Proceedings of the 2013 International Conference on Software and System Process 2013
DOI: 10.1145/2486046.2486067
|View full text |Cite
|
Sign up to set email alerts
|

Mining explicit rules for software process evaluation

Abstract: We present an approach to automatically discovering explicit rules for software process evaluation from evaluation histories. Each rule is a conjunction of a subset of attributes in a process execution, characterizing why the execution is normal or anomalous. The discovered rules can be used for stakeholder as expertise to avoid mistakes in the future, thus improving software process quality; it can also be used to compose a classifier to automatically evaluate future process execution. We formulate this probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…In this scenery, it is possible to make the simulation and verify how the process treats a particular situation (NAVARRO; HOEK, 2005). Sun, Du and Chen (2013) presented an approach to automatically discover explicit rules for software process evaluation from the evaluation histories. Each rule is a conjunction of a subset of attributes in a process execution, characterizing the reason why the execution is normal or anomalous.…”
Section: Process Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scenery, it is possible to make the simulation and verify how the process treats a particular situation (NAVARRO; HOEK, 2005). Sun, Du and Chen (2013) presented an approach to automatically discover explicit rules for software process evaluation from the evaluation histories. Each rule is a conjunction of a subset of attributes in a process execution, characterizing the reason why the execution is normal or anomalous.…”
Section: Process Validationmentioning
confidence: 99%
“…Each rule is a conjunction of a subset of attributes in a process execution, characterizing the reason why the execution is normal or anomalous. Sun, Du and Chen (2013) formulated this problem as a contrasting item set mining task and employ the branch-and-bound technique to speed up mining by pruning search space. Ferreira and Moita (2010) also suggested an approach to compare the formal model and the execution of the process, but they adopted concepts based on software inspection.…”
Section: Process Validationmentioning
confidence: 99%
“…Yan et al mine discriminative subgraph patterns via leap search [27]. Sun et al mine contrasting patterns for software process evaluation [25].…”
Section: Related Workmentioning
confidence: 99%
“…These violation patterns are learnt from historical process execution data using a contrasting pattern mining algorithm [26]. They are meaningful to the bug management process of a specific commercial bank introduced in [14,13].…”
Section: Detecting Violations In Bug Management Processmentioning
confidence: 99%
“…Their approach first learns a binary classification model from the historical evaluation results, and then applies the model to classify future process executions. Sun et al [26] further improves this approach by mining explicit evaluation rules from evaluation history. Each rule is capable of explaining why a process execution is evaluated as normal or anomalous.…”
Section: Software Process Evaluationmentioning
confidence: 99%