skip to main content
survey

Predictive Models in Software Engineering: Challenges and Opportunities

Published:09 April 2022Publication History
Skip Abstract Section

Abstract

Predictive models are one of the most important techniques that are widely applied in many areas of software engineering. There have been a large number of primary studies that apply predictive models and that present well-performed studies in various research domains, including software requirements, software design and development, testing and debugging, and software maintenance. This article is a first attempt to systematically organize knowledge in this area by surveying a body of 421 papers on predictive models published between 2009 and 2020. We describe the key models and approaches used, classify the different models, summarize the range of key application areas, and analyze research results. Based on our findings, we also propose a set of current challenges that still need to be addressed in future work and provide a proposed research road map for these opportunities.

REFERENCES

  1. [1] Abad Zahra Shakeri Hossein, Gervasi Vincenzo, Zowghi Didar, and Far Behrouz H.. 2019. Supporting analysts by dynamic extraction and classification of requirements-related knowledge. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 442453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Abdeen Hani, Bali Khaled, Sahraoui Houari, and Dufour Bruno. 2015. Learning dependency-based change impact predictors using independent change histories. Inf. Softw. Technol. 67 (2015), 220235.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Abdessalem Raja Ben, Nejati Shiva, Briand Lionel C., and Stifter Thomas. 2018. Testing vision-based control systems using learnable evolutionary algorithms. In Proceedings of the IEEE/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 10161026.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Abebe Surafel Lemma, Ali Nasir, and Hassan Ahmed E.. 2016. An empirical study of software release notes. Empir. Softw. Eng. 21, 3 (2016), 11071142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Abualhaija Sallam, Arora Chetan, Sabetzadeh Mehrdad, Briand Lionel C, and Traynor Michael. 2020. Automated demarcation of requirements in textual specifications: A machine learning-based approach. Empir. Softw. Eng. 25, 6 (2020), 54545497.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Afric Petar, Sikic Lucija, Kurdija Adrian Satja, and Silic Marin. 2020. REPD: Source code defect prediction as anomaly detection. J. Syst. Softw. 168 (2020), 110641.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Agrawal Amritanshu and Menzies Tim. 2018. Is “better data” better than “better data miners”? In Proceedings of the IEEE/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 10501061.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Ahasanuzzaman Md, Asaduzzaman Muhammad, Roy Chanchal K., and Schneider Kevin A.. 2020. CAPS: A supervised technique for classifying Stack Overflow posts concerning API issues. Empir. Softw. Eng. 25, 2 (2020), 14931532.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Dallal Jehad Al and Briand Lionel C.. 2012. A precise method-method interaction-based cohesion metric for object-oriented classes. ACM Trans. Softw. Eng. Methodol. 21, 2 (2012), 134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Alahmadi Mohammad, Khormi Abdulkarim, and Haiduc Sonia. 2020. UI screens identification and extraction from mobile programming screencasts. In Proceedings of the 28th International Conference on Program Comprehension. 319330.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Allamanis Miltiadis, Barr Earl T., Bird Christian, and Sutton Charles. 2014. Learning natural coding conventions. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 281293.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Allix Kevin, Bissyandé Tegawendé F., Jérome Quentin, Klein Jacques, Traon Yves Le, et al. 2016. Empirical assessment of machine learning-based malware detectors for Android. Empir. Softw. Eng. 21, 1 (2016), 183211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Alrashedy Kamel, Dharmaretnam Dhanush, German Daniel M., Srinivasan Venkatesh, and Gulliver T. Aaron. 2020. SCC++: Predicting the programming language of questions and snippets of stack overflow. J. Syst. Softw. 162 (2020), 110505.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Amar Anunay and Rigby Peter C.. 2019. Mining historical test logs to predict bugs and localize faults in the test logs. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 140151.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Anish Preethu Rose, Balasubramaniam Balaji, Sainani Abhishek, Cleland-Huang Jane, Daneva Maya, Wieringa Roel J., and Ghaisas Smita. 2016. Probing for requirements knowledge to stimulate architectural thinking. In Proceedings of the 38th International Conference on Software Engineering. 843854.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Anvik John and Murphy Gail C.. 2011. Reducing the effort of bug report triage: Recommenders for development-oriented decisions. ACM Trans. Softw. Eng. Methodol. 20, 3 (2011), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Arisholm Erik, Briand Lionel C., and Johannessen Eivind B.. 2010. A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. J. Syst. Softw. 83, 1 (2010), 217.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Aslan Ömer Aslan and Samet Refik. 2020. A comprehensive review on malware detection approaches. IEEE Access 8 (2020), 62496271.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Bacchelli Alberto, Sasso Tommaso Dal, D’Ambros Marco, and Lanza Michele. 2012. Content classification of development emails. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 375385.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Bai Yude, Xing Zhenchang, Li Xiaohong, Feng Zhiyong, and Ma Duoyuan. 2020. Unsuccessful story about few shot malware family classification and siamese network to the rescue. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 15601571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Bao Liang, Li Qian, Lu Peiyao, Lu Jie, Ruan Tongxiao, and Zhang Ke. 2018. Execution anomaly detection in large-scale systems through console log analysis. J. Syst. Softw. 143 (2018), 172186.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Bao Liang, Liu Xin, Xu Ziheng, and Fang Baoyin. 2018. AutoConfig: Automatic configuration tuning for distributed message systems. In Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2940.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Lingfeng Bao, Xin Xia, David Lo, and Gail C. Murphy. 2019. A large scale study of long-time contributor prediction for github projects. IEEE Transactions on Software Engineering 47, 6 (2019), 1277–1298.Google ScholarGoogle Scholar
  24. [24] Bao Lingfeng, Xing Zhenchang, Xia Xin, Lo David, and Li Shanping. 2017. Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report. In Proceedings of the IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 170181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Bao Lingfeng, Xing Zhenchang, Xia Xin, Lo David, Wu Minghui, and Yang Xiaohu. 2020. psc2code: Denoising code extraction from programming screencasts. ACM Trans. Softw. Eng. Methodol. 29, 3 (2020), 138.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Bell Robert M., Ostrand Thomas J., and Weyuker Elaine J.. 2013. The limited impact of individual developer data on software defect prediction. Empir. Softw. Eng. 18, 3 (2013), 478505.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Bennin Kwabena Ebo, Keung Jacky W., and Monden Akito. 2019. On the relative value of data resampling approaches for software defect prediction. Empir. Softw. Eng. 24, 2 (2019), 602636.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Benoit Tristan, Marion Jean-Yves, and Bardin Sébastien. 2021. Binary level toolchain provenance identification with graph neural networks. In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 131141.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Bernal-Cárdenas Carlos, Cooper Nathan, Moran Kevin, Chaparro Oscar, Marcus Andrian, and Poshyvanyk Denys. 2020. Translating video recordings of mobile app usages into replayable scenarios. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 309321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Bettaieb Seifeddine, Shin Seung Yeob, Sabetzadeh Mehrdad, Briand Lionel C., Garceau Michael, and Meyers Antoine. 2020. Using machine learning to assist with the selection of security controls during security assessment. Empir. Softw. Eng. 25, 4 (2020), 25502582.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Beyer Stefanie, Macho Christian, Penta Massimiliano Di, and Pinzger Martin. 2020. What kind of questions do developers ask on stack overflow? A comparison of automated approaches to classify posts into question categories. Empir. Softw. Eng. 25, 3 (2020), 22582301.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Bhattacharya Pamela, Neamtiu Iulian, and Shelton Christian R.. 2012. Automated, highly-accurate, bug assignment using machine learning and tossing graphs. J. Syst. Softw. 85, 10 (2012), 22752292.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Bian Pan, Liang Bin, Huang Jianjun, Shi Wenchang, Wang Xidong, and Zhang Jian. 2020. SinkFinder: Harvesting hundreds of unknown interesting function pairs with just one seed. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 11011113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Blincoe Kelly, Dehghan Ali, Salaou Abdoul-Djawadou, Neal Adam, Linaker Johan, and Damian Daniela. 2019. High-level software requirements and iteration changes: A predictive model. Empir. Softw. Eng. 24, 3 (2019), 16101648.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Blincoe Kelly, Valetto Giuseppe, and Damian Daniela. 2013. Do all task dependencies require coordination? the role of task properties in identifying critical coordination needs in software projects. In Proceedings of the 9th Joint Meeting on Foundations of Software Engineering. 213223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Bourque Pierre, Fairley Richard E., et al. 2014. Guide to the Software Engineering Body of Knowledge (SWEBOK (R)): Version 3.0. IEEE Computer Society Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Bowes David, Hall Tracy, Harman Mark, Jia Yue, Sarro Federica, and Wu Fan. 2016. Mutation-aware fault prediction. In Proceedings of the 25th International Symposium on Software Testing and Analysis. 330341.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Brindescu Caius, Ahmed Iftekhar, Leano Rafael, and Sarma Anita. 2020. Planning for untangling: Predicting the difficulty of merge conflicts. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 801811.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Bui Nghi D. Q., Yu Yijun, and Jiang Lingxiao. 2019. Bilateral dependency neural networks for cross-language algorithm classification. In Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 422433.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Buse Raymond P. L. and Weimer Westley. 2009. The road not taken: Estimating path execution frequency statically. In Proceedings of the IEEE 31st International Conference on Software Engineering. IEEE, 144154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Buse Raymond P. L. and Weimer Westley R.. 2009. Learning a metric for code readability. IEEE Trans. Softw. Eng. 36, 4 (2009), 546558.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Cambronero Jose, Li Hongyu, Kim Seohyun, Sen Koushik, and Chandra Satish. 2019. When deep learning met code search. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 964974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Canfora Gerardo, Lucia Andrea De, Penta Massimiliano Di, Oliveto Rocco, Panichella Annibale, and Panichella Sebastiano. 2015. Defect prediction as a multiobjective optimization problem. Softw. Test., Verif. Reliab. 25, 4 (2015), 426459.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Casalnuovo Casey, Devanbu Prem, Oliveira Abilio, Filkov Vladimir, and Ray Baishakhi. 2015. Assert use in GitHub projects. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 755766.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Catolino Gemma, Palomba Fabio, Lucia Andrea De, Ferrucci Filomena, and Zaidman Andy. 2018. Enhancing change prediction models using developer-related factors. J. Syst. Softw. 143 (2018), 1428.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Catolino Gemma, Palomba Fabio, Fontana Francesca Arcelli, Lucia Andrea De, Zaidman Andy, and Ferrucci Filomena. 2020. Improving change prediction models with code smell-related information. Empir. Softw. Eng. 25, 1 (2020), 4995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Catolino Gemma, Palomba Fabio, Zaidman Andy, and Ferrucci Filomena. 2019. Not all bugs are the same: Understanding, characterizing, and classifying bug types. J. Syst. Softw. 152 (2019), 165181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Cerpa Narciso, Bardeen Matthew, Astudillo Cesar A., and Verner June. 2016. Evaluating different families of prediction methods for estimating software project outcomes. J. Syst. Softw. 112 (2016), 4864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Chandramohan Mahinthan, Tan Hee Beng Kuan, Briand Lionel C., Shar Lwin Khin, and Padmanabhuni Bindu Madhavi. 2013. A scalable approach for malware detection through bounded feature space behavior modeling. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 312322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Chen Bihuan, Chen Linlin, Zhang Chen, and Peng Xin. 2020. BUILDFAST: History-aware build outcome prediction for fast feedback and reduced cost in continuous integration. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 4253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. [51] Chen Guibin, Chen Chunyang, Xing Zhenchang, and Xu Bowen. 2016. Learning a dual-language vector space for domain-specific cross-lingual question retrieval. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 744755.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Chen Huanchao, Huang Yuan, Liu Zhiyong, Chen Xiangping, Zhou Fan, and Luo Xiaonan. 2019. Automatically detecting the scopes of source code comments. J. Syst. Softw. 153 (2019), 4563.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. [53] Chen Jinyin, Hu Keke, Yu Yue, Chen Zhuangzhi, Xuan Qi, Liu Yi, and Filkov Vladimir. 2020. Software visualization and deep transfer learning for effective software defect prediction. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 578589.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Chen Jinfu, Kudjo Patrick Kwaku, Mensah Solomon, Brown Selasie Aformaley, and Akorfu George. 2020. An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection. J. Syst. Softw. 167 (2020), 110616.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Chen Qiuyuan, Xia Xin, Hu Han, Lo David, and Li Shanping. 2021. Why my code summarization model does not work: Code comment improvement with category prediction. ACM Trans. Softw. Eng. Methodol. 30, 2 (2021), 129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Chen Tse-Hsun, Thomas Stephen W., Hemmati Hadi, Nagappan Meiyappan, and Hassan Ahmed E.. 2017. An empirical study on the effect of testing on code quality using topic models: A case study on software development systems. IEEE Trans. Reliab. 66, 3 (2017), 806824.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Xin Chen, He Jiang, Xiaochen Li, Liming Nie, Dongjin Yu, Tieke He, and Zhenyu Chen. 2020. A systemic framework for crowdsourced test report quality assessment. Empirical Software Engineering 25, 2 (2020), 1382–1418.Google ScholarGoogle Scholar
  58. [58] Chen Yang, Santosa Andrew E., Yi Ang Ming, Sharma Abhishek, Sharma Asankhaya, and Lo David. 2020. A machine learning approach for vulnerability curation. In Proceedings of the 17th International Conference on Mining Software Repositories. 3242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Chen Zhenpeng, Cao Yanbin, Lu Xuan, Mei Qiaozhu, and Liu Xuanzhe. 2019. SEntiMoji: An emoji-powered learning approach for sentiment analysis in software engineering. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 841852.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Chen Zhenpeng, Cao Yanbin, Yao Huihan, Lu Xuan, Peng Xin, Mei Hong, and Liu Xuanzhe. 2021. Emoji-powered sentiment and emotion detection from software developers’ communication data. ACM Trans. Softw. Eng. Methodol. 30, 2 (2021), 148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] Choetkiertikul Morakot, Dam Hoa Khanh, Tran Truyen, and Ghose Aditya. 2015. Characterization and prediction of issue-related risks in software projects. In Proceedings of the IEEE/ACM 12th Working Conference on Mining Software Repositories. IEEE, 280291.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Cooray Deshan, Malek Sam, Roshandel Roshanak, and Kilgore David. 2010. RESISTing reliability degradation through proactive reconfiguration. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 8392.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Cotroneo Domenico, Pietrantuono Roberto, and Russo Stefano. 2013. A learning-based method for combining testing techniques. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 142151.Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Dam Hoa Khanh, Pham Trang, Ng Shien Wee, Tran Truyen, Grundy John, Ghose Aditya, Kim Taeksu, and Kim Chul-Joo. 2019. Lessons learned from using a deep tree-based model for software defect prediction in practice. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 4657.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. [65] Hoa Khanh Dam, Truyen Tran, Trang Pham, Shien Wee Ng, John Grundy, and Aditya Ghose. 2018. Automatic feature learning for predicting vulnerable software components. IEEE Transactions on Software Engineering 47, 1 (2018), 67–85.Google ScholarGoogle Scholar
  66. [66] Carvalho Andre B. De, Pozo Aurora, and Vergilio Silvia Regina. 2010. A symbolic fault-prediction model based on multiobjective particle swarm optimization. J. Syst. Softw. 83, 5 (2010), 868882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. [67] Dehghan Ali, Neal Adam, Blincoe Kelly, Linaker Johan, and Damian Daniela. 2017. Predicting likelihood of requirement implementation within the planned iteration: An empirical study at IBM. In Proceedings of the IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 124134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Dejaeger Karel, Verbeke Wouter, Martens David, and Baesens Bart. 2011. Data mining techniques for software effort estimation: A comparative study. IEEE Trans. Softw. Eng. 38, 2 (2011), 375397.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Dejaeger Karel, Verbraken Thomas, and Baesens Bart. 2012. Toward comprehensible software fault prediction models using Bayesian network classifiers. IEEE Trans. Softw. Eng. 39, 2 (2012), 237257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Dey Tapajit, Mousavi Sara, Ponce Eduardo, Fry Tanner, Vasilescu Bogdan, Filippova Anna, and Mockus Audris. 2020. Detecting and characterizing bots that commit code. In Proceedings of the 17th International Conference on Mining Software Repositories. 209219.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. [71] Nucci Dario Di, Palomba Fabio, Siravo Sandro, Bavota Gabriele, Oliveto Rocco, and Lucia Andrea De. 2015. On the role of developer’s scattered changes in bug prediction. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 241250.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Nucci Dario Di, Palomba Fabio, Tamburri Damian A., Serebrenik Alexander, and Lucia Andrea De. 2018. Detecting code smells using machine learning techniques: Are we there yet? In Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 612621.Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Sorbo Andrea Di, Panichella Sebastiano, Visaggio Corrado A., Penta Massimiliano Di, Canfora Gerardo, and Gall Harald C.. 2015. Development emails content analyzer: Intention mining in developer discussions (T). In Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 1223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Dwarakanath Anurag, Ahuja Manish, Sikand Samarth, Rao Raghotham M., Bose R. P. Jagadeesh Chandra, Dubash Neville, and Podder Sanjay. 2018. Identifying implementation bugs in machine learning based image classifiers using metamorphic testing. In Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis. 118128.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Egelman Carolyn D., Murphy-Hill Emerson, Kammer Elizabeth, Hodges Margaret Morrow, Green Collin, Jaspan Ciera, and Lin James. 2020. Predicting developers’ negative feelings about code review. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 174185.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Eken Beyza, Atar RiFat, Sertalp Sahra, and Tosun Ayşe. 2019. Predicting defects with latent and semantic features from commit logs in an industrial setting. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW). IEEE, 98105.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Eken Beyza and Tosun Ayse. 2021. Investigating the performance of personalized models for software defect prediction. J. Syst. Softw. 181 (2021), 111038.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] Fakhoury Sarah, Arnaoudova Venera, Noiseux Cedric, Khomh Foutse, and Antoniol Giuliano. 2018. Keep it simple: Is deep learning good for linguistic smell detection? In Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 602611.Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] Falessi Davide, Cantone Giovanni, and Canfora Gerardo. 2011. Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques. IEEE Trans. Softw. Eng. 39, 1 (2011), 1844.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. [80] Falessi Davide, Penta Massimiliano Di, Canfora Gerardo, and Cantone Giovanni. 2017. Estimating the number of remaining links in traceability recovery. Empir. Softw. Eng. 22, 3 (2017), 9961027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Davide Falessi, Justin Roll, Jin L. C. Guo, and Jane Cleland-Huang. 2018. Leveraging historical associations between requirements and source code to identify impacted classes. IEEE Transactions on Software Engineering 46, 4 (2018), 420–441.Google ScholarGoogle Scholar
  82. [82] Yuanrui Fan, Xin Xia, Daniel Alencar da Costa, David Lo, Ahmed E. Hassan, and Shanping Li. 2019. The impact of mislabeled changes by szz on just-in-time defect prediction. IEEE Transactions on Software Engineering 47, 8 (2019), 1559–1586.Google ScholarGoogle Scholar
  83. [83] Yuanrui Fan, Xin Xia, David Lo, and Ahmed E. Hassan. 2018. Chaff from the wheat: Characterizing and determining valid bug reports. IEEE Transactions on Software Engineering 46, 5 (2018), 495–525.Google ScholarGoogle Scholar
  84. [84] Fan Yuanrui, Xia Xin, Lo David, and Li Shanping. 2018. Early prediction of merged code changes to prioritize reviewing tasks. Empir. Softw. Eng. 23, 6 (2018), 33463393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] Fang Chunrong, Liu Zixi, Shi Yangyang, Huang Jeff, and Shi Qingkai. 2020. Functional code clone detection with syntax and semantics fusion learning. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. 516527.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] Femmer Henning, Ganesan Dharmalingam, Lindvall Mikael, and McComas David. 2013. Detecting inconsistencies in wrappers: A case study. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 10221031.Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Filieri Antonio, Tamburrelli Giordano, and Ghezzi Carlo. 2015. Supporting self-adaptation via quantitative verification and sensitivity analysis at run time. IEEE Trans. Softw. Eng. 42, 1 (2015), 7599.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. [88] Fontana Francesca Arcelli, Mäntylä Mika V., Zanoni Marco, and Marino Alessandro. 2016. Comparing and experimenting machine learning techniques for code smell detection. Empir. Softw. Eng. 21, 3 (2016), 11431191.Google ScholarGoogle ScholarCross RefCross Ref
  89. [89] Fritz Thomas, Begel Andrew, Müller Sebastian C., Yigit-Elliott Serap, and Züger Manuela. 2014. Using psycho-physiological measures to assess task difficulty in software development. In Proceedings of the 36th International Conference on Software Engineering. 402413.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. [90] Fu Wei and Menzies Tim. 2017. Easy over hard: A case study on deep learning. In Proceedings of the 11th Joint Meeting on Foundations of Software Engineering. 4960.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. [91] Fu Wei and Menzies Tim. 2017. Revisiting unsupervised learning for defect prediction. In Proceedings of the 11th Joint Meeting on Foundations of Software Engineering. 7283.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. [92] Ghotra Baljinder, McIntosh Shane, and Hassan Ahmed E.. 2015. Revisiting the impact of classification techniques on the performance of defect prediction models. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 789800.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Giger Emanuel, D’Ambros Marco, Pinzger Martin, and Gall Harald C.. 2012. Method-level bug prediction. In Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. IEEE, 171180.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. [94] Giger Emanuel, Pinzger Martin, and Gall Harald C.. 2011. Comparing fine-grained source code changes and code churn for bug prediction. In Proceedings of the 8th Working Conference on Mining Software Repositories. 8392.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. [95] Girardi Daniela, Novielli Nicole, Fucci Davide, and Lanubile Filippo. 2020. Recognizing developers’ emotions while programming. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 666677.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Gong Lina, Jiang Shujuan, Wang Rongcun, and Jiang Li. 2019. Empirical evaluation of the impact of class overlap on software defect prediction. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 698709.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. [97] Gopalakrishnan Raghuram, Sharma Palak, Mirakhorli Mehdi, and Galster Matthias. 2017. Can latent topics in source code predict missing architectural tactics? In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 1526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. [98] Gopinath Divya, Khurshid Sarfraz, Saha Diptikalyan, and Chandra Satish. 2014. Data-guided repair of selection statements. In Proceedings of the 36th International Conference on Software Engineering. 243253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. [99] Gottipati Swapna, Lo David, and Jiang Jing. 2011. Finding relevant answers in software forums. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 323332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Giovanni Grano, Fabio Palomba, and Harald C. Gall. 2019. Lightweight assessment of test-case effectiveness using source-code-quality indicators. IEEE Transactions on Software Engineering 47, 4 (2019), 758–774.Google ScholarGoogle Scholar
  101. [101] Groce Alex, Kulesza Todd, Zhang Chaoqiang, Shamasunder Shalini, Burnett Margaret, Wong Weng-Keen, Stumpf Simone, Das Shubhomoy, Shinsel Amber, Bice Forrest, et al. 2013. You are the only possible oracle: Effective test selection for end users of interactive machine learning systems. IEEE Trans. Softw. Eng. 40, 3 (2013), 307323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. [102] Gu Yongfeng, Xuan Jifeng, Zhang Hongyu, Zhang Lanxin, Fan Qingna, Xie Xiaoyuan, and Qian Tieyun. 2019. Does the fault reside in a stack trace? Assisting crash localization by predicting crashing fault residence. J. Syst. Softw. 148 (2019), 88104.Google ScholarGoogle ScholarCross RefCross Ref
  103. [103] Guo Jianmei, Czarnecki Krzysztof, Apel Sven, Siegmund Norbert, and Wąsowski Andrzej. 2013. Variability-aware performance prediction: A statistical learning approach. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 301311.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Guo Philip J., Zimmermann Thomas, Nagappan Nachiappan, and Murphy Brendan. 2010. Characterizing and predicting which bugs get fixed: An empirical study of Microsoft Windows. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. 495504.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. [105] Ha Huong and Zhang Hongyu. 2019. DeepPerf: Performance prediction for configurable software with deep sparse neural network. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 10951106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. [106] Habib Andrew and Pradel Michael. 2018. Is this class thread-safe? Inferring documentation using graph-based learning. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. 4152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. [107] Haiduc Sonia, Bavota Gabriele, Marcus Andrian, Oliveto Rocco, Lucia Andrea De, and Menzies Tim. 2013. Automatic query reformulations for text retrieval in software engineering. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 842851.Google ScholarGoogle ScholarCross RefCross Ref
  108. [108] Haiduc Sonia, Bavota Gabriele, Oliveto Rocco, Lucia Andrea De, and Marcus Andrian. 2012. Automatic query performance assessment during the retrieval of software artifacts. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. 9099.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. [109] Haiduc Sonia, Bavota Gabriele, Oliveto Rocco, Marcus Andrian, and Lucia Andrea De. 2012. Evaluating the specificity of text retrieval queries to support software engineering tasks. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 12731276.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. [110] Hajri Ines, Goknil Arda, Pastore Fabrizio, and Briand Lionel C.. 2020. Automating system test case classification and prioritization for use case-driven testing in product lines. Empir. Softw. Eng. 25, 5 (2020), 37113769.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. [111] Han Zhuobing, Li Xiaohong, Xing Zhenchang, Liu Hongtao, and Feng Zhiyong. 2017. Learning to predict severity of software vulnerability using only vulnerability description. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 125136.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Hanam Quinn, Tan Lin, Holmes Reid, and Lam Patrick. 2014. Finding patterns in static analysis alerts: Improving actionable alert ranking. In Proceedings of the 11th Working Conference on Mining Software Repositories. 152161.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. [113] Hata Hideaki, Mizuno Osamu, and Kikuno Tohru. 2010. Fault-prone module detection using large-scale text features based on spam filtering. Empir. Softw. Eng. 15, 2 (2010), 147165.Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. [114] Hata Hideaki, Mizuno Osamu, and Kikuno Tohru. 2012. Bug prediction based on fine-grained module histories. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 200210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. [115] He Jianjun, Xu Ling, Yan Meng, Xia Xin, and Lei Yan. 2020. Duplicate bug report detection using dual-channel convolutional neural networks. In Proceedings of the 28th International Conference on Program Comprehension. 117127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. [116] He Peng, Li Bing, Liu Xiao, Chen Jun, and Ma Yutao. 2015. An empirical study on software defect prediction with a simplified metric set. Inf. Softw. Technol. 59 (2015), 170190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. [117] Hellendoorn Vincent J., Bird Christian, Barr Earl T., and Allamanis Miltiadis. 2018. Deep learning type inference. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 152162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. [118] Herzig Kim, Just Sascha, and Zeller Andreas. 2016. The impact of tangled code changes on defect prediction models. Empir. Softw. Eng. 21, 2 (2016), 303336.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. [119] Herzig Kim and Nagappan Nachiappan. 2014. The impact of test ownership and team structure on the reliability and effectiveness of quality test runs. In Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. [120] Hirao Toshiki, McIntosh Shane, Ihara Akinori, and Matsumoto Kenichi. 2019. The review linkage graph for code review analytics: A recovery approach and empirical study. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 578589.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. [121] Hoang Thong, Dam Hoa Khanh, Kamei Yasutaka, Lo David, and Ubayashi Naoyasu. 2019. DeepJIT: An end-to-end deep learning framework for just-in-time defect prediction. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 3445.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. [122] Hora Andre, Valente Marco Tulio, Robbes Romain, and Anquetil Nicolas. 2016. When should internal interfaces be promoted to public? In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 278289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. [123] Hosseini Seyedrebvar, Turhan Burak, and Gunarathna Dimuthu. 2017. A systematic literature review and meta-analysis on cross project defect prediction. IEEE Trans. Softw. Eng. 45, 2 (2017), 111147.Google ScholarGoogle ScholarCross RefCross Ref
  124. [124] Hosseini Seyedrebvar, Turhan Burak, and Mäntylä Mika. 2018. A benchmark study on the effectiveness of search-based data selection and feature selection for cross project defect prediction. Inf. Softw. Technol. 95 (2018), 296312.Google ScholarGoogle ScholarCross RefCross Ref
  125. [125] Hu Wei and Wong Kenny. 2013. Using citation influence to predict software defects. In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR). IEEE, 419428.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. [126] Huang Jeff, Luo Qingzhou, and Rosu Grigore. 2015. GPredict: Generic predictive concurrency analysis. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 847857.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Huang Qiao, Shihab Emad, Xia Xin, Lo David, and Li Shanping. 2018. Identifying self-admitted technical debt in open source projects using text mining. Empir. Softw. Eng. 23, 1 (2018), 418451.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. [128] Huang Qiao, Xia Xin, and Lo David. 2017. Supervised vs unsupervised models: A holistic look at effort-aware just-in-time defect prediction. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 159170.Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Huang Qiao, Xia Xin, Lo David, and Murphy Gail C. 2018. Automating intention mining. IEEE Trans. Softw. Eng. 46, 10 (2018), 10981119.Google ScholarGoogle ScholarCross RefCross Ref
  130. [130] Rubing Huang, Weifeng Sun, Yinyin Xu, Haibo Chen, Dave Towey, and Xin Xia. 2019. A survey on adaptive random testing. IEEE Transactions on Software Engineering 47, 10 (2019), 2052–2083.Google ScholarGoogle Scholar
  131. [131] Huang Yi, Chen Chunyang, Xing Zhenchang, Lin Tian, and Liu Yang. 2018. Tell them apart: Distilling technology differences from crowd-scale comparison discussions. In Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 214224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. [132] Huang Yuan, Hu Xinyu, Jia Nan, Chen Xiangping, Zheng Zibin, and Luo Xiapu. 2020. CommtPst: Deep learning source code for commenting positions prediction. J. Syst. Softw. 170 (2020), 110754.Google ScholarGoogle ScholarCross RefCross Ref
  133. [133] Huang Zijie, Shao Zhiqing, Fan Guisheng, Gao Jianhua, Zhou Ziyi, Yang Kang, and Yang Xingguang. 2021. Predicting community smells’ occurrence on individual developers by sentiments. arXiv preprint arXiv:2103.07090 (2021).Google ScholarGoogle Scholar
  134. [134] Islam Md Shariful, Hamou-Lhadj Abdelwahab, Sabor Korosh Koochekian, Hamdaqa Mohammad, and Cai Haipeng. 2021. EnHMM: On the use of ensemble HMMs and stack traces to predict the reassignment of bug report fields. In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 411421.Google ScholarGoogle ScholarCross RefCross Ref
  135. [135] Jeong Gaeul, Kim Sunghun, and Zimmermann Thomas. 2009. Improving bug triage with bug tossing graphs. In Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 111120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. [136] Jha Nishant and Mahmoud Anas. 2018. Using frame semantics for classifying and summarizing application store reviews. Empir. Softw. Eng. 23, 6 (2018), 37343767.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. [137] Jia Zhouyang, Li Shanshan, Yu Tingting, Liao Xiangke, and Wang Ji. 2019. Automatically detecting missing cleanup for ungraceful exits. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 751762.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. [138] Jiang He, Li Xiaochen, Yang Zijiang, and Xuan Jifeng. 2017. What causes my test alarm? Automatic cause analysis for test alarms in system and integration testing. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 712723.Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. [139] Jiang He, Zhang Jingxuan, Ren Zhilei, and Zhang Tao. 2017. An unsupervised approach for discovering relevant tutorial fragments for APIs. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 3848.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. [140] Jiang Jiajun, Lu Weihai, Chen Junjie, Lin Qingwei, Zhao Pu, Kang Yu, Zhang Hongyu, Xiong Yingfei, Gao Feng, Xu Zhangwei, et al. 2020. How to mitigate the incident? An effective troubleshooting guide recommendation technique for online service systems. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 14101420.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. [141] Jiang Tian, Tan Lin, and Kim Sunghun. 2013. Personalized defect prediction. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 279289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. [142] Jing Xiaoyuan, Wu Fei, Dong Xiwei, Qi Fumin, and Xu Baowen. 2015. Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning. In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. 496507.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. [143] Jing Xiao-Yuan, Wu Fei, Dong Xiwei, and Xu Baowen. 2016. An improved SDA based defect prediction framework for both within-project and cross-project class-imbalance problems. IEEE Trans. Softw. Eng. 43, 4 (2016), 321339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. [144] Jing Xiao-Yuan, Ying Shi, Zhang Zhi-Wu, Wu Shan-Shan, and Liu Jin. 2014. Dictionary learning based software defect prediction. In Proceedings of the 36th International Conference on Software Engineering. 414423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. [145] Jonsson Leif, Borg Markus, Broman David, Sandahl Kristian, Eldh Sigrid, and Runeson Per. 2016. Automated bug assignment: Ensemble-based machine learning in large scale industrial contexts. Empir. Softw. Eng. 21, 4 (2016), 15331578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. [146] Kabinna Suhas, Bezemer Cor-Paul, Shang Weiyi, Syer Mark D., and Hassan Ahmed E.. 2018. Examining the stability of logging statements. Empir. Softw. Eng. 23, 1 (2018), 290333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. [147] Kaltenecker Christian, Grebhahn Alexander, Siegmund Norbert, Guo Jianmei, and Apel Sven. 2019. Distance-based sampling of software configuration spaces. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 10841094.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. [148] Kamei Yasutaka, Fukushima Takafumi, McIntosh Shane, Yamashita Kazuhiro, Ubayashi Naoyasu, and Hassan Ahmed E.. 2016. Studying just-in-time defect prediction using cross-project models. Empir. Softw. Eng. 21, 5 (2016), 20722106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. [149] Kamei Yasutaka, Shihab Emad, Adams Bram, Hassan Ahmed E., Mockus Audris, Sinha Anand, and Ubayashi Naoyasu. 2012. A large-scale empirical study of just-in-time quality assurance. IEEE Trans. Softw. Eng. 39, 6 (2012), 757773.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. [150] Kan Edward Y. Y., Chan Wing Kwong, and Tse T. H.. 2012. EClass: An execution classification approach to improving the energy-efficiency of software via machine learning. J. Syst. Softw. 85, 4 (2012), 960973.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. [151] Kapur Ritu and Sodhi Balwinder. 2020. A defect estimator for source code: Linking defect reports with programming constructs usage metrics. ACM Trans. Softw. Eng. Methodol. 29, 2 (2020), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. [152] Keele Staffs et al. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical report, Ver. 2.3 EBSE Technical Report. EBSE.Google ScholarGoogle Scholar
  153. [153] Khomh Foutse, Chan Brian, Zou Ying, Sinha Anand, and Dietz Dave. 2011. Predicting post-release defects using pre-release field testing results. In Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM). IEEE, 253262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. [154] Khomh Foutse, Vaucher Stephane, Guéhéneuc Yann-Gaël, and Sahraoui Houari. 2011. BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. J. Syst. Softw. 84, 4 (2011), 559572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. [155] Kikas Riivo, Dumas Marlon, and Pfahl Dietmar. 2016. Using dynamic and contextual features to predict issue lifetime in GitHub projects. In Proceedings of the IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR). IEEE, 291302.Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. [156] Kim Dongsun, Tao Yida, Kim Sunghun, and Zeller Andreas. 2013. Where should we fix this bug? A two-phase recommendation model. IEEE Trans. Softw. Eng. 39, 11 (2013), 15971610.Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. [157] Kim Dongsun, Wang Xinming, Kim Sunghun, Zeller Andreas, Cheung Shing-Chi, and Park Sooyong. 2011. Which crashes should I fix first?: Predicting top crashes at an early stage to prioritize debugging efforts. IEEE Trans. Softw. Eng. 37, 3 (2011), 430447.Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. [158] Kim I. Luk, Zheng Yunhui, Park Hogun, Wang Weihang, You Wei, Aafer Yousra, and Zhang Xiangyu. 2020. Finding client-side business flow tampering vulnerabilities. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 222233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. [159] Kim Sunghun, Jr E. James Whitehead, and Zhang Yi. 2008. Classifying software changes: Clean or buggy?IEEE Trans. Softw. Eng. 34, 2 (2008), 181196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. [160] Kim Sunghun, Zhang Hongyu, Wu Rongxin, and Gong Liang. 2011. Dealing with noise in defect prediction. In Proceedings of the 33rd International Conference on Software Engineering (ICSE). IEEE, 481490.Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. [161] Kitchenham Barbara A., Dyba Tore, and Jorgensen Magne. 2004. Evidence-based software engineering. In Proceedings of the 26th International Conference on Software Engineering. IEEE, 273281.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. [162] Kobayashi Kenichi, Matsuo Akihiko, Inoue Katsuro, Hayase Yasuhiro, Kamimura Manabu, and Yoshino Toshiaki. 2011. ImpactScale: Quantifying change impact to predict faults in large software systems. In Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM). IEEE, 4352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. [163] Kondo Masanari, Bezemer Cor-Paul, Kamei Yasutaka, Hassan Ahmed E., and Mizuno Osamu. 2019. The impact of feature reduction techniques on defect prediction models. Empir. Softw. Eng. 24, 4 (2019), 19251963.Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. [164] Kondo Masanari, German Daniel M., Mizuno Osamu, and Choi Eun-Hye. 2020. The impact of context metrics on just-in-time defect prediction. Empir. Softw. Eng. 25, 1 (2020), 890939.Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. [165] Kotsiantis S. B., Kanellopoulos Dimitris, and Pintelas P. E.. 2006. Data preprocessing for supervised leaning. Int. J. Comput. Sci. 1, 2 (2006), 111117.Google ScholarGoogle Scholar
  166. [166] Kpodjedo Segla, Ricca Filippo, Galinier Philippe, Guéhéneuc Yann-Gaël, and Antoniol Giuliano. 2011. Design evolution metrics for defect prediction in object oriented systems. Empir. Softw. Eng. 16, 1 (2011), 141175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. [167] Krishna Rahul, Menzies Tim, and Fu Wei. 2016. Too much automation? The bellwether effect and its implications for transfer learning. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. 122131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. [168] Kudjo Patrick Kwaku and Chen Jinfu. 2019. A cost-effective strategy for software vulnerability prediction based on bellwether analysis. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 424427.Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. [169] Kumar Lov, Sripada Sai Krishna, Sureka Ashish, and Rath Santanu Ku. 2018. Effective fault prediction model developed using least square support vector machine (LSSVM). J. Syst. Softw. 137 (2018), 686712.Google ScholarGoogle ScholarCross RefCross Ref
  170. [170] Lamkanfi Ahmed, Demeyer Serge, Giger Emanuel, and Goethals Bart. 2010. Predicting the severity of a reported bug. In Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR). IEEE, 110.Google ScholarGoogle ScholarCross RefCross Ref
  171. [171] Le Tien-Duy B., Linares-Vásquez Mario, Lo David, and Poshyvanyk Denys. 2015. Rclinker: Automated linking of issue reports and commits leveraging rich contextual information. In Proceedings of the IEEE 23rd International Conference on Program Comprehension. IEEE, 3647.Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. [172] Le Tien-Duy B. and Lo David. 2013. Will fault localization work for these failures? An automated approach to predict effectiveness of fault localization tools. In Proceedings of the IEEE International Conference on Software Maintenance. IEEE, 310319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. [173] Le Tien-Duy B., Thung Ferdian, and Lo David. 2017. Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools. Empir. Softw. Eng. 22, 4 (2017), 22372279.Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. [174] Goues Claire Le and Weimer Westley. 2011. Measuring code quality to improve specification mining. IEEE Trans. Softw. Eng. 38, 1 (2011), 175190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. [175] Lee Sangho, Jung Changhee, and Pande Santosh. 2014. Detecting memory leaks through introspective dynamic behavior modelling using machine learning. In Proceedings of the 36th International Conference on Software Engineering. 814824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  176. [176] Lee Taek, Nam Jaechang, Han DongGyun, Kim Sunghun, and In Hoh Peter. 2011. Micro interaction metrics for defect prediction. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 311321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. [177] Lee Taek, Nam Jaechang, Han Donggyun, Kim Sunghun, and In Hoh Peter. 2016. Developer micro interaction metrics for software defect prediction. IEEE Trans. Softw. Eng. 42, 11 (2016), 10151035.Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. [178] Lessmann Stefan, Baesens Bart, Mues Christophe, and Pietsch Swantje. 2008. Benchmarking classification models for software defect prediction: A proposed framework and novel findings. IEEE Trans. Softw. Eng. 34, 4 (2008), 485496.Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. [179] Li Heng, Shang Weiyi, Zou Ying, and Hassan Ahmed E.. 2017. Towards just-in-time suggestions for log changes. Empir. Softw. Eng. 22, 4 (2017), 18311865.Google ScholarGoogle ScholarDigital LibraryDigital Library
  180. [180] Li Ke, Xiang Zilin, Chen Tao, and Tan Kay Chen. 2020. BiLO-CPDP: Bi-level programming for automated model discovery in cross-project defect prediction. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 573584.Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. [181] Li Wanchun, Harrold Mary Jean, and Görg Carsten. 2010. Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 155158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. [182] Li Xiang, Mutha Chetan, and Smidts Carol S.. 2016. An automated software reliability prediction system for safety critical software. Empir. Softw. Eng. 21, 6 (2016), 24132455.Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. [183] Li Xueliang, Yang Yuming, Liu Yepang, Gallagher John P., and Wu Kaishun. 2020. Detecting and diagnosing energy issues for mobile applications. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. 115127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  184. [184] Li Yangguang, Jiang Zhen Ming, Li Heng, Hassan Ahmed E., He Cheng, Huang Ruirui, Zeng Zhengda, Wang Mian, and Chen Pinan. 2020. Predicting node failures in an ultra-large-scale cloud computing platform: An AIOps solution. ACM Trans. Softw. Eng. Methodol. 29, 2 (2020), 124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. [185] Li Zhiqiang, Jing Xiao-Yuan, Zhu Xiaoke, and Zhang Hongyu. 2017. Heterogeneous defect prediction through multiple kernel learning and ensemble learning. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 91102.Google ScholarGoogle ScholarCross RefCross Ref
  186. [186] Lim Soo Ling, Quercia Daniele, and Finkelstein Anthony. 2010. StakeNet: Using social networks to analyse the stakeholders of large-scale software projects. In Proceedings of the ACM/IEEE 32nd International Conference on Software Engineering. IEEE, 295304.Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. [187] Lin Bin, Zampetti Fiorella, Bavota Gabriele, Penta Massimiliano Di, and Lanza Michele. 2019. Pattern-based mining of opinions in Q&A websites. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 548559.Google ScholarGoogle ScholarDigital LibraryDigital Library
  188. [188] Lin Bin, Zampetti Fiorella, Bavota Gabriele, Penta Massimiliano Di, Lanza Michele, and Oliveto Rocco. 2018. Sentiment analysis for software engineering: How far can we go? In Proceedings of the 40th International Conference on Software Engineering. 94–104.Google ScholarGoogle Scholar
  189. [189] Lin Dayi, Bezemer Cor-Paul, and Hassan Ahmed E.. 2019. Identifying gameplay videos that exhibit bugs in computer games. Empir. Softw. Eng. 24, 6 (2019), 40064033.Google ScholarGoogle ScholarCross RefCross Ref
  190. [190] Lin Qingwei, Hsieh Ken, Dang Yingnong, Zhang Hongyu, Sui Kaixin, Xu Yong, Lou Jian-Guang, Li Chenggang, Wu Youjiang, Yao Randolph, et al. 2018. Predicting node failure in cloud service systems. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 480490.Google ScholarGoogle ScholarDigital LibraryDigital Library
  191. [191] Linares-Vásquez Mario, McMillan Collin, Poshyvanyk Denys, and Grechanik Mark. 2014. On using machine learning to automatically classify software applications into domain categories. Empir. Softw. Eng. 19, 3 (2014), 582618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. [192] Hui Liu, Jiahao Jin, Zhifeng Xu, Yifan Bu, YanzhenZou, and Lu Zhang. 2019. Deep learning based code smell detection. IEEE Transactions on Software Engineering 47, 9 (2019), 1811–1837.Google ScholarGoogle Scholar
  193. [193] Liu Hui, Shen Mingzhu, Jin Jiahao, and Jiang Yanjie. 2020. Automated classification of actions in bug reports of mobile apps. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. 128140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  194. [194] Liu Han, Sun Chengnian, Su Zhendong, Jiang Yu, Gu Ming, and Sun Jiaguang. 2017. Stochastic optimization of program obfuscation. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 221231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  195. [195] Liu Hui, Xu Zhifeng, and Zou Yanzhen. 2018. Deep learning based feature envy detection. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. 385396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  196. [196] Liu Pei, Li Li, Zhao Yanjie, Sun Xiaoyu, and Grundy John. 2018. AndroZooOpen: Collecting large-scale open source Android apps for the research community. Star 1, 800 (2018), 1300.Google ScholarGoogle Scholar
  197. [197] Liu Tianming, Wang Haoyu, Li Li, Bai Guangdong, Guo Yao, and Xu Guoai. 2019. DaPanda: Detecting aggressive push notifications in Android apps. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 6678.Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. [198] Liu Xiaoyu, Huang Li Guo, Ge Jidong, and Ng Vincent. 2019. Predicting licenses for changed source code. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 686697.Google ScholarGoogle ScholarDigital LibraryDigital Library
  199. [199] Liu Yibin, Li Yanhui, Guo Jianbo, Zhou Yuming, and Xu Baowen. 2018. Connecting software metrics across versions to predict defects. In Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 232243.Google ScholarGoogle ScholarCross RefCross Ref
  200. [200] Lucia, Lo David, Jiang Lingxiao, Budi Aditya, et al. 2012. Active refinement of clone anomaly reports. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 397407.Google ScholarGoogle ScholarDigital LibraryDigital Library
  201. [201] Luo Sicheng, Xu Hui, Bi Yanxiang, Wang Xin, and Zhou Yangfan. 2021. Boosting symbolic execution via constraint solving time prediction (experience paper). In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. 336347.Google ScholarGoogle ScholarDigital LibraryDigital Library
  202. [202] Ma Ping, Cheng Hangyuan, Zhang Jingxuan, and Xuan Jifeng. 2020. Can this fault be detected: A study on fault detection via automated test generation. J. Syst. Softw. 170 (2020), 110769.Google ScholarGoogle ScholarCross RefCross Ref
  203. [203] Ma Wanwangying, Chen Lin, Yang Yibiao, Zhou Yuming, and Xu Baowen. 2016. Empirical analysis of network measures for effort-aware fault-proneness prediction. Inf. Softw. Technol. 69 (2016), 5070.Google ScholarGoogle ScholarDigital LibraryDigital Library
  204. [204] Ma Ying, Luo Guangchun, Zeng Xue, and Chen Aiguo. 2012. Transfer learning for cross-company software defect prediction. Inf. Softw. Technol. 54, 3 (2012), 248256.Google ScholarGoogle ScholarDigital LibraryDigital Library
  205. [205] Machalica Mateusz, Samylkin Alex, Porth Meredith, and Chandra Satish. 2019. Predictive test selection. In Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP). IEEE/ACM, 91100. DOI:.Google ScholarGoogle ScholarDigital LibraryDigital Library
  206. [206] Machalica Mateusz, Samylkin Alex, Porth Meredith, and Chandra Satish. 2019. Predictive test selection. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 91100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  207. [207] Macho Christian, McIntosh Shane, and Pinzger Martin. 2016. Predicting build co-changes with source code change and commit categories. In Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 541551.Google ScholarGoogle ScholarCross RefCross Ref
  208. [208] Maddila Chandra, Bansal Chetan, and Nagappan Nachiappan. 2019. Predicting pull request completion time: A case study on large scale cloud services. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 874882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  209. [209] Malhotra Ruchika and Khanna Megha. 2017. An empirical study for software change prediction using imbalanced data. Empir. Softw. Eng. 22, 6 (2017), 28062851.Google ScholarGoogle ScholarDigital LibraryDigital Library
  210. [210] Malhotra Ruchika and Khanna Megha. 2019. Dynamic selection of fitness function for software change prediction using particle swarm optimization. Inf. Softw. Technol. 112 (2019), 5167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  211. [211] Malik Haroon, Hemmati Hadi, and Hassan Ahmed E.. 2013. Automatic detection of performance deviations in the load testing of large scale systems. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 10121021.Google ScholarGoogle ScholarCross RefCross Ref
  212. [212] Malik Rabee Sohail, Patra Jibesh, and Pradel Michael. 2019. NL2Type: Inferring JavaScript function types from natural language information. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 304315.Google ScholarGoogle ScholarDigital LibraryDigital Library
  213. [213] Martens Daniel and Maalej Walid. 2019. Towards understanding and detecting fake reviews in app stores. Empir. Softw. Eng. 24, 6 (2019), 33163355.Google ScholarGoogle ScholarCross RefCross Ref
  214. [214] Mashhadi Mohammad Jafar and Hemmati Hadi. 2020. Hybrid deep neural networks to infer state models of black-box systems. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 299311.Google ScholarGoogle ScholarDigital LibraryDigital Library
  215. [215] McIntosh Andrea, Hassan Safwat, and Hindle Abram. 2019. What can Android mobile app developers do about the energy consumption of machine learning?Empir. Softw. Eng. 24, 2 (2019), 562601.Google ScholarGoogle ScholarDigital LibraryDigital Library
  216. [216] McMillan Collin, Linares-Vasquez Mario, Poshyvanyk Denys, and Grechanik Mark. 2011. Categorizing software applications for maintenance. In Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM). IEEE, 343352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  217. [217] Medeiros Ibéria, Neves Nuno, and Correia Miguel. 2015. Detecting and removing web application vulnerabilities with static analysis and data mining. IEEE Trans. Reliab. 65, 1 (2015), 5469.Google ScholarGoogle ScholarCross RefCross Ref
  218. [218] Meneely Andrew, Rotella Pete, and Williams Laurie. 2011. Does adding manpower also affect quality? An empirical, longitudinal analysis. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 8190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  219. [219] Menzies Tim, Majumder Suvodeep, Balaji Nikhila, Brey Katie, and Fu Wei. 2018. 500+ times faster than deep learning: (A case study exploring faster methods for text mining stackoverflow). In Proceedings of the IEEE/ACM 15th International Conference on Mining Software Repositories (MSR). IEEE, 554563.Google ScholarGoogle Scholar
  220. [220] Mills Chris, Bavota Gabriele, Haiduc Sonia, Oliveto Rocco, Marcus Andrian, and Lucia Andrea De. 2017. Predicting query quality for applications of text retrieval to software engineering tasks. ACM Trans. Softw. Eng. Methodol. 26, 1 (2017), 145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  221. [221] Mills Chris, Escobar-Avila Javier, Bhattacharya Aditya, Kondyukov Grigoriy, Chakraborty Shayok, and Haiduc Sonia. 2019. Tracing with less data: Active learning for classification-based traceability link recovery. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 103113.Google ScholarGoogle ScholarCross RefCross Ref
  222. [222] Mirakhorli Mehdi and Cleland-Huang Jane. 2015. Detecting, tracing, and monitoring architectural tactics in code. IEEE Trans. Softw. Eng. 42, 3 (2015), 205220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  223. [223] Mirakhorli Mehdi, Shin Yonghee, Cleland-Huang Jane, and Cinar Murat. 2012. A tactic-centric approach for automating traceability of quality concerns. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 639649.Google ScholarGoogle ScholarDigital LibraryDigital Library
  224. [224] Misirli Ayse Tosun and Bener Ayse Basar. 2014. Bayesian networks for evidence-based decision-making in software engineering. IEEE Trans. Softw. Eng. 40, 6 (2014), 533554.Google ScholarGoogle ScholarCross RefCross Ref
  225. [225] Misirli Ayse Tosun, Shihab Emad, and Kamei Yasukata. 2016. Studying high impact fix-inducing changes. Empir. Softw. Eng. 21, 2 (2016), 605641.Google ScholarGoogle ScholarDigital LibraryDigital Library
  226. [226] Mittas Nikolaos and Angelis Lefteris. 2012. Ranking and clustering software cost estimation models through a multiple comparisons algorithm. IEEE Trans. Softw. Eng. 39, 4 (2012), 537551.Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. [227] Mockus Audris. 2009. Amassing and indexing a large sample of version control systems: Towards the census of public source code history. In Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories. IEEE, 1120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  228. [228] Molina Facundo, Degiovanni Renzo, Ponzio Pablo, Regis Germán, Aguirre Nazareno, and Frias Marcelo. 2019. Training binary classifiers as data structure invariants. In Proceedings of the IEEE/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 759770.Google ScholarGoogle ScholarDigital LibraryDigital Library
  229. [229] Monden Akito, Hayashi Takuma, Shinoda Shoji, Shirai Kumiko, Yoshida Junichi, Barker Mike, and Matsumoto Kenichi. 2013. Assessing the cost effectiveness of fault prediction in acceptance testing. IEEE Trans. Softw. Eng. 39, 10 (2013), 13451357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  230. [230] Montandon Joao Eduardo, Silva Luciana Lourdes, and Valente Marco Tulio. 2019. Identifying experts in software libraries and frameworks among GitHub users. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 276287.Google ScholarGoogle ScholarDigital LibraryDigital Library
  231. [231] Moran Kevin, Bernal-Cárdenas Carlos, Curcio Michael, Bonett Richard, and Poshyvanyk Denys. 2018. Machine learning-based prototyping of graphical user interfaces for mobile apps. IEEE Trans. Softw. Eng. 46, 2 (2018), 196221.Google ScholarGoogle ScholarCross RefCross Ref
  232. [232] Moran Kevin, Palacio David N., Bernal-Cárdenas Carlos, McCrystal Daniel, Poshyvanyk Denys, Shenefiel Chris, and Johnson Jeff. 2020. Improving the effectiveness of traceability link recovery using hierarchical Bayesian networks. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 873885.Google ScholarGoogle ScholarDigital LibraryDigital Library
  233. [233] Moreno Laura, Bavota Gabriele, Haiduc Sonia, Penta Massimiliano Di, Oliveto Rocco, Russo Barbara, and Marcus Andrian. 2015. Query-based configuration of text retrieval solutions for software engineering tasks. In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. 567578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  234. [234] Mori Toshiki and Uchihira Naoshi. 2019. Balancing the trade-off between accuracy and interpretability in software defect prediction. Empir. Softw. Eng. 24, 2 (2019), 779825.Google ScholarGoogle ScholarDigital LibraryDigital Library
  235. [235] Mostaeen Golam, Svajlenko Jeffrey, Roy Banani, Roy Chanchal K., and Schneider Kevin A.. 2019. CloneCognition: Machine learning based code clone validation tool. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 11051109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  236. [236] Moussa Rebecca and Azar Danielle. 2017. A PSO-GA approach targeting fault-prone software modules. J. Syst. Softw. 132 (2017), 4149.Google ScholarGoogle ScholarDigital LibraryDigital Library
  237. [237] Mukherjee Debdoot and Garg Malika. 2013. Which work-item updates need your response? In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR). IEEE, 1221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  238. [238] Müller Sebastian C. and Fritz Thomas. 2015. Stuck and frustrated or in flow and happy: Sensing developers’ emotions and progress. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 688699.Google ScholarGoogle ScholarCross RefCross Ref
  239. [239] Müller Sebastian C. and Fritz Thomas. 2016. Using (bio) metrics to predict code quality online. In Proceedings of the IEEE/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 452463.Google ScholarGoogle ScholarDigital LibraryDigital Library
  240. [240] Munaiah Nuthan, Kroh Steven, Cabrey Craig, and Nagappan Meiyappan. 2017. Curating GitHub for engineered software projects. Empir. Softw. Eng. 22, 6 (2017), 32193253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  241. [241] Murgia Alessandro, Ortu Marco, Tourani Parastou, Adams Bram, and Demeyer Serge. 2018. An exploratory qualitative and quantitative analysis of emotions in issue report comments of open source systems. Empir. Softw. Eng. 23, 1 (2018), 521564.Google ScholarGoogle ScholarDigital LibraryDigital Library
  242. [242] Murtaza Syed Shariyar, Madhavji Nazim, Gittens Mechelle, and Li Zude. 2011. Diagnosing new faults using mutants and prior faults (NIER track). In Proceedings of the 33rd International Conference on Software Engineering. 960963.Google ScholarGoogle ScholarDigital LibraryDigital Library
  243. [243] Murukannaiah Pradeep K. and Singh Munindar P.. 2015. Platys: An active learning framework for place-aware application development and its evaluation. ACM Trans. Softw. Eng. Methodol. 24, 3 (2015), 132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  244. [244] Nafi Kawser Wazed, Kar Tonny Shekha, Roy Banani, Roy Chanchal K., and Schneider Kevin A.. 2019. CLCDSA: Cross language code clone detection using syntactical features and API documentation. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 10261037.Google ScholarGoogle ScholarDigital LibraryDigital Library
  245. [245] Nagappan Nachiappan and Ball Thomas. 2005. Use of relative code churn measures to predict system defect density. In Proceedings of the 27th International Conference on Software Engineering. 284292.Google ScholarGoogle ScholarDigital LibraryDigital Library
  246. [246] Nair Vivek, Menzies Tim, Siegmund Norbert, and Apel Sven. 2017. Using bad learners to find good configurations. In Proceedings of the 11th Joint Meeting on Foundations of Software Engineering. 257267.Google ScholarGoogle ScholarDigital LibraryDigital Library
  247. [247] Nam Daye, Horvath Amber, Macvean Andrew, Myers Brad, and Vasilescu Bogdan. 2019. Marble: Mining for boilerplate code to identify API usability problems. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 615627.Google ScholarGoogle ScholarDigital LibraryDigital Library
  248. [248] Nam Jaechang, Fu Wei, Kim Sunghun, Menzies Tim, and Tan Lin. 2017. Heterogeneous defect prediction. IEEE Trans. Softw. Eng. 44, 9 (2017), 874896.Google ScholarGoogle ScholarCross RefCross Ref
  249. [249] Nam Jaechang and Kim Sunghun. 2015. CLAMI: Defect prediction on unlabeled datasets (T). In Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 452463.Google ScholarGoogle ScholarDigital LibraryDigital Library
  250. [250] Nam Jaechang, Pan Sinno Jialin, and Kim Sunghun. 2013. Transfer defect learning. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 382391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  251. [251] Narayanan Annamalai, Chandramohan Mahinthan, Chen Lihui, and Liu Yang. 2018. A multi-view context-aware approach to Android malware detection and malicious code localization. Empir. Softw. Eng. 23, 3 (2018), 12221274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  252. [252] Nasab Ali Rezaei, Shahin Mojtaba, Liang Peng, Basiri Mohammad Ehsan, Raviz Seyed Ali Hoseyni, Khalajzadeh Hourieh, Waseem Muhammad, and Naseri Amineh. 2021. Automated identification of security discussions in microservices systems: Industrial surveys and experiments. J. Syst. Softw. 181 (2021), 111046.Google ScholarGoogle ScholarDigital LibraryDigital Library
  253. [253] Natella Roberto, Cotroneo Domenico, Duraes Joao A., and Madeira Henrique S.. 2012. On fault representativeness of software fault injection. IEEE Trans. Softw. Eng. 39, 1 (2012), 8096.Google ScholarGoogle ScholarCross RefCross Ref
  254. [254] Nayebi Maleknaz, Cho Henry, and Ruhe Guenther. 2018. App store mining is not enough for app improvement. Empir. Softw. Eng. 23, 5 (2018), 27642794.Google ScholarGoogle ScholarDigital LibraryDigital Library
  255. [255] Nayebi Maleknaz, Farahi Homayoon, and Ruhe Guenther. 2017. Which version should be released to app store? In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). IEEE, 324333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  256. [256] Nejati Shiva, Sabetzadeh Mehrdad, Arora Chetan, Briand Lionel C., and Mandoux Felix. 2016. Automated change impact analysis between SysML models of requirements and design. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 242253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  257. [257] Nguyen Anh Tuan, Nguyen Tung Thanh, Al-Kofahi Jafar, Nguyen Hung Viet, and Nguyen Tien N.. 2011. A topic-based approach for narrowing the search space of buggy files from a bug report. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 263272.Google ScholarGoogle ScholarDigital LibraryDigital Library
  258. [258] Nguyen Anh Tuan, Nguyen Tung Thanh, Nguyen Tien N., Lo David, and Sun Chengnian. 2012. Duplicate bug report detection with a combination of information retrieval and topic modeling. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. IEEE, 7079.Google ScholarGoogle ScholarDigital LibraryDigital Library
  259. [259] Nguyen Son, Phan Hung, Le Trinh, and Nguyen Tien N.. 2020. Suggesting natural method names to check name consistencies. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 13721384.Google ScholarGoogle ScholarDigital LibraryDigital Library
  260. [260] Ni Zhen, Li Bin, Sun Xiaobing, Chen Tianhao, Tang Ben, and Shi Xinchen. 2020. Analyzing bug fix for automatic bug cause classification. J. Syst. Softw. 163 (2020), 110538.Google ScholarGoogle ScholarCross RefCross Ref
  261. [261] Niu Haoran, Keivanloo Iman, and Zou Ying. 2017. Learning to rank code examples for code search engines. Empir. Softw. Eng. 22, 1 (2017), 259291.Google ScholarGoogle ScholarDigital LibraryDigital Library
  262. [262] Nori Aditya V. and Sharma Rahul. 2013. Termination proofs from tests. In Proceedings of the 9th Joint Meeting on Foundations of Software Engineering. 246256.Google ScholarGoogle ScholarDigital LibraryDigital Library
  263. [263] Ochodek Miroslaw, Hebig Regina, Meding Wilhelm, Frost Gert, and Staron Miroslaw. 2020. Recognizing lines of code violating company-specific coding guidelines using machine learning. Empir. Softw. Eng. 25, 1 (2020), 220265.Google ScholarGoogle ScholarDigital LibraryDigital Library
  264. [264] Okutan Ahmet and Yıldız Olcay Taner. 2014. Software defect prediction using Bayesian networks. Empir. Softw. Eng. 19, 1 (2014), 154181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  265. [265] Okutan Ahmet and Yildiz Olcay Taner. 2016. A novel kernel to predict software defectiveness. J. Syst. Softw. 119 (2016), 109121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  266. [266] Owhadi-Kareshk Moein, Nadi Sarah, and Rubin Julia. 2019. Predicting merge conflicts in collaborative software development. In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). IEEE, 111.Google ScholarGoogle ScholarCross RefCross Ref
  267. [267] Ozcelik Burcu and Yilmaz Cemal. 2015. Seer: A lightweight online failure prediction approach. IEEE Trans. Softw. Eng. 42, 1 (2015), 2646.Google ScholarGoogle ScholarDigital LibraryDigital Library
  268. [268] Padhye Rohan, Mani Senthil, and Sinha Vibha Singhal. 2014. NeedFeed: Taming change notifications by modeling code relevance. In Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 665676.Google ScholarGoogle ScholarDigital LibraryDigital Library
  269. [269] Palomba Fabio and Tamburri Damian Andrew. 2021. Predicting the emergence of community smells using socio-technical metrics: A machine-learning approach. J. Syst. Softw. 171 (2021), 110847.Google ScholarGoogle ScholarCross RefCross Ref
  270. [270] Fabio Palomba, Damian Andrew Tamburri, Francesca Arcelli Fontana, Rocco Oliveto, Andy Zaidman, and Alexander Serebrenik. 2018. Beyond technical aspects: How do community smells influence the intensity of code smells? IEEE Transactions on Software Engineering 47, 1 (2018), 108–129.Google ScholarGoogle Scholar
  271. [271] Palomba Fabio, Zanoni Marco, Fontana Francesca Arcelli, Lucia Andrea De, and Oliveto Rocco. 2016. Smells like teen spirit: Improving bug prediction performance using the intensity of code smells. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 244255.Google ScholarGoogle ScholarCross RefCross Ref
  272. [272] Pan Cong and Pradel Michael. 2021. Continuous test suite failure prediction. In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. 553565.Google ScholarGoogle ScholarDigital LibraryDigital Library
  273. [273] Panichella Annibale, Dit Bogdan, Oliveto Rocco, Penta Massimilano Di, Poshynanyk Denys, and Lucia Andrea De. 2013. How to effectively use topic models for software engineering tasks? An approach based on genetic algorithms. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 522531.Google ScholarGoogle ScholarCross RefCross Ref
  274. [274] Papadakis Mike, Shin Donghwan, Yoo Shin, and Bae Doo-Hwan. 2018. Are mutation scores correlated with real fault detection? A large scale empirical study on the relationship between mutants and real faults. In Proceedings of the IEEE/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 537548.Google ScholarGoogle ScholarDigital LibraryDigital Library
  275. [275] Pascarella Luca, Bruntink Magiel, and Bacchelli Alberto. 2019. Classifying code comments in Java software systems. Empir. Softw. Eng. 24, 3 (2019), 14991537.Google ScholarGoogle ScholarDigital LibraryDigital Library
  276. [276] Pascarella Luca, Palomba Fabio, and Bacchelli Alberto. 2018. Re-evaluating method-level bug prediction. In Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 592601.Google ScholarGoogle ScholarCross RefCross Ref
  277. [277] Pascarella Luca, Palomba Fabio, and Bacchelli Alberto. 2019. Fine-grained just-in-time defect prediction. J. Syst. Softw. 150 (2019), 2236.Google ScholarGoogle ScholarCross RefCross Ref
  278. [278] Pascarella Luca, Palomba Fabio, and Bacchelli Alberto. 2020. On the performance of method-level bug prediction: A negative result. J. Syst. Softw. 161 (2020), 110493.Google ScholarGoogle ScholarDigital LibraryDigital Library
  279. [279] Pecorelli Fabiano, Nucci Dario Di, Roover Coen De, and Lucia Andrea De. 2020. A large empirical assessment of the role of data balancing in machine-learning-based code smell detection. J. Syst. Softw. 169 (2020), 110693.Google ScholarGoogle ScholarCross RefCross Ref
  280. [280] Pecorelli Fabiano, Palomba Fabio, Nucci Dario Di, and Lucia Andrea De. 2019. Comparing heuristic and machine learning approaches for metric-based code smell detection. In Proceedings of the IEEE/ACM 27th International Conference on Program Comprehension (ICPC). IEEE, 93104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  281. [281] Pei Jiayan, Wu Yimin, Qin Zishan, Cong Yao, and Guan Jingtao. 2021. Attention-based model for predicting question relatedness on Stack Overflow. arXiv preprint arXiv:2103.10763 (2021).Google ScholarGoogle Scholar
  282. [282] Perez Daniel and Chiba Shigeru. 2019. Cross-language clone detection by learning over abstract syntax trees. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 518528.Google ScholarGoogle ScholarDigital LibraryDigital Library
  283. [283] Perini Anna, Susi Angelo, and Avesani Paolo. 2012. A machine learning approach to software requirements prioritization. IEEE Trans. Softw. Eng. 39, 4 (2012), 445461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  284. [284] Peters Fayola and Menzies Tim. 2012. Privacy and utility for defect prediction: Experiments with MORPH. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 189199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  285. [285] Peters Fayola, Menzies Tim, Gong Liang, and Zhang Hongyu. 2013. Balancing privacy and utility in cross-company defect prediction. IEEE Trans. Softw. Eng. 39, 8 (2013), 10541068.Google ScholarGoogle ScholarDigital LibraryDigital Library
  286. [286] Peters Fayola, Menzies Tim, and Layman Lucas. 2015. LACE2: Better privacy-preserving data sharing for cross project defect prediction. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 801811.Google ScholarGoogle ScholarCross RefCross Ref
  287. [287] Peters Fayola, Menzies Tim, and Marcus Andrian. 2013. Better cross company defect prediction. In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR). IEEE, 409418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  288. [288] Fayola Peters, Thein Than Tun, Yijun Yu, and Bashar Nuseibeh. 2017. Text filtering and ranking for security bug report prediction. IEEE Transactions on Software Engineering 45, 6 (2017), 615–631.Google ScholarGoogle Scholar
  289. [289] Petersen Kai, Vakkalanka Sairam, and Kuzniarz Ludwik. 2015. Guidelines for conducting systematic mapping studies in software engineering: An update. Inf. Softw. Technol. 64 (2015), 118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  290. [290] Pitakrat Teerat, Okanović Dušan, Hoorn André van, and Grunske Lars. 2018. Hora: Architecture-aware online failure prediction. J. Syst. Softw. 137 (2018), 669685.Google ScholarGoogle ScholarCross RefCross Ref
  291. [291] Pornprasit Chanathip and Tantithamthavorn Chakkrit. 2021. JITLine: A simpler, better, faster, finer-grained just-in-time defect prediction. arXiv preprint arXiv:2103.07068 (2021).Google ScholarGoogle Scholar
  292. [292] Posnett Daryl, Filkov Vladimir, and Devanbu Premkumar. 2011. Ecological inference in empirical software engineering. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 362371.Google ScholarGoogle ScholarDigital LibraryDigital Library
  293. [293] Pradel Michael, Gousios Georgios, Liu Jason, and Chandra Satish. 2020. Typewriter: Neural type prediction with search-based validation. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 209220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  294. [294] Pradel Michael, Murali Vijayaraghavan, Qian Rebecca, Machalica Mateusz, Meijer Erik, and Chandra Satish. 2020. Scaffle: Bug localization on millions of files. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. 225236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  295. [295] Prana Gede Artha Azriadi, Treude Christoph, Thung Ferdian, Atapattu Thushari, and Lo David. 2019. Categorizing the content of GitHub README files. Empir. Softw. Eng. 24, 3 (2019), 12961327.Google ScholarGoogle ScholarDigital LibraryDigital Library
  296. [296] Premraj Rahul and Herzig Kim. 2011. Network versus code metrics to predict defects: A replication study. In Proceedings of the International Symposium on Empirical Software Engineering and Measurement. IEEE, 215224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  297. [297] Yu Qu, Qinghua Zheng, Jianlei Chi, Yangxu Jin, Ancheng He, Di Cui, Hengshan Zhang, and Ting Liu. 2019. Using K-core decomposition on class dependency networks to improve bug prediction Model’s practical performance. IEEE Transactions on Software Engineering 47, 2 (2019), 348–3.Google ScholarGoogle Scholar
  298. [298] Rahman Foyzur and Devanbu Premkumar. 2013. How, and why, process metrics are better. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 432441.Google ScholarGoogle ScholarCross RefCross Ref
  299. [299] Rahman Foyzur, Khatri Sameer, Barr Earl T., and Devanbu Premkumar. 2014. Comparing static bug finders and statistical prediction. In Proceedings of the 36th International Conference on Software Engineering. 424434.Google ScholarGoogle ScholarDigital LibraryDigital Library
  300. [300] Rahman Foyzur, Posnett Daryl, and Devanbu Premkumar. 2012. Recalling the “imprecision” of cross-project defect prediction. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. 111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  301. [301] Rahman Foyzur, Posnett Daryl, Herraiz Israel, and Devanbu Premkumar. 2013. Sample size vs. bias in defect prediction. In Proceedings of the 9th Joint Meeting on Foundations of Software Engineering. 147157.Google ScholarGoogle ScholarDigital LibraryDigital Library
  302. [302] Rahman Mohammad Masudur, Roy Chanchal K., and Kula Raula G.. 2017. Predicting usefulness of code review comments using textual features and developer experience. In Proceedings of the IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 215226.Google ScholarGoogle ScholarDigital LibraryDigital Library
  303. [303] Rajbahadur Gopi Krishnan, Wang Shaowei, Kamei Yasutaka, and Hassan Ahmed E.. 2017. The impact of using regression models to build defect classifiers. In Proceedings of the IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 135145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  304. [304] Ramírez-Mora Sandra L., Oktaba Hanna, and Gómez-Adorno Helena. 2020. Descriptions of issues and comments for predicting issue success in software projects. J. Syst. Softw. 168 (2020), 110663.Google ScholarGoogle ScholarCross RefCross Ref
  305. [305] Rath Michael, Rendall Jacob, Guo Jin L. C., Cleland-Huang Jane, and Mäder Patrick. 2018. Traceability in the wild: Automatically augmenting incomplete trace links. In Proceedings of the 40th International Conference on Software Engineering. 834845.Google ScholarGoogle ScholarDigital LibraryDigital Library
  306. [306] Rehman Inayat, Mirakhorli Mehdi, Nagappan Meiyappan, Uulu Azat Aralbay, and Thornton Matthew. 2018. Roles and impacts of hands-on software architects in five industrial case studies. In Proceedings of the 40th International Conference on Software Engineering. 117127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  307. [307] Ren Luyao, Zhou Shurui, Kästner Christian, and Wąsowski Andrzej. 2019. Identifying redundancies in fork-based development. In Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 230241.Google ScholarGoogle ScholarCross RefCross Ref
  308. [308] Rigby Peter C. and Robillard Martin P.. 2013. Discovering essential code elements in informal documentation. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 832841.Google ScholarGoogle ScholarCross RefCross Ref
  309. [309] Rodeghero Paige, Jiang Siyuan, Armaly Ameer, and McMillan Collin. 2017. Detecting user story information in developer-client conversations to generate extractive summaries. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 4959.Google ScholarGoogle ScholarDigital LibraryDigital Library
  310. [310] Romano Daniele and Pinzger Martin. 2011. Using source code metrics to predict change-prone Java interfaces. In Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM). IEEE, 303312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  311. [311] Roy Arunava and Pham Hoang. 2018. Toward the development of a conventional time series based web error forecasting framework. Empir. Softw. Eng. 23, 2 (2018), 570644.Google ScholarGoogle ScholarDigital LibraryDigital Library
  312. [312] Roy Devjeet, Fakhoury Sarah, Lee John, and Arnaoudova Venera. 2020. A model to detect readability improvements in incremental changes. In Proceedings of the 28th International Conference on Program Comprehension. 2536.Google ScholarGoogle ScholarDigital LibraryDigital Library
  313. [313] Russo Barbara, Succi Giancarlo, and Pedrycz Witold. 2015. Mining system logs to learn error predictors: A case study of a telemetry system. Empir. Softw. Eng. 20, 4 (2015), 879927.Google ScholarGoogle ScholarDigital LibraryDigital Library
  314. [314] Ryu Duksan, Choi Okjoo, and Baik Jongmoon. 2016. Value-cognitive boosting with a support vector machine for cross-project defect prediction. Empir. Softw. Eng. 21, 1 (2016), 4371.Google ScholarGoogle ScholarDigital LibraryDigital Library
  315. [315] Sabbaghi Arash, Keyvanpour Mohammad Reza, and Parsa Saeed. 2020. FCCI: A fuzzy expert system for identifying coincidental correct test cases. J. Syst. Softw. 168 (2020), 110635.Google ScholarGoogle ScholarCross RefCross Ref
  316. [316] Saccente Nicholas, Dehlinger Josh, Deng Lin, Chakraborty Suranjan, and Xiong Yin. 2019. Project Achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW). IEEE, 114121.Google ScholarGoogle ScholarCross RefCross Ref
  317. [317] Saini Vaibhav, Farmahinifarahani Farima, Lu Yadong, Baldi Pierre, and Lopes Cristina V.. 2018. Oreo: Detection of clones in the twilight zone. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 354365.Google ScholarGoogle ScholarDigital LibraryDigital Library
  318. [318] Santos Fabio, Wiese Igor, Trinkenreich Bianca, Steinmacher Igor, Sarma Anita, and Gerosa Marco. 2021. Can I solve it? Identifying APIs required to complete OSS task. arXiv preprint arXiv:2103.12653 (2021).Google ScholarGoogle Scholar
  319. [319] Sarkar Aindrila, Rigby Peter C., and Bartalos Béla. 2019. Improving bug triaging with high confidence predictions at ericsson. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 8191.Google ScholarGoogle ScholarCross RefCross Ref
  320. [320] Scandariato Riccardo, Walden James, Hovsepyan Aram, and Joosen Wouter. 2014. Predicting vulnerable software components via text mining. IEEE Trans. Softw. Eng. 40, 10 (2014), 9931006.Google ScholarGoogle ScholarCross RefCross Ref
  321. [321] Schmidhuber Jürgen. 2015. Deep learning in neural networks: An overview. Neural Netw. 61 (2015), 85117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  322. [322] John Dooley and John Zukowski. 2011. Software development and professional practice. Springer.Google ScholarGoogle Scholar
  323. [323] Shar Lwin Khin, Tan Hee Beng Kuan, and Briand Lionel C.. 2013. Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 642651.Google ScholarGoogle ScholarCross RefCross Ref
  324. [324] Shi Lin, Xing Mingzhe, Li Mingyang, Wang Yawen, Li Shoubin, and Wang Qing. 2020. Detection of hidden feature requests from massive chat messages via deep siamese network. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 641653.Google ScholarGoogle ScholarDigital LibraryDigital Library
  325. [325] Shi Ying, Li Ming, Arndt Steven, and Smidts Carol. 2017. Metric-based software reliability prediction approach and its application. Empir. Softw. Eng. 22, 4 (2017), 15791633.Google ScholarGoogle ScholarDigital LibraryDigital Library
  326. [326] Shihab Emad, Ihara Akinori, Kamei Yasutaka, Ibrahim Walid M., Ohira Masao, Adams Bram, Hassan Ahmed E., and Matsumoto Ken-ichi. 2013. Studying re-opened bugs in open source software. Empir. Softw. Eng. 18, 5 (2013), 10051042.Google ScholarGoogle ScholarCross RefCross Ref
  327. [327] Shimagaki Junji, Kamei Yasutaka, Ubayashi Naoyasu, and Hindle Abram. 2018. Automatic topic classification of test cases using text mining at an Android smartphone vendor. In Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  328. [328] Shin Yonghee, Bell Robert M., Ostrand Thomas J., and Weyuker Elaine J.. 2012. On the use of calling structure information to improve fault prediction. Empir. Softw. Eng. 17, 4 (2012), 390423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  329. [329] Shin Yonghee, Meneely Andrew, Williams Laurie, and Osborne Jason A.. 2010. Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE Trans. Softw. Eng. 37, 6 (2010), 772787.Google ScholarGoogle ScholarDigital LibraryDigital Library
  330. [330] Shin Yonghee and Williams Laurie. 2013. Can traditional fault prediction models be used for vulnerability prediction?Empir. Softw. Eng. 18, 1 (2013), 2559.Google ScholarGoogle ScholarCross RefCross Ref
  331. [331] Shippey Thomas, Bowes David, and Hall Tracy. 2019. Automatically identifying code features for software defect prediction: Using AST N-grams. Inf. Softw. Technol. 106 (2019), 142160.Google ScholarGoogle ScholarCross RefCross Ref
  332. [332] Shivaji Shivkumar, Whitehead E. James, Akella Ram, and Kim Sunghun. 2012. Reducing features to improve code change-based bug prediction. IEEE Trans. Softw. Eng. 39, 4 (2012), 552569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  333. [333] Siegmund Norbert, Grebhahn Alexander, Apel Sven, and Kästner Christian. 2015. Performance-influence models for highly configurable systems. In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. 284294.Google ScholarGoogle ScholarDigital LibraryDigital Library
  334. [334] Silic Marin, Delac Goran, and Srbljic Sinisa. 2013. Prediction of atomic web services reliability based on k-means clustering. In Proceedings of the 9th Joint Meeting on Foundations of Software Engineering. 7080.Google ScholarGoogle ScholarDigital LibraryDigital Library
  335. [335] Joengju Sohn and Shin Yoo. 2019. Empirical evaluation of fault localisation using code and change metrics. IEEE Transactions on Software Engineering 47, 8 (2019), 1605–1625.Google ScholarGoogle Scholar
  336. [336] Soltanifar Behjat, Erdem Atakan, and Bener Ayse. 2016. Predicting defectiveness of software patches. In Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  337. [337] Song Charles, Porter Adam, and Foster Jeffrey S.. 2013. iTree: Efficiently discovering high-coverage configurations using interaction trees. IEEE Trans. Softw. Eng. 40, 3 (2013), 251265.Google ScholarGoogle ScholarDigital LibraryDigital Library
  338. [338] Song Qinbao, Jia Zihan, Shepperd Martin, Ying Shi, and Liu Jin. 2010. A general software defect-proneness prediction framework. IEEE Trans. Softw. Eng. 37, 3 (2010), 356370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  339. [339] Sridharan Murali, Mantyla Mika, Rantala Leevi, and Claes Maelick. 2021. Data balancing improves self-admitted technical debt detection. arXiv preprint arXiv:2103.13165 (2021).Google ScholarGoogle Scholar
  340. [340] Srisopha Kamonphop, Link Daniel, Swami Devendra, and Boehm Barry. 2020. Learning features that predict developer responses for iOS app store reviews. In Proceedings of the 14th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). 111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  341. [341] Stocco Andrea, Weiss Michael, Calzana Marco, and Tonella Paolo. 2020. Misbehaviour prediction for autonomous driving systems. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. 359371.Google ScholarGoogle ScholarDigital LibraryDigital Library
  342. [342] Strecker Jaymie and Memon Atif M.. 2012. Accounting for defect characteristics in evaluations of testing techniques. ACM Trans. Softw. Eng. Methodol. 21, 3 (2012), 143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  343. [343] Su Yihsiung, Luarn Pin, Lee Yue-Shi, and Yen Show-Jane. 2017. Creating an invalid defect classification model using text mining on server development. J. Syst. Softw. 125 (2017), 197206.Google ScholarGoogle ScholarDigital LibraryDigital Library
  344. [344] Suh Alexander. 2020. Adapting bug prediction models to predict reverted commits at Wayfair. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 12511262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  345. [345] Sun Chengnian, Lo David, Khoo Siau-Cheng, and Jiang Jing. 2011. Towards more accurate retrieval of duplicate bug reports. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 253262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  346. [346] Sun Chengnian, Lo David, Wang Xiaoyin, Jiang Jing, and Khoo Siau-Cheng. 2010. A discriminative model approach for accurate duplicate bug report retrieval. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. 4554.Google ScholarGoogle ScholarDigital LibraryDigital Library
  347. [347] Tan Lin, Liu Chen, Li Zhenmin, Wang Xuanhui, Zhou Yuanyuan, and Zhai Chengxiang. 2014. Bug characteristics in open source software. Empir. Softw. Eng. 19, 6 (2014), 16651705.Google ScholarGoogle ScholarDigital LibraryDigital Library
  348. [348] Tan Youshuai, Xu Sijie, Wang Zhaowei, Zhang Tao, Xu Zhou, and Luo Xiapu. 2020. Bug severity prediction using question-and-answer pairs from Stack Overflow. J. Syst. Softw. 165 (2020), 110567.Google ScholarGoogle ScholarCross RefCross Ref
  349. [349] Chakkrit Tantithamthavorn, Ahmed E. Hassan, and Kenichi Matsumoto. 2018. The impact of class rebalancing techniques on the performance and interpretation of defect prediction models. IEEE Transactions on Software Engineering 46, 11 (2018), 1200–1219.Google ScholarGoogle Scholar
  350. [350] Tantithamthavorn Chakkrit, McIntosh Shane, Hassan Ahmed E., Ihara Akinori, and Matsumoto Kenichi. 2015. The impact of mislabelling on the performance and interpretation of defect prediction models. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 812823.Google ScholarGoogle ScholarCross RefCross Ref
  351. [351] Tantithamthavorn Chakkrit, McIntosh Shane, Hassan Ahmed E., and Matsumoto Kenichi. 2016. Automated parameter optimization of classification techniques for defect prediction models. In Proceedings of the 38th International Conference on Software Engineering. 321332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  352. [352] Tantithamthavorn Chakkrit, McIntosh Shane, Hassan Ahmed E., and Matsumoto Kenichi. 2016. An empirical comparison of model validation techniques for defect prediction models. IEEE Trans. Softw. Eng. 43, 1 (2016), 118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  353. [353] Theisen Christopher, Herzig Kim, Morrison Patrick, Murphy Brendan, and Williams Laurie. 2015. Approximating attack surfaces with stack traces. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 199208.Google ScholarGoogle ScholarCross RefCross Ref
  354. [354] Thomas Stephen W., Nagappan Meiyappan, Blostein Dorothea, and Hassan Ahmed E.. 2013. The impact of classifier configuration and classifier combination on bug localization. IEEE Trans. Softw. Eng. 39, 10 (2013), 14271443.Google ScholarGoogle ScholarDigital LibraryDigital Library
  355. [355] Thongtanunam Patanamon, Shang Weiyi, and Hassan Ahmed E.. 2019. Will this clone be short-lived? Towards a better understanding of the characteristics of short-lived clones. Empir. Softw. Eng. 24, 2 (2019), 937972.Google ScholarGoogle ScholarDigital LibraryDigital Library
  356. [356] Thung Ferdian, Le Xuan-Bach D., and Lo David. 2015. Active semi-supervised defect categorization. In Proceedings of the IEEE 23rd International Conference on Program Comprehension. IEEE, 6070.Google ScholarGoogle ScholarDigital LibraryDigital Library
  357. [357] Tian Yuan, Lawall Julia, and Lo David. 2012. Identifying Linux bug fixing patches. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 386396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  358. [358] Tian Yuchi, Pei Kexin, Jana Suman, and Ray Baishakhi. 2018. DeepTest: Automated testing of deep-neural-network-driven autonomous cars. In Proceedings of the 40th International Conference on Software Engineering. 303314.Google ScholarGoogle ScholarDigital LibraryDigital Library
  359. [359] Tong Haonan, Liu Bin, and Wang Shihai. 2018. Software defect prediction using stacked denoising autoencoders and two-stage ensemble learning. Inf. Softw. Technol. 96 (2018), 94111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  360. [360] Torrado Nuria, Wiper Michael P., and Lillo Rosa E.. 2012. Software reliability modeling with software metrics data via Gaussian processes. IEEE Trans. Softw. Eng. 39, 8 (2012), 11791186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  361. [361] Tosun Ayşe, Bener Ayşe, Turhan Burak, and Menzies Tim. 2010. Practical considerations in deploying statistical methods for defect prediction: A case study within the Turkish telecommunications industry. Inf. Softw. Technol. 52, 11 (2010), 12421257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  362. [362] Tourani Parastou and Adams Bram. 2016. The impact of human discussions on just-in-time quality assurance: An empirical study on OpenStack and Eclipse. In Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 189200.Google ScholarGoogle ScholarCross RefCross Ref
  363. [363] Treude Christoph and Wagner Markus. 2019. Predicting good configurations for GitHub and stack overflow topic models. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 8495.Google ScholarGoogle ScholarDigital LibraryDigital Library
  364. [364] Tu Feifei, Zhu Jiaxin, Zheng Qimu, and Zhou Minghui. 2018. Be careful of when: An empirical study on time-related misuse of issue tracking data. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 307318.Google ScholarGoogle ScholarDigital LibraryDigital Library
  365. [365] Turhan Burak, Menzies Tim, Bener Ayşe B., and Stefano Justin Di. 2009. On the relative value of cross-company and within-company data for defect prediction. Empir. Softw. Eng. 14, 5 (2009), 540578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  366. [366] Uchôa Anderson, Barbosa Caio, Coutinho Daniel, Oizumi Willian, Assunçao Wesley K. G., Vergilio Silvia Regina, Pereira Juliana Alves, Oliveira Anderson, and Garcia Alessandro. 2021. Predicting design impactful changes in modern code review: A large-scale empirical study. In Proceedings of the IEEE/ACM 18th International Conference on Mining Software Repositories (MSR). IEEE, 471482.Google ScholarGoogle ScholarCross RefCross Ref
  367. [367] Umer Qasim, Liu Hui, and Illahi Inam. 2019. CNN-based automatic prioritization of bug reports. IEEE Trans. Reliab. 69, 4 (2019), 13411354.Google ScholarGoogle ScholarCross RefCross Ref
  368. [368] Garcia Harold Valdivia and Shihab Emad. 2014. Characterizing and predicting blocking bugs in open source projects. In Proceedings of the 11th Working Conference on Mining Software Repositories. 7281.Google ScholarGoogle ScholarDigital LibraryDigital Library
  369. [369] Vendome Christopher, Linares-Vásquez Mario, Bavota Gabriele, Penta Massimiliano Di, German Daniel, and Poshyvanyk Denys. 2017. Machine learning-based detection of open source license exceptions. In Proceedings of the IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 118129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  370. [370] Wang Haoren and Kagdi Huzefa. 2018. A conceptual replication study on bugs that get fixed in open source software. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 299310.Google ScholarGoogle ScholarCross RefCross Ref
  371. [371] Wang Hongbing, Wang Lei, Yu Qi, Zheng Zibin, Bouguettaya Athman, and Lyu Michael R.. 2016. Online reliability prediction via motifs-based dynamic Bayesian networks for service-oriented systems. IEEE Trans. Softw. Eng. 43, 6 (2016), 556579.Google ScholarGoogle ScholarDigital LibraryDigital Library
  372. [372] Wang Junjie, Wang Song, Cui Qiang, and Wang Qing. 2016. Local-based active classification of test report to assist crowdsourced testing. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. 190201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  373. [373] Wang Song, Bansal Chetan, and Nagappan Nachiappan. 2021. Large-scale intent analysis for identifying large-review-effort code changes. Inf. Softw. Technol. 130 (2021), 106408.Google ScholarGoogle ScholarCross RefCross Ref
  374. [374] Wang Song, Liu Taiyue, Nam Jaechang, and Tan Lin. 2018. Deep semantic feature learning for software defect prediction. IEEE Trans. Softw. Eng. 46, 12 (2018), 12671293.Google ScholarGoogle ScholarCross RefCross Ref
  375. [375] Wang Song, Liu Taiyue, and Tan Lin. 2016. Automatically learning semantic features for defect prediction. In Proceedings of the IEEE/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 297308.Google ScholarGoogle ScholarDigital LibraryDigital Library
  376. [376] Wang Xiaoyin, Dang Yingnong, Zhang Lu, Zhang Dongmei, Lan Erica, and Mei Hong. 2012. Can I clone this piece of code here? In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. 170179.Google ScholarGoogle ScholarDigital LibraryDigital Library
  377. [377] Wang Xiaoyin, Dang Yingnong, Zhang Lu, Zhang Dongmei, Lan Erica, and Mei Hong. 2014. Predicting consistency-maintenance requirement of code clonesat copy-and-paste time. IEEE Trans. Softw. Eng. 40, 8 (2014), 773794.Google ScholarGoogle ScholarCross RefCross Ref
  378. [378] Wang Xin, Liu Jin, Li Li, Chen Xiao, Liu Xiao, and Wu Hao. 2020. Detecting and explaining self-admitted technical debts with attention-based neural networks. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering. 871882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  379. [379] Wen Ming, Wu Rongxin, and Cheung Shing-Chi. 2018. How well do change sequences predict defects? Sequence learning from software changes. IEEE Trans. Softw. Eng. 46, 11 (2018), 11551175.Google ScholarGoogle ScholarCross RefCross Ref
  380. [380] Westermann Dennis, Happe Jens, Krebs Rouven, and Farahbod Roozbeh. 2012. Automated inference of goal-oriented performance prediction functions. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. 190199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  381. [381] Weyuker Elaine J., Ostrand Thomas J., and Bell Robert M.. 2010. Comparing the effectiveness of several modeling methods for fault prediction. Empir. Softw. Eng. 15, 3 (2010), 277295.Google ScholarGoogle ScholarDigital LibraryDigital Library
  382. [382] White Thomas D., Fraser Gordon, and Brown Guy J.. 2019. Improving random GUI testing with image-based widget detection. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 307317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  383. [383] Wiese Igor Scaliante, Ré Reginaldo, Steinmacher Igor, Kuroda Rodrigo Takashi, Oliva Gustavo Ansaldi, Treude Christoph, and Gerosa Marco Aurélio. 2017. Using contextual information to predict co-changes. J. Syst. Softw. 128 (2017), 220235.Google ScholarGoogle ScholarDigital LibraryDigital Library
  384. [384] Wolf Timo, Schroter Adrian, Damian Daniela, and Nguyen Thanh. 2009. Predicting build failures using social network analysis on developer communication. In Proceedings of the IEEE 31st International Conference on Software Engineering. IEEE, 111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  385. [385] Wood Andrew, Rodeghero Paige, Armaly Ameer, and McMillan Collin. 2018. Detecting speech act types in developer question/answer conversations during bug repair. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 491502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  386. [386] Wu Qian, Liang Guangtai, Wang Qianxiang, Xie Tao, and Mei Hong. 2011. Iterative mining of resource-releasing specifications. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 233242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  387. [387] Wu Rongxin, Zhang Hongyu, Kim Sunghun, and Cheung Shing-Chi. 2011. ReLink: Recovering links between bugs and changes. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 1525.Google ScholarGoogle ScholarDigital LibraryDigital Library
  388. [388] Wu Xiaoxue, Zheng Wei, Chen Xiang, Zhao Yu, Yu Tingting, and Mu Dejun. 2021. Improving high-impact bug report prediction with combination of interactive machine learning and active learning. Inf. Softw. Technol. 133 (2021), 106530.Google ScholarGoogle ScholarCross RefCross Ref
  389. [389] Wu Yueming, Zou Deqing, Dou Shihan, Yang Siru, Yang Wei, Cheng Feng, Liang Hong, and Jin Hai. 2020. SCDetector: Software functional clone detection based on semantic tokens analysis. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 821833.Google ScholarGoogle ScholarDigital LibraryDigital Library
  390. [390] Xia Xin, Lo David, McIntosh Shane, Shihab Emad, and Hassan Ahmed E.. 2015. Cross-project build co-change prediction. In Proceedings of the IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 311320.Google ScholarGoogle ScholarCross RefCross Ref
  391. [391] Xia Xin, Lo David, Pan Sinno Jialin, Nagappan Nachiappan, and Wang Xinyu. 2016. Hydra: Massively compositional model for cross-project defect prediction. IEEE Trans. Softw. Eng. 42, 10 (2016), 977998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  392. [392] Xia Xin, Lo David, Shihab Emad, and Wang Xinyu. 2015. Automated bug report field reassignment and refinement prediction. IEEE Trans. Reliab. 65, 3 (2015), 10941113.Google ScholarGoogle ScholarCross RefCross Ref
  393. [393] Xia Xin, Lo David, Shihab Emad, Wang Xinyu, and Zhou Bo. 2015. Automatic, high accuracy prediction of reopened bugs. Autom. Softw. Eng. 22, 1 (2015), 75109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  394. [394] Xia Xin, Lo David, Wang Xinyu, and Yang Xiaohu. 2016. Collective personalized change classification with multiobjective search. IEEE Trans. Reliab. 65, 4 (2016), 18101829.Google ScholarGoogle ScholarCross RefCross Ref
  395. [395] Xia Xin, Shihab Emad, Kamei Yasutaka, Lo David, and Wang Xinyu. 2016. Predicting crashing releases of mobile applications. In Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  396. [396] Xiao Peng, Liu Bin, and Wang Shihai. 2018. Feedback-based integrated prediction: Defect prediction based on feedback from software testing process. J. Syst. Softw. 143 (2018), 159171.Google ScholarGoogle ScholarCross RefCross Ref
  397. [397] Xu Bowen, Ye Deheng, Xing Zhenchang, Xia Xin, Chen Guibin, and Li Shanping. 2016. Predicting semantically linkable knowledge in developer online forums via convolutional neural network. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 5162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  398. [398] Xu Zhou, Li Li, Yan Meng, Liu Jin, Luo Xiapu, Grundy John, Zhang Yifeng, and Zhang Xiaohong. 2021. A comprehensive comparative study of clustering-based unsupervised defect prediction models. J. Syst. Softw. 172 (2021), 110862.Google ScholarGoogle ScholarCross RefCross Ref
  399. [399] Xu Zhou, Li Shuai, Tang Yutian, Luo Xiapu, Zhang Tao, Liu Jin, and Xu Jun. 2018. Cross version defect prediction with representative data via sparse subset selection. In Proceedings of the IEEE/ACM 26th International Conference on Program Comprehension (ICPC). IEEE, 13213211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  400. [400] Xu Zhou, Li Shuai, Xu Jun, Liu Jin, Luo Xiapu, Zhang Yifeng, Zhang Tao, Keung Jacky, and Tang Yutian. 2019. LDFR: Learning deep feature representation for software defect prediction. J. Syst. Softw. 158 (2019), 110402.Google ScholarGoogle ScholarDigital LibraryDigital Library
  401. [401] Xu Zhou, Liu Jin, Luo Xiapu, and Zhang Tao. 2018. Cross-version defect prediction via hybrid active learning with kernel principal component analysis. In Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 209220.Google ScholarGoogle ScholarCross RefCross Ref
  402. [402] Xu Zhou, Xuan Jifeng, Liu Jin, and Cui Xiaohui. 2016. MICHAC: Defect prediction via feature selection based on maximal information coefficient with hierarchical agglomerative clustering. In Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 370381.Google ScholarGoogle ScholarCross RefCross Ref
  403. [403] Yan Meng, Fang Yicheng, Lo David, Xia Xin, and Zhang Xiaohong. 2017. File-level defect prediction: Unsupervised vs. supervised models. In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). IEEE, 344353.Google ScholarGoogle ScholarDigital LibraryDigital Library
  404. [404] Yan Meng, Xia Xin, Shihab Emad, Lo David, Yin Jianwei, and Yang Xiaohu. 2018. Automating change-level self-admitted technical debt determination. IEEE Trans. Softw. Eng. 45, 12 (2018), 12111229.Google ScholarGoogle ScholarCross RefCross Ref
  405. [405] Yan Ruibo, Xiao Xi, Hu Guangwu, Peng Sancheng, and Jiang Yong. 2018. New deep learning method to detect code injection attacks on hybrid applications. J. Syst. Softw. 137 (2018), 6777.Google ScholarGoogle ScholarCross RefCross Ref
  406. [406] Yang Aidan Z. H., Costa Daniel Alencar da, and Zou Ying. 2019. Predicting co-changes between functionality specifications and source code in behavior driven development. In Proceedings of the IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 534544.Google ScholarGoogle ScholarDigital LibraryDigital Library
  407. [407] Yang Hui, Willis Alistair, Roeck Anne De, and Nuseibeh Bashar. 2010. Automatic detection of nocuous coordination ambiguities in natural language requirements. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 5362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  408. [408] Yang Jiachen, Hotta Keisuke, Higo Yoshiki, Igaki Hiroshi, and Kusumoto Shinji. 2015. Classification model for code clones based on machine learning. Empir. Softw. Eng. 20, 4 (2015), 10951125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  409. [409] Yang Xiaoxing, Tang Ke, and Yao Xin. 2014. A learning-to-rank approach to software defect prediction. IEEE Trans. Reliab. 64, 1 (2014), 234246.Google ScholarGoogle ScholarCross RefCross Ref
  410. [410] Yang Xiaoxing and Wen Wushao. 2018. Ridge and lasso regression models for cross-version defect prediction. IEEE Trans. Reliab. 67, 3 (2018), 885896.Google ScholarGoogle ScholarCross RefCross Ref
  411. [411] Yang Ye, Karim Muhammad Rezaul, Saremi Razieh, and Ruhe Guenther. 2016. Who should take this task? Dynamic decision support for crowd workers. In Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  412. [412] Yang Yibiao, Zhou Yuming, Liu Jinping, Zhao Yangyang, Lu Hongmin, Xu Lei, Xu Baowen, and Leung Hareton. 2016. Effort-aware just-in-time defect prediction: Simple unsupervised models could be better than supervised models. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 157168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  413. [413] Yang Yibiao, Zhou Yuming, Lu Hongmin, Chen Lin, Chen Zhenyu, Xu Baowen, Leung Hareton, and Zhang Zhenyu. 2014. Are slice-based cohesion metrics actually useful in effort-aware post-release fault-proneness prediction? An empirical study. IEEE Trans. Softw. Eng. 41, 4 (2014), 331357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  414. [414] Yap Bee Wah, Rani Khatijahhusna Abd, Rahman Hezlin Aryani Abd, Fong Simon, Khairudin Zuraida, and Abdullah Nik Nik. 2014. An application of oversampling, undersampling, bagging and boosting in handling imbalanced datasets. In Proceedings of the 1st International Conference on Advanced Data and Information Engineering (DaEng’13). Springer, 1322.Google ScholarGoogle ScholarCross RefCross Ref
  415. [415] Yazdaninia Mohamad, Lo David, and Sami Ashkan. 2021. Characterization and prediction of questions without accepted answers on stack overflow. arXiv preprint arXiv:2103.11386 (2021).Google ScholarGoogle Scholar
  416. [416] Yilmaz Cemal and Porter Adam. 2010. Combining hardware and software instrumentation to classify program executions. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 6776.Google ScholarGoogle ScholarDigital LibraryDigital Library
  417. [417] Yu Qiao, Jiang Shujuan, and Zhang Yanmei. 2017. A feature matching and transfer approach for cross-company defect prediction. J. Syst. Softw. 132 (2017), 366378.Google ScholarGoogle ScholarDigital LibraryDigital Library
  418. [418] Yu Tingting, Wen Wei, Han Xue, and Hayes Jane Huffman. 2018. ConPredictor: Concurrency defect prediction in real-world applications. IEEE Trans. Softw. Eng. 45, 6 (2018), 558575.Google ScholarGoogle ScholarCross RefCross Ref
  419. [419] Yu Zhongxing, Bai Chenggang, and Cai Kai-Yuan. 2015. Does the failing test execute a single or multiple faults? An approach to classifying failing tests. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, 924935.Google ScholarGoogle ScholarCross RefCross Ref
  420. [420] Zhe Yu, Christopher Theisen, Laurie Williams, and Tim Menzies. 2019. Improving vulnerability inspection efficiency using active learning. IEEE Transactions on Software Engineering 47, 11 (2019), 2401–2420.Google ScholarGoogle Scholar
  421. [421] Zampetti Fiorella, Serebrenik Alexander, and Penta Massimiliano Di. 2020. Automatically learning patterns for self-admitted technical debt removal. In Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 355366.Google ScholarGoogle ScholarCross RefCross Ref
  422. [422] Zanetti Marcelo Serrano, Scholtes Ingo, Tessone Claudio Juan, and Schweitzer Frank. 2013. Categorizing bugs with social networks: A case study on four open source software communities. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 10321041.Google ScholarGoogle ScholarCross RefCross Ref
  423. [423] Zeng Zhengran, Zhang Yuqun, Zhang Haotian, and Zhang Lingming. 2021. Deep just-in-time defect prediction: How far are we? In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. 427438.Google ScholarGoogle ScholarDigital LibraryDigital Library
  424. [424] Zhang Feng, Hassan Ahmed E., McIntosh Shane, and Zou Ying. 2016. The use of summation to aggregate software metrics hinders the performance of defect prediction models. IEEE Trans. Softw. Eng. 43, 5 (2016), 476491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  425. [425] Zhang Feng, Keivanloo Iman, and Zou Ying. 2017. Data transformation in cross-project defect prediction. Empir. Softw. Eng. 22, 6 (2017), 31863218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  426. [426] Zhang Fanlong, Khoo Siau-cheng, and Su Xiaohong. 2017. Predicting change consistency in a clone group. J. Syst. Softw. 134 (2017), 105119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  427. [427] Zhang Feng, Mockus Audris, Keivanloo Iman, and Zou Ying. 2016. Towards building a universal defect prediction model with rank transformed predictors. Empir. Softw. Eng. 21, 5 (2016), 21072145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  428. [428] Zhang Feng, Zheng Quan, Zou Ying, and Hassan Ahmed E.. 2016. Cross-project defect prediction using a connectivity-based unsupervised classifier. In Proceedings of the IEEE/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 309320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  429. [429] Zhang Hongyu, Gong Liang, and Versteeg Steve. 2013. Predicting bug-fixing time: An empirical study of commercial software projects. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 10421051.Google ScholarGoogle ScholarCross RefCross Ref
  430. [430] Zhang Haoxiang, Wang Shaowei, Chen Tse-Hsun, and Hassan Ahmed E.. 2021. Are comments on Stack Overflow well organized for easy retrieval by developers?ACM Trans. Softw. Eng. Methodol. 30, 2 (2021), 131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  431. [431] Zhang Jie, Zhang Lingming, Harman Mark, Hao Dan, Jia Yue, and Zhang Lu. 2018. Predictive mutation testing. IEEE Trans. Softw. Eng. 45, 9 (2018), 898918.Google ScholarGoogle ScholarDigital LibraryDigital Library
  432. [432] Zhang Kevin. 2019. A machine learning based approach to identify SQL injection vulnerabilities. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 12861288.Google ScholarGoogle ScholarDigital LibraryDigital Library
  433. [433] Zhang Xu, Xu Yong, Lin Qingwei, Qiao Bo, Zhang Hongyu, Dang Yingnong, Xie Chunyu, Yang Xinsheng, Cheng Qian, Li Ze, et al. 2019. Robust log-based anomaly detection on unstable log data. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 807817.Google ScholarGoogle ScholarDigital LibraryDigital Library
  434. [434] Zhang Yuwei, Jin Dahai, Xing Ying, and Gong Yunzhan. 2020. Automated defect identification via path analysis-based features with transfer learning. J. Syst. Softw. 166 (2020), 110585.Google ScholarGoogle ScholarCross RefCross Ref
  435. [435] Zhao Kunsong, Liu Jin, Xu Zhou, Li Li, Yan Meng, Yu Jiaojiao, and Zhou Yuxuan. 2021. Predicting crash fault residence via simplified deep forest based on a reduced feature set. arXiv preprint arXiv:2104.01768 (2021).Google ScholarGoogle Scholar
  436. [436] Zhao Nengwen, Chen Junjie, Wang Zhou, Peng Xiao, Wang Gang, Wu Yong, Zhou Fang, Feng Zhen, Nie Xiaohui, Zhang Wenchi, et al. 2020. Real-time incident prediction for online service systems. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 315326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  437. [437] Zheng Wujie, Lu Haochuan, Zhou Yangfan, Liang Jianming, Zheng Haibing, and Deng Yuetang. 2019. iFeedback: Exploiting user feedback for real-time issue detection in large-scale online service systems. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 352363.Google ScholarGoogle ScholarDigital LibraryDigital Library
  438. [438] Zhong Hao, Zhang Lu, Xie Tao, and Mei Hong. 2009. Inferring resource specifications from natural language API documentation. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. IEEE, 307318.Google ScholarGoogle Scholar
  439. [439] Zhou Minghui and Mockus Audris. 2014. Who will stay in the FLOSS community? Modeling participant’s initial behavior. IEEE Trans. Softw. Eng. 41, 1 (2014), 8299.Google ScholarGoogle ScholarDigital LibraryDigital Library
  440. [440] Zhou Tianchi, Sun Xiaobing, Xia Xin, Li Bin, and Chen Xiang. 2019. Improving defect prediction with deep forest. Inf. Softw. Technol. 114 (2019), 204216.Google ScholarGoogle ScholarDigital LibraryDigital Library
  441. [441] Zhou Xiang, Peng Xin, Xie Tao, Sun Jun, Ji Chao, Liu Dewei, Xiang Qilin, and He Chuan. 2019. Latent error prediction and fault localization for microservice applications by learning from system trace logs. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 683694.Google ScholarGoogle ScholarDigital LibraryDigital Library
  442. [442] Zhou Yu, Tong Yanxiang, Gu Ruihang, and Gall Harald. 2016. Combining text mining and data mining for bug report classification. J. Softw.: Evol. Process 28, 3 (2016), 150176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  443. [443] Zhou Yuming, Xu Baowen, and Leung Hareton. 2010. On the ability of complexity metrics to predict fault-prone classes in object-oriented systems. J. Syst. Softw. 83, 4 (2010), 660674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  444. [444] Zhou Yuming, Xu Baowen, Leung Hareton, and Chen Lin. 2014. An in-depth study of the potentially confounding effect of class size in fault prediction. ACM Trans. Softw. Eng. Methodol. 23, 1 (2014), 151.Google ScholarGoogle ScholarDigital LibraryDigital Library
  445. [445] Zhou Yuming, Yang Yibiao, Lu Hongmin, Chen Lin, Li Yanhui, Zhao Yangyang, Qian Junyan, and Xu Baowen. 2018. How far we have progressed in the journey? An examination of cross-project defect prediction. ACM Trans. Softw. Eng. Methodol. 27, 1 (2018), 151.Google ScholarGoogle ScholarDigital LibraryDigital Library
  446. [446] Zhou Zhi-Hua. 2009. Ensemble Learning.Encyc. Biomet. 1 (2009), 270273.Google ScholarGoogle ScholarCross RefCross Ref
  447. [447] Zimmermann Thomas, Nagappan Nachiappan, Gall Harald, Giger Emanuel, and Murphy Brendan. 2009. Cross-project defect prediction: A large scale experiment on data vs. domain vs. process. In Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 91100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  448. [448] Zimmermann Thomas, Nagappan Nachiappan, Guo Philip J., and Murphy Brendan. 2012. Characterizing and predicting which bugs get reopened. In Proceedings of the 34th International Conference on Software Engineering (ICSE). IEEE, 10741083.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Predictive Models in Software Engineering: Challenges and Opportunities

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Software Engineering and Methodology
      ACM Transactions on Software Engineering and Methodology  Volume 31, Issue 3
      July 2022
      912 pages
      ISSN:1049-331X
      EISSN:1557-7392
      DOI:10.1145/3514181
      • Editor:
      • Mauro Pezzè
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 April 2022
      • Online AM: 31 January 2022
      • Accepted: 1 November 2021
      • Revised: 1 October 2021
      • Received: 1 March 2021
      Published in tosem Volume 31, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • survey
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format