedings of the 10th Working Conference on Mining Software Repositories
May 2013
438 pages
ISBN:9781467329361

Publisher

IEEE Press

Publication History

Published: 18 May 2013

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)45
  • Downloads (Last 6 weeks)11
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Fast Outage Analysis of Large-scale Production Clouds with Service Correlation MiningProceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00085(885-896)Online publication date: 22-May-2021
  • (2019)DeepTriageProceedings of the ACM India Joint International Conference on Data Science and Management of Data10.1145/3297001.3297023(171-179)Online publication date: 3-Jan-2019
  • (2019)An empirical investigation of incident triage for online service systemsProceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice10.1109/ICSE-SEIP.2019.00020(111-120)Online publication date: 27-May-2019
  • (2018)Be careful of when: an empirical study on time-related misuse of issue tracking dataProceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3236024.3236054(307-318)Online publication date: 26-Oct-2018
  • (2018)A Scalable Solution for Rule-Based Part-of-Speech Tagging on Novel Hardware AcceleratorsProceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining10.1145/3219819.3219889(665-674)Online publication date: 19-Jul-2018
  • (2018)Recognizing software bug-specific named entity in software bug repositoryProceedings of the 26th Conference on Program Comprehension10.1145/3196321.3196335(108-119)Online publication date: 28-May-2018
  • (2018)Overcoming language dichotomiesProceedings of the 26th Conference on Program Comprehension10.1145/3196321.3196322(7-18)Online publication date: 28-May-2018
  • (2018)Effectiveness of exploring historical commits for developer recommendationFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6023-312:3(528-544)Online publication date: 1-Jun-2018
  • (2018)EnTagRec ++Empirical Software Engineering10.1007/s10664-017-9533-123:2(800-832)Online publication date: 1-Apr-2018
  • (2017)Improving Automated Bug Triaging with Specialized Topic ModelIEEE Transactions on Software Engineering10.1109/TSE.2016.257645443:3(272-297)Online publication date: 1-Mar-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media