DSpace Repository

Browsing by Subject "Data mining"

Browsing by Subject "Data mining"

Sort by: Order: Results:

  • Kula, Raula Gaikovina; Roover, Coen De; German, Daniel M.; Ishio, Takashi; Inoue, Katsuro (IEEE, 2018)
    The popularity of super repositories such as Maven Central and the CRAN is a testament to software reuse activities in both open-source and commercial projects alike. However, several studies have highlighted the risks and ...
  • Uemura, Kyohei; Saito, Yusuke; Fujiwara, Shin; Tanaka, Daiki; Fujiwara, Kenji; Iida, Hajimu; Matsumoto, Kenichi (IEEE, 2016)
    In the research of Mining Software Repositories, source code repositories are one of the core sources since it contains the product and the process of software development. A source code repository stores the versions of ...
  • Fujiwara, Shin; Hata, Hideaki; Monden, Akito; Matsumoto, Kenichi (IEEE, 2015)
    Large software projects such as Mozilla Firefox and Eclipse own more than ten thousand bug reports that have been reported but left unresolved. To utilize such a great amount of unresolved bug reports and accelerate bug ...
  • Pingclasai, Natthakul; Hata, Hideaki; Matsumoto, Ken-ichi (IEEE, 2013)
    Bug reports are widely used in several research areas such as bug prediction, bug triaging, and etc. The performance of these studies relies on the information from bug reports. Previous study showed that a significant ...
  • Limsettho, Nachai; Hata, Hideaki; Matsumoto, Ken-ichi (IEEE, 2014)
    Bug reports play essential roles in many software engineering tasks. Since validity and performance of these tasks definitely rely on the quality of bug reports, accurate information from bug reports is very important. ...
  • Morisaki, Shuji; Monden, Akito; Matsumura, Tomoko; Tamada, Haruaki; Matsumoto, Ken-ichi (IEEE, 2007)
    This paper describes an empirical study to reveal rules associated with defect correction effort. We defined defect correction effort as a quantitative (ratio scale) variable, and extended conventional (nominal scale based) ...
  • Ihara, Akinori; Kamei, Yasutaka; Ohira, Masao; Hassan, Ahmed E.; Ubayashi, Naoyasu; Matsumoto, Ken-ichi (IEEE, 2014)
    There exists two types of developers in Open Source Software (OSS) projects: 1) Committers who have permission to commit edited source code to the Version Control System (VCS), 2) Developers who contribute source code but ...
  • Ueda, Yuki; Ihara, Akinori; Hirao, Toshiki; Ishio, Takashi; Matsumoto, Kenichi (IEEE, 2017)
    Peer code review is key to ensuring the absence of software defects. To improve the review process, many code review tools provide OSS(Open Source Software) project CI(Continuous Integration) tests that automatically verify ...
  • Shihab, Emad; Ihara, Akinori; Kamei, Yasutaka; Ibrahim, Walid M.; Ohira, Masao; Adams, Bram; Hassan, Ahmed E.; Matsumoto, Ken-ichi (IEEE, 2010)
    Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be re-opened. Re-opened bugs increase maintenance ...
  • Ishio, Takashi; Sakaguchi, Yusuke; Ito, Kaoru; Inoue, Katsuro (IEEE, 2017)
    Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need ...
  • Tantithamthavorn, Chakkrit; McIntosh, Shane; Hassan, Ahmed E.; Ihara, Akinori; Matsumoto, Kenichi (IEEE, 2015)
    The reliability of a prediction model depends on the quality of the data from which it was trained. Therefore, defect prediction models may be unreliable if they are trained using noisy data. Recent research suggests that ...
  • Okada, Joji; Ishio, Takashi; Sakata, Yuji; Inoue, Katsuro (IEEE, 2019)
    Legacy systems are important in business but difficult to maintain. One of the causes of the difficulties is a large number of code clones in the systems; Those clones implement similar functionalities using common loop ...