Skip to main content
Book cover

CCF Conference on Big Data

Big Data 2018: Big Data pp 336–349Cite as

Identification of High Priority Bug Reports via Integration Method

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 945))

Abstract

Many software projects use bug tracking systems to collect and allocate the bug reports, but the priority assignment tasks become difficult to be completed because of the increasing bug reports. In order to assist developers to reduce the pressure on assigning the priority for each bug report, we propose an integration method to predict priority levels based on machine learning. Our approach considers the textual description in bug reports as features and feeds these features to three different classifiers. We utilize these classifiers to predict the bug reports with unknown type and obtain three different results. Simultaneously, we set weights to balance the abilities of identifying different categories based on the characteristics of different projects for each classifier. Finally, we utilize the weights to adjust prediction results and produce a unique priority for assigning to each bug reports. We perform experiments on datasets from 4 products in Mozilla and the experimental results show that our approach has a better performance in terms of identifying the priority of bug reports than previous general methods and ensemble methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xia, X., Lo, D., Wang, X., Zhou, B.: Accurate developer recommendation for bug resolution. In: Conference: Reverse Engineering, pp. 72–81. IEEE (2013)

    Google Scholar 

  2. Anvik, J., Hiew, L., Murphy, G.C.: Coping with an open bug repository. In: Proceedings of the 2005 OOPSLA workshop on Eclipse technology eXchange, pp. 35–39. ACM, New York (2005)

    Google Scholar 

  3. Tian, Y., Lo, D., Sun, C.: DRONE: predicting priority of reported bugs by multi-factor analysis. In: IEEE International Conference on Software Maintenance, pp. 200–209. IEEE (2013)

    Google Scholar 

  4. Wang, Q., et al.: Local-based active classification of test report to assist crowdsourced testing. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 190–201. ACM (2016)

    Google Scholar 

  5. Neeraj, B., Girja, S., Ritu, D.B., Manisha, M.: Decision tree analysis on j48 algorithm for data mining. J. Adv. Res. Comput. 3(6), 1114–1119 (2013)

    Google Scholar 

  6. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, Burlington (2006)

    MATH  Google Scholar 

  7. IBM ILOG CPLEX Optimizer. https://www.ibm.com/analytics/data-science/prescriptive-analytics/cplex-optimizer/. Accessed 26 Apr 2018

  8. Lovins, J.B.: Development of a stemming algorithm. Mech. Transl. Comput. Linguist. 11, 22–31 (1968)

    Google Scholar 

  9. http://bugzilla.mozilla.org. Accessed 26 Mar 2018

  10. Hu, J., Zhang, G.: K-fold cross-validation based selected ensemble classification algorithm. Bull. Sci. Technol. 29, 115–117 (2013)

    Google Scholar 

  11. Weng, C.G., Poon, J.: A new evaluation measure for imbalanced datasets. In: Australasian Data Mining Conference, pp. 27–32. Australian Computer Society, Inc. (2008)

    Google Scholar 

  12. Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE International Conference on Software Maintenance, pp. 346–355 (2015)

    Google Scholar 

  13. Cohen, W.W.: Fast effective rule induction. In: Twelfth International Conference on Machine Learning, pp. 115–123. Morgan Kaufmann Publishers, Inc. (1995)

    Google Scholar 

  14. Lamkanfi, A., Demeyer, S., Giger, E., et al.: Predicting the severity of a reported bug. In: Mining Software Repositories, pp. 1–10. IEEE (2010)

    Google Scholar 

  15. Lamkanfi, A., Demeyer, S., Soetens, Q.D., et al.: Comparing mining algorithms for predicting the severity of a reported bug. In: European Conference on Software Maintenance and Reengineering, pp. 249–258. IEEE Computer Society (2011)

    Google Scholar 

  16. Tian, Y., Lo, D., Sun, C.: Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. In: Reverse Engineering, pp. 215–224. IEEE (2012)

    Google Scholar 

  17. Tian, Y., Lo, D., Xia, X., et al.: Automated prediction of bug report priority using multi-factor analysis. Empir. Softw. Eng. 20(5), 1354–1383 (2015)

    Article  Google Scholar 

  18. Sharma, M., Bedi, P., Chaturvedi, K.K., et al.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: International Conference on Intelligent Systems Design and Applications, pp. 539–545. IEEE (2013)

    Google Scholar 

  19. Khomh, F., Chan, B., Zou, Y., et al.: An entropy evaluation approach for triaging field crashes: a case study of Mozilla Firefox. In: Working Conference on Reverse Engineering, pp. 261–270. IEEE Computer Society (2011)

    Google Scholar 

  20. Antoniol, G., Ayari, K., Penta, M.D., Khomh, F.: Is it a bug or an enhancement? A text-based approach to classify change requests. In: Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2008, pp. 304–318. ACM (2008)

    Google Scholar 

  21. Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: International Conference on Software Engineering, pp. 499–510. IEEE (2007)

    Google Scholar 

  22. Sun, C., Lo, D., et al.: A discriminative model approach for accurate duplicate bug report retrieval. In: International Conference on Software Engineering, pp. 45–54. IEEE (2010)

    Google Scholar 

  23. Sun, C., Lo, D., Khoo, S.C., et al.: Towards more accurate retrieval of duplicate bug reports. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 253–262. IEEE (2011)

    Google Scholar 

  24. Tian, Y., Sun, C., Lo, D.: Improved duplicate bug report identification, vol. 94, no. 3, pp. 385–390 (2012)

    Google Scholar 

  25. Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In: International Conference on Software Engineering, pp. 14–24. IEEE (2012)

    Google Scholar 

  26. Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: IEEE Working Conference on Mining Software Repositories, pp. 11–20. IEEE (2010)

    Google Scholar 

  27. Huang, L.G., Ng, V., Persing, I., et al.: AutoODC: automated generation of orthogonal defect classifications. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 3–46. IEEE (2011)

    Google Scholar 

  28. Thung, F., Lo, D., Jiang, L.: Automatic defect categorization. In: Working Conference on Reverse Engineering, pp. 205–214. IEEE (2012)

    Google Scholar 

  29. Kim, S., Whitehead, E.J.: How long did it take to fix bugs? In: International Workshop on Mining Software Repositories, MSR 2006, pp. 173–174. DBLP, Shanghai (2006)

    Google Scholar 

  30. Weiss, C., Premraj, R., Zimmermann, T., et al.: How long will it take to fix this bug? In: Proceedings of International Workshop on Mining Software Repositories, p. 1 (2007)

    Google Scholar 

  31. Jeong, G., Kim, S., Zimmermann, T.: Improving bug triage with bug toss-ing graphs. In: The Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering, pp. 111–120. ACM (2009)

    Google Scholar 

  32. Tamrawi, A., Nguyen, T.T., Al-Kofahi, J., et al.: Fuzzy set-based automatic bug triaging (NIER track). In: International Conference on Software Engineering, pp. 884–887. IEEE (2011)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (No. 61602077, No. 61672122), the Natural Science Foundation of Liaoning Province of China (No. 20170540097), and the Fundamental Research Funds for the Central Universities (No. 3132016348).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, G., Li, H., Chen, R., Ge, X., Guo, S. (2018). Identification of High Priority Bug Reports via Integration Method. In: Xu, Z., Gao, X., Miao, Q., Zhang, Y., Bu, J. (eds) Big Data. Big Data 2018. Communications in Computer and Information Science, vol 945. Springer, Singapore. https://doi.org/10.1007/978-981-13-2922-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2922-7_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2921-0

  • Online ISBN: 978-981-13-2922-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics