Dependency Graph and Metrics for Defects Prediction
|
|
- Sharleen Gibson
- 6 years ago
- Views:
Transcription
1 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 115 Dependency Graph and Metrics for Defects Prediction Hesham Abandah JUST University Jordan-Irbid heshama@just.edu.jo Izzat Alsmadi Yarmouk University Jordan-Irbid ialsmadi@yu.edu.jo ABSTRACT Software defects prediction was introduced to support development and maintenance activities and improve the software quality. Reliable defect predictors can significantly optimize the utilization of software projects resources and increase customers confidence in the developed software products. In this paper, three different classifiers (LMT, SMO and J48) are used to study the relations between dependency collected metrics and bugs collected for the software under study. ANT open source software is used in this case study. The selection of this open source was relation to the availability of source code and bug reports. Results varied between the three classifiers and showed J48 to be the best classifier in terms of predicating such correlation between dependency metrics and defects. In general the three classifiers showed that there is a high significant correlation between proposed and evaluated dependency metrics and software defects which showed that they can be used as important early predictors for the software quality in general. Author Keywords Software quality, software testing, coupling metrics, dependency metrics, call-graph, defects prediction. ACM Classification Keywords D.2.8 Software Engineering: Metrics: Product metrics. General Terms Software Engineering; Metrics; Product metrics. 1. INTRODUCTION For software project management, the ability to predict software quality is important for current and future activities. It is important to plan evaluation and testing for requirements, design, implementation and testing in the lifetime of the project. Further, it can help in planning future software maintenance and evolution activities after the release of the software. Software metrics are used to collect information related to one or more software attributes with the goal of evaluating such software. Software metrics can be related to the software product, development process, management activities, etc. For software products in particular, several aspects related to the software can be assessed. Tools can be used to collect such information automatically with the least effort and time from the users side. Those metrics are usually collected from the software design or code. There are important aspects for quality assurance and auditing. Call graph and dependency metrics give indication of the connectivity and the complexity of the software components interactions. While such interactions are necessary and without such interactions, software will not be able to perform its intended tasks; nevertheless, the large number of connections between software components can be a main factor for causing its complexity. Such complexity can be eventually a major contributor to the difficulty to maintain, extend or reuse such software. The rest of the paper is organized as the following: The next section involves a literature review for some related papers. Section three describes the methodology to develop call graph based metric tool and then based on ANT 1.7 open source code and bugs, study relation with bugs. Section four includes analysis and evaluation, section five includes experiments and the paper is concluded in section six. 2. LITERATURE REVIEW In this literature survey section, we will list several examples of research papers in two sections. In the first one, we will list examples of papers discussed the proposal and evaluation of dependency or call graph metrics in software products evaluation. The second section is in relation with using one or more software products aspects for defects prediction. Several research papers tried to develop metrics based on call graphs and derive dependency metrics, especially code metrics and size metrics. Values of such metrics are usually assessed based on defects prediction. Many researchers studied software modeling and found that modeling techniques were grouped into mainly two categories: Graphical modeling techniques that use a diagram with d symbols to represent the components and arcs that connect the symbols and represent the relationships and other notations to represent the constrains. Textual modeling techniques used a standardized notations and keywords to represent software components. The researchers in [2] considered the process of extracting call dependencies as one of the most important steps in software reengineering. They developed a tool for call graph extraction based on OINK framework. The researchers in [6] made an enhancement for the hierarchical edge bundling (HEB) technique to be used as a candidate visualization technique in their framework. An experiment is conducted to compare their enhancement (HEB) and Tulip graph visualization framework. Several large systems (Bison, Mozilla Firefox, and OINK) are analyzed to conclude with the differences between the two visualization
2 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 116 techniques. The results showed that (HEB) scheme performs better in typical comprehension tasks involving. The researchers in [3] introduced a new framework for call graph construction to be used for program analyses. They chose (ASM and Soot) as byte code readers for their environment to store information about the structure of the codes such as: classes, methods, files, and statements. As a next step in the proposed framework three algorithms have been implemented for call graph construction (CHA, RTA and CTA). Finally the authors concluded with an experimental study on a variety of source code programs in order to compare the two byte code readers. [3] The second section of related papers include references to papers used one or more software aspects for faults prediction. A number of approaches have been deployed for defect prediction, which they depend on different criteria and information. Some researchers turn to finding bugs in software code by analyzing the source code for that software and estimating its complexity. This approach is based on extracting specific metrics from source code, then use these metrics to decide which part (e.g. module) of the software code that is likely to be defected. On the other hand, other researchers prefer to use the system history to decide which part of them has a large probability to be defected. This is especially useful when the application has many releases. Research papers showed that the system history is more accurate for predicting defected parts of the system in comparison with code complexity. For these reasons other studies drawn that support the two approaches together and use them both in finding systems bugs. The researchers in [4] used decision tree learners to compare the influence of different metrics used in defect prediction and predicting defects densities. They collected the data needed (i.e. source code metrics and bug reports) in the experiment from seven versions of Mozilla open source code. They applied J48 algorithm in WEKA data miner on the data set, and based on different experiments data and constraints to formulate defects prediction hypotheses, they concluded that a simple tree learner can produce good results with various sets of input data, and in finding underlying roles for defect prediction. The researchers in [5] used code churn measures to introduce a new technique for prediction of defects density. The idea was drawn with a hypothesis that was based on the assumption that the code may evolve many times in the prerelease version then it will have a major chance to be defected in the post release. The authors conducted an experiment on W2K3 release and the release of W2K3 service pack and showed that code churn is a good defect predictor. They found out that the increase of the code churn measures leads to an increase on the defect density in any software. They conclude that their metrics set: LOC churned, Deleted LOC, Files churned, Churn count, Weeks of churn, churn count, and files count can report if a part of the system are defected or not with accuracy of 89 %. Software developers aim to evaluate the software in terms quality before delivering it to customers to predict possible future bugs or defects especially for critical systems that should be as free of such bugs and defects as possible. In [7, 8] researchers used CGBR metric to evaluate the ability of software metrics to predict faults. They used a case study of software from a local company and their results showed that false alarms in prediction of defects using this metric can be reduced. In one more paper [9] their results based on large software for a telecommunication company that 70% of the defects could be detected by inspecting only 3% of the code. 3. METHODOLOGY We developed a tool to build dynamically dependency graphs based on calls between the different code classes. [1] 4. ANALYSIS AND EVALUATION After refining the generated CSV file that represents the data set of our research with bug attribute then it will be ready to analyze and evaluate using tool WEKA as data miner tool. At this study we apply the following classifier algorithms such as J48 algorithm, Logistic Model Trees (LMT) Algorithm and Support Vector Machine Algorithm (SMO) classifier. The decision tree algorithm was chosen since we want to look at classifiers that were easy to understand, so we could see how valid the correlation between call graphs based metrics and bug. 4.1 Evaluation Measures Table 1 shows the source code metrics that are collected for the ANT project. Metric Metric Matrix Type LOC Fan In Fan Out CGBR # of executable and non-commented line code for each function # of callee function list # of called function list (1 d) + d * i CGBR(Ti) C(Ti) IFC IFC(M) = LOC(M) + [fan-in(m) x fan-out(m)] 2 Table 1. Call graph based matrices measurements [1] The five metrics we use at this research are related to size of the software or related to coupling and dependency between the components and functions of the application under investigation. LOC metric value represents the number of executable and non-commented lines of code. FanIn metric value for such function represents the number of function calling a given function. FanOut metric value for such function represents the number of function being called by a given function. CGBR metric is an abbreviation
3 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 117 to call graph based ranking and proposed by [7, 8]. This metric depends on the page ranking algorithm that used by almost of the search engines, where the ranking methodology is adopted to functions of the software. This metric hypothesis that more frequently used functions and less used modules should have different defects and bugs characteristic. IFC metric is abbreviated to information flow complexity (IFC) and represents the measurement of the total level of information flow of given function. 4.2 Principle Component Analysis using SPSS The purpose of this analysis is to show how metrics in developed tool correlate to each other. Table (2) described PCA analysis for call graph based metrics in developed tool results in 2 orthogonal dimension components were identified from 5 call graph based metrics that have Eigen value more than 1. According to this, medium redundancy presented among these measures. In the Table 4.2, Eigen values, the variance of the data set explained by the PC (in percent), and the cumulative variance are provided for each PC. Values above 0.6 are set in boldface. The 2 PCs capture % of the variance in the data set. Component 1 2 Eigen value % of Variance Cumulative % CGBR LOC IFC FanIn FanOut Table 2. Rotated Component Matrix for developed tool The PCs are interpreted as follows: PC1: CBGR, LOC, FanIn, and FanOut are coupling and size metrics. We have size and coupling metrics in this dimension. This shows that there are classes with high internal methods (methods defined in the class) and external methods (methods called by the class). This means coupling is related to number of methods and attributes in the class. PC2: IFC measure the total level of information flow of a module and reflect the degree of flow complexity among classes. 5. EXPERMENTS At the first step, we collect the source code for the application of the study, ANT 1.7. We enter the source code for the application to a developed C# tool in order to generate call graph model for it. After that, the developed tool computes the desired metrics for each function extracted. Then compute the same metrics to classes and output the results into CSV file that represent the data set to be tested. The next step is refining the data set with bug report related to each application under investigation. Finally, evaluate the value of the metrics in terms bug and defect detection. The format of the data set should be ARRF file, since the classifier algorithms such as J48 algorithm and M5P algorithm accepts only the files with that format. The accuracy is calculated with ten-fold cross validation. The attributes of the file listed in the figure (1) Figure 1. Attributes of the data set The attribute bug is classified into three categories based on the number of bugs for each class. Table (3) illustration the all types of bugs. Bug Categories Two Three 5.1 Experimental Results Metric Matrix VL == 0 errors / L == 1 error / M == 2 errors / H == 3 errors / VH == > 3 error L == 0 errors / M == 1-2 errors / H == > 2 errors False == no errors / True == exist errors Table 3. Categories of bugs The results of experiments show that there is an obvious correlation between the call graph based metrics and the bug and defects of the application. Table (4) will summarize all the result of the experiment. Bug Category Category Category Category Two Three % % % Table 4. Summary of the experiments results in terms of bug categories
4 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 118 As we show in the figure (2) that correlation between bug and the desired software metrics will be high when we split the bug class into small number of categories, like category three that split the bug class into two categories. So we take category three as criteria to compare the J48 classifier on the applications under investigation output to other classifier output such as Logistic Model Trees (LMT) classifier and Support Vector Machine Algorithm (SMO) classifier % 75.00% 74.00% 73.00% 72.00% Figure 2. Summary of the experiments results in terms of bug categories As we show in the Table (5) and figure (3) the results of three classifier algorithm are approximately have similar values, where that leads us to conclude that correlation is very high between the call graph metrics and bugs of the application under investigation. Classifier algorithm J84 LMT SMO % `% % Table 5. Summary of the experiments result in terms of algorithm types % 80.00% 60.00% 40.00% 20.00% 0.00% Category 74.51% 73.54% Category Category Two Three 75.65% J84 LMT SMO Figure 3. Summary of the experiments result in terms of algorithm types Finally, we make some normalization to our data set by excluding the non public functions such as private and protected functions from the computation of the call graph metrics for the applications under investigation, and we list the results of analysis at Table (6) Classifier algorithm J84 LMT SMO % % % Table 6. Summary of the experimental results of data set excluding non-public functions As we show in the Table (6) and figure (4) the results of three classifier algorithm are approximately have similar values, where that leads us to conclude that correlation is very high between the call graph metrics that computed without non public functions and bugs of the application under investigation % 80.00% 60.00% 40.00% 20.00% 0.00% Figure 4. Summary of the experiments results of data set excluding non-public functions After studying the results in Table (5) and results in Table (6), we show that the percentage of the proposed correlation between call graph based metrics and bugs in software design is raised up when the J48 classifier algorithm is used. 6. CONCLUSION J84 LMT SMO Coupling metrics can be significant indicators on the complexity of the software products. They indicate the level of interaction between software components. In software maintenance and software quality, techniques are used to predict software quality using current software products, tools or samples of those products. The goal is to be able to predict quality of the developed software with the least amount of possible human effort.
5 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 119 In this paper, we used the information collected from several code coupling or dependency metrics to evaluate their correlation with software defects and hence their ability to predict the current or future existence of those defects. ANT open source code is used for the evaluation study. Both metrics and bug reports are collected automatically based on a locally developed tool. Results showed a significant correlation between evaluated metrics and software bugs. Given that the whole process is automated, those techniques can provide important assets for quality assurance and auditing. References 1. Abandah, H. and Alsmadi I., Call Graph Based Metrics To Evaluate Software Design Quality, International Journal of Software Engineering and Its s IJSEIA, Bohnet, J., and Döllner, J. (2006). Visual exploration of function call graphs for feature location in complex software systems. Proceedings of the 2006 ACM symposium on Software visualization SoftVis 06, Vol. 1, pp ACM Press. Retrieved from Honar, E. and Jahromi, M., (2010). A Framework for Call Graph Construction, Student thesis At School of Computer Science, Physics and Mathematics 4. Knab, P, Pinzger, M and Bernstein, A. (2006). Predicting defect densities in source code files with decision tree learners. Proceedings of the 2006 international workshop on Mining software repositories, May 22-23, 2006, Shanghai, China [doi> / ] 5. Nagappan, N., Ball, T., (2005), Use of relative code churn measures to predict system defect density, Proceedings of the 27th international conference on Software engineering, pp: , May 15-21, 2005, St. Louis, MO, USA [doi> / ] 6. Telea, A., Hoogendorp, H., Ersoy, O., and Reniers, D. (2009). Extraction and visualization of call dependencies for large C/C++ code bases: A comparative study th IEEE International Workshop on Visualizing Software for Understanding and Analysis, pp: IEEE. Retrieved from rnumber= Turhan, B., and Bener, A. (2008). Data sampling for cross company defect predictors, Technical Report, Computer Engineering, Bogazici University. 8. Turhan, B., and Bener, A. (2007). A multivariate analysis of static code attributes for defect prediction. Quality software, QSIC 07. In Seventh international conference (pp ). 9. Turhan, B., Gozde K., and Bener, A. Data mining source code for locating software bugs: A case study in telecommunication industry, Expert Systems with s 36 (2009)
Replication of Defect Prediction Studies
Replication of Defect Prediction Studies Problems, Pitfalls and Recommendations Thilo Mende University of Bremen, Germany PROMISE 10 12.09.2010 1 / 16 Replication is a waste of time. " Replicability is
More informationPREDICTION OF DEFECT DENSITY FOR OPEN SOURCE SOFTWARE USING REPOSITORY METRICS
Journal of Web Engineering, Vol. 6, No.3&4 (207) 293-30 Rinton Press PREDICTION OF DEFECT DENSITY FOR OPEN SOURCE SOFTWARE USING REPOSITORY METRICS DINESH VERMA Jaypee University of Engineering and Technology,
More informationSoftware Data Analytics. Nevena Lazarević
Software Data Analytics Nevena Lazarević 1 Selected Literature Perspectives on Data Science for Software Engineering, 1st Edition, Tim Menzies, Laurie Williams, Thomas Zimmermann The Art and Science of
More informationSoftware Fault Prediction Using Single Linkage Clustering Method
Software Fault Prediction Using Single Linkage Clustering Method K.C. Sujitha, S. Leninisha PG Student, Dept. of IT, Easwari Engineering College, Chennai, Tamilnadu, India 1 Assistant Professor, Dept.
More informationOf Changes and their History: Ideas for New IDEs
Of Changes and their History: Ideas for New IDEs Harald Gall University of Zurich Department of Informatics http://seal.ifi.uzh.ch "The study of products is vastly more important than the study of production,
More informationImpact of Restricted Forward Greedy Feature Selection Technique on Bug Prediction
Impact of Restricted Forward Greedy Feature Selection Technique on Bug Prediction K Muthukumaran, N L Bhanu Murthy BITS Pilani Hyderabad Campus Shameerpet, RR District, AP 500078 {p2011415, bhanu }@hyderabad.bits-pilani.ac.in
More informationIntroduction to Software Metrics
Introduction to Software Metrics Outline Today we begin looking at measurement of software quality using software metrics We ll look at: What are software quality metrics? Some basic measurement theory
More informationSOFTWARE FAULT PREDICTION: A REVIEW
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
More informationA Comparative Study of Filter-based Feature Ranking Techniques
Western Kentucky University From the SelectedWorks of Dr. Huanjing Wang August, 2010 A Comparative Study of Filter-based Feature Ranking Techniques Huanjing Wang, Western Kentucky University Taghi M. Khoshgoftaar,
More informationM. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content",
M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content", Information and Software Technology, Vol. 40, No. 14, pp.
More informationPractical Considerations in Deploying Statistical Methods for Defect Prediction: A Case Study within the Turkish Telecommunications Industry
Manuscript Click here to view linked References Practical Considerations in Deploying Statistical Methods for Defect Prediction: A Case Study within the Turkish Telecommunications Industry Ayşe Tosun 1,
More informationDESIGN AND DEVELOPMENT OF SOFTWARE FAULT PREDICTION MODEL TO ENHANCE THE SOFTWARE QUALITY LEVEL
International Journal of Information Technology and Management Information Systems (IJITMIS) Volume 1, Issue 2007, Jan Dec 2007, pp. 01 06 Available online at http://www.iaeme.com/ijitmis/issues.asp?jtype=ijitmis&vtype=1&itype=2007
More informationInformation and Software Technology
Information and Software Technology 55 (2013) 1479 1495 Contents lists available at SciVerse ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Predicting
More informationEnhanced Cost Sensitive Boosting Network for Software Defect Prediction
Enhanced Cost Sensitive Boosting Network for Software Defect Prediction Sreelekshmy. P M.Tech, Department of Computer Science and Engineering, Lourdes Matha College of Science & Technology, Kerala,India
More informationQuality Assessment Method for Software Development Process Document based on Software Document Characteristics Metric
Quality Assessment Method for Software Development Process Document based on Software Document Characteristics Metric Patra Thitisathienkul, Nakornthip Prompoon Department of Computer Engineering Chulalongkorn
More informationMining Software Repositories
Mining Software Repositories What is MSR? Mining Software Repositories (MSR) uses data available in repositories to support development activities For example, defect assignment, software validation, evolution
More informationEvaluating Software Development Environments
Evaluating Software Development Environments Brendan Murphy Microsoft Research Cambridge Talk Overview History of Software Metrics Defining Clear Goals Review of Metrics Contextual Constraints Progression
More informationIntroduction to Software Metrics
Introduction to Software Metrics Outline Today we begin looking at measurement of software quality using software metrics We ll look at: What are software quality metrics? Some basic measurement theory
More informationAssociation rules model of e-banking services
Association rules model of e-banking services V. Aggelis Department of Computer Engineering and Informatics, University of Patras, Greece Abstract The introduction of data mining methods in the banking
More informationAssociation rules model of e-banking services
In 5 th International Conference on Data Mining, Text Mining and their Business Applications, 2004 Association rules model of e-banking services Vasilis Aggelis Department of Computer Engineering and Informatics,
More informationAMERICAN SOCIETY FOR QUALITY CERTIFIED RELIABILITY ENGINEER (CRE) BODY OF KNOWLEDGE
AMERICAN SOCIETY FOR QUALITY CERTIFIED RELIABILITY ENGINEER (CRE) BODY OF KNOWLEDGE The topics in this Body of Knowledge include additional detail in the form of subtext explanations and the cognitive
More informationAPPLY ANT COLONY ALGORITHM TO TEST CASE PRIORITIZATION
APPLY ANT COLONY ALGORITHM TO TEST CASE PRIORITIZATION Chien-Li Shen* and Eldon Y. Li, Department of Information Management, College of Commerce National Chengchi University, Taiwan E-mail: 99356508@nccu.edu.tw,
More informationmywbut.com Software Reliability and Quality Management
Software Reliability and Quality Management 1 Software Reliability Issues 2 Specific Instructional Objectives At the end of this lesson the student would be able to: Differentiate between a repeatable
More informationFraud Detection for MCC Manipulation
2016 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 2016) ISBN: 978-1-60595-345-8 Fraud Detection for MCC Manipulation Hong-feng CHAI 1, Xin LIU 2, Yan-jun
More informationAre Change Metrics Good Predictors for an Evolving Software Product Line?
Are Change Metrics Good Predictors for an Evolving Software Product Line? Sandeep Krishnan Dept. of Computer Science Iowa State University Ames, IA 50014 sandeepk@iastate.edu Chris Strasburg Iowa State
More informationForecasting mobile games retention using Weka
22 Forecasting mobile games retention using Weka Forecasting mobile games retention using Weka Roxana Ioana STIRCU Bucharest University of Economic Studies roxana.stircu@gmail.com Abstract: In the actual
More informationChapter 8 Analytical Procedures
Slide 8.1 Principles of Auditing: An Introduction to International Standards on Auditing Chapter 8 Analytical Procedures Rick Hayes, Hans Gortemaker and Philip Wallage Slide 8.2 Analytical procedures Analytical
More informationExploration into Costs and Mitigation Strategies for Invalid Defects in Systems Development
Exploration into Costs and Mitigation Strategies for Invalid Defects in Systems Development Keith N. Mort Marist College Department of Information Systems Poughkeepsie, NY keith@mort.net Abstract Organizations
More informationPrediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine
Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine R. Sathya Assistant professor, Department of Computer Science & Engineering Annamalai University
More informationTNM033 Data Mining Practical Final Project Deadline: 17 of January, 2011
TNM033 Data Mining Practical Final Project Deadline: 17 of January, 2011 1 Develop Models for Customers Likely to Churn Churn is a term used to indicate a customer leaving the service of one company in
More informationPredicting Defects in Software Using Grammar-Guided Genetic Programming
Predicting Defects in Software Using Grammar-Guided Genetic Programming Athanasios Tsakonas and Georgios Dounias University of the Aegean, Department of Finance and Management Engineering, Fostini 31 str.,
More informationA Classification based Predictive Cost Model for Measuring Reusability Level of Open Source Software
7688, Vol. 5, Issue 1, March 2018, pp. 19-23 A Classification based Predictive Cost Model for Measuring Reusability Level of Open Source Software Divanshi Priyadarshni Wangoo 1 and Archana Singh 2 1 Amity
More informationAn exploratory study of package metrics as change size indicators in evolving object-oriented software
Comput Syst Sci & Eng (2013) 4: 251 257 2013 CRL Publishing Ltd International Journal of Computer Systems Science & Engineering An exploratory study of package metrics as change size indicators in evolving
More informationSoftware Engineering Tools and Environments. Ch. 9 1
Software Engineering Tools and Environments Ch. 9 1 Outline How did the field evolve? How can tools and environments be classified and compared? What are the main categories? How can tools be integrated?
More informationSalford Predictive Modeler. Powerful machine learning software for developing predictive, descriptive, and analytical models.
Powerful machine learning software for developing predictive, descriptive, and analytical models. The Company Minitab helps companies and institutions to spot trends, solve problems and discover valuable
More informationSoftware Quality Engineering Courses Offered by The Westfall Team
Building Skills is a 3-day course that is a subset of our course. The course is designed to provide a fundamental knowledge base and practical skills for anyone interested in implementing or improving
More informationOn the Correlation between Testing Effort and Software Complexity Metrics
On the Correlation between Testing Effort and Software Complexity Metrics Adnan Muslija, Eduard Enoiu, Email: muslija.adnan@gmail.com, eduard.enoiu@mdh.se Mälardalen University, Västerås, Sweden. Abstract
More informationOn the Correlation between Testing Effort and Software Complexity Metrics
On the Correlation between Testing Effort and Software Complexity Metrics Adnan Muslija, Eduard Enoiu, Mälardalen University, Västerås, Sweden. Abstract Software complexity metrics, such as code size and
More informationSoftware Quality Engineering Courses Offered by The Westfall Team
Courses is a 2-day course that is a subset of our course. The course is designed to provide an overview of techniques and practices. This course starts with an overview of software quality engineering
More informatione-trans Association Rules for e-banking Transactions
In IV International Conference on Decision Support for Telecommunications and Information Society, 2004 e-trans Association Rules for e-banking Transactions Vasilis Aggelis University of Patras Department
More informationHierarchy Based Reusability Assessment Model for Component Qualification in Reusable Verification Environment
Hierarchy Based Reusability Assessment Model for Qualification in Reusable Verification Environment Dr. V. Subedha,Professor & Head Department of CSE Panimalar Institute of Technology Chennai, India subedha@gmail.com
More informationFault-prone Module Prediction Using Version Histories.
Title Author(s) Fault-prone Module Prediction Using Version Histories Hata, Hideaki Citation Issue Date Text Version ETD URL http://hdl.handle.net/11094/2569 DOI rights Fault-prone Module Prediction Using
More informationAn Approach to Efficient Software Bug Prediction using Regression Analysis and Neural Networks
An Approach to Efficient Software Bug Prediction using Regression Analysis and Neural Networks Surbhi Parnerkar 1, Ati Jain 2, Vijay Birchha 3 Student, Department of Computer Science & Engineering, SVCE,
More informationBook Outline. Software Testing and Analysis: Process, Principles, and Techniques
Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing
More informationPredicting Corporate Influence Cascades In Health Care Communities
Predicting Corporate Influence Cascades In Health Care Communities Shouzhong Shi, Chaudary Zeeshan Arif, Sarah Tran December 11, 2015 Part A Introduction The standard model of drug prescription choice
More informationMasters in Business Statistics (MBS) /2015. Department of Mathematics Faculty of Engineering University of Moratuwa Moratuwa. Web:
Masters in Business Statistics (MBS) - 2014/2015 Department of Mathematics Faculty of Engineering University of Moratuwa Moratuwa Web: www.mrt.ac.lk Course Coordinator: Prof. T S G Peiris Prof. in Applied
More informationUnderstanding the Impact of Code and Process Metrics on Post-release Defects: A Case Study on the Eclipse Project
Understanding the Impact of Code and Process Metrics on Post-release Defects: A Case Study on the Eclipse Project Emad Shihab, Zhen Ming Jiang, Walid M. Ibrahim, Bram Adams and Ahmed E. Hassan Software
More informationDetecting and Pruning Introns for Faster Decision Tree Evolution
Detecting and Pruning Introns for Faster Decision Tree Evolution Jeroen Eggermont and Joost N. Kok and Walter A. Kosters Leiden Institute of Advanced Computer Science Universiteit Leiden P.O. Box 9512,
More informationChurn Prediction Model Using Linear Discriminant Analysis (LDA)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 86-93 www.iosrjournals.org Churn Prediction Model Using Linear Discriminant
More informationImpact of ERP Implementation on Supply Chain Performance of Transport and Logistics Companies in Sri Lanka
ISSN: 2513-2520 R4TLI Conference Proceedings 2017 Impact of ERP Implementation on Supply Chain Performance of Transport and Logistics Companies in Sri Lanka 1. Introduction Dilini Yapa University of Moratuwa,
More informationFOUNDATIONAL CONCEPTS FOR MODEL DRIVEN SYSTEM DESIGN
FOUNDATIONAL CONCEPTS FOR MODEL DRIVEN SYSTEM DESIGN Loyd Baker, Paul Clemente, Bob Cohen, Larry Permenter, Byron Purves, and Pete Salmon INCOSE Model Driven System Interest Group Abstract. This paper
More informationA STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET
A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET 1 J.JEYACHIDRA, M.PUNITHAVALLI, 1 Research Scholar, Department of Computer Science and Applications,
More informationChapter-3. Software Metrics and Reliability
Chapter-3 \ functions under given conditions for a specified period of time." The reliability of the delivered code is related to the quality of all of the processes and products of software development;
More informationBuilding the In-Demand Skills for Analytics and Data Science Course Outline
Day 1 Module 1 - Predictive Analytics Concepts What and Why of Predictive Analytics o Predictive Analytics Defined o Business Value of Predictive Analytics The Foundation for Predictive Analytics o Statistical
More informationMain Message. Workshop 1a: Software Measurement. Dietmar Pfahl
Software Economics Fall 2015 Workshop 1a: Software Measurement Main Message Software measures can be misleading, so Either you don t use them Dietmar Pfahl (based on slides by Marlon Dumas & Anton Litvinenko)
More informationSOFTWARE MAINTENANCE PROCESS MODEL AFTER DELIVERY WITH QUALIFIED OUTPUT
SOFTWARE MAINTENANCE PROCESS MODEL AFTER DELIVERY WITH QUALIFIED OUTPUT SALEEM AL-ZOUBI Faculty of Information Technology, Irbid National University E-mail: it@inu.edu.jo Abstract-Software maintenance
More informationWhen to Book: Predicting Flight Pricing
When to Book: Predicting Flight Pricing Qiqi Ren Stanford University qiqiren@stanford.edu Abstract When is the best time to purchase a flight? Flight prices fluctuate constantly, so purchasing at different
More informationIs This a Bug or an Obsolete Test?
Is This a Bug or an Obsolete Test? Dan Hao 1, Tian Lan 1, Hongyu Zhang 2, Chao Guo 1, Lu Zhang 1 1 Key Laboratory of High Confidence Software Technologies (Peking University), MoE Institute of Software,
More informationA Study on Factors Affecting Maintainability and Maintainability Models
A Study on s Affecting Maintainability and Maintainability Models Deepa N 1, P. V. Indu Bhanu 2, C. S. Kausthubhi 3, M Sai Sriya 4 1,2,3,4 School of Information Technology & Engineering, VIT University
More informationDiscriminant models for high-throughput proteomics mass spectrometer data
Proteomics 2003, 3, 1699 1703 DOI 10.1002/pmic.200300518 1699 Short Communication Parul V. Purohit David M. Rocke Center for Image Processing and Integrated Computing, University of California, Davis,
More informationBusiness Mathematics / Quantitative Research Methods I
Faculty of Economics and Business Administration Exam: Code: Examinator: Co-reader: Business Mathematics / Quantitative Research Methods I E_BK1_BUSM / E_IBA1_BUSM / E_EBE1_QRM1 dr. R. Heijungs dr. G.J.
More informationE-Commerce Sales Prediction Using Listing Keywords
E-Commerce Sales Prediction Using Listing Keywords Stephanie Chen (asksteph@stanford.edu) 1 Introduction Small online retailers usually set themselves apart from brick and mortar stores, traditional brand
More informationTime Series Motif Discovery
Time Series Motif Discovery Bachelor s Thesis Exposé eingereicht von: Jonas Spenger Gutachter: Dr. rer. nat. Patrick Schäfer Gutachter: Prof. Dr. Ulf Leser eingereicht am: 10.09.2017 Contents 1 Introduction
More informationEnterprise Modeling and its Applications in Company Management Systems
Enterprise Modeling and its Applications in Company Management Systems Ladaislav Madarász 1, Maroš Timko 2, Michal Raček 3 1 Department of Cybernetics and Artificial Intelligence, FEI TU Košice, Letná
More informationProposal for ISyE6416 Project
Profit-based classification in customer churn prediction: a case study in banking industry 1 Proposal for ISyE6416 Project Profit-based classification in customer churn prediction: a case study in banking
More informationFilter-Wrapper based Feature Ranking Technique for Dynamic Software Quality Attributes
Filter-Wrapper based Feature Ranking Technique for Dynamic Software Quality Attributes Siti Sakira Kamaruddin 1, Jamaiah Yahaya 2 Aziz Deraman 3, and Ruzita Ahmad 4 1 Universiti Utara Malaysia, Malaysia,
More informationSoftware Development Life Cycle (SDLC) Tata Consultancy Services ltd. 12 October
Software Development Life Cycle (SDLC) Tata Consultancy Services ltd. 12 October 2006 1 Objectives (1/2) At the end of the presentation, participants should be able to: Realise the need for a systematic
More informationLectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1
Lectures 2 & 3 Software Processes Software Engineering, COMP201 Slide 1 What is a Process? When we provide a service or create a product we always follow a sequence of steps to accomplish a set of tasks
More informationEvaluating Workflow Trust using Hidden Markov Modeling and Provenance Data
Evaluating Workflow Trust using Hidden Markov Modeling and Provenance Data Mahsa Naseri and Simone A. Ludwig Abstract In service-oriented environments, services with different functionalities are combined
More informationCode Compulsory Module Credits Continuous Assignment
CURRICULUM AND SCHEME OF EVALUATION Compulsory Modules Evaluation (%) Code Compulsory Module Credits Continuous Assignment Final Exam MA 5210 Probability and Statistics 3 40±10 60 10 MA 5202 Statistical
More informationRequirements Engineering and Software Architecture Project Description
Requirements Engineering and Software Architecture Project Description Requirements Engineering Project Description The project is student-driven. There will be external sponsors, users, and others that
More informationMultivariate Logistic Regression Prediction of Fault-Proneness in Software Modules
Multivariate Logistic Regression Prediction of Fault-Proneness in Software Modules Goran Mauša *, Tihana Galinac Grbac * and Bojana Dalbelo Bašić ** * Faculty of Engineering, University of Rijeka, Rijeka,
More informationChurn Prediction for Game Industry Based on Cohort Classification Ensemble
Churn Prediction for Game Industry Based on Cohort Classification Ensemble Evgenii Tsymbalov 1,2 1 National Research University Higher School of Economics, Moscow, Russia 2 Webgames, Moscow, Russia etsymbalov@gmail.com
More informationOptimization Problems and Algorithms in Supply-Chain Management
Optimization Problems and Algorithms in Supply-Chain Management 1 Botond Bertok, 1 Robert Adonyi, 2 Sandor Bodrogi, and 1 Zoltan Kovacs 1 University of Pannonia, Faculty of Information Technology Department
More informationSOFTWARE DEVELOPMENT PRODUCTIVITY FACTORS IN PC PLATFORM
SOFTWARE DEVELOPMENT PRODUCTIVITY FACTORS IN PC PLATFORM Abbas Heiat, College of Business, Montana State University-Billings, Billings, MT 59101, 406-657-1627, aheiat@msubillings.edu ABSTRACT CRT and ANN
More informationStudying the Fix-Time for Bugs in Large Open Source Projects
Studying the Fix-Time for Bugs in Large Open Source Projects Lionel Marks School of Computing Queen s University, Canada Ying Zou Dept. of Elec. and Comp. Eng. Queen s University, Canada ying.zou@queensu.ca
More informationWorkshop 1: Software Measurement. Marlon Dumas
Software Economics Fall 2013 Workshop 1: Software Measurement Marlon Dumas (based on slides by Anton Litvinenko) Main message Software measures can be misleading, so Either you don t use them Or you better
More informationMining for Cost Estimating Relations from Limited Complex Data
Mining for Cost Estimating Relations from Limited Complex Data Modeling Approaches for NASA Robotic Earth/Space Science Projects 2015 ICEAA Workshop 6/11/15 Shawn Hayes and Mark Jacobs Victory Solutions
More informationTraffic Accident Analysis from Drivers Training Perspective Using Predictive Approach
Traffic Accident Analysis from Drivers Training Perspective Using Predictive Approach Hiwot Teshome hewienat@gmail Tibebe Beshah School of Information Science, Addis Ababa University, Ethiopia tibebe.beshah@gmail.com
More information2. Materials and Methods
Identification of cancer-relevant Variations in a Novel Human Genome Sequence Robert Bruggner, Amir Ghazvinian 1, & Lekan Wang 1 CS229 Final Report, Fall 2009 1. Introduction Cancer affects people of all
More information9. Verification, Validation, Testing
9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification
More informationDescribing DSTs Analytics techniques
Describing DSTs Analytics techniques This document presents more detailed notes on the DST process and Analytics techniques 23/03/2015 1 SEAMS Copyright The contents of this document are subject to copyright
More informationPMBOK Guide Fifth Edition Pre Release Version October 10, 2012
5.3.1 Define Scope: Inputs PMBOK Guide Fifth Edition 5.3.1.1 Scope Management Plan Described in Section 5.1.3.1.The scope management plan is a component of the project management plan that establishes
More informationA Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management
International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:
More informationHUMAN RESOURCE PLANNING AND ENGAGEMENT DECISION SUPPORT THROUGH ANALYTICS
HUMAN RESOURCE PLANNING AND ENGAGEMENT DECISION SUPPORT THROUGH ANALYTICS Janaki Sivasankaran 1, B Thilaka 2 1,2 Department of Applied Mathematics, Sri Venkateswara College of Engineering, (India) ABSTRACT
More informationBug Prediction. SW-Wartung & Evolution. Emanuel Giger. University of Zurich Department of Informatics. software evolution & architecture lab
Bug Prediction SW-Wartung & Evolution Emanuel Giger University of Zurich Department of Informatics software evolution & architecture lab Software has Bugs! 2 Software has Bugs! 2 Software has Bugs! 2 Software
More informationVIBRATION ANALYSIS FOR ROTATING MACHINES HEALTH MONITORING
LOGISTICS FOR DEFENSE VIBRATION ANALYSIS FOR ROTATING MACHINES HEALTH MONITORING 2017/05/09 José Barriga Mangas Telecommunication Engineer Index 01 Key Takeaways 02 Introduction to Organization and Business
More informationReUse: Challenges and Business Success Harald Gall
ReUse: Challenges and Business Success Harald Gall Department of Informatics software evolution and architecture lab seal.ifi.uzh.ch/gall Objects and reuse some practical observations 2 Outline Challenges
More informationESTIMATION OF ASPECT ORIENTED PROGRAMMING USING DIFFERENT METRICES
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 1460 ESTIMATION OF ASPECT ORIENTED PROGRAMMING USING DIFFERENT METRICES Annu Student, M.Tech Deptt. Of Computer
More informationPredicting Popularity of Messages in Twitter using a Feature-weighted Model
International Journal of Advanced Intelligence Volume 0, Number 0, pp.xxx-yyy, November, 20XX. c AIA International Advanced Information Institute Predicting Popularity of Messages in Twitter using a Feature-weighted
More informationBrief Summary of Last Lecture. Model checking of timed automata: general approach
Brief Summary of Last Lecture Formal verification Types: deductive (theorem proving) and algorithmic (model checking) ields proof that a (formal) specification is fulfilled Formalization of specs e.g.
More informationC. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International
C. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International Journal of Reliability, Quality and Safety Engineering,
More informationUsing Factor Analysis to Generate Clusters of Agile Practices
Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process Improvement) Noura Abbas University of Southampton School of Electronics and Computer Science Southampton, UK, SO17
More informationTesting and Inspections (3C05/D22) Unit 11: Testing and Inspection. What is Testing?
Testing and Inspections (3C05/D22) Unit 11: Testing and Inspection Objectives To introduce software testing and to develop its role within the software development process. To introduce the use of formal
More informationFEATURES AND BENEFITS
SGS MINERALS SERVICES T3 SGS 1079 MET PLATFORM SGS Minerals Services is the industry leader in providing support and creating solutions for mining projects worldwide. SGS offers advanced process control
More informationA Comparative Study on the existing methods of Software Size Estimation
A Comparative Study on the existing methods of Software Size Estimation Manisha Vatsa 1, Rahul Rishi 2 Department of Computer Science & Engineering, University Institute of Engineering & Technology, Maharshi
More informationINFORMS Analytics Maturity Model. User Guide
INFORMS Analytics Maturity Model User Guide Introducing the INFORMS Scorecard INFORMS, the leading association for advanced analytics professionals, seeks to advance the practice, research, methods, and
More informationGQM: Goal Question Metrics
GQM: Goal Question Metrics Introduction Main reference Understanding Measurement and Practical Implementation of GQM, V. R. Basili, C. B. Seaman, 2010 Leveraging Measurement Many organizations collect
More informationMetrics based field problem prediction. Paul Luo Li ISRI SE - CMU
Metrics based field problem prediction Paul Luo Li ISRI SE - CMU Field problems happen Program testing can be used to show the presence of bugs, but never to show their absence! -Dijkstra Statement coverage,
More informationCROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload
CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload Xing Yang, Xiang Li, Yipeng Ji, and Mo Sha School of Computer Science, Beihang University, Beijing, China {yangxing,
More information