Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction
Cross-project defect prediction (CPDP) refers to predicting defects in a target project using
prediction models trained from historical data of other source projects. And CPDP in the …
prediction models trained from historical data of other source projects. And CPDP in the …
Characterizing and predicting blocking bugs in open source projects
H Valdivia Garcia, E Shihab - … of the 11th working conference on mining …, 2014 - dl.acm.org
As software becomes increasingly important, its quality becomes an increasingly important
issue. Therefore, prior work focused on software quality and proposed many prediction …
issue. Therefore, prior work focused on software quality and proposed many prediction …
Towards building a universal defect prediction model
To predict files with defects, a suitable prediction model must be built for a software project
from either itself (within-project) or other projects (cross-project). A universal defect …
from either itself (within-project) or other projects (cross-project). A universal defect …
A benchmark study on the effectiveness of search-based data selection and feature selection for cross project defect prediction
Context Previous studies have shown that steered training data or dataset selection can
lead to better performance for cross project defect prediction (CPDP). On the other hand …
lead to better performance for cross project defect prediction (CPDP). On the other hand …
The impact of automated feature selection techniques on the interpretation of defect models
The interpretation of defect models heavily relies on software metrics that are used to
construct them. Prior work often uses feature selection techniques to remove metrics that are …
construct them. Prior work often uses feature selection techniques to remove metrics that are …
Cross project defect prediction via balanced distribution adaptation based transfer learning
Defect prediction assists the rational allocation of testing resources by detecting the
potentially defective software modules before releasing products. When a project has no …
potentially defective software modules before releasing products. When a project has no …
Which log level should developers choose for a new logging statement?
Logging statements are used to record valuable runtime information about applications.
Each logging statement is assigned a log level such that users can disable some verbose …
Each logging statement is assigned a log level such that users can disable some verbose …
[HTML][HTML] Toward a catalog of software quality metrics for infrastructure code
Abstract Infrastructure-as-code (IaC) is a practice to implement continuous deployment by
allowing management and provisioning of infrastructure through the definition of machine …
allowing management and provisioning of infrastructure through the definition of machine …
Comparing static bug finders and statistical prediction
The all-important goal of delivering better software at lower cost has led to a vital, enduring
quest for ways to find and remove defects efficiently and accurately. To this end, two parallel …
quest for ways to find and remove defects efficiently and accurately. To this end, two parallel …
Signature verification competition for online and offline skilled forgeries (sigcomp2011)
The Netherlands Forensic Institute and the Institute for Forensic Science in Shanghai are in
search of a signature verification system that can be implemented in forensic casework and …
search of a signature verification system that can be implemented in forensic casework and …