2021
DOI: 10.1016/j.eswa.2021.114816
|View full text |Cite
|
Sign up to set email alerts
|

An approach to generate the bug report summaries using two-level feature extraction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The used state acronyms are defined in Table 3. As compared with the presented profiles, PL P (P1) and PL P (MongoDB), PL P (Log4J2) comprises a lower number of paths (99) with a lower number of states (2)(3)(4)(5)(6)(7)(8)(9). Two-and three-state paths are dominant (54.2% and 32.5% issue coverage).…”
Section: )mentioning
confidence: 85%
See 1 more Smart Citation
“…The used state acronyms are defined in Table 3. As compared with the presented profiles, PL P (P1) and PL P (MongoDB), PL P (Log4J2) comprises a lower number of paths (99) with a lower number of states (2)(3)(4)(5)(6)(7)(8)(9). Two-and three-state paths are dominant (54.2% and 32.5% issue coverage).…”
Section: )mentioning
confidence: 85%
“…Data collected in software repositories are the basis for diverse practical and research studies in the software engineering domain. Here, we can distinguish the following aspects considered in the literature on software repositories: the detection of duplicate issues [4,5], bug prediction and issue classification [6,7], bug triaging [8], and issue report textual analysis [9,10]. Most papers related to software bugs focus on a single selected problem considering coarse-grained data from repositories.…”
Section: Introductionmentioning
confidence: 99%
“…Then in the left thigh, a groin incision was made and the greater saphenous vein was dissected out in the same way as was on the other side Several minutes of compression was used for haemostasis generated generic summary is shown in Table 8 in the implementation section. The score value is given up-to-the scale value to (Fleuren & Alkema, 2015;Gupta & Gupta, 2021;Jindal & Kaur, 2020;Krasniqi, 2021;Mishra et al, 2014;Nath & Roy, 2022;Rambow et al, 2004;Wan & McKeown, 2004;Zechner, 2002a;Zhou et al, 2003a) and 10 is the maximum summary score for each summary. Table 12 and Figure 6 show the score specified by these experts to the generated generic summary in biomedical text data.…”
Section: Rake Sentences Concept Map Sentencesmentioning
confidence: 99%
“…To mitigate this issue, automatic text summarization plays a crucial role in acquiring potent knowledge effectively and efficiently from the vast domain of information. It has been extensively applied on several domains such as document summarization (Zechner, 2002a; Zhou et al, 2003a), e‐mail summarization (Rambow et al, 2004; Wan & McKeown, 2004) and bug report summarization (Gupta & Gupta, 2021; Jindal & Kaur, 2020; Krasniqi, 2021; Nath & Roy, 2022). Also, there is a huge increase in electronic content of textual data in biomedical and health‐care domains in scientific articles, medical guidelines, clinical trial reports (Fleuren & Alkema, 2015; Mishra et al, 2014) and health records (Moradi & Ghadiri, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, the final hidden-layer state, obtained from the unidirectional LSTM at the decoder, is regarded as a semantic vector of the generated text summary. The semantic similarity can be expressed by calculating the cosine similarity [28] of and . As the source text and generated text summary are located in the same semantic space, the cosine similarity can effectively measure the distance between them.…”
Section: Figure 4 the Proposed Esn Modelmentioning
confidence: 99%