Skip to main content
Top

2018 | OriginalPaper | Chapter

Defect Report Classification in Accordance with Areas of Testing

Author : Anna Gromova

Published in: Tools and Methods of Program Analysis

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There can be thousands of software defects found during testing and submitted into a bug-tracking system. This paper intends to reveal the importance of distinguishing different areas of testing in order to be able to perform further meaningful manipulations with defects, compute various metrics, classify or cluster bugs. An area of testing is made up of a group of software components. The Component/s field in a bug tracking system usually contains information as to what area the defect belongs to. However, sometimes the field can be empty or does not include all the necessary elements. Moreover, every defect belongs to one or several areas, that is why the classes can overlap within the classification. Therefore it becomes necessary to use the Summary field, which has brief information about the defect. Both fields have text format and require natural language processing. This paper introduces some techniques to classify defect reports according to areas of testing, using the data of two text fields and natural language processing methods and tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Antoniol, G., Ayari, K., Di Penta, M., Khomh, F., Guneuc, Y.-G.: Is it a bug or an enhancement?: a text-based approach to classify change requests. In: Proceedings 2008 Conference Center for Advance Studies Collaborative Research: Meeting Minds, CASCON 2008, Article No. 23, pp. 304–318. ACM, New York (2008) Antoniol, G., Ayari, K., Di Penta, M., Khomh, F., Guneuc, Y.-G.: Is it a bug or an enhancement?: a text-based approach to classify change requests. In: Proceedings 2008 Conference Center for Advance Studies Collaborative Research: Meeting Minds, CASCON 2008, Article No. 23, pp. 304–318. ACM, New York (2008)
2.
go back to reference Bhattacharya, P., Neamtiu, I.: Bug-fix time prediction models: can we do better? In: Proceedings of 8th Working Conference Mining Software Repositories, MSR 2011, pp. 207–210. ACM, New York (2011) Bhattacharya, P., Neamtiu, I.: Bug-fix time prediction models: can we do better? In: Proceedings of 8th Working Conference Mining Software Repositories, MSR 2011, pp. 207–210. ACM, New York (2011)
4.
go back to reference Coves, T.F., Hruschka, E.R.: Towards improving cluster-based feature selection with a simplified silhouette filter. Inf. Sci. 181(18), 3766–3782 (2011)CrossRef Coves, T.F., Hruschka, E.R.: Towards improving cluster-based feature selection with a simplified silhouette filter. Inf. Sci. 181(18), 3766–3782 (2011)CrossRef
5.
go back to reference \(\breve{C}\)ubrani\( \acute{c} \) D., Murphy G.C: Automatic bug triage using text categorization. In: Proceedings of 16th International Conference Software engineering and Knowledge engineering, pp. 92–97. KSI Press (2004) \(\breve{C}\)ubrani\( \acute{c} \) D., Murphy G.C: Automatic bug triage using text categorization. In: Proceedings of 16th International Conference Software engineering and Knowledge engineering, pp. 92–97. KSI Press (2004)
7.
go back to reference Durgesh, K.S., Lekha, B.: Data classification using support vector machine. J. Theor. Appl. Inf. Technol. 12(1), 1–7 (2010) Durgesh, K.S., Lekha, B.: Data classification using support vector machine. J. Theor. Appl. Inf. Technol. 12(1), 1–7 (2010)
8.
go back to reference Forman, G.: An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. 3, 1289–1305 (2003)MATH Forman, G.: An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. 3, 1289–1305 (2003)MATH
9.
go back to reference Frakes, W.B., Baeza-Yates, R.: Information Retrieval: Data Structures and Algorithms. Prentice-Hall, Englewood Cliffs (1992) Frakes, W.B., Baeza-Yates, R.: Information Retrieval: Data Structures and Algorithms. Prentice-Hall, Englewood Cliffs (1992)
10.
go back to reference Freund, R.J., Wilson, W.J.: Regression Analysis: Statistical Modeling of a Response Variable. Academic Press, San Diego (1998)MATH Freund, R.J., Wilson, W.J.: Regression Analysis: Statistical Modeling of a Response Variable. Academic Press, San Diego (1998)MATH
11.
go back to reference Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: Proceedings of the 7th IEEE Working Conference Mining Software Repositories (MSR), pp. 11–20. IEEE Computer Society, May 2010 Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: Proceedings of the 7th IEEE Working Conference Mining Software Repositories (MSR), pp. 11–20. IEEE Computer Society, May 2010
12.
go back to reference Guo, P.J., Zimmermann, T., Nagappan, N., Murphy, B.: Characterizing and predicting which bugs get fixed: an empirical study of Microsoft windows. In: Proceedings of 32nd ACM/IEEE International Conference Software Engineering, ICSE 2010, vol. 1, pp. 495–504. ACM, New York (2010) Guo, P.J., Zimmermann, T., Nagappan, N., Murphy, B.: Characterizing and predicting which bugs get fixed: an empirical study of Microsoft windows. In: Proceedings of 32nd ACM/IEEE International Conference Software Engineering, ICSE 2010, vol. 1, pp. 495–504. ACM, New York (2010)
13.
go back to reference Hall, M.A.: Correlation-Based Feature Subset Selection for Machine Learning. Hamilton, New Zealand (1998) Hall, M.A.: Correlation-Based Feature Subset Selection for Machine Learning. Hamilton, New Zealand (1998)
14.
go back to reference Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd edn. Springer, New York (2009)CrossRefMATH Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd edn. Springer, New York (2009)CrossRefMATH
15.
go back to reference Kollar, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. The MIT Press, Cambridge (2009) Kollar, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. The MIT Press, Cambridge (2009)
16.
go back to reference Liu, H., Setiono, R.: A probabilistic approach to feature selection: a filter solution. In: 13th International Conference on Machine Learning, pp. 319–327 (1996) Liu, H., Setiono, R.: A probabilistic approach to feature selection: a filter solution. In: 13th International Conference on Machine Learning, pp. 319–327 (1996)
17.
go back to reference Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)CrossRefMATH Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)CrossRefMATH
19.
go back to reference Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufman, San Francisco (1993) Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufman, San Francisco (1993)
20.
go back to reference Rish, I.: An empirical study of the NaïVe Bayes classifier. In: Proceedings of the IJCAI-2001 Workshop on Empirical Methods in Artificial Intelligence, pp. 41–46 (2001) Rish, I.: An empirical study of the NaïVe Bayes classifier. In: Proceedings of the IJCAI-2001 Workshop on Empirical Methods in Artificial Intelligence, pp. 41–46 (2001)
22.
go back to reference Shihab, E., Ihara, A., Kamei, Y., Ibrahim, W.M., Ohira, M., Adams, B., Hassan, A.E., Matsumoto, K.-I.: Predicting re-opened bugs: a case study on the eclipse project. In: Proceedings of 2010 17th Working Conference Reverse Engineering, WCRE 2010, pp. 249–258. IEEE Computer Society, Washington, DC (2010) Shihab, E., Ihara, A., Kamei, Y., Ibrahim, W.M., Ohira, M., Adams, B., Hassan, A.E., Matsumoto, K.-I.: Predicting re-opened bugs: a case study on the eclipse project. In: Proceedings of 2010 17th Working Conference Reverse Engineering, WCRE 2010, pp. 249–258. IEEE Computer Society, Washington, DC (2010)
23.
go back to reference Somasundaram, K., Murphy, G.C.: Automatic categorization of bug reports using latent dirichlet allocation. In: Proceedings of the 5th India Software Engineering Conference, ISEC 2012, pp. 125–130. ACM, New York (2012) Somasundaram, K., Murphy, G.C.: Automatic categorization of bug reports using latent dirichlet allocation. In: Proceedings of the 5th India Software Engineering Conference, ISEC 2012, pp. 125–130. ACM, New York (2012)
24.
go back to reference Strate, J.D., Laplante, P.A.: A literature review of research in software defect reporting. IEEE Trans. Reliab. 62, 444–454 (2013)CrossRef Strate, J.D., Laplante, P.A.: A literature review of research in software defect reporting. IEEE Trans. Reliab. 62, 444–454 (2013)CrossRef
25.
go back to reference Sun, C., Lo, D., Wang, X., Jiang, J.D., Khoo, S.-C.: A discriminative model approach for accurate duplicate bug report retrieval. In: Proceedings of 32nd ACM/IEEE International Conference Software Engineering, ICSE 2010, vol. 1, pp. 45–54. ACM, New York (2010) Sun, C., Lo, D., Wang, X., Jiang, J.D., Khoo, S.-C.: A discriminative model approach for accurate duplicate bug report retrieval. In: Proceedings of 32nd ACM/IEEE International Conference Software Engineering, ICSE 2010, vol. 1, pp. 45–54. ACM, New York (2010)
26.
go back to reference Sureka, A., Indukuri, K.V.: Linguistic analysis of bug report titles with respect to the dimension of bug importance. In: Proceedings of the Third Annual ACM Bangalore Conference, Article No. 9, pp. 1–6. ACM (2010) Sureka, A., Indukuri, K.V.: Linguistic analysis of bug report titles with respect to the dimension of bug importance. In: Proceedings of the Third Annual ACM Bangalore Conference, Article No. 9, pp. 1–6. ACM (2010)
27.
go back to reference Weiss, C., Premraj, R., Zimmermann, T., Zeller, A.: How long will it take to fix this bug? In: Proceedings of 4th International Workshop Mining Software Repositories, MSR 2007, vol. 1. IEEE Computer Society, Washington, DC (2007) Weiss, C., Premraj, R., Zimmermann, T., Zeller, A.: How long will it take to fix this bug? In: Proceedings of 4th International Workshop Mining Software Repositories, MSR 2007, vol. 1. IEEE Computer Society, Washington, DC (2007)
28.
go back to reference Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufman, San Francisco (2005)MATH Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufman, San Francisco (2005)MATH
29.
go back to reference Xia, X., Lo, D., Qiu, W., Wang, B., Zhou, B.: Automated configuration bug report prediction using text mining. In: 2014 IEEE 38th Annual Computer Software and Applications Conference, pp. 107–116 (2014) Xia, X., Lo, D., Qiu, W., Wang, B., Zhou, B.: Automated configuration bug report prediction using text mining. In: 2014 IEEE 38th Annual Computer Software and Applications Conference, pp. 107–116 (2014)
30.
go back to reference Zhou, Y., Tong, Y., Gu, R., Gall, H.C.: Combining text mining and data mining for bug report classification. In: Proceedings of 30th International Conference on Software Maintenance and Evolution (ICSM/ICSME), pp. 311–320. IEEE (2014) Zhou, Y., Tong, Y., Gu, R., Gall, H.C.: Combining text mining and data mining for bug report classification. In: Proceedings of 30th International Conference on Software Maintenance and Evolution (ICSM/ICSME), pp. 311–320. IEEE (2014)
Metadata
Title
Defect Report Classification in Accordance with Areas of Testing
Author
Anna Gromova
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-71734-0_4

Premium Partner