Mining Textual Data for Software Engineering Tasks
|
|
|
- Rodger Chase
- 9 years ago
- Views:
Transcription
1 Mining Textual Data for Software Engineering Tasks Latifa Guerrouj Benjamin C. M. Fung McGill University McGill University 3661 Peel St., Canada H3A 1X Peel St., Canada H3A 1X1 Mobile: (+1) Phone: (+1) Fax: (+1) Web: Web: David Lo Singapore Management University 80 Stamford Road Singapore Web: Foutse Khomh École Polytechnique de Montréal 2500, chemin de la Polytechnique, Montral (Qubec) H3T 1J4 Phone: (+1) Fax: (+1) Web: Abdelwahab Hamou-Lhadj Concordia University 515 St. Catherine, West Montréal, H3G 2W1 Canada Phone: (+1) ext Web: abdelw/index.html Abstract Software development artifacts produced during the development process are of different types. Some are structured such as the source code and execution traces while others are unstructured like source code comments, identifiers, bug reports, usage logs, etc. Such data embeds a significant knowledge about software projects that can help software developers make technical and business decisions. While the focus has been extensively on source code in the past, researchers have recently investigated the textual information (e.g., identifiers and comments) contained in software artifacts or informal documentation (e.g., StackOverflow, s threads, change logs, bug reports, etc.) about the software systems. Automatic techniques and tools have been developed to generate and or mine unstructured data to gain insight about the software development process or assist development teams in tasks like software traceability, feature/concept location, source code vocabulary normalization, bug localization, and summarization. The tutorial will start with an introduction of textual information in source code and or documentation. Next, we will present automatic techniques and tools to generate and mine unstructured data and discuss related challenges. We will also present examples of major software engineering tasks making use of unstructured data mining along with scenarios of their application and the most recent contributions relevant to each task. Specifically, we will focus on automatic source code vocabulary normalization, summarization, crash reports analysis for fault localisation. Finally, we will discuss with the audience the success and failures in achieving the full potential of such tasks in a software development context as well as possible improvements and research directions. The tutorial will provide novice with a common framework about major software engineering tasks leveraging textual information while for experts, the tutorial can be an interesting opportunity to discuss challenges, document the state of the art and practice, encourage cross-fertilization across various research areas ranging from mining software repositories to natural language processing and text retrieval, and to establish foreseeable collaborations between researchers. I. MOTIVATION Software development projects knowledge is grounded in rich data. For example, source code, check-ins, bug reports, work items and test executions are recorded in software repositories such as version control systems (Git, Subversion, Mercurial, CVS) and issue-tracking systems (Bugzilla, JIRA, Trac), and the information about user experiences of interacting with software is typically stored in log files or informal documentation such as StackOverflow. While there has been extensive research on static analysis of source code, recent studies have exploited textual information used in source code of software systems or trapped in informal documentation (e.g., s threads, StackOverflow posts, etc.). The purpose is to develop automatic software engineering techniques, gain insights and understand software projects, and support the decision-making process. Major software engineering tasks have leveraged textual information. For example in the context of software traceability, researchers have made use of textual information to trace code to documents (e.g., requirements) [1], [2], they also suggested lightweight techniques of linking code to documentation such as threads [3] and StackOverflow [4], as well as tracing code examples to documentation [5]. Textual information have been also exploited in feature/concept location [6], [7], [8], source code vocabulary normalization [9], [10] and summarization of complex artifacts involving release notes [11], StackOverflow [12], and bug reports [13]. Such approaches have been developed with the aim of guiding developers and practitioners towards a better understanding of their software projects and the way they evolve.
2 While solutions provided for these engineering tasks demonstrated promising results, there are many challenges left concerned with mining textual information, using it in the development of the above-mentioned tasks, as well as integrating and adopting such solutions into software development processes. The goals of this tutorial are to discuss the use of textual information, its related challenges and open-question, tools and techniques of mining such data as well as ways of integrating and exploiting them by major software engineering tasks to fully reap their benefits. We invite both novice and experts to this tutorial that will be an opportunity to share tools, techniques, and experiences in the field. We also plan, after the presentation of the tutorial, to have a discussion and dissemination of the presented research by opening up a discussion and involving participants in sharing their opinions. We invite researchers and practitioners interested in improving, integrating, and adopting the use and mining of textual information in their software engineering tools and thus software development and maintenance activities. The tutorial encourages both academic researchers and industrial practitioners for an exchange of ideas and collaboration. II. TOPICS The tutorial will focus on the presentation of recent techniques and tools used to generate and mine textual information as well as software engineering tasks making use of such rich data. The tutorial will explain, present, and discuss the following: 1) Textual information in source code and informal documentation; 2) Benefits of using textual information in software engineering tasks; 3) Recent tools and techniques used to generate and mine textual information; 4) Challenges related to mining textual information; 5) Major software engineering tasks using textual information; 6) Explain source code vocabulary normalization and how it makes use of textual information along with recent automatic approaches; 7) Present summarization software artifacts with recent automatic approaches in this area; 8) Explore bug localization, how it makes use of textual information, and how the instructors could improve it by leveraging text in crash reports; 9) Identification of open research challenges and possible solutions. III. PRESENTERS EXPERIENCE IN THE AREA AND TOPICS OF THEIR PRESENTATIONS Latifa Guerrouj preformed her past studies on contextaware source code vocabulary normalization. Vocabulary normalization aligns the vocabulary found in the source code with that found in other software artifacts (e.g., test cases, requirements, specifications, design, etc). Latifa developed automatic context-aware source code vocabulary approaches by mining textual information in source code [14], [15], [16], [17], [18]. She also investigated the use of normalization in the context of feature location using textual information and dynamic analysis [19]. Recently, she suggested a new approach summarizing Android API classes and methods discussed in StackOverflow using n-grams language models and applying machine learning techniques [12]. Latifa is the coorganizer of the International Workshop on Software Analytics (SWAN 15). In this tutorial, she will make the focus on how text found in source code or information documentation can be mined and exploited in the context of engineering tasks namely source code vocabulary and summarization of software artefacts. David Lo research work focuses on software engineering and data mining. He investigates how techniques from these two research areas could benefit and complement each other. In the software engineering area, his research includes software specification mining/protocol inference, mining software repositories, program analysis, software testing and automated debugging. Technique-wise, he investigates a composition of techniques including static analysis, dynamic analysis, data mining, information retrieval, and natural language processing. In the data mining area, his works on frequent pattern mining, discriminative pattern mining, and social network mining. David contributed to the analysis of software text with the aim of aiding software developers in performing their various tasks. Examples of his works relevant to this tutorial involve enhanced techniques making use of text version for bug localization [20], a large scale investigation of issue trackers from GitHub [21], accurate information retrieval-based bug localization based on bug reports [22], interactive fault localization leveraging simple user feedback [23], automatic duplicate bug report detection with a combination of information retrieval and topic modeling [24]. David is the co-organizer of the first International Workshop on Machine Learning and Information Retrieval for Software Evolution (MALIR-SE) collocated with ASE In this tutorial, David will make the focus on techniques of mining text and its use for bug localization. Foutse Khomh leads the SoftWare Analytics and Technologies (SWAT) Lab that applies analytic techniques to empower development teams with insightful and actionable information about their activities. SWAT team also build tools to assess and improve the quality of software systems. Early models and tools proposed by SWAT members are already being used in the industry. Among Foutse s research works related to this workshop, we state the ones on challenges and issues of mining crash reports [25], tracking back the history of commits in low-tech reviewing environments [26], supplementary bug fixes vs. re-opened bugs [27], improving bug localization using correlations in crash reports [28], classifying field crash reports for fixing bugs: A case study of Mozilla Firefox [29], and a text-based approach to classify change requests [30]. Foutse co-founded the International Workshop on Release
3 Engineering (RELENG) in 2013 and has been co-organizing it since then. In this tutorial, Foutse will show his recent work on using crash reports for the improvement of bug localization and identifying highly impactful bugs. IV. GOALS AND EXPECTED RESULTS This tutorial targets both novice and experts working in the field of software maintenance and evolution, interested in the analysis of software text, its mining, and its practical use in the context of software engineering tasks. For experts, it will provide an informal interactive forum to exchange ideas and experiences, streamline research making use of textual information, identify some common ground of their work, and share lessons and challenges, thereby articulating a vision for the future of software engineering. The intended outcomes of this tutorial are: 1) Make clear (for novice) what is textual information and techniques of its mining; 2) Explore the different contemporary software engineering techniques making use of textual data; 3) Stimulate discussions, interest, and understanding in integrating textual info in software engineering tasks and software development process; 4) Bridging the gap between the theory and practice by bringing together researchers and practitioners interested in analysing software text for software engineering tasks; 5) Discuss challenges, experiences, lessons, and explore the different possible strategies to overcome the challenges faced and towards promising solutions to essential problems; 6) Build a common framework of major automatic approaches making use of textual information; 7) Advance the state of the art and practice in software engineering; V. OUTLINE 1) Introduction about software text and tools to generate and mine such data by David Lo. 2) Exploration of major software engineering tasks making use of textual data by Foutse Khomh. 3) Presentation of source code vocabulary normalization along with examples of recent published automatic source code vocabulary normalization approaches by Latifa Guerrouj. 4) Presentation of summarization of software artifacts along with examples of recent published automatic summarization approach by Latifa Guerrouj. 5) Presentation of bug localization with examples of most recent automatic approaches in this area by David Lo. 6) Exploration of recent ways to improve bug localization using crash reports and to identify impactful bugs by Foutse Khomh. 7) Summary and recap of the tutorial by David Lo, Latifa Guerrouj, and Foutse Khomh. VI. TARGET AUDIENCE This tutorial is intended for both novice and experts, academics and industrial practitioners. It will provide participants with an understanding of software text, techniques to mine it from source code or documentation, and ways of adopting and integrating it in major engineering tasks. Additionally, novice will be able to understand engineering tasks such as vocabulary normalization, bug localization, and summarization and how they exploit textual data to fully reap their benefits. The tutorial will show scenarios of the presented approaches and how they can help to guide developers during their tasks as well as to improve software maintenance and evolution. We will also discuss the limitations and challenges of the most recent related techniques and how these issues can be addressed and mitigated. Participants are encouraged to talk about their recent works related to the tutorial (if any) and share their experiences and major faced challenges. Experts will be there to guide and provide them with feedback. VII. FORMAT We propose to have 2-hours tutorial consisting of a 1 hour dedicated to an 1) introduction of textual data by the presenters, 2) major software engineering tasks leveraging such data, 3) concrete examples of recent automatic approaches on source code vocabulary normalization and summarization, and 4) related discussions by participants. The other 1 hour will be devoted to the 5) bug localization, 6) its enhancement using crash reports as well as ways of identifying impactful bugs, 7) discussion by participants, and 8) summary and recap. We encourage discussions so as to develop an in-depth understanding of the presented topics for novice. Experts are invited to enrich the discussions by providing opinions and moderating a discussion on the state-of-the-art and stateof-the-practice of software engineering tasks making use of textual data. VIII. ACKNOWLEDGEMENT Special thanks to Giuliano Antoniol and Massimiliano Di Penta for all their valuable feedback on this tutorial.
4 IX. C ONTRIBUTORS BIOGRAPHY Latifa Guerrouj is a Postdoctoral Research Fellow at McGill University, Canada. She received her Ph.D. from the Department of Computing and Software Engineering (DGIGL) of E cole Polytechnique de Montre al, Canada. Her research work/interests involves empirical software engineering, software analytics, data mining, and big data software engineering. Latifa is serving as an organizing and program committee member for several international conferences and workshops including ICSME 16, ICSME 15, SANER 15, SWAN 15, ICSM 14, SCAM 14, MSR 14/13, WCRE 13/12, ICST 12, and MUD 12/13. She is a member of ACM and IEEE. Benjamin C. M. Fung is an Associate Professor of Information Studies (SIS) at McGill University and a Research Scientist in the National Cyber-Forensics and Training Alliance Canada (NCFTA Canada). He received a Ph.D. degree in computing science from Simon Fraser University in Dr. Fung has over 80 refereed publications that span the prestigious research forums of data mining, privacy protection, cyber forensics, services computing, and building engineering. His data mining works in crime investigation and authorship analysis have been reported by media worldwide. His research has been supported in part by the Discovery Grants and Strategic Project Grants from the Natural Sciences and Engineering Research Council of Canada (NSERC), Insight Development Grants from the Social Sciences and Humanities Research Council (SSHRC), Defence Research and Development Canada (DRDC), and Fonds de recherche du Qubec - Nature et technologies (FRQNT), and NCFTA Canada. Dr. Fung is a licensed professional engineer in software engineering, and is currently affiliated with the Data Mining and Security Lab at SIS. David Lo is an Assistant Professor in the School of Information Systems at Singapore Management University. He received his PhD from School of Computing, National University of Singapore in Before that, he was studying at School of Computer Engineering, Nanyang Technological University and graduated with a B.Eng (Hons I) in David works in the intersection of software engineering and data mining. His research interests include dynamic program analysis, specification mining, and pattern mining. Lo received a PhD in computer science from the National University of Singapore. He is a member of the IEEE and the ACM. Foutse khomh is an Assistant Professor at the E cole Polytechnique de Montre al, where he heads the SWAT Lab on software analytics and cloud engineering research ( Prior to this position he was a Research Fellow at Queen s University (Canada), working with the Software Reengineering Research Group and the NSERC/RIM Industrial Research Chair in Software Engineering of Ultra Large Scale Systems. He received his Ph.D in Software Engineering from the University of Montreal in 2010, under the supervision of Yann-Gae l Gue he neuc. His main research interest is in the field of empirical software engineering, with an emphasis on developing techniques and tools to improve software quality. Over the years, he has applied many text mining techniques to solve multiple software engineering problems. He co-founded the International Workshop on Release Engineering ( and was one of the editors of the first special issue on Release Engineering in the IEEE Software magazine. Abdelwahab Hamou-Lhadj is a tenured Associate Professor in ECE, Concordia University. His research interests include software modeling, software behavior analysis, software maintenance and evolution, anomaly detection systems. He holds a Ph.D. degree in Computer Science from the University of Ottawa (2005). He is a Licensed Professional Engineer in Quebec, and a long- lasting member of IEEE and ACM.
5 REFERENCES [1] N. Ali, Y.-G. Guéhéneuc, and G. Antoniol, Trustrace: Mining software repositories to improve the accuracy of requirement traceability links, IEEE Transactions on Software Engineering, vol. 39, no. 5, pp , [2] G. Antoniol, G. Canfora, G. Casazza, A. De Lucia, and E. Merlo, Recovering traceability links between code and documentation, IEEE Transactions on Software Engineering, vol. 28, no. 10, pp , [3] A. Bacchelli, M. Lanza, and R. Robbes, Linking s and source code artifacts, in Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010, pp [4] P. C. Rigby and M. P. Robillard, Discovering essential code elements in informal documentation, in Proceedings of the 2013 International Conference on Software Engineering, ser. ICSE 13, 2013, pp [5] S. Subramanian, L. Inozemtseva, and R. Holmes, Live api documentation, in Proceedings of the 36th International Conference on Software Engineering, ser. ICSE 2014, 2014, pp [6] D. Liu, A. Marcus, D. Poshyvanyk, and V. Rajlich, Feature location via information retrieval based filtering of a single scenario execution trace. in ASE 07, 2007, pp [7] D. Poshyvanyk, Y.-G. Guéhéneuc, A. Marcus, G. Antoniol, and V. Rajlich, Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval, IEEE Transactions on Software Engineering, vol. 33, no. 6, pp , [8] T. Eisenbarth, R. Koschke, and D. Simon, Locating features in source code, IEEE Transactions on Software Engieering, pp , March [9] L. Guerrouj, D. P. Massimiliano, G. Yann-Gaël, and G. Antoniol, Tidier: an identifier splitting approach using speech recognition techniques, Journal of Software: Evolution and Process, pp , [10] E. Enslen, E. Hill, L. L. Pollock, and K. Vijay-Shanker, Mining source code to automatically split identifiers for software analysis, in Proceedings of of the 6th International Working Conference on Mining Software Repositories, 2009, pp [11] L. Moreno, G. Bavota, M. D. Penta, R. Oliveto, and A. Marcus, How can i use this method, in Proceedings of the 37th International Conference on Software Engineering, ser. ICSE 2015, [12] L. Guerrouj, D. Bourque, and P. Rigby, Leveraging informal documentation to summarize classes and methods in context, in Proceedings of the 37th International Conference on Software Engineering, ser. ICSE 2015, [13] S. Rastkar, G. C. Murphy, and G. Murray, Summarizing software artifacts: a case study of bug reports. ACM, 2010, pp [14] L. Guerrouj, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, An experimental investigation on the effects of context on source code identifiers splitting and expansion, Empirical Software Engineering, vol. 19, no. 6, pp , [15] L. Guerrouj, M. D. Penta, G. Antoniol, and Y. G. Guéhéneuc, Tidier: An identifier splitting approach using speech recognition techniques, Journal of Software Maintenance - Research and Practice, p. 31, [16] L. Guerrouj, Normalizing source code vocabulary to support program comprehension and software quality, in Proceedings of the 2013 International Conference on Software Engineering, 2013, pp [17] L. Guerrouj, P. Galinier, Y.-G. Guéhéneuc, G. Antoniol, and M. D. Penta, Tris: a fast and accurate identifiers splitting and expansion algorithm, in Proc. of the International Working Conference on Reverse Engineering (WCRE 12), 2012, pp [18] N. Madani, L. Guerrouj, M. Di Penta, Y.-G. Guéhéneuc, and G. Antoniol, Recognizing words from source code identifiers using speech recognition techniques, in Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR 2010), March , Madrid, Spain. IEEE CS Press, [19] B. Dit, L. Guerrouj, D. Poshyvanyk, and G. Antoniol, Can better identifier splitting techniques help feature location? in Proc. of the International Conference on Program Comprehension (ICPC), Kingston, 2011, pp [20] S. Wang and D. Lo, Version history, similar report, and structure: Putting them together for improved bug localization, in Proceedings of the 22Nd International Conference on Program Comprehension. ACM, 2014, pp [21] T. F. Bissyand, D. Lo, L. Jiang, L. Rveillre, J. Klein, and Y. L. Traon, Got issues? who cares about it? a large scale investigation of issue trackers from github. IEEE, 2013, pp [22] J. Zhou, H. Zhang, and D. Lo, Where should the bugs be fixed? - more accurate information retrieval-based bug localization based on bug reports, in Proceedings of the 34th International Conference on Software Engineering, 2012, pp [23] L. Gong, D. Lo, L. Jiang, and H. Zhang, Interactive fault localization leveraging simple user feedback. IEEE Computer Society, 2012, pp [24] A. T. Nguyen, T. T. Nguyen, T. N. Nguyen, D. Lo, and C. Sun, Duplicate bug report detection with a combination of information retrieval and topic modeling, in Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012, pp [25] L. An and F. Khomh, Challenges and issues of mining crash reports, in 1st IEEE International Workshop on Software Analytics, SWAN 2015, Montreal, QC, Canada, March 2, 2015, 2015, pp [26] Y. Jiang, B. Adams, F. Khomh, and D. M. German, Tracing back the history of commits in low-tech reviewing environments, in Proceedings of the 8th International Symposium on Empirical Software Engineering and Measurement (ESEM), Torino, Italy, September [27] L. An, F. Khomh, and B. Adams, Supplementary Bug Fixes vs. Reopened Bugs. IEEE Computer Society, 2014, pp [28] S. Wang, F. Khomh, and Y. Zou, in MSR, pp [29] T. Dhaliwal, F. Khomh, and Y. Zou, Classifying field crash reports for fixing bugs: A case study of mozilla firefox. in ICSM. IEEE, 2011, pp [30] G. Antoniol, K. Ayari, M. Di Penta, F. Khomh, and Y.-G. Guéhéneuc, Is it a bug or an enhancement?: A text-based approach to classify change requests, in Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds, 2008, pp. 23:304 23:318.
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe
A Visualization Approach for Bug Reports in Software Systems
, pp. 37-46 http://dx.doi.org/10.14257/ijseia.2014.8.10.04 A Visualization Approach for Bug Reports in Software Systems Maen Hammad 1, Somia Abufakher 2 and Mustafa Hammad 3 1, 2 Department of Software
A Case Study of Calculation of Source Code Module Importance
A Case Study of Calculation of Source Code Module Importance Takaaki Goto 1, Setsuo Yamada 2, Tetsuro Nishino 1, and Kensei Tsuchida 3 1 Graduate School of Informatics and Engineering, The University of
A Manual Categorization of Android App Development Issues on Stack Overflow
2014 IEEE International Conference on Software Maintenance and Evolution A Manual Categorization of Android App Development Issues on Stack Overflow Stefanie Beyer Software Engineering Research Group University
Software Intelligence: The Future of Mining Software Engineering Data
Software Intelligence: The Future of Mining Software Engineering Data ABSTRACT Ahmed E. Hassan School of Computing Queen s University Kingston, ON, Canada [email protected] Mining software engineering
Classification Algorithms for Detecting Duplicate Bug Reports in Large Open Source Repositories
Classification Algorithms for Detecting Duplicate Bug Reports in Large Open Source Repositories Sarah Ritchey (Computer Science and Mathematics) [email protected] - student Bonita Sharif (Computer
What Questions Developers Ask During Software Evolution? An Academic Perspective
What Questions Developers Ask During Software Evolution? An Academic Perspective Renato Novais 1, Creidiane Brito 1, Manoel Mendonça 2 1 Federal Institute of Bahia, Salvador BA Brazil 2 Fraunhofer Project
Leveraging Traceability between Code and Tasks for Code Review and Release Management
Leveraging Traceability between Code and Tasks for Code Review and Release Management Nitesh Narayan, Jan Finis, Yang Li Institute of Computer Science Technical University of Munich Boltzmannstrasse 3,
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching Amir H. Moin and Günter Neumann Language Technology (LT) Lab. German Research Center for Artificial Intelligence (DFKI)
A Governance Framework for Building Secure IT Systems *
A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching Amir H. Moin and Günter Neumann Language Technology (LT) Lab. German Research Center for Artificial Intelligence (DFKI)
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
An Empirical Study of the Effects of Expert Knowledge on Bug Reports
An Empirical Study of the Effects of Expert Knowledge on Bug Reports Da Huo, Tao Ding, Collin McMillan, and Malcom Gethers Department of Computer Science and Engineering University of Notre Dame, Notre
Industrial Application of Clone Change Management System
Industrial Application of Clone Change Management System Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano Graduate School of Information Science and Technology, Osaka University,
A Change Impact Analysis Tool for Software Development Phase
, pp. 245-256 http://dx.doi.org/10.14257/ijseia.2015.9.9.21 A Change Impact Analysis Tool for Software Development Phase Sufyan Basri, Nazri Kama, Roslina Ibrahim and Saiful Adli Ismail Advanced Informatics
Change Impact Analysis for the Software Development Phase: State-of-the-art
Change Impact Analysis for the Software Development Phase: State-of-the-art Nazri Kama Advanced Informatics School, Universiti Teknologi Malaysia, Malaysia [email protected] Abstract Impact analysis
The Use of Merging Algorithm to Real Ranking for Graph Search
The Use of Merging Algorithm to Real Ranking for Graph Search A. Mohammad Reza Nami, B. Mehdi Ebadian Faculty of Electrical, Computer, and IT Engineering, Islamic Azad University- Qazvin Branch, Qazvin,
SERVICE TO PROFESSIONAL COMMUNITY. - Registration Chair of the 2017 IEEE Conference on Decision and Control (IEEE CDC 2017)
SERVICE TO PROFESSIONAL COMMUNITY - Registration Chair of the 2017 IEEE Conference on Decision and Control (IEEE CDC 2017) - Member of IEEE Strategic Planning Committee (2015 Present) - Member of IEEE
What s Hot in Software Engineering Twitter Space?
What s Hot in Software Engineering Twitter Space? Abhishek Sharma, Yuan Tian, and David Lo School of Information Systems Singapore Management University {abhisheksh.2014,yuan.tian.2012,davidlo}@smu.edu.sg
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Curriculum Vitae. Zhenchang Xing
Curriculum Vitae Zhenchang Xing Computing Science Department University of Alberta, Edmonton, Alberta T6G 2E8 Phone: (780) 433 0808 E-mail: [email protected] http://www.cs.ualberta.ca/~xing EDUCATION
Application of Data Mining Techniques for Improving Software Engineering
Application of Data Mining Techniques for Improving Software Engineering Wahidah Husain 1, Pey Ven Low 2, Lee Koon Ng 3, Zhen Li Ong 4, School of Computer Sciences, Universiti Sains Malaysia 11800 USM,
Context Capture in Software Development
Context Capture in Software Development Bruno Antunes, Francisco Correia and Paulo Gomes Knowledge and Intelligent Systems Laboratory Cognitive and Media Systems Group Centre for Informatics and Systems
Semantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds
Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds M. Ali Babar Lancaster University, UK & IT University of Copenhagen Talk @ MESOCA, Eindhoven, the Netherlands September,
LYNNETTE D. PURDA, PhD CFA Associate Professor and RBC Fellow of Finance
LYNNETTE D. PURDA, PhD CFA Associate Professor and RBC Fellow of Finance EDUCATION Ph.D. in Finance, Rotman School of Management, University of Toronto 2003 Chartered Financial Analyst Designation 2000
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
Got Issues? Who Cares About It?
Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub Tegawendé F. Bissyandé 1, David Lo 2, Lingxiao Jiang 2, Laurent Réveillère 3, Jacques Klein 1 and Yves Le Traon
Automated Analysis of the Results of Performance Regression Tests
Automated Analysis of the Results of Performance Regression Tests Zhen Ming (Jack) Jiang Assistant Professor, Department of Electrical Engineering and Computer Science, Lassonde School of Engineering,
Tracing Requirements and Source Code during Software Development
Tracing Requirements and Source Code during Software Development Alexander Delater, Barbara Paech Institute of Computer Science University of Heidelberg Im Neuenheimer Feld 326, 69120 Heidelberg, Germany
A Crowd Method for Internet-based Software with Big Data
2014 中 南 大 学 英 特 尔 透 明 计 算 与 大 数 据 研 讨 会 A Crowd Method for Internet-based Software with Big Data Gang Yin Software Collaboration and Data Mining Group National University of Defense Technology Changsha,
Factors Impacting Rapid Releases: An Industrial Case Study
Factors Impacting Rapid Releases: An Industrial Case Study Noureddine Kerzazi Dept. Research & Development, Payza.com Montreal, Canada [email protected] Foutse Khomh SWAT, École Polytechnique de Montréal
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities Monika Gupta [email protected] PhD Advisor: Dr. Ashish Sureka Industry
Testing Lifecycle: Don t be a fool, use a proper tool.
Testing Lifecycle: Don t be a fool, use a proper tool. Zdenek Grössl and Lucie Riedlova Abstract. Show historical evolution of testing and evolution of testers. Description how Testing evolved from random
Efficient Collection and Analysis of Program Data - Hackystat
You can t even ask them to push a button: Toward ubiquitous, developer-centric, empirical software engineering Philip Johnson Department of Information and Computer Sciences University of Hawaii Honolulu,
Research of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
Do Onboarding Programs Work?
Do Onboarding Programs Work? Adriaan Labuschagne and Reid Holmes School of Computer Science University of Waterloo Waterloo, ON, Canada alabusch,[email protected] Abstract Open source software systems
Automating the Measurement of Open Source Projects
Automating the Measurement of Open Source Projects Daniel German Department of Computer Science University of Victoria [email protected] Audris Mockus Avaya Labs Department of Software Technology Research
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Open Source Bug Tracking Characteristics In Two Open Source Projects, Apache and Mozilla
Open Source Bug Tracking Characteristics In Two Open Source Projects, Apache and Mozilla Mikko Koivusaari, Jouko Kokko, Lasse Annola Abstract 1. Introduction 2. Bug tracking in open source projects 2.1
Barely Sufficient Software Engineering: 10 Practices to Improve Your Research CSE Software
Barely Sufficient Software Engineering: 10 Practices to Improve Your Research CSE Software Special Thanks: LDRD NNSA ASC SAND#: 2009-0579 C Michael A. Heroux James M. Willenbring Sandia National Laboratories
A Framework of Model-Driven Web Application Testing
A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China
The CS Principles Project 1
The CS Principles Project 1 Owen Astrachan, Duke University Amy Briggs, Middlebury College Abstract The Computer Science Principles project is part of a national effort to reach a wide and diverse audience
CONNECTING DATA WITH BUSINESS
CONNECTING DATA WITH BUSINESS Big Data and Data Science consulting Business Value through Data Knowledge Synergic Partners is a specialized Big Data, Data Science and Data Engineering consultancy firm
Mining Source Code Descriptions from Developer Communications
Mining Source Code Descriptions from Developer Communications Sebastiano Panichella, Jairo Aponte, Massimiliano Di Penta, Andrian Marcus, Gerardo Canfora Dept. of Engineering-RCOST, University of Sannio,
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
Service-oriented architectures (SOAs) support
C o v e r f e a t u r e On Testing and Evaluating Service-Oriented Software WT Tsai, Xinyu Zhou, and Yinong Chen, Arizona State University Xiaoying Bai, Tsinghua University, China As service-oriented architecture
Formal Methods for Preserving Privacy for Big Data Extraction Software
Formal Methods for Preserving Privacy for Big Data Extraction Software M. Brian Blake and Iman Saleh Abstract University of Miami, Coral Gables, FL Given the inexpensive nature and increasing availability
A Method for Open Source License Compliance of Java Applications
FOCUS: Software Engineering for Compliance A Method for Open Source Compliance of Java Applications Daniel M. German, University of Victoria Massimiliano Di Penta, University of Sannio // Kenen is a semiautomatic
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing Domenico Amalfitano Anna Rita Fasolino Porfirio Tramontana Dipartimento di Informatica e Sistemistica University of Naples Federico II, Italy
Comparing Agile Software Processes Based on the Software Development Project Requirements
CIMCA 2008, IAWTIC 2008, and ISE 2008 Comparing Agile Software Processes Based on the Software Development Project Requirements Malik Qasaimeh, Hossein Mehrfard, Abdelwahab Hamou-Lhadj Department of Electrical
Modeling the Relation Between Driving Behavior and Fuel Consumption
WHITE PAPER Modeling the Relation Between Driving Behavior and Fuel Consumption Many companies are investing in coaching services for professional drivers with the goal of teaching them how to reduce fuel
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
A Framework of User-Driven Data Analytics in the Cloud for Course Management
A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer
An Empirical Study on Requirements Traceability Using Eye-Tracking
An Empirical Study on Requirements Traceability Using Eye-Tracking Nasir Ali 1,2, Zohreh Sharafi 1,2, Yann-Gaël Guéhéneuc 1, and Giuliano Antoniol 2 1 Ptidej Team, 2 SOCCER Lab, DGIGL, École Polytechnique
Current Research Topic In Software Engineering
Current Research Topic In Software Engineering A PROJECT REPORT Submitted by MD. Mithun Ahamed Id: 13-96937-2 Under the guidance of DR. Dip Nandi in partial fulfillment for the award of the degre of Master
HP ALM11 & MS VS/TFS2010
Comparison Test Management Tools HP ALM11 & MS VS/TFS2010 22 mei 2012 voordracht georganiseerd door Discussiegroep Software Testing met de steun van Ingenieurshuis, Antwerpen 24/05/2012 HP ALM 11 Microsoft
Analysis of Software Project Reports for Defect Prediction Using KNN
, July 2-4, 2014, London, U.K. Analysis of Software Project Reports for Defect Prediction Using KNN Rajni Jindal, Ruchika Malhotra and Abha Jain Abstract Defect severity assessment is highly essential
Integrating Service Oriented MSR Framework and Google Chart Tools for Visualizing Software Evolution
2012 Fourth International Workshop on Empirical Software Engineering in Practice Integrating Service Oriented MSR Framework and Google Chart Tools for Visualizing Software Evolution Yasutaka Sakamoto,
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management Everton Gomede, Rafael Thiago da Silva and Rodolfo Miranda de Barros Department of Computer Science State
MATTEO RIONDATO Curriculum vitae
MATTEO RIONDATO Curriculum vitae 100 Avenue of the Americas, 16 th Fl. New York, NY 10013, USA +1 646 292 6641 [email protected] http://matteo.rionda.to EDUCATION Ph.D. Computer Science, Brown University,
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
An Introduction to Recommendation Systems in Software Engineering
Chapter 1 An Introduction to Recommendation Systems in Software Engineering Martin P. Robillard and Robert J. Walker Abstract. Software engineering is a knowledge-intensive activity that presents many
Understanding the popularity of reporters and assignees in the Github
Understanding the popularity of reporters and assignees in the Github Joicy Xavier, Autran Macedo, Marcelo de A. Maia Computer Science Department Federal University of Uberlândia Uberlândia, Minas Gerais,
Industrial Adoption of Automatically Extracted GUI Models for Testing
Industrial Adoption of Automatically Extracted GUI Models for Testing Pekka Aho 1,2 [email protected], Matias Suarez 3 [email protected], Teemu Kanstrén 1,4 [email protected], and Atif M. Memon
