Abstract
Many software projects use bug tracking systems to collect and allocate the bug reports, but the priority assignment tasks become difficult to be completed because of the increasing bug reports. In order to assist developers to reduce the pressure on assigning the priority for each bug report, we propose an integration method to predict priority levels based on machine learning. Our approach considers the textual description in bug reports as features and feeds these features to three different classifiers. We utilize these classifiers to predict the bug reports with unknown type and obtain three different results. Simultaneously, we set weights to balance the abilities of identifying different categories based on the characteristics of different projects for each classifier. Finally, we utilize the weights to adjust prediction results and produce a unique priority for assigning to each bug reports. We perform experiments on datasets from 4 products in Mozilla and the experimental results show that our approach has a better performance in terms of identifying the priority of bug reports than previous general methods and ensemble methods.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Xia, X., Lo, D., Wang, X., Zhou, B.: Accurate developer recommendation for bug resolution. In: Conference: Reverse Engineering, pp. 72–81. IEEE (2013)
Anvik, J., Hiew, L., Murphy, G.C.: Coping with an open bug repository. In: Proceedings of the 2005 OOPSLA workshop on Eclipse technology eXchange, pp. 35–39. ACM, New York (2005)
Tian, Y., Lo, D., Sun, C.: DRONE: predicting priority of reported bugs by multi-factor analysis. In: IEEE International Conference on Software Maintenance, pp. 200–209. IEEE (2013)
Wang, Q., et al.: Local-based active classification of test report to assist crowdsourced testing. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 190–201. ACM (2016)
Neeraj, B., Girja, S., Ritu, D.B., Manisha, M.: Decision tree analysis on j48 algorithm for data mining. J. Adv. Res. Comput. 3(6), 1114–1119 (2013)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, Burlington (2006)
IBM ILOG CPLEX Optimizer. https://www.ibm.com/analytics/data-science/prescriptive-analytics/cplex-optimizer/. Accessed 26 Apr 2018
Lovins, J.B.: Development of a stemming algorithm. Mech. Transl. Comput. Linguist. 11, 22–31 (1968)
http://bugzilla.mozilla.org. Accessed 26 Mar 2018
Hu, J., Zhang, G.: K-fold cross-validation based selected ensemble classification algorithm. Bull. Sci. Technol. 29, 115–117 (2013)
Weng, C.G., Poon, J.: A new evaluation measure for imbalanced datasets. In: Australasian Data Mining Conference, pp. 27–32. Australian Computer Society, Inc. (2008)
Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE International Conference on Software Maintenance, pp. 346–355 (2015)
Cohen, W.W.: Fast effective rule induction. In: Twelfth International Conference on Machine Learning, pp. 115–123. Morgan Kaufmann Publishers, Inc. (1995)
Lamkanfi, A., Demeyer, S., Giger, E., et al.: Predicting the severity of a reported bug. In: Mining Software Repositories, pp. 1–10. IEEE (2010)
Lamkanfi, A., Demeyer, S., Soetens, Q.D., et al.: Comparing mining algorithms for predicting the severity of a reported bug. In: European Conference on Software Maintenance and Reengineering, pp. 249–258. IEEE Computer Society (2011)
Tian, Y., Lo, D., Sun, C.: Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. In: Reverse Engineering, pp. 215–224. IEEE (2012)
Tian, Y., Lo, D., Xia, X., et al.: Automated prediction of bug report priority using multi-factor analysis. Empir. Softw. Eng. 20(5), 1354–1383 (2015)
Sharma, M., Bedi, P., Chaturvedi, K.K., et al.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: International Conference on Intelligent Systems Design and Applications, pp. 539–545. IEEE (2013)
Khomh, F., Chan, B., Zou, Y., et al.: An entropy evaluation approach for triaging field crashes: a case study of Mozilla Firefox. In: Working Conference on Reverse Engineering, pp. 261–270. IEEE Computer Society (2011)
Antoniol, G., Ayari, K., Penta, M.D., Khomh, F.: Is it a bug or an enhancement? A text-based approach to classify change requests. In: Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2008, pp. 304–318. ACM (2008)
Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: International Conference on Software Engineering, pp. 499–510. IEEE (2007)
Sun, C., Lo, D., et al.: A discriminative model approach for accurate duplicate bug report retrieval. In: International Conference on Software Engineering, pp. 45–54. IEEE (2010)
Sun, C., Lo, D., Khoo, S.C., et al.: Towards more accurate retrieval of duplicate bug reports. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 253–262. IEEE (2011)
Tian, Y., Sun, C., Lo, D.: Improved duplicate bug report identification, vol. 94, no. 3, pp. 385–390 (2012)
Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In: International Conference on Software Engineering, pp. 14–24. IEEE (2012)
Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: IEEE Working Conference on Mining Software Repositories, pp. 11–20. IEEE (2010)
Huang, L.G., Ng, V., Persing, I., et al.: AutoODC: automated generation of orthogonal defect classifications. In: IEEE/ACM International Conference on Automated Software Engineering, pp. 3–46. IEEE (2011)
Thung, F., Lo, D., Jiang, L.: Automatic defect categorization. In: Working Conference on Reverse Engineering, pp. 205–214. IEEE (2012)
Kim, S., Whitehead, E.J.: How long did it take to fix bugs? In: International Workshop on Mining Software Repositories, MSR 2006, pp. 173–174. DBLP, Shanghai (2006)
Weiss, C., Premraj, R., Zimmermann, T., et al.: How long will it take to fix this bug? In: Proceedings of International Workshop on Mining Software Repositories, p. 1 (2007)
Jeong, G., Kim, S., Zimmermann, T.: Improving bug triage with bug toss-ing graphs. In: The Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering, pp. 111–120. ACM (2009)
Tamrawi, A., Nguyen, T.T., Al-Kofahi, J., et al.: Fuzzy set-based automatic bug triaging (NIER track). In: International Conference on Software Engineering, pp. 884–887. IEEE (2011)
Acknowledgement
This work is supported by the National Natural Science Foundation of China (No. 61602077, No. 61672122), the Natural Science Foundation of Liaoning Province of China (No. 20170540097), and the Fundamental Research Funds for the Central Universities (No. 3132016348).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gao, G., Li, H., Chen, R., Ge, X., Guo, S. (2018). Identification of High Priority Bug Reports via Integration Method. In: Xu, Z., Gao, X., Miao, Q., Zhang, Y., Bu, J. (eds) Big Data. Big Data 2018. Communications in Computer and Information Science, vol 945. Springer, Singapore. https://doi.org/10.1007/978-981-13-2922-7_23
Download citation
DOI: https://doi.org/10.1007/978-981-13-2922-7_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2921-0
Online ISBN: 978-981-13-2922-7
eBook Packages: Computer ScienceComputer Science (R0)