Software configuration engineering in practice interviews, survey, and systematic literature review
Modern software applications are adapted to different situations (eg, memory limits,
enabling/disabling features, database credentials) by changing the values of configuration …
enabling/disabling features, database credentials) by changing the values of configuration …
Detecting missing information in bug descriptions
Bug reports document unexpected software behaviors experienced by users. To be
effective, they should allow bug triagers to easily understand and reproduce the potential …
effective, they should allow bug triagers to easily understand and reproduce the potential …
Predicting semantically linkable knowledge in developer online forums via convolutional neural network
Consider a question and its answers in Stack Overflow as a knowledge unit. Knowledge
units often contain semantically relevant knowledge, and thus linkable for different purposes …
units often contain semantically relevant knowledge, and thus linkable for different purposes …
Bug characteristics in blockchain systems: a large-scale empirical study
Bugs severely hurt blockchain system dependability. A thorough understanding of
blockchain bug characteristics is required to design effective tools for preventing, detecting …
blockchain bug characteristics is required to design effective tools for preventing, detecting …
Bee: A tool for structuring and analyzing bug reports
Y Song, O Chaparro - Proceedings of the 28th ACM joint meeting on …, 2020 - dl.acm.org
This paper introduces BEE, a tool that automatically analyzes user-written bug reports and
provides feedback to reporters and developers about the system's observed behavior (OB) …
provides feedback to reporters and developers about the system's observed behavior (OB) …
What constitutes the deployment and runtime configuration system? An empirical study on openstack projects
Modern software systems are designed to be deployed in different configured environments
(eg, permissions, virtual resources, network connections) and adapted at runtime to different …
(eg, permissions, virtual resources, network connections) and adapted at runtime to different …
Towards understanding bugs in an open source cloud management stack: An empirical study of OpenStack software bugs
Cloud management stack (CMS) provides convenience for organizations in managing their
cloud platforms. CMS software is complex and bugs in it can cause serious damage to the …
cloud platforms. CMS software is complex and bugs in it can cause serious damage to the …
Empirical analysis on effectiveness of source code metrics for predicting change-proneness
Change-prone classes or modules are defined as software components in the source code
which are likely to change in the future. Change-proneness prediction are useful to the …
which are likely to change in the future. Change-proneness prediction are useful to the …
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm
In software engineering fault proneness prediction is one of the important fields for quality
measurement using multiple code metrics. The metrics thresholds are very practical in …
measurement using multiple code metrics. The metrics thresholds are very practical in …
Using source code metrics and ensemble methods for fault proneness prediction
Software fault prediction model are employed to optimize testing resource allocation by
identifying fault-prone classes before testing phases. Several researchers' have validated …
identifying fault-prone classes before testing phases. Several researchers' have validated …