2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems 2012
DOI: 10.1109/cisis.2012.132
|View full text |Cite
|
Sign up to set email alerts
|

An Automated Approach for Software Bug Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The complexes were prepared by the method in literature [19]. Equimolar ethanolic solution of ligands (HNLH and HNSM) (0.0025 mol) and SnCl 2 .2H 2 O (0.0025 mol) were refluxed with constant stirring for 2 h (Scheme 2).…”
Section: Preparation Of Complexesmentioning
confidence: 99%
“…The complexes were prepared by the method in literature [19]. Equimolar ethanolic solution of ligands (HNLH and HNSM) (0.0025 mol) and SnCl 2 .2H 2 O (0.0025 mol) were refluxed with constant stirring for 2 h (Scheme 2).…”
Section: Preparation Of Complexesmentioning
confidence: 99%
“…Feature selection and bi-grams are used and it has been observed the using the bi-gram, a little improvement in the performance can be achieved, however as the result also depend on the type of the project, so in some case use of the bi-gram may yield to bad results (Roy & Rossi, 2012). Neelofar et.al (Neelofar, Javed, & Javed, 2012) expressed that for a developer task of tracking the bug is very difficult and time consuming, as the developers are expert in a particular area. For example, some developers are expert in creating the interface for the end user and other functionality of any high level language.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bug classification is a possible research area that can be explored with our dataset, using all the data sources it offers Neelofar et al (2012); Pingclasai et al (2013). In applications with different components connected to the network or that make use of a database system, they can lead to classifications not previously considered.…”
Section: Applications For a Dataset Of End-to-end Bugs In Software Researchmentioning
confidence: 99%