A Bug Report Analysis and Search Tool and Its Validation
Resumo
De acordo com um trabalho recente, entradas de relatório de bug duplicadas em rastreadores de bug impactam negativamente na manutenção de software e produtividade de evolução devido a, entre outros fatores, o aumento do tempo gasto na análise do relatório. Esse tipo de a duplicação é caracterizada pelo envio de dois ou mais relatórios de bug que descrever o mesmo problema de software. Nesse sentido, esta dissertação investiga e caracteriza o problema de duplicação do relatório de bug e propõe uma solução para isto.
Palavras-chave:
Bug Report, Ferramenta de Busca, Validação
Referências
Antoniol, G., Penta, M. D., Gall, H., and Pinzger, M. (2005). Towards the integration of versioning systems, bug reports and source code meta-models. Electronic Notes in Theoretical Computer Science, 127(3), 87–99.
Anvik, J. and Murphy, G. C. (2007). Determining implementation expertise from bug reports. In Proc. of the 4th Inter. Work. on Mining Soft. Repositories (MSR’07). IEEE.
Anvik, J., Hiew, L., and Murphy, G. C. (2005). Coping with an open bug repository. In Proc. of the 2005 OOPSLA Work. on Eclipse Technology eXchange, pages 35–39.
Anvik, J., Hiew, L., and Murphy, G. C. (2006). Who should fix this bug? In Proc. of the 28th Inter. Conf. on Soft. Eng. (ICSE’06), pages 361–370.
Baeza-Yates, R. A. and Ribeiro-Neto, B. A. (1999). Modern Information Retrieval. Addison-Wesley.
Basili, V., Selby, R., and Hutchens, D. (1986). Experimentation in software engineering. IEEE Trans. on Soft. Eng., 12(7), 733–743.
Bennett, K. H. and Rajlich, V. T. (2000). Software maintenance and evolution: a roadmap. In Proc. of the Conf. on The Future of Soft. Eng. (ICSE’00), pages 73–87.
Bettenburg, N., Just, S., Schroter, A., Weiss, C., Premraj, R., and Zimmermann, T. (2007). Quality of bug reports in eclipse. In Proc. of the 2007 OOPSLA Work. on Eclipse Technology eXchange (Eclipse ’07), pages 21–25. ACM.
Canfora, G. and Cerulo, L. (2005). Impact analysis by mining software and change request repositories. In Proc. of the 11th IEEE Inter. Soft. Metrics Symposium (METRICS’05), page 29.
Canfora, G. and Cerulo, L. (2006). Supporting change request assignment in open source development. In Proc. of the 2006 ACM Symposium on Applied Comp. (SAC’06), pages 1767–1772. ACM
Card, S. K., Mackinlay, J. D., and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think. The Morgan Kaufmann Series in Interactive Technologies. Morgan Kaufmann.
Eastwood, A. (1993). Firm fires shots at legacy systems. Comp. Canada, 19(2), 17.
Erlikh, L. (2000). Leveraging legacy system dollars for e-business. IT Professional, 2(3), 17–23.
Fischer, M., Pinzger, M., and Gall, H. (2003a). Analyzing and relating bug re port data for feature tracking. In Proc. of the 10th Working Conf. on Reverse Eng. (WCRE’03), pages 90–99.
Fischer, M., Pinzger, M., and Gall, H. (2003b). Populating a release history database from version control and bug tracking systems. In Proc. of the 19th Inter. Conf. on Soft. Maintenance (ICSM’03), pages 23–32. IEEE.
Hiew, L. (2006). Assisted Detection of Duplicate Bug Reports. Master’s thesis, The University of British Columbia.
Huff, F. (1990). Information systems maintenance. The Business Quarterly, (55), 30–32.
Kagdi, H., Maletic, J., and Sharif, B. (2007a). Mining software repositories for traceability links. In In the Proc. of the 15 IEEE Inter. Conf. on Program Comprehension (ICPC’07), pages 145–154.
Kagdi, H., Collard, M. L., and Maletic, J. I. (2007b). A survey and taxonomy of approaches for mining software repositories in the context of software evolution: Survey articles. Journal of Soft. Maint. and Evol., 19(2), 77–131.
Ko, A. J., Myers, B. A., and Chau, D. H. (2006). A linguistic analysis of how people describe software problems. In Proc. of the Visual Languages and Human-Centric Computing (VLHCC’06), pages 127–134.
Koponen, T. and Lintula, H. (2006). Are the changes induced by the defect reports in the open source software maintenance? In H. R. Arabnia and H. Reza, editors, Proc. of the 2006 Inter. Conf. on Soft. Eng. Research (SERP’06), pages 429–435. CSREA.
Lancaster, F. W. (1986). Vocabulary Control for Information Retrieval. Information Resources Press, 2 edition.
Moad, J. (1990). Maintaining the competitive edge. Datamation, 4(36), 61–62.
Panjer, L. D. (2007). Predicting eclipse bug lifetimes. In Proc. of the Fourth Inter. Workshop on Mining Soft. Repositories (MSR’07), page 29.
Podgurski, A., Leon, D., Francis, P., Masri, W., Minch, M., Sun, J., and Wang, B. (2003). Automated support for classifying software failure reports. In Proc. of the 25th Inter. Conf. on Soft. Eng. (ICSE’03), pages 465–475.
Runeson, P., Alexandersson, M., and Nyholm, O. (2007). Detection of duplicate defect reports using natural language processing. In Proc. of the 29th Inter. Conf. on Soft. Eng. (ICSE’07), pages 499–510. IEEE.
Salton, G., Wong, A., and Yang, C. S. (1975). A vector space model for automatic indexing. Commun. ACM, 18(11), 613–620.
Sandusky, R. J., Gasser, L., and Ripoche, G. (2004). Bug report networks: Varieties, strategies, and impacts in a f/oss development community. In Proc. of the 1st Inter. Work. on Mining Soft. Repositories (MSR’04).
Sommerville, I. (2007). Software Engineering. Addison Wesley, 8 edition.
Song, Q., Shepperd, M. J., Cartwright, M., and Mair, C. (2006). Software defect association mining and defect correction effort prediction. IEEE Trans. on Soft. Eng., 32(2), 69–82.
Wang, X., Zhang, L., Xie, T., Anvik, J., and Sun, J. (2008). An approach to detecting duplicate bug reports using natural language and execution information. In Proc. of the 13th Inter. Conf. on Soft. Eng. (ICSE’08), pages 461–470. ACM.
Weiss, C., Premraj, R., Zimmermann, T., and Zeller, A. (2007). How long will it take to fix this bug? In Proc. of the 4th Inter. Work. on Mining Soft. Repositories (MSR’07), pages 20–26. IEEE.
Anvik, J. and Murphy, G. C. (2007). Determining implementation expertise from bug reports. In Proc. of the 4th Inter. Work. on Mining Soft. Repositories (MSR’07). IEEE.
Anvik, J., Hiew, L., and Murphy, G. C. (2005). Coping with an open bug repository. In Proc. of the 2005 OOPSLA Work. on Eclipse Technology eXchange, pages 35–39.
Anvik, J., Hiew, L., and Murphy, G. C. (2006). Who should fix this bug? In Proc. of the 28th Inter. Conf. on Soft. Eng. (ICSE’06), pages 361–370.
Baeza-Yates, R. A. and Ribeiro-Neto, B. A. (1999). Modern Information Retrieval. Addison-Wesley.
Basili, V., Selby, R., and Hutchens, D. (1986). Experimentation in software engineering. IEEE Trans. on Soft. Eng., 12(7), 733–743.
Bennett, K. H. and Rajlich, V. T. (2000). Software maintenance and evolution: a roadmap. In Proc. of the Conf. on The Future of Soft. Eng. (ICSE’00), pages 73–87.
Bettenburg, N., Just, S., Schroter, A., Weiss, C., Premraj, R., and Zimmermann, T. (2007). Quality of bug reports in eclipse. In Proc. of the 2007 OOPSLA Work. on Eclipse Technology eXchange (Eclipse ’07), pages 21–25. ACM.
Canfora, G. and Cerulo, L. (2005). Impact analysis by mining software and change request repositories. In Proc. of the 11th IEEE Inter. Soft. Metrics Symposium (METRICS’05), page 29.
Canfora, G. and Cerulo, L. (2006). Supporting change request assignment in open source development. In Proc. of the 2006 ACM Symposium on Applied Comp. (SAC’06), pages 1767–1772. ACM
Card, S. K., Mackinlay, J. D., and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think. The Morgan Kaufmann Series in Interactive Technologies. Morgan Kaufmann.
Eastwood, A. (1993). Firm fires shots at legacy systems. Comp. Canada, 19(2), 17.
Erlikh, L. (2000). Leveraging legacy system dollars for e-business. IT Professional, 2(3), 17–23.
Fischer, M., Pinzger, M., and Gall, H. (2003a). Analyzing and relating bug re port data for feature tracking. In Proc. of the 10th Working Conf. on Reverse Eng. (WCRE’03), pages 90–99.
Fischer, M., Pinzger, M., and Gall, H. (2003b). Populating a release history database from version control and bug tracking systems. In Proc. of the 19th Inter. Conf. on Soft. Maintenance (ICSM’03), pages 23–32. IEEE.
Hiew, L. (2006). Assisted Detection of Duplicate Bug Reports. Master’s thesis, The University of British Columbia.
Huff, F. (1990). Information systems maintenance. The Business Quarterly, (55), 30–32.
Kagdi, H., Maletic, J., and Sharif, B. (2007a). Mining software repositories for traceability links. In In the Proc. of the 15 IEEE Inter. Conf. on Program Comprehension (ICPC’07), pages 145–154.
Kagdi, H., Collard, M. L., and Maletic, J. I. (2007b). A survey and taxonomy of approaches for mining software repositories in the context of software evolution: Survey articles. Journal of Soft. Maint. and Evol., 19(2), 77–131.
Ko, A. J., Myers, B. A., and Chau, D. H. (2006). A linguistic analysis of how people describe software problems. In Proc. of the Visual Languages and Human-Centric Computing (VLHCC’06), pages 127–134.
Koponen, T. and Lintula, H. (2006). Are the changes induced by the defect reports in the open source software maintenance? In H. R. Arabnia and H. Reza, editors, Proc. of the 2006 Inter. Conf. on Soft. Eng. Research (SERP’06), pages 429–435. CSREA.
Lancaster, F. W. (1986). Vocabulary Control for Information Retrieval. Information Resources Press, 2 edition.
Moad, J. (1990). Maintaining the competitive edge. Datamation, 4(36), 61–62.
Panjer, L. D. (2007). Predicting eclipse bug lifetimes. In Proc. of the Fourth Inter. Workshop on Mining Soft. Repositories (MSR’07), page 29.
Podgurski, A., Leon, D., Francis, P., Masri, W., Minch, M., Sun, J., and Wang, B. (2003). Automated support for classifying software failure reports. In Proc. of the 25th Inter. Conf. on Soft. Eng. (ICSE’03), pages 465–475.
Runeson, P., Alexandersson, M., and Nyholm, O. (2007). Detection of duplicate defect reports using natural language processing. In Proc. of the 29th Inter. Conf. on Soft. Eng. (ICSE’07), pages 499–510. IEEE.
Salton, G., Wong, A., and Yang, C. S. (1975). A vector space model for automatic indexing. Commun. ACM, 18(11), 613–620.
Sandusky, R. J., Gasser, L., and Ripoche, G. (2004). Bug report networks: Varieties, strategies, and impacts in a f/oss development community. In Proc. of the 1st Inter. Work. on Mining Soft. Repositories (MSR’04).
Sommerville, I. (2007). Software Engineering. Addison Wesley, 8 edition.
Song, Q., Shepperd, M. J., Cartwright, M., and Mair, C. (2006). Software defect association mining and defect correction effort prediction. IEEE Trans. on Soft. Eng., 32(2), 69–82.
Wang, X., Zhang, L., Xie, T., Anvik, J., and Sun, J. (2008). An approach to detecting duplicate bug reports using natural language and execution information. In Proc. of the 13th Inter. Conf. on Soft. Eng. (ICSE’08), pages 461–470. ACM.
Weiss, C., Premraj, R., Zimmermann, T., and Zeller, A. (2007). How long will it take to fix this bug? In Proc. of the 4th Inter. Work. on Mining Soft. Repositories (MSR’07), pages 20–26. IEEE.
Publicado
07/06/2010
Como Citar
CAVALCANTI, Yguaratã Cerqueira; ALMEIDA, Eduardo Santana de; MEIRA, Silvio de Lemos.
A Bug Report Analysis and Search Tool and Its Validation. In: SIMPÓSIO BRASILEIRO DE QUALIDADE DE SOFTWARE (SBQS), 9. , 2010, Belém.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2010
.
p. 455-472.
DOI: https://doi.org/10.5753/sbqs.2010.15453.