نتایج جستجو برای: dubas bug

تعداد نتایج: 16220  

2013
Martin Pöhlmann Elmar Juergens

If a bug gets fixed in duplicated code, often all duplicates (so called clones) need to be modified accordingly. In practice, however, fixes are often incomplete, causing the bug to remain in one or more of the clones. In this paper, we present an approach to detect such incomplete bug-fixes in cloned code. It analyzes a system’s version history to reveal those commits that fix problems. It the...

2004
Davor Cubranic Gail C. Murphy

Bug triage, deciding what to do with an incoming bug report, is taking up increasing amount of developer resources in large open-source projects. In this paper, we propose to apply machine learning techniques to assist in bug triage by using text categorization to predict the developer that should work on the bug based on the bug’s description. We demonstrate our approach on a collection of 15,...

2012
Muhammad Asaduzzaman Michael C. Bullock Chanchal K. Roy Kevin A. Schneider

Changes, a rather inevitable part of software development can cause maintenance implications if they introduce bugs into the system. By isolating and characterizing these bug introducing changes it is possible to uncover potential risky source code entities or issues that produce bugs. In this paper, we mine the bug introducing changes in the Android platform by mapping bug reports to the chang...

Journal: :JSW 2012
Deqing Wang Hui Zhang Rui Liu Mengxiang Lin Wenjun Wu

The number of bug reports in complex software increases dramatically. Since bugs are still triaged manually, bug triage or assignment is a labor-intensive and time-consuming task. Without knowledge about the structure of the software, testers often specify the component of a new bug incorrectly. Meanwhile, it is difficult for triagers to determine the component of the bug only by its descriptio...

2017
B. Rama Ganesh

When a new bug report is received, developers usually need to reproduce the bug and perform code reviews to find the cause, a process that can be tedious and time consuming. A tool for ranking all the source files with respect to how likely they are to contain the cause of the bug would enable developers to narrow down their search and improve productivity. This paper introduces an adaptive ran...

2011
Liguo Yu Srini Ramaswamy Anil Nair

Bugzilla is an online software bug reporting system. It is widely used by both open-source software projects and commercial software companies and has become a major source to study software evolution, software project management, and software quality control. In some research studies, the number of bug reports has been used as an indicator of software quality. This paper examines this represen...

2010
JAMES D. HANSEN

The interaction of feeding by a grass bug, Ir"bisia pacifica (Uhler), and drought stress on growth of Great Basin wildrye, Leymus cinereus (Scrih. & Merr.) Love, and intermediate wheatgrass, Thinopyrum intermedium (Host) Barkw. & D. R. Dewey, was studied in the greenhouse. At peak production, control plants of Great Basin wildrye had more than twice as much green leaf area per tiller than bug-i...

2015
Anuradha Sharma Sachin Sharma

Software Bugs occur for a wide range of reasons. Bug reports can be generated automatically or drafted by user of software. Bug reports can also go with other malfunctions of the software, mostly for the beta or unsteady versions of the software. Most often, these bug reports are improved with user contributed experiences as to know what in fact faced by him/her. Addressing these bugs accounts ...

2011

Bug or Fault localization is a process of identifying the specific location(s) or region(s) of source code (at various granularity levels such as the directory path, file, method or statement) that is faulty and needs to be modified to repair the defect. Bug localization is a routine task in software maintenance (corrective maintenance). Due to the increasing size and complexity of current soft...

Journal: :J. Cybersecurity 2017
Thomas Maillart Mingyi Zhao Jens Grossklags John C.-I. Chuang

Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers to be fairly rewarded for the vulnerabilities they find. Little is known however on the incentives set by bug bounty programs: How they drive new bug discoveries, and how they supposedly improve security through the progressive exhaustion of discoverable vulnerabilit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید