Dam et al., 2018 - Google Patents
A deep tree-based model for software defect predictionDam et al., 2018
View PDF- Document ID
- 1737689525752246653
- Author
- Dam H
- Pham T
- Ng S
- Tran T
- Grundy J
- Ghose A
- Kim T
- Kim C
- Publication year
- Publication venue
- arXiv preprint arXiv:1802.00921
External Links
Snippet
Defects are common in software systems and can potentially cause various problems to software users. Different methods have been developed to quickly predict the most likely locations of defects in large code bases. Most of them focus on designing features (eg …
- 230000002950 deficient 0 abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dam et al. | A deep tree-based model for software defect prediction | |
Dam et al. | Lessons learned from using a deep tree-based model for software defect prediction in practice | |
Dam et al. | Automatic feature learning for predicting vulnerable software components | |
Guggulothu et al. | Code smell detection using multi-label classification approach | |
Dam et al. | Automatic feature learning for vulnerability prediction | |
Gomes et al. | BERT-and TF-IDF-based feature extraction for long-lived bug prediction in FLOSS: a comparative study | |
Cai et al. | An abstract syntax tree encoding method for cross-project defect prediction | |
Lin et al. | Semantic feature learning via dual sequences for defect prediction | |
Deng et al. | A suitable AST node granularity and multi-kernel transfer convolutional neural network for cross-project defect prediction | |
Cao et al. | Rule-based specification mining leveraging learning to rank | |
Cheng et al. | Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network | |
Thung | Automatic prediction of bug fixing effort measured by code churn size | |
Alenezi et al. | Efficient deep features learning for vulnerability detection using character n-gram embedding | |
Mashhadi et al. | Method-level bug severity prediction using source code metrics and LLMs | |
Stammer et al. | Neural concept binder | |
Liu et al. | Deepanna: Deep learning based java annotation recommendation and misuse detection | |
Zhang et al. | A novel approach of data race detection based on CNN-BiLSTM hybrid neural network | |
Juliet Thessalonica et al. | Intelligent mining of association rules based on nanopatterns for code smells detection | |
Mishra et al. | Deep learning based continuous integration and continuous delivery software defect prediction with effective optimization strategy | |
Yerramreddy et al. | An empirical assessment of machine learning approaches for triaging reports of static analysis tools | |
Paissan et al. | Listenable maps for zero-shot audio classifiers | |
Badvath et al. | Prediction of software defects using deep learning with improved cuckoo search algorithm | |
Dwarakanath et al. | Software defect prediction using deep semantic feature learning | |
Gurung | Performing Software Defect Prediction Using Deep Learning | |
Liu et al. | VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning |