[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Roman et al., 2023 - Google Patents

Predictive Power of Two Data Flow Metrics in Software Defect Prediction.

Roman et al., 2023

View PDF
Document ID
17640570530931494744
Author
Roman A
Brozek R
Hryszko J
Publication year
Publication venue
ENASE

External Links

Snippet

Data flow coverage criteria are widely used in software testing, but there is almost no research on low-level data flow metrics as software defect predictors. Aims: We examine two such metrics in this context: depdegree (DD) proposed by Beyer and Fararooy and a new …
Continue reading at www.scitepress.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • G06F17/30303Improving data quality; Data cleansing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • G06F8/43Checking; Contextual analysis
    • G06F8/436Semantic checking
    • G06F8/437Type checking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • G06F8/44Encoding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Majd et al. SLDeep: Statement-level software defect prediction using deep-learning model on static code features
Guggulothu et al. Code smell detection using multi-label classification approach
Dutta et al. Detecting flaky tests in probabilistic and machine learning applications
Le et al. Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning
Zagane et al. Deep learning for software vulnerabilities detection using code metrics
Le Goues et al. A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each
Briand et al. Developing interpretable models with optimized set reduction for identifying high-risk software components
Yaraghi et al. Scalable and accurate test case prioritization in continuous integration contexts
Kharkar et al. Learning to reduce false positives in analytic bug detectors
Ni et al. Analyzing bug fix for automatic bug cause classification
Li et al. Discovery of potential parallelism in sequential programs
Guo et al. Paris: Predicting application resilience using machine learning
Carlin et al. A cost analysis of machine learning using dynamic runtime opcodes for malware detection
Musco et al. A large-scale study of call graph-based impact prediction using mutation testing
Naeem et al. Scalable mutation testing using predictive analysis of deep learning model
Kaur et al. A systematic literature review on the use of machine learning in code clone research
Phung et al. Error-type—A novel set of software metrics for software fault prediction
Luo et al. Inferring software behavioral models with MapReduce
Liu et al. Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks
Polaczek et al. Exploring the software repositories of embedded systems: An industrial experience
Roman et al. Predictive Power of Two Data Flow Metrics in Software Defect Prediction.
Chu et al. Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Naeem et al. Identifying vulnerable IoT applications using deep learning
Yerramreddy et al. An empirical assessment of machine learning approaches for triaging reports of static analysis tools
Aghamohammadi et al. An ensemble‐based predictive mutation testing approach that considers impact of unreached mutants