Comparing Methods to Identify Defect Reports in a Change Management Database

Size: px
Start display at page:

Download "Comparing Methods to Identify Defect Reports in a Change Management Database"

Transcription

1 Comparing Methods to Identify Defect Reports in a Change Management Database Elaine J. Weyuker, Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ (weyuker,ostrand)@research.att.com ABSTRACT A key problem when doing automated fault analysis and fault prediction from information in a software change management database is how to determine which change reports represent software faults. In some change management systems, there is no simple way to distinguish fault reports from changes made to add new functionality or perform routine maintenance. This paper describes a comparison of two methods for classifying change reports for a large software system, and concludes that, for that particular system, the stage of development when the report was initialized is a more accurate indicator of its fault status than the presence of certain keywords in the report s natural language description. 1. INTRODUCTION A very important problem for testing large software systems is to make testing as automatic and repeatable as possible, and to make sure that the substantial costs associated with testing are well spent. It is also important to be able to automate these activities to a large extent. Automation helps make the testing phase cost-effective, and helps mitigate the variation between different testers skill levels. Automation also enables the development of substantial test suites to validate large software systems that are often required to run continuously and are mission-critical for an organization. For these reasons, we have been developing algorithms that automatically predict which files of a large software system are likely to contain the largest numbers of faults in the next release of a software system, and implementing a tool to make those predictions. This tool requires no data mining or analysis to be performed by the user, and requires no particular expertise of the user. By helping to localize where faults are most likely to occur, its output will help testers prioritize their efforts, and more effectively allocate the time that is available for testing. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. DEFECTS 08, July 20, 2008, Seattle, Washington, USA. Copyright 2008 ACM /08/07...$5.00. The study described in this paper is about determining when we have encountered a fault. It is not about predictive models, per se, rather it considers two different ways of automatically deciding whether or not a change has been made in response to an identified fault. For clarification purposes, we include some terminology. If the software is run on an input, and the output is determined to be incorrect, we say that a failure has occurred. A fault is the problem in the software that caused the failure to occur. Faults are also known as defects. The removal of a fault is called debugging. The prediction algorithms used by our tool have been developed by analyzing historical fault and change information as well as characteristics of the source code for several large software systems, listed in Table 1. The algorithms rely on a set of factors that include the file s size, the programming language used, and the number of faults and changes made to the file in earlier releases. This information is extracted from the database of the commercially available change management/version control tool that records all changes made to the system under development. Changes are described in modification requests (MR), which include information about the changed software, including dates of MR creation and of the software changes, id numbers of the developers and testers, stages of the development process when the MR was created, and natural language text that describe the reason for requesting a change and sometimes an additional description of the actual change. The size and programming language of a given file are obtainable directly from the code itself. MRs are written to change software for a variety of reasons that are not fault-related, such as adding new functionality to the system, performing maintenance updates, enhancing performance, applying requirements changes, among other reasons. Surprisingly, the change management tool used by all the systems we have analyzed does not provide a simple way to differentiate the fault-related MRs from those submitted for other reasons. In order to validate the effectiveness of our prediction models, we have done a series of empirical studies on the systems in Table 1. With one exception, the subject systems have had thousands of MRs written, too many to permit careful reading of each one to determine whether or not it represents a fault. In these studies, we have tried a number of different ways of determining whether an MR is fault-related, to serve as proxies for complete knowledge of the actual fault reports. This paper compares the latest method we have used, which is based on the development 27

2 System No. of Releases Years KLOC % Faults In 20% Files MR fault criterion Inventory % 1 or 2 changed files Provisioning % manual reading Voice Response % created by tester Maintenance Support % development stage Table 1: Information for Empirical Studies stage during which the change was made, to a method based on analysis of the natural language text of the MRs. In our first empirical study [2], we used an algorithm proposed by project personnel of the inventory system that was the subject of that study. They suggested that if just one or two files were changed as the result of an MR, then the MR likely represented a fault, while if many files were changed, then it was more likely to be a change to some interface or a wholesale introduction of many files implementing some new functionality. This simple rule of thumb performed surprisingly well. In a small informal experiment, we randomly selected about 50 MRs and read their natural language descriptions manually to determine whether or not they represented faults. Almost all of the 50 were correctly characterized using the 1 or 2 files approach. Although this approximation seemed satisfactory for the inventory system, it seemed too rigid for general use, and we continued looking for a better method. The second system we studied, a service provisioning system, contained relatively few modification requests, although it was made up of over 400 thousand lines of code. Because of the relatively small number of MRs, we were able to manually read every one, and classify each as being either a fault MR or not. The other systems we have encountered all contained far too many changes for manual categorization to be feasible, and in any case, manual reading cannot be made part of an automated tool. For the third system we studied, a voice response system, we used two different methods to determine which MRs represented faults. After we began our study, we were able to convince the administrators of the change management system to add a specific bug identification field to the standard MR template. In this field, users could classify each newly created MR as one of bug, no-bug, or don t know. The field was available during approximately the last third of the system s lifespan, and provided accurate MR classification for that period. Unfortunately, this field was not provided for any of the systems we have since analyzed. For historic MRs that had already been created for the voice response system when we began our study, we identified fault MRs by using a heuristic proposed by the project s system testers. In retrospect, it is difficult to understand why we did not think of their suggestion originally. The testers pointed out that any change proposed by a tester is by definition a fault, since their sole job function is to test the software in order to identify faults. Testing personnel do not propose new functionality. Of course, sometimes a tester may incorrectly believe that an output is wrong and submit an MR that does not in fact describe a failure situation. In such a case, once it is determined that the MR does not really represent a fault, no changes will be made to the software for that MR. In all our studies, we have counted one fault for each file changed in an MR that meets the fault identification criterion being used. Regardless of the criterion that identifies fault MRs, there must always be changed files recorded for an MR to contribute to the count of faults for the system. Thus, if a tester creates an MR for which no files are ever changed, it will have no effect on the fault counts. Faults might be observed in any of the following testing stages: integration test, system test, load test, operations readiness test, end to end test, and user acceptance testing. Each testing stage is uniquely identified appropriately in the MR database. Again, testers responsible for these phases do nothing but test software. They cannot initiate new functionality and so any MRs created during these development stages are considered to be faults if they lead to some software file being changed. Each MR includes a listing of every file changed. It is also possible that a fault might escape detection during all testing phases and cause a failure that is first noticed by a customer. This is relatively rare for the systems we have studied, with the vast majority of faults being identified during some pre-release testing phase. However, for faults that do escape to the field, they are identified in our MR database with an indication that the MR was initiated by a customer, or more often by a support person contacted by a customer. We used a fourth software system, a maintenance support system, as the subject of the empirical study described in this paper. For this system there was a new category that had not been used by earlier subject systems. This is the post-release category mentioned above in which the MR is designated in the MR database as having been found by support personnel. We therefore defined a fault to be any change to a software file made as the result of an MR initiated during integration testing, system testing, load testing, operations readiness testing, end to end testing, or user acceptance testing, or by a support person once the software is in the field. Table 1 shows system information and prediction results for the four systems mentioned above, and characterizes the method used to identify fault-related MRs. Column 5 shows the percentage of the faults actually contained in the 20% of the files that the model predicted would contain the largest numbers of faults. For each of the systems, the models correctly identified the files containing the vast majority of the faults. An explanation of the slightly less accurate results for the voice response system is presented in [1]. In the next section we describe an empirical study that compares the resulting MRs identified when two different types of definitions are used to identify which modification requests represent faults. The purpose of this study is not a competition. Instead the goal is to determine what is the most effective way of identifying faults and then to use that algorithm to improve our prediction results. Since our ultimate goal is to find a way of assisting practitioners in their development of large software systems with high reliability 28

3 Development Stage Def Only Keyword Def Only Both Total MRs Release A Release B Release C Release D Table 2: Faults According to Different Definitions requirements, this is an important issue. 2. AN EMPIRICAL STUDY In the current study, we compare the results of using two different definitions to identify fault MRs. The first is the one that we used when we studied the maintenance support system while doing fault prediction. This was based on the development stage at which the modification request was first initiated. This definition has also been the basis for determining how effective our prediction algorithms are. The second definition we consider is based on scanning the English description in the MR for the keywords bug, defect, patch and fix. By scanning for these strings, we would identify any variant of the word, such as bug or bugs, fix, fixes and fixed. Each keyword must be either at the beginning of the string or preceded by at least one whitespace character. This prevents the identification of words that coincidentally include one of the keywords as a substring, such as dispatch, suffix, or ladybug. On the other hand, there might be other MRs including words that would be identified but probably should not be. One example would be an MR including the word fixate. However, in our study, we have not noticed any incidents of undesired words being selected. This keyword method is very similar to the one used by Zimmermann et al. [4] to analyze change reports for the open-source Eclipse system. Their goal was to make fault predictions for the Eclipse code, and they were also faced with deciding which changes in the repository represented faults. The study in this paper was done using the fourth system listed in Table 1, a maintenance support system that was described in detail in [3]. This largescale system has been in the field for over nine years, and provided us with data for 35 consecutive releases. The most recent release contains well over a half million lines of code. During those 35 releases, 8568 MRs were written, some of which represented faults, many more of which did not represent faults, but rather enhancements or modifications made for some other reason. For the current study we selected four of the 35 releases to consider in detail, using a program to separate MRs into four categories. The first three of these categories were considered faults by at least one of the definitions: those identified as faults because of their development stage only, those identified because of the presence of at least one keyword but not an appropriate development stage, and those identified for both reasons. The remaining MRs did not have either characteristic, and were therefore not considered faults. For each MR in those four subject releases that was identified by one of the definitions, but not by the other, we manually read its description to see whether we could determine whether or not it represented a fault. Our goal was to determine which type of definition was most effective both at correctly identifying faults, and also not identifying nonfaults as faults. Since the ultimate goal is to have the most accurate fault-identification algorithm possible, we also plan to determine whether combining the two definitions will improve the accuracy of identifying the set of fault MRs. 3. FINDINGS We identify the four releases studied as Releases A, B, C, and D. Table 2 summarizes our observations. Column 2 shows the number of MRs classified as faults because of their development stage, but not containing one of the designated keywords. Column 3 shows the number of MRs classified as faults by keyword, but not by development stage. Column 4 shows the number of MRs classified as faults using both definitions, and Column 5 shows the total number of MRs for that release. Using either or both of the fault definitions, it is clear that the majority of all MRs written for this project were classified as being non-fault MRs and are believed to have been written to make other types of modifications. For this reason, it is essential that we have a definition that can correctly identify the relatively small number of fault MRs. The table indicates that the use of the development stage always identifies more modification requests as faults than the use of the keywords definition, for each of the four releases studied. Out of all MRs identified as being a fault MR by at least one of the definitions, the percentage that was identified by the development stage only ranged from 43.9% to 67.5%, while those identified only by keyword ranged from 1.7% to 26.2%. For the four releases studied, only about one third of the MRs identified as faults by either definition are identified by both definitions. To determine which fault definition yielded the most accurate results, we manually read the natural language descriptions of each MR that met one or the other, but not both, of the two fault criteria. Based on our understanding of the descriptions, we then classified each MR as either a fault or a non-fault. The results are shown in Table 3, which splits the MRs identified by only one of the two definitions into those correctly identified as faults, and those incorrectly identified. The table s first row shows that for Release A, 25 of 29 or 87% of the MRs that were classified as faults by the development stage definition, but not the keyword definition, were actually faults, and hence correctly classified. In contrast, only 7 of 16 or 43% of the MRs that were classified as faults using the keyword definition, but not by the development stage definition, were correctly classified. For Release B, 96% of the MRs that were classified as faults by the development stage definition, but not the keyword definition, were correctly classified, while none of the MRs classified as faults using the keyword definition, but not by the development stage definition, were correctly classified. For Releases C and D, none of the very few keyword-only MRs represented faults. In contrast, for Releases C and D respectively, 95% and 100% of the MRs identified by the de- 29

4 Classified as Faults by Development Stage Only Classified as Faults by Keyword Only Fault Non-Fault Percent Correct Faults Fault Non-Fault Percent Correct Faults Release A % % Release B % % Release C % 0 2 0% Release D % 0 1 0% Table 3: Correct and Incorrect Fault Classifications Type 1 misclassification rate Type 2 misclassification rate Development Stage Keyword Development Stage Keyword Release A 8.3% 25.7% 3.2% 10.6% Release B 2.5% 46.7% 0.0% 12.3% Release C 3.5% 5.3% 0.0% 15.6% Release D 0.0% 4.8% 0.0% 14.6% Table 4: Misclassification Rates velopment stage definition, but not the keyword definition, were correctly classified as faults. Extrapolating from our study of the four releases in Table 2 to the 35 releases in the system s complete history, we would expect that somewhere between 20% and 25% of the total 8568 MRs, or roughly 2,000 MRs, would be identified as faults by at least one of the definitions. Because of the large numbers of MRs involved, we did not attempt to read every one of these 2000 to determine whether or not it was correctly categorized by one or both of the definitions, but limited ourselves to the four releases as representative. We now want to make an assessment of the numbers of misclassifications observed during a release for each of the two definitions. It is important to recognize that there may be some actual faults that are not identified by either the development stage definition or the keyword definition, but they are not considered in this study because we are unaware of them. In addition, there may be faults in the software that have not been identified at all and therefore do not correspond to any modification request in the change database. We assume throughout our entire discussion that MRs that are not identified by either fault definition do not represent faults and similarly that MRs identified by both definitions really do represent faults. What we have observed so far is that for the four releases studied for this subject system, the development stage definition identified significantly more MRs as faults, and they were much more likely to be correctly identified as faults. For the four releases, while an average of 95% of the MRs identified as faults by the development stage definition alone turned out to actually be faults, less than 15% of the MRs identified by the keyword definition alone actually were faults. This considers only MRs identified by one definition but not the other. Type 1 or false positive misclassifications consist of those instances in which an MR that is not a fault MR is incorrectly classified as being a fault MR. Type 2 or false negative misclassifications consist of those instances in which an MR that really is a fault MR is classified as not being a fault MR. The numbers of Type 1 misclassifications for each definition are in the columns labelled Non-Fault in Table 3. These are Column 3 for the development stage definition, and Column 5 for the keyword definition. Type 2 misclassifications for a given definition appear in the Fault column of the other definition, since these represent MRs determined to be faults by manual reading, but not identified as such by the given definition. A fault criterion can be considered effective if Type 1 and Type 2 misclassifications are low, but both numbers have to be considered. For example, if a criterion identified no MRs as faults, then there would be no Type 1 misclassifications, regardless of the number of actual faults. If there were in fact many faults, then the Type 2 number would be high. Similarly, if a criterion identified every MR as a fault, then it would yield no false negatives, but the number of false positives would be high. Because the four releases in this study have different total counts of MRs, and different fault counts, we use rates of Type 1 and Type 2 misclassifications to compare them uniformly. We calculate the Type 1 misclassification rate for a definition by dividing the number of Type 1 misclassifications by the total number of items classified as a fault by the definition. The denominator is thus the number of MRs classified as faults by the definition alone, plus the number classified as faults by both definitions. For example, 79 MRs in Release C were classified as faults by the development stage definition (and not by the keyword definition), and 36 were classified as faults by both definitions. Four of the development-only MRs were misclassified because they really were not faults, for a Type 1 misclassification rate of 3.5% = Calculated in this way, for the development stage definition, the Type 1 misclassification rates were 8.3%, 2.5%, 3.5% and 0% for Releases A, B, C and D respectively. In contrast, the Type 1 misclassification rates for the keyword definition were 25.7%, 46.7%, 5.3%, and 4.8%, for Releases A, B, C and D respectively. The Type 2 misclassification rates for the development stage definition are very low. For Release A, 7 faults were correctly identified by the keyword definition, but were missed by the development stage definition, giving a Type 2 rate of 3.2% for development stage for this release. For Releases B, C, and D, there were no false negatives, and hence the Type 2 rate is 0% for those three releases. In contrast, the keyword definition produced a total of 179 false negatives over the four releases, giving Type 2 rates of 10.6%, 12.3%, 15.6%, and 14.6%. 30

5 Table 4 shows the Type 1 and Type 2 misclassification rates for the two definitions, for each of the four releases. There are very different consequences of each sort of misclassification. Too many false positive classifications will lead to an inaccurate assessment that some files historically contained more faults than they really did. Since the fault count of a file in previous releases is a factor in predicting its future fault-proneness, this can result in an overly pessimistic (and incorrect) prediction that the file will contain future faults, leading testers to pay unwarranted extra attention to that part of the code. In contrast, when Type 2 misclassifications occur, actual faults are not correctly identified, and so a file or other software artifact that is likely to contain faults, might not get the scrutiny it deserves. The discussion above indicates that the keyword definition has relatively large numbers of both Type 1 and Type 2 misclassifications, while the development stage definition has relatively few of each. This indicates to us that at least for this subject system, using keywords to identify which MRs represent faults does not yield acceptable results, while the use of development stage yields far more accurate results. Initially we had thought that we might be able to improve our fault identification algorithm by including MRs that were identified by either the development stage or keyword definitions. The high number of Type I misclassifications observed convinced us that that would yield poorer results than we have seen using the development stage alone. 4. EXAMPLES We were surprised that so many MRs were incorrectly identified as faults or non-faults using the keyword definition and were interested in seeing why that was the case. In this section we consider some examples of phrases in modification requests that included one of the keywords, but when the MR description was read, we determined that the MR was not a fault MR. In several cases, the MR was written to initialize all new files into the release. In that case there was often a phrase used that spoke of doing the patch build or some similar wording. Another case that occurred multiple times was a phrase indicating that something was fixed elsewhere or that nothing needed to be fixed. One interesting example used the word defective in the description, but it was not referring to code, but rather to data. This was an MR written to change the contents of a database, and was not written in response to an observed failure. A different MR used the word fix when changing or reinitializing some data. Another set of MRs used the word fix in the description when referring to the manual or documentation. Again, this did not represent a fault but rather a change in the requirements. One final example of a non-fault MR that used the word patch spoke about writing a patch to change timeout variables during testing. This would allow testers to do certain types of performance, stress or load tests and the patch was to be reversed once testing was complete. This example was especially interesting because, although the MR referred to testing, it was not initiated by testers but rather during a rarely-used category called controlled intro. In addition to the above examples, one could easily imagine encountering phrases such as this is not a bug or this is not a defect or nothing needs to be patched, although we did not encounter them in any of the four releases we studied. As indicated above, we did encounter related phrases that said something to the effect that nothing needed to be fixed. 5. CONCLUSIONS Based on this single case study, it appears that using the development stage fault classification algorithm correctly identifies a far larger percentage of actual faults than the keyword definition approach. Augmenting the development stage approach with the keyword method does identify a small number of faults missed when using the development stage by itself, but it also incorrectly identifies far more MRs. We expect to repeat this experiment on other systems and study the fault MRs not identified by the current set of keywords for possible additional keywords that can be used to augment the keyword set. Because open-source systems like the Eclipse system studied in [4] do not follow a set of standard development stages, and do not have professional developer/testers with specific roles, the development stage method is probably not applicable to them. However, it has been highly effective for our subject system. 6. REFERENCES [1] R.M. Bell, T.J. Ostrand, and E.J. Weyuker. Looking for Bugs in All the Right Places. Proc. ACM/International Symposium on Software Testing and Analysis (ISSTA2006), Portland, Maine, July 2006, pp [2] T.J. Ostrand, E.J. Weyuker, and R.M. Bell. Predicting the Location and Number of Faults in Large Software Systems. IEEE Trans. on Software Engineering, Vol 31, No 4, April [3] T.J. Ostrand, E.J. Weyuker, and R.M. Bell. Automating Algorithms for the Identification of Fault-Prone Files. Proc. ACM/International Symposium on Software Testing and Analysis (ISSTA07), London, England, July [4] T. Zimmermann, R. Premraj and A. Zeller. Predicting Defects for Eclipse. Proc. Third International Workshop on Predictor Models in Software Engineering, (Promise07), May

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs

More information

Where the Bugs Are. Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com. Elaine J.

Where the Bugs Are. Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com. Elaine J. Where the Bugs Are Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 weyuker@research.att.com

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

Automated Classification of Change Messages in Open Source Projects

Automated Classification of Change Messages in Open Source Projects Automated Classification of Change Messages in Open Source Projects Ahmed E. Hassan School of Computing Queen s University Kingston, Canada ahmed@cs.queensu.ca ABSTRACT Source control systems permit developers

More information

Prioritizing Software Security Fortification through Code-Level Metrics

Prioritizing Software Security Fortification through Code-Level Metrics Prioritizing Software Security Fortification through Code-Level Metrics Michael Gegick, Laurie Williams, Jason Osborne, Mladen Vouk North Carolina State University Raleigh, NC 27695 {mcgegick, lawilli3,

More information

Code Ownership in Open-Source Software

Code Ownership in Open-Source Software Code Ownership in Open-Source Software Matthieu Foucault University of Bordeaux LaBRI, UMR 5800 F-33400, Talence, France mfoucaul@labri.fr Jean-Rémy Falleri University of Bordeaux LaBRI, UMR 5800 F-33400,

More information

Empirical Software Engineering Research - The Good, The Bad, The Ugly

Empirical Software Engineering Research - The Good, The Bad, The Ugly Empirical Software Engineering Research - The Good, The Bad, The Ugly Elaine J. Weyuker AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 weyuker@research.att.com Abstract The Software Engineering

More information

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information

More information

A Process is Not Just a Flowchart (or a BPMN model)

A Process is Not Just a Flowchart (or a BPMN model) A Process is Not Just a Flowchart (or a BPMN model) The two methods of representing process designs that I see most frequently are process drawings (typically in Microsoft Visio) and BPMN models (and often

More information

Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction

Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction Huanjing Wang Western Kentucky University huanjing.wang@wku.edu Taghi M. Khoshgoftaar

More information

Mining the Software Change Repository of a Legacy Telephony System

Mining the Software Change Repository of a Legacy Telephony System Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,

More information

Test Automation Architectures: Planning for Test Automation

Test Automation Architectures: Planning for Test Automation Test Automation Architectures: Planning for Test Automation Douglas Hoffman Software Quality Methods, LLC. 24646 Heather Heights Place Saratoga, California 95070-9710 Phone 408-741-4830 Fax 408-867-4550

More information

Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals

Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals Omer Duskin Dror G. Feitelson School of Computer Science and Engineering The Hebrew University

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

Reflections and Perspectives on Predictive Modeling in Industry

Reflections and Perspectives on Predictive Modeling in Industry Reflections and Perspectives on Predictive Modeling in Industry Tom Ostrand AT&T Labs - Research Crest Open Workshop Oct 24-25, 2011 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T

More information

Poverty among ethnic groups

Poverty among ethnic groups Poverty among ethnic groups how and why does it differ? Peter Kenway and Guy Palmer, New Policy Institute www.jrf.org.uk Contents Introduction and summary 3 1 Poverty rates by ethnic group 9 1 In low income

More information

Concepts of digital forensics

Concepts of digital forensics Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence

More information

Assessment of RLG Trusted Digital Repository Requirements

Assessment of RLG Trusted Digital Repository Requirements Assessment of RLG Trusted Digital Repository Requirements Reagan W. Moore San Diego Supercomputer Center 9500 Gilman Drive La Jolla, CA 92093-0505 01 858 534 5073 moore@sdsc.edu ABSTRACT The RLG/NARA trusted

More information

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 41 Value of Information In this lecture, we look at the Value

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Multiagent Reputation Management to Achieve Robust Software Using Redundancy

Multiagent Reputation Management to Achieve Robust Software Using Redundancy Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu

More information

Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry

Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry Practical Considerations in Deploying AI: A Case Study within the Turkish Telecommunications Industry!"#$%&'()* 1, Burak Turhan 1 +%!"#$%,$*$- 1, Tim Menzies 2 ayse.tosun@boun.edu.tr, turhanb@boun.edu.tr,

More information

A Prediction Model for System Testing Defects using Regression Analysis

A Prediction Model for System Testing Defects using Regression Analysis A Prediction Model for System Testing Defects using Regression Analysis 1 Muhammad Dhiauddin Mohamed Suffian, 2 Suhaimi Ibrahim 1 Faculty of Computer Science & Information System, Universiti Teknologi

More information

HM REVENUE & CUSTOMS. Child and Working Tax Credits. Error and fraud statistics 2008-09

HM REVENUE & CUSTOMS. Child and Working Tax Credits. Error and fraud statistics 2008-09 HM REVENUE & CUSTOMS Child and Working Tax Credits Error and fraud statistics 2008-09 Crown Copyright 2010 Estimates of error and fraud in Tax Credits 2008-09 Introduction 1. Child Tax Credit (CTC) and

More information

The Mathematics 11 Competency Test Percent Increase or Decrease

The Mathematics 11 Competency Test Percent Increase or Decrease The Mathematics 11 Competency Test Percent Increase or Decrease The language of percent is frequently used to indicate the relative degree to which some quantity changes. So, we often speak of percent

More information

ScreenMatch: Providing Context to Software Translators by Displaying Screenshots

ScreenMatch: Providing Context to Software Translators by Displaying Screenshots ScreenMatch: Providing Context to Software Translators by Displaying Screenshots Geza Kovacs MIT CSAIL 32 Vassar St, Cambridge MA 02139 USA gkovacs@mit.edu Abstract Translators often encounter ambiguous

More information

Ensembles and PMML in KNIME

Ensembles and PMML in KNIME Ensembles and PMML in KNIME Alexander Fillbrunn 1, Iris Adä 1, Thomas R. Gabriel 2 and Michael R. Berthold 1,2 1 Department of Computer and Information Science Universität Konstanz Konstanz, Germany First.Last@Uni-Konstanz.De

More information

A General Approach to Incorporate Data Quality Matrices into Data Mining Algorithms

A General Approach to Incorporate Data Quality Matrices into Data Mining Algorithms A General Approach to Incorporate Data Quality Matrices into Data Mining Algorithms Ian Davidson 1st author's affiliation 1st line of address 2nd line of address Telephone number, incl country code 1st

More information

ANALYSIS OF OPEN SOURCE DEFECT TRACKING TOOLS FOR USE IN DEFECT ESTIMATION

ANALYSIS OF OPEN SOURCE DEFECT TRACKING TOOLS FOR USE IN DEFECT ESTIMATION ANALYSIS OF OPEN SOURCE DEFECT TRACKING TOOLS FOR USE IN DEFECT ESTIMATION Catherine V. Stringfellow, Dileep Potnuri Department of Computer Science Midwestern State University Wichita Falls, TX U.S.A.

More information

Request for Proposals for Software Development Services. Questions and Answers

Request for Proposals for Software Development Services. Questions and Answers Request for Proposals for Software Development Services Questions and Answers Question: What is the open-source license that the NIEM profile will be distributed under and how will the NIEM profile source

More information

DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING

DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING ABSTRACT The objective was to predict whether an offender would commit a traffic offence involving death, using decision tree analysis. Four

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Efficient Bug Triaging Using Text Mining

Efficient Bug Triaging Using Text Mining 2185 Efficient Bug Triaging Using Text Mining Mamdouh Alenezi and Kenneth Magel Department of Computer Science, North Dakota State University Fargo, ND 58108, USA Email: {mamdouh.alenezi, kenneth.magel}@ndsu.edu

More information

Mode and Patient-mix Adjustment of the CAHPS Hospital Survey (HCAHPS)

Mode and Patient-mix Adjustment of the CAHPS Hospital Survey (HCAHPS) Mode and Patient-mix Adjustment of the CAHPS Hospital Survey (HCAHPS) April 30, 2008 Abstract A randomized Mode Experiment of 27,229 discharges from 45 hospitals was used to develop adjustments for the

More information

Understanding and Predicting Effort in Software Projects

Understanding and Predicting Effort in Software Projects Understanding and Predicting Effort in Software Projects A. Mockus, D. Weiss, and P. Zhang audris,weiss,pingzhang @avaya.com Avaya Labs Research Basking Ridge, NJ 07920 http://www.research.avayalabs.com/user/audris

More information

PowerScheduler Load Process User Guide. PowerSchool Student Information System

PowerScheduler Load Process User Guide. PowerSchool Student Information System PowerSchool Student Information System Released November 18, 2008 Document Owner: Documentation Services This edition applies to Release 5.2 of the PowerSchool software and to all subsequent releases and

More information

Processing and data collection of program structures in open source repositories

Processing and data collection of program structures in open source repositories 1 Processing and data collection of program structures in open source repositories JEAN PETRIĆ, TIHANA GALINAC GRBAC AND MARIO DUBRAVAC, University of Rijeka Software structure analysis with help of network

More information

Predicting Defect Densities in Source Code Files with Decision Tree Learners

Predicting Defect Densities in Source Code Files with Decision Tree Learners Predicting Defect Densities in Source Code Files with Decision Tree Learners Patrick Knab, Martin Pinzger, Abraham Bernstein Department of Informatics University of Zurich, Switzerland {knab,pinzger,bernstein}@ifi.unizh.ch

More information

A Case Study in Test Management

A Case Study in Test Management A Case Study in Test Management Tauhida Parveen Scott Tilley George Gonzalez Dept. of Computer Sciences Dept. of Computer Sciences Software Quality Management Florida Institute of Technology Florida Institute

More information

Commission Accounting User Manual

Commission Accounting User Manual Commission Accounting User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship

More information

INVESTIGATING THE DEFECT PATTERNS DURING THE SOFTWARE DEVELOPMENT PROJECTS

INVESTIGATING THE DEFECT PATTERNS DURING THE SOFTWARE DEVELOPMENT PROJECTS INVESTIGATING THE DEFECT PATTERNS DURING THE SOFTWARE DEVELOPMENT PROJECTS A Paper Submitted to the Graduate Faculty of the North Dakota State University of Agriculture and Applied Science By Abhaya Nath

More information

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Zeeshan Ahmed Vienna University of Technology Getreidemarkt 9/307, 1060 Vienna Austria Email: zeeshan.ahmed@tuwien.ac.at

More information

Author Gender Identification of English Novels

Author Gender Identification of English Novels Author Gender Identification of English Novels Joseph Baena and Catherine Chen December 13, 2013 1 Introduction Machine learning algorithms have long been used in studies of authorship, particularly in

More information

How to achieve excellent enterprise risk management Why risk assessments fail

How to achieve excellent enterprise risk management Why risk assessments fail How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.

More information

Overview. Table of Contents. SA Data Warehouse

Overview. Table of Contents. SA Data Warehouse Overview The goal of the Student Administration Data Warehouse (herein referred to as SADW) is to provide an easily accessible and easy to use reporting environment that can satisfy 80% of the daily reporting

More information

A Case Study on Benefits and Side-Effects of Agile Practices in Large-Scale Requirements Engineering

A Case Study on Benefits and Side-Effects of Agile Practices in Large-Scale Requirements Engineering A Case Study on Benefits and Side-Effects of Agile Practices in Large-Scale Requirements Engineering Elizabeth Bjarnason, Krzysztof Wnuk, Björn Regnell Department of Computer Science, Lund University,

More information

First Affirmative Speaker Template 1

First Affirmative Speaker Template 1 First Affirmative Speaker Template 1 upon the gender of the Chairman.) DEFINITION 2A. We define the topic as (Explain what the topic means. Define the key or important words in the topic. Use a dictionary

More information

Managing Agile Projects in TestTrack GUIDE

Managing Agile Projects in TestTrack GUIDE Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...

More information

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression

More information

An Introduction to. Metrics. used during. Software Development

An Introduction to. Metrics. used during. Software Development An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote

More information

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization

Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization Regression Testing Based on Comparing Fault Detection by multi criteria before prioritization and after prioritization KanwalpreetKaur #, Satwinder Singh * #Research Scholar, Dept of Computer Science and

More information

A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic

A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic Report prepared for Brandon Slama Department of Health Management and Informatics University of Missouri, Columbia

More information

An Automated Test for Telepathy in Connection with Emails

An Automated Test for Telepathy in Connection with Emails Journal of Scientifi c Exploration, Vol. 23, No. 1, pp. 29 36, 2009 0892-3310/09 RESEARCH An Automated Test for Telepathy in Connection with Emails RUPERT SHELDRAKE AND LEONIDAS AVRAAMIDES Perrott-Warrick

More information

Universiteit Leiden. Opleiding Informatica

Universiteit Leiden. Opleiding Informatica Internal Report 2012-08 August 2012 Universiteit Leiden Opleiding Informatica Maintaining a software system with the use of Domain-Specific languages Tyron Offerman BACHELOR THESIS Leiden Institute of

More information

Chapter 6 Competitive Markets

Chapter 6 Competitive Markets Chapter 6 Competitive Markets After reading Chapter 6, COMPETITIVE MARKETS, you should be able to: List and explain the characteristics of Perfect Competition and Monopolistic Competition Explain why a

More information

Number Patterns, Cautionary Tales and Finite Differences

Number Patterns, Cautionary Tales and Finite Differences Learning and Teaching Mathematics, No. Page Number Patterns, Cautionary Tales and Finite Differences Duncan Samson St Andrew s College Number Patterns I recently included the following question in a scholarship

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

TEACHING COST ACCOUNTING: ALTERNATIVE METHODS FOR CALCULATING EQUIVALENT UNITS

TEACHING COST ACCOUNTING: ALTERNATIVE METHODS FOR CALCULATING EQUIVALENT UNITS TEACHING COST ACCOUNTING: ALTERNATIVE METHODS FOR CALCULATING EQUIVALENT UNITS William B. Pollard, Appalachian State University, Boone, NC 28608, pollardwb@appstate.edu INTRODUCTION A graduate level managerial/cost

More information

Automating the Measurement of Open Source Projects

Automating the Measurement of Open Source Projects Automating the Measurement of Open Source Projects Daniel German Department of Computer Science University of Victoria dmgerman@uvic.ca Audris Mockus Avaya Labs Department of Software Technology Research

More information

ISTQB Certified Tester. Foundation Level. Sample Exam 1

ISTQB Certified Tester. Foundation Level. Sample Exam 1 ISTQB Certified Tester Foundation Level Version 2015 American Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. #1 When test cases are designed

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Open Source Software Maintenance Process Framework

Open Source Software Maintenance Process Framework Open Source Software Maintenance Process Framework Timo Koponen Department of Computer Science University of Kuopio Box 163, 70211 Kuopio, Finland +358-17-162388 timo.koponen@uku.fi Virpi Hotti Department

More information

Orthogonal Defect Classification in Agile Development

Orthogonal Defect Classification in Agile Development Orthogonal Defect Classification in Agile Development Monika Jagia, IBM Software Group India, monika.jagia@in.ibm.com Seema Meena, IBM Software Group India, seemeena@in.ibm.com 2008 IBM Corporation Copyright

More information

OVERVIEW AND TERMINOLOGY

OVERVIEW AND TERMINOLOGY ACH Online Services OVERVIEW AND TERMINOLOGY There are ACH terms and definitions that are helpful to understand in order to use the ACH Online Service. In addition, there are basic tasks (accessing ACH

More information

Brown Hills College of Engineering & Technology Machine Design - 1. UNIT 1 D e s i g n P h i l o s o p h y

Brown Hills College of Engineering & Technology Machine Design - 1. UNIT 1 D e s i g n P h i l o s o p h y UNIT 1 D e s i g n P h i l o s o p h y Problem Identification- Problem Statement, Specifications, Constraints, Feasibility Study-Technical Feasibility, Economic & Financial Feasibility, Social & Environmental

More information

HP Quality Center. Upgrade Preparation Guide

HP Quality Center. Upgrade Preparation Guide HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 This document has several purposes: To explain what website maintenance is and why it's critical

More information

Less is more: Temporal fault predictive performance over multiple Hadoop releases

Less is more: Temporal fault predictive performance over multiple Hadoop releases Less is more: Temporal fault predictive performance over multiple Hadoop releases M. Harman 1, S. Islam 1, Y. Jia 1, L. Minku 2, F. Sarro 1 and K. Srivisut 3 1 CREST, UCL, UK 2 University of Birmingham,

More information

Community-Assisted Software Engineering Decision Making. Technical Report

Community-Assisted Software Engineering Decision Making. Technical Report Community-Assisted Software Engineering Decision Making Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 Keller Hall 200 Union Street SE Minneapolis, MN 55455-0159

More information

An automatic predictive datamining tool. Data Preparation Propensity to Buy v1.05

An automatic predictive datamining tool. Data Preparation Propensity to Buy v1.05 An automatic predictive datamining tool Data Preparation Propensity to Buy v1.05 Januray 2011 Page 2 of 11 Data preparation - Introduction If you are using The Intelligent Mining Machine (TIMi) inside

More information

Building A Smart Academic Advising System Using Association Rule Mining

Building A Smart Academic Advising System Using Association Rule Mining Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 raedamin@just.edu.jo Qutaibah Althebyan +962796536277 qaalthebyan@just.edu.jo Baraq Ghalib & Mohammed

More information

GMAT SYLLABI. Types of Assignments - 1 -

GMAT SYLLABI. Types of Assignments - 1 - GMAT SYLLABI The syllabi on the following pages list the math and verbal assignments for each class. Your homework assignments depend on your current math and verbal scores. Be sure to read How to Use

More information

Automated Medical Citation Records Creation for Web-Based On-Line Journals

Automated Medical Citation Records Creation for Web-Based On-Line Journals Automated Medical Citation Records Creation for Web-Based On-Line Journals Daniel X. Le, Loc Q. Tran, Joseph Chow Jongwoo Kim, Susan E. Hauser, Chan W. Moon, George R. Thoma National Library of Medicine,

More information

Stepwise Regression. Chapter 311. Introduction. Variable Selection Procedures. Forward (Step-Up) Selection

Stepwise Regression. Chapter 311. Introduction. Variable Selection Procedures. Forward (Step-Up) Selection Chapter 311 Introduction Often, theory and experience give only general direction as to which of a pool of candidate variables (including transformed variables) should be included in the regression model.

More information

Lund, November 16, 2015. Tihana Galinac Grbac University of Rijeka

Lund, November 16, 2015. Tihana Galinac Grbac University of Rijeka Lund, November 16, 2015. Tihana Galinac Grbac University of Rijeka Motivation New development trends (IoT, service compositions) Quality of Service/Experience Demands Software (Development) Technologies

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs Continued Involvement in Software Development: Motivational Factors Conference Item How to cite:

More information

Errors in Operational Spreadsheets: A Review of the State of the Art

Errors in Operational Spreadsheets: A Review of the State of the Art Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College sgp@dartmouth.edu Kenneth R. Baker Tuck School of Business Dartmouth College

More information

Data Mining Project Report. Document Clustering. Meryem Uzun-Per

Data Mining Project Report. Document Clustering. Meryem Uzun-Per Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...

More information

How To Map Behavior Goals From Facebook On The Behavior Grid

How To Map Behavior Goals From Facebook On The Behavior Grid The Behavior Grid: 35 Ways Behavior Can Change BJ Fogg Persuasive Technology Lab Stanford University captology.stanford.edu www.bjfogg.com bjfogg@stanford.edu ABSTRACT This paper presents a new way of

More information

Investment Appraisal INTRODUCTION

Investment Appraisal INTRODUCTION 8 Investment Appraisal INTRODUCTION After reading the chapter, you should: understand what is meant by the time value of money; be able to carry out a discounted cash flow analysis to assess the viability

More information

Session 6 Number Theory

Session 6 Number Theory Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple

More information

20 CODE CHALLENGES. GCSE (9 1) Computer Science GCSE REFORM. February 2015

20 CODE CHALLENGES. GCSE (9 1) Computer Science GCSE REFORM. February 2015 February 2015 GCSE (9 1) Computer Science GCSE REFORM We will inform centres about any changes to the specification. We will also publish changes on our website. The latest version of our specification

More information

AI-Based Software Defect Predictors: Applications and Benefits in a Case Study

AI-Based Software Defect Predictors: Applications and Benefits in a Case Study Proceedings of the Twenty-Second Innovative Applications of Artificial Intelligence Conference (IAAI-10) AI-Based Software Defect Predictors: Applications and Benefits in a Case Study Ayse Tosun 1, Ayse

More information

Calculation of Risk Factor Using the Excel spreadsheet Calculation of Risk Factor.xls

Calculation of Risk Factor Using the Excel spreadsheet Calculation of Risk Factor.xls Calculation of Risk Factor Using the Excel spreadsheet Calculation of Risk Factor.xls Events, Impact and Software Validation Table of Contents Many software products in complex computer systems like LIS

More information

Predicting sports events from past results

Predicting sports events from past results Predicting sports events from past results Towards effective betting on football Douwe Buursma University of Twente P.O. Box 217, 7500AE Enschede The Netherlands d.l.buursma@student.utwente.nl ABSTRACT

More information

This paper was presented at CUMREC 98, The College and University Computer Users Association Conference. It is the intellectual property of the

This paper was presented at CUMREC 98, The College and University Computer Users Association Conference. It is the intellectual property of the This paper was presented at CUMREC 98, The College and University Computer Users Association Conference. It is the intellectual property of the author(s). Permission to print out or disseminate all or

More information

NFRs: Fact or Fiction

NFRs: Fact or Fiction Worcester Polytechnic Institute DigitalCommons@WPI Computer Science Faculty Publications Department of Computer Science 1-1-2002 NFRs: Fact or Fiction Janet Burge Worcester Polytechnic Institute, jburge@cs.wpi.edu

More information

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:

More information

CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf

CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf First Name: Last Name: NetID: The purpose of this lab is to help you to better understand functions:

More information

Technical versus non-technical skills in test automation

Technical versus non-technical skills in test automation Technical versus non-technical skills in test automation Dorothy Graham Software Testing Consultant info@dorothygraham.co.uk SUMMARY In this paper, I discuss the role of the testers and test automators

More information

Random Forest Based Imbalanced Data Cleaning and Classification

Random Forest Based Imbalanced Data Cleaning and Classification Random Forest Based Imbalanced Data Cleaning and Classification Jie Gu Software School of Tsinghua University, China Abstract. The given task of PAKDD 2007 data mining competition is a typical problem

More information

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,

More information

Reliability of a Commercial Telecommunications System

Reliability of a Commercial Telecommunications System Reliability of a Commercial Telecommunications System Mohamed Kaâniche and Karama Kanoun LAAS-CNRS 7, Avenue du Colonel Roche 77 Toulouse, France Abstract We analyze data collected on a commercial telecommunications

More information

Using the PRECEDE- PROCEED Planning Model PRECEDE-PROCEED P R E C E D E. Model for health promotion programming Best known among health scientists

Using the PRECEDE- PROCEED Planning Model PRECEDE-PROCEED P R E C E D E. Model for health promotion programming Best known among health scientists Using the PRECEDE- PROCEED Planning Model Dr. McKinley Thomas Associate Professor Department of Community Medicine Mercer University PRECEDE-PROCEED Model for health promotion programming Best known among

More information

Context-aware Library Management System using Augmented Reality

Context-aware Library Management System using Augmented Reality International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library

More information

FABRICATION DRAWINGS A Paradigm Shift

FABRICATION DRAWINGS A Paradigm Shift INNOVATIVE DIMENSIONS Presented by Fitzpatrick Engineering Group March 2013 2012 Finalist Innovation in Structural Engineering DRAWINGS A Paradigm Shift 19520 Catawba Avenue, Ste 311 Cornelius, NC 28031-3711

More information

Agile Based Software Development Model : Benefits & Challenges

Agile Based Software Development Model : Benefits & Challenges Agile Based Software Development Model : Benefits & Challenges Tajinder Kumar Assistant Professor, IT Department JMIT Radaur, Haryana Vipul Gupta Assistant Professor, IT Department JMIT Radaur, Haryana

More information

Testing Research and Statistical Hypotheses

Testing Research and Statistical Hypotheses Testing Research and Statistical Hypotheses Introduction In the last lab we analyzed metric artifact attributes such as thickness or width/thickness ratio. Those were continuous variables, which as you

More information

Performance Based Evaluation of New Software Testing Using Artificial Neural Network

Performance Based Evaluation of New Software Testing Using Artificial Neural Network Performance Based Evaluation of New Software Testing Using Artificial Neural Network Jogi John 1, Mangesh Wanjari 2 1 Priyadarshini College of Engineering, Nagpur, Maharashtra, India 2 Shri Ramdeobaba

More information