[go: up one dir, main page]

Dam et al., 2018 - Google Patents

A deep tree-based model for software defect prediction

Dam et al., 2018

View PDF
Document ID
1737689525752246653
Author
Dam H
Pham T
Ng S
Tran T
Grundy J
Ghose A
Kim T
Kim C
Publication year
Publication venue
arXiv preprint arXiv:1802.00921

External Links

Snippet

Defects are common in software systems and can potentially cause various problems to software users. Different methods have been developed to quickly predict the most likely locations of defects in large code bases. Most of them focus on designing features (eg …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code

Similar Documents

Publication Publication Date Title
Dam et al. A deep tree-based model for software defect prediction
Dam et al. Lessons learned from using a deep tree-based model for software defect prediction in practice
Dam et al. Automatic feature learning for predicting vulnerable software components
Guggulothu et al. Code smell detection using multi-label classification approach
Dam et al. Automatic feature learning for vulnerability prediction
Gomes et al. BERT-and TF-IDF-based feature extraction for long-lived bug prediction in FLOSS: a comparative study
Cai et al. An abstract syntax tree encoding method for cross-project defect prediction
Lin et al. Semantic feature learning via dual sequences for defect prediction
Deng et al. A suitable AST node granularity and multi-kernel transfer convolutional neural network for cross-project defect prediction
Cao et al. Rule-based specification mining leveraging learning to rank
Cheng et al. Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network
Thung Automatic prediction of bug fixing effort measured by code churn size
Alenezi et al. Efficient deep features learning for vulnerability detection using character n-gram embedding
Mashhadi et al. Method-level bug severity prediction using source code metrics and LLMs
Stammer et al. Neural concept binder
Liu et al. Deepanna: Deep learning based java annotation recommendation and misuse detection
Zhang et al. A novel approach of data race detection based on CNN-BiLSTM hybrid neural network
Juliet Thessalonica et al. Intelligent mining of association rules based on nanopatterns for code smells detection
Mishra et al. Deep learning based continuous integration and continuous delivery software defect prediction with effective optimization strategy
Yerramreddy et al. An empirical assessment of machine learning approaches for triaging reports of static analysis tools
Paissan et al. Listenable maps for zero-shot audio classifiers
Badvath et al. Prediction of software defects using deep learning with improved cuckoo search algorithm
Dwarakanath et al. Software defect prediction using deep semantic feature learning
Gurung Performing Software Defect Prediction Using Deep Learning
Liu et al. VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning