Rozprawy doktorskie na temat „Software defects”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Software defects”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Couto, César Francisco de Moura. "Predicting software defects with causality tests = Predizendo defeitos de software com testes de causalidade". Universidade Federal de Minas Gerais, 2013. http://hdl.handle.net/1843/ESBF-9GMMLN.
Pełny tekst źródłaPredição de defeitos é uma área de pesquisa em engenharia de software que objetiva identificar os componentes de um sistema de software que são mais prováveis de apresentar defeitos. Apesar do grande investimento em pesquisa objetivando identificar uma maneira efetiva para predizer defeitos em sistemas de software, ainda não existe uma solução amplamente utilizada para este problema. As atuais abordagens para predição de defeitos apresentam pelo menos dois problemas principais. Primeiro, a maioria das abordagens não considera a idéia de causalidade entre métricas de software e defeitos. Mais especificamente, os estudos realizados para avaliar as técnicas de predição de defeitos não investigam em profundidade se as relações descobertas indicam relações de causa e efeito ou se são coincidências estatísticas. O segundo problema diz respeito a saída dos atuais modelos de predição de defeitos. Tipicamente, a maioria dos modelos indica o número ou a existência de defeitos em um componente no futuro. Claramente, a disponibilidade desta informação é importante para promover a qualidade de software. Entretanto, predizer defeitos logo que eles são introduzidos no código é mais útil para mantenedores que simplesmente sinalizar futuras ocorrências de defeitos. Para resolver estas questões, nós propomos uma abordagem para predição de defeitos centrada em evidências mais robustas no sentido de causalidade entre métricas de código fonte (como preditor) e a ocorrência de defeitos. Mais especificamente, nós usamos um teste de hipótese estatístico proposto por Clive Granger (Teste de Causalidade de Granger) para avaliar se variações passadas nos valores de métricas de código fonte podem ser usados para predizer mudanças em séries temporais de defeitos. Nossa abordagem ativa alarmes quando mudanças realizadas no código fonte de um sistema alvo são prováveis de produzir defeitos. Nós avaliamos nossa abordagem em várias fases da vida de quatro sistemas implementados em Java. Nós alcançamos um precisão média maior do que 50% em três dos quatro sistemas avaliados. Além disso, ao comparar nossa abordagem com abordagens que não são baseadas em testes de causalidade, nossa abordagem alcançou uma precisão melhor.
Wang, Hui. "Software Defects Classification Prediction Based On Mining Software Repository". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-216554.
Pełny tekst źródłaNakamura, Taiga. "Recurring software defects in high end computing". College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7217.
Pełny tekst źródłaThesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Hickman, Björn, i Victor Holmqvist. "Predict future software defects through machine learning". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301864.
Pełny tekst źródłaRapportens mål var att undersöka potentiella effekter av att predicera mjukvarudefekter i ett mjukvaruprojekt. Detta genomfördes med hjälp av maskininlärning. Vidare undersöker studien vilka särdrag hos en kodbas som är av intresse för att genomföra dessa prediktioner. De undersökta särdrag som användes för att träna modellerna var av både teknisk såväl som organisatorisk karaktär. Modellerna som användes var Random forest, logistisk regression och naive Bayes. Data hämtades från ett open source git-repository, VSCode, där korrekta klassificeringar av rapporterade defekter hämtades från GitHub-Issues. Rapportens resultat ger indikationer på att både tekniska och organisatoriska särdrag är av relevans. Samtliga tre modeller påvisade liknande resultat. Vidare kan modellernas resultat visa stöd för att användas som ett komplementärt verktyg vid projektledning av mjukvaruprojekt. Närmare bestämt stöd vid riskplanering, riskbedömning och vid resursallokering. Vidare skulle fortsatta studier inom detta område vara av intresse för att bekräfta denna studies slutsatser.
Shippey, Thomas Joshua. "Exploiting abstract syntax trees to locate software defects". Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16365.
Pełny tekst źródłaZheng, Xue Lin. "A Framework for Early Detection of Requirements Defects". Thesis, Griffith University, 2008. http://hdl.handle.net/10072/366377.
Pełny tekst źródłaThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Phaphoom, Nattakarn. "Pair Programming and Software Defects : A Case Study". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3513.
Pełny tekst źródłaAlmossawi, Ali. "Investigating the architectural drivers of defects in open-source software systems : an empirical study of defects and reopened defects in GNOME". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76566.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 64-67).
In major software systems that are developed by competent software engineers, the existence of defects in production is unlikely to be an acceptable situation. And yet, we find that in several such systems, defects remain a reality. Furthermore, the number of changes that are fixed only to then be reopened is noticeable. The implications of having defects in a system can be frustrating for all stakeholders, and when they require constant rework, they can lead to the problematic code-test-code-test mode of development. For management, such conditions can result in slipped schedules and an increase in development costs and for upper management and users, they can result in losing confidence in the product. This study looks at the drivers of defects in the mature open-source project GNOME and explores the relationship between the various drivers of these defects and software quality. Using defect-activity and source-code data for 32 systems over a period of eight years, the work presents a multiple regression model capable of explaining 16.2% of defects and a logistic regression model capable of explaining between 13.6% and 18.1% of reopened defects. The study also shows that although defects in general and reopened defects appear to move together, defects in general correlate with a measure of complexity that captures how components connect to each other whereas reopened defects correlate with a measure that captures the inner complexities of components, thereby suggesting that different types of defects are correlated with different forms of complexity.
by Ali Almossawi.
S.M.in Engineering and Management
Vandehei, Bailey R. "Leveraging Defects Life-Cycle for Labeling Defective Classes". DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2111.
Pełny tekst źródłaArantes, Alessandro Oliveira. "REACTOR: Combining static analysis, testing and reverse engineering to detect software defects". Instituto Nacional de Pesquisas Espaciais (INPE), 2016. http://urlib.net/sid.inpe.br/mtc-m21b/2016/04.20.19.30.
Pełny tekst źródłaÉ cada vez mais comum a utilização de sistemas computacionais em substituição à mão de obra humana em sistemas críticos, e na medida em que estes sistemas têm se tornado mais autônomos para tomar decisões, eles exigem um alto grau de qualidade e robustez. O INPE desenvolve sistemas embarcados para satélites científicos e balões estratosféricos; consequentemente, os processos de verificação e validação exigem cuidados especiais na detecção e prevenção de defeitos. E tendo em vista a complexidade e o domínio dos sistemas em questão, estes processos consomem a mão de obra especialista por um longo período. Neste cenário, a aplicação de técnicas que possam efetuar testes de forma automática auxiliam o processo proporcionando um ganho significativo de produtividade e eficácia no trabalho dos especialistas. Com esse objetivo, este trabalho realiza a engenharia reversa de código-fonte de modo a combinar dois processos de V\&V, análise estática de código fonte e teste de software, a fim de detectar uma gama mais ampla de defeitos. O método proposto, denominado REACTOR (Reverse Engineering for stAtic Code analysis and Testing to detect sOftwaRe defects), complementa a maneira tradicional pela qual os analisadores de código estático trabalham usando informações dinâmicas obtidas por um gerador de caso de teste automatizado, que combina três técnicas de caixa preta diferentes, sendo também possível inferir um conjunto de resultados esperados estimados similar a um oráculo de teste. Ainda assim, a leitura do código fonte estático por si só pode não revelar vários tipos de defeitos que só podem ser detectados combinando a análise estática com informação dinâmica. O método REACTOR foi implementado em uma ferramenta de software, também chamado de REACTOR, que poupa os testadores de um grande volume de trabalho manual automatizando o processo e baseando-se apenas no código fonte. Além disso, a REACTOR foi aplicada em alguns casos de estudo incluindo uma aplicação da área espacial, e seu desempenho foi melhor do que outras três conhecidos analisadores de código estático.
Jaber, Khaled M. "Supporting Project Tasks, Resources, Documents, and Defects Analysis in Software Project Management". Ohio University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1461609929.
Pełny tekst źródłaHassan, Syed Karimuddin and Syed Muhammad. "Defect Detection in SRS using Requirement Defect Taxonomy". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5253.
Pełny tekst źródłaskarimuddin@yahoo.com, hassanshah357@gmail.com
Powell, Daniel, i n/a. "Formal Methods For Verification Based Software Inspection". Griffith University. School of Computing and Information Technology, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030925.154706.
Pełny tekst źródłaPowell, Daniel. "Formal Methods For Verification Based Software Inspection". Thesis, Griffith University, 2003. http://hdl.handle.net/10072/366466.
Pełny tekst źródłaThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Computing and Information Technology
Full Text
Bowes, David Hutchinson. "Factors affecting the performance of trainable models for software defect prediction". Thesis, University of Hertfordshire, 2013. http://hdl.handle.net/2299/10978.
Pełny tekst źródłaAllanqawi, Khaled Kh S. Kh. "A framework for the classification and detection of design defects and software quality assurance". Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34534/.
Pełny tekst źródłavon, Oldenburg Tim. "Making scope explorable in Software Development Environments to reduce defects and support program understanding". Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-24006.
Pełny tekst źródłaDa, Costa S. C. "The prediction of risk of welding defects at the procedure stage using computer knowledge based systems". Thesis, Cranfield University, 1992. http://dspace.lib.cranfield.ac.uk/handle/1826/4446.
Pełny tekst źródłaVan, Rooyen Gert-Jan. "Baseband compensation principles for defects in quadrature signal conversion and processing". Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49869.
Pełny tekst źródłaENGLISH ABSTRACT: Keywords: software-defined radio, SDR, quadrature mixing, quadrature modulation, quadrature demodulation, digital compensation, software radio, direct-digital synthesis, DDS. An often-stated goal of software-defined transceiver systems is to perform digital signal conversion as close to the antenna as possible by using high-rate converters. In this dissertation, alternative design principles are proposed, and it is shown that the signal processing techniques based on these principles improve on the prior system's accuracy, while maintaining system flexibility. Firstly, it is proposed that digital compensation can be used to reverse the effects of hardware inaccuracies in the RF front-end of a software-defined radio. Novel compensation techniques are introduced that suppress the signal artefacts introduced by typical frontend hardware. The extent to which such artefacts may be suppressed, is only limited by the accuracy by which they may be measured and digitally represented. A general compensation principle is laid down, which formalises the conditions under which optimal compensation may be achieved. Secondly, it is proposed that, in the design of such RF front-ends, a clear distinction should be drawn between signal processing complexity and frequency translation. It is demonstrated that conventional SDR systems often neglect this principle. As an alternative, quadrature mixing is shown to provide a clear separation between the frequency translation and signal processing problems. However, effective use of quadrature mixing as design approach necessitates the use of accurate compensation techniques to circumvent the hardware inaccuracies typically found in such mixers. Quadrature mixers are proposed as general-purpose front-ends for software-defined radios, and quadrature modulation and demodulation techniques are presented as alternatives to existing schemes. The inherent hardware inaccuracies are analysed and simulated, and appropriate compensation techniques are derived and tested. Finally, the theory is verified with a prototype system.
AFRIKAANSE OPSOMMING: Sleutelwoorde: sagteware-gedefinieerde radio, SDR, haaksfasige menging, haaksfasige modulasie, haaksfasige demodulasie, digitale kompensasie, sagteware-radio, direk-digitale sintese, DDS. 'n Gewilde stelling is dat digitale seinomsetting in sagteware-gedefinieerde kommunikasiestelsels so na as moontlik aan die antenna moet geskied deur gebruik te maak van hoëspoed omsetters. Hierdie verhandeling stel alternatiewe ontwerpsbeginsels voor, en toon aan dat hierdie beginsels die eersgenoemde stelsel se akkuraatheid verbeter, terwyl stelselbuigsaamheid gehandhaaf word. Dit word eerstens voorgestel dat digitale kompensasie gebruik word om die effekte van hardeware-onakkuraathede in die RF-koppelvlak van sagteware-gedefinieerde radio's om te keer. Nuwe kompensasietegnieke, wat seinartefakte weens koppelvlak-onakkuraathede kan onderdruk, word aangebied. Die mate waartoe hierdie artefakte onderdruk kan word, word slegs beperk deur die akkuraatheid waarmee dit gemeet en digitaal voorgestel kan word. 'n Algemene kompensasiebeginsel word neergelê waarin die voorwaardes vir optimale kompensasie vasgelê word. Tweedens word voorgestel dat 'n duidelike onderskeid getref word tussen seinverwerkingskompleksiteit en seinverskuiwing in RF-koppelvlakke. Daar word getoon dat konvensionele SDR-stelsels dikwels nie hierdie beginsel handhaaf nie. 'n Alternatief, naamlik haaksfasige menging, word voorgehou as 'n tegniek wat duidelik onderskei tussen seinverskuiwing en seinverwerking. Akkurate kompensasietegnieke is egter nodig om effektief van sulke mengers gebruik te maak. Haaksfasige mengers word voorgestel as veeldoelige koppelvlakke vir sagteware-gedefinieerde radio's, en haaksfasige modulasie- en demodulasietegnieke word voorgestel as plaasvervangers vir bestaande tegnieke. Die inherente hardeware-onakkuraathede word geanaliseer en gesimuleer, en geskikte kompensasietegnieke word afgelei en getoets. Laastens word die teoretiese resultate met 'n praktiese prototipe bevestig.
Suh, Caitlin D. "The Use of High-Throughput Virtual Screening Software in the Proposal of A Novel Treatment for Congenital Heart Defects". Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/cmc_theses/2260.
Pełny tekst źródłaOliveira, Itelvina Silva de. "Teste baseado em defeitos para ambientes de data warehouse". Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1413.
Pełny tekst źródłaOrganizations need to manage information for a continuous improvement of its business processes and aggregate knowledge that help in the decision-making process. This information often is provided by Data Warehouse environments (DW), in which data are handled and processed. The quality of data in these environments is essential to make correct decisions, becoming it necessary the application of tests. The objective of this work is to develop and validate the implementation of a testing approach for DW using criteria of Fault-based Testing techniques. The application of the approach enabled tests in three phases of development of the DW, which are the data sources, ETL and DW data. The test criteria Mutation Analysis was applied to the ETL process (Extraction, Transformation and Load) through SQL mutation operators and the Alternative Data Instances Analysis was applied to the data sources and DW data through fault classes on the data. These classes were generated by analyzing and associating of data quality problems in the DW development stages. The results obtained through the case studies allowed assessment of the applicability and effectiveness of testing technique fault for DW environments, thus enabling to reveal faults, which may occur in the generation of DW that could harm the quality of the data stored in these environments.
Ahmed, Israr, i Shahid Nadeem. "Minimizing Defects Originating from Elicitation, Analysis and Negotiation (E and A&N) Phase in Bespoke Requirements Engineering". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4070.
Pełny tekst źródłaРуденко, Александр Антонович. "Вероятностные модели и методы оценивания надежности программных средств с учетом вторичных дефектов". Thesis, Полтавский национальный технический университет им. Ю. Кондратюка, 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/19065.
Pełny tekst źródłaThe dissertation on obtaining the scientific degree of candidate of technical sciences in the specialty 05.13.06 – information technologies – National technical University "Kharkiv Polytechnic Institute", Kharkov, 2015. The dissertation dedicated to the developing of models, methods of reliability estimation of software-technical complexes of information technology on the basis of making secondary defects. Scientific results are: improving probabilistic models of reliability estimation of software based on the parameters of secondary defects by modifying the risk function of these models that allows to reflect processes of testing and maintenance of software; method of estimating secondary defects of software tools that is based on the analysis of statistical data of manifestation of primary defects of software tools that allows to raise the accuracy of the quantitative assessment of performance indicators; the method of calculating the average intensity of manifestation of defects and the average change in the intensity of manifestation of defects with the help of modified model Jelinski-Moranda that, unlike existing, takes into account factor of secondary defects that allows to verify the reliability of software tools. Information technology of assessment the secure of software tools taking into account the secondary defects is devised basing on the method of estimating the number of secondary defects according to the statistics of defect detection and the method of calculating the average intensity of manifestation of defects and the average change in the intensity of manifestation of defects. The proposed models and methods allow to raise the accuracy of estimation of reliability of software and hardware complexes that is achieved by taking into account the factor of secondary defects.
Руденко, Олександр Антонович. "Імовірнісні моделі та методи оцінювання надійності програмних засобів з урахуванням вторинних дефектів". Thesis, ТОВ "Фірма "Техсервіс", 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/19064.
Pełny tekst źródłaThe dissertation on obtaining the scientific degree of candidate of technical sciences in the specialty 05.13.06 – information technologies – National technical University "Kharkiv Polytechnic Institute", Kharkov, 2015. The dissertation dedicated to the developing of models, methods of reliability estimation of software-technical complexes of information technology on the basis of making secondary defects. Scientific results are: improving probabilistic models of reliability estimation of software based on the parameters of secondary defects by modifying the risk function of these models that allows to reflect processes of testing and maintenance of software; method of estimating secondary defects of software tools that is based on the analysis of statistical data of manifestation of primary defects of software tools that allows to raise the accuracy of the quantitative assessment of performance indicators; the method of calculating the average intensity of manifestation of defects and the average change in the intensity of manifestation of defects with the help of modified model Jelinski-Moranda that, unlike existing, takes into account factor of secondary defects that allows to verify the reliability of software tools. Information technology of assessment the secure of software tools taking into account the secondary defects is devised basing on the method of estimating the number of secondary defects according to the statistics of defect detection and the method of calculating the average intensity of manifestation of defects and the average change in the intensity of manifestation of defects. The proposed models and methods allow to raise the accuracy of estimation of reliability of software and hardware complexes that is achieved by taking into account the factor of secondary defects.
Ye, Xin. "Automated Software Defect Localization". Ohio University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1462374079.
Pełny tekst źródłaPorto, Faimison Rodrigues. "Cross-project defect prediction with meta-Learning". Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-21032018-163840/.
Pełny tekst źródłaModelos de predição de defeitos auxiliam profissionais de teste na priorização de partes do software mais propensas a conter defeitos. A abordagem de predição de defeitos cruzada entre projetos (CPDP) refere-se à utilização de projetos externos já conhecidos para compor o conjunto de treinamento. Essa abordagem é útil quando a quantidade de dados históricos de defeitos é inapropriada ou insuficiente para compor o conjunto de treinamento. Embora o princípio seja atrativo, o desempenho de predição é um fator limitante nessa abordagem. Nos últimos anos, vários métodos foram propostos com o intuito de melhorar o desempenho de predição de modelos CPDP. Contudo, na literatura, existe uma carência de estudos comparativos que apontam quais métodos CPDP apresentam melhores desempenhos. Além disso, não há evidências sobre quais métodos CPDP apresentam melhor desempenho para um domínio de aplicação específico. De fato, não existe um algoritmo de aprendizado de máquina que seja apropriado para todos os domínios de aplicação. A tarefa de decisão sobre qual algoritmo é mais adequado a um determinado domínio de aplicação é investigado na literatura de meta-aprendizado. Um modelo de meta-aprendizado é caracterizado pela sua capacidade de aprender a partir de experiências anteriores e adaptar seu viés de indução dinamicamente de acordo com o domínio alvo. Neste trabalho, nós investigamos a viabilidade de usar meta-aprendizado para a recomendação de métodos CPDP. Nesta tese são almejados três principais objetivos. Primeiro, é conduzida uma análise experimental para investigar a viabilidade de usar métodos de seleção de atributos como procedimento interno de dois métodos CPDP, com o intuito de melhorar o desempenho de predição. Segundo, são investigados quais métodos CPDP apresentam um melhor desempenho em um contexto geral. Nesse contexto, também é investigado se os métodos com melhor desempenho geral apresentam melhor desempenho para os mesmos conjuntos de dados (ou projetos de software). Os resultados revelam que os métodos CPDP mais adequados para um projeto podem variar de acordo com as características do projeto sendo predito. Essa constatação conduz à terceira investigação realizada neste trabalho. Foram investigadas as várias particularidades inerentes ao contexto CPDP a fim de propor uma solução de meta-aprendizado capaz de aprender com experiências anteriores e recomendar métodos CPDP adequados, de acordo com as características do software. Foram avaliados a capacidade de meta-aprendizado da solução proposta e a sua performance em relação aos métodos base que apresentaram melhor desempenho geral.
Jain, Achin. "Software defect content estimation: A Bayesian approach". Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/26932.
Pełny tekst źródłaCAVALCANTI, Diego Tavares. "Estudo do uso de vocabulários para analisar o impacto de relatórios de defeitos a código-fonte". Universidade Federal de Campina Grande, 2012. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/1839.
Pełny tekst źródłaMade available in DSpace on 2018-09-28T14:01:43Z (GMT). No. of bitstreams: 1 DIEGO TAVARES CAVALCANTI - DISSERTAÇÃO PPGCC 2012..pdf: 11733349 bytes, checksum: 59909ce95d6ea71dea6e9686d3d20c33 (MD5) Previous issue date: 2012-11-26
Localizar e corrigir defeitos são tarefas comuns no processo de manutenção de software. Entretanto, a atividade de localizar entidades de código que são possivelmente defeituosas e que necessitam ser modificadas para a correção de um defeito, não é trivial. Geralmente, desenvolvedores realizam esta tarefa por meio de um processo manual de leitura e inspeção do código, bem como de informações cadastradas em relatórios de defeitos. De fato, é necessário que os desenvolvedores tenham um bom conhecimento da arquitetura e do design do software a fim de realizarem tal tarefa. Entretanto, este conhecimento fica espalhado por entre a equipe e requer tempo para ser adquirido por novatos. Assim, é necessário o desenvolvimento de técnicas que auxiliem na tarefa de análise de impacto de relatórios de defeitos no código, independente da experiência do desenvolvedor que irá executá-la. Neste trabalho, apresentamos resultados de um estudo empírico no qual avaliamos se a análise automática de vocabulários de relatórios de defeitos e de software pode ser útil na tarefa de localizar defeitos no código. Nele, analisamos similaridade de vocabulários como fator para sugerir classes que são prováveis de serem impactadas por um dado relatório de defeito. Realizamos uma avaliação com oito projetos maduros de código aberto, desenvolvidos em Java, que utilizam Bugzilla e JIRA como seus repositórios de defeitos. Nossos resultados indicam que a análise de ambos os vocabulários é, de fato, uma fonte valiosa de informação, que pode ser utilizada para agilizar a tarefa de localização de defeitos. Para todos os sistemas estudados, ao considerarmos apenas análise de vocabulário, vimos que, mesmo com um ranking contendo apenas 8% das classes de um projeto, foi possível encontrar classes relacionadas ao defeito buscado em até 75% dos casos. Portanto, podemos concluir que, mesmo que não possamos utilizar vocabulários de software e de relatórios de defeitos como únicas fontes de informação, eles certamente podem melhorar os resultados obtidos, ao serem combinados com técnicas complementares.
Locating and fixing bugs described in bug reports are routine tasks in software development processes. A major effort must be undertaken to successfully locate the (possibly faulty) entities in the code that must be worked on. Generally, developers map bug reports to code through manual reading and inspection of both bug reports and the code itself. In practice, they must rely on their knowledge about the software architecture and design to perform the mapping in an efficient and effective way. However, it is well known that architectural and design knowledge is spread out among developers. Hence, the success of such a task is directly depending on choosing the right developer. In this paper, we present results of an empirical study we performed to evaluate whether the automated analysis of bug reports and software vocabularies can be helpful in the task of locating bugs. We conducted our study on eight versions of six mature Java open-source projects that use Bugzilla and JIRA as bug tracking systems. In our study, we have used Information Retrieval techniques to assess the similarity of bug reports and code entities vocabularies. For each bug report, we ranked ali code entities according to the measured similarity. Our results indicate that vocabularies are indeed a valuable source of information that can be used to narrow down the bug-locating task. For ali the studied systems, considering vocabulary similarity only, a Top 8% list of entities has about 75% of the target entities. We conclude that while vocabularies cannot be the sole source of information, they can certainly improve results if combined with other techniques.
Sherwood, Patricia Ann. "Inspections : software development process for building defect free software applied in a small-scale software development environment /". Online version of thesis, 1990. http://hdl.handle.net/1850/10598.
Pełny tekst źródłaTran, Qui Can Cuong. "Empirical evaluation of defect identification indicators and defect prediction models". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2553.
Pełny tekst źródłaAkinwale, Olusegun. "DuoTracker tool support for software defect data collection and analysis /". abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447633.
Pełny tekst źródłaGray, David Philip Harry. "Software defect prediction using static code metrics : formulating a methodology". Thesis, University of Hertfordshire, 2013. http://hdl.handle.net/2299/11067.
Pełny tekst źródłaHameed, Muhammad Muzaffar, i Muhammad Zeeshan ul Haq. "DefectoFix : An interactive defect fix logging tool". Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5268.
Pełny tekst źródłaKasianenko, Stanislav. "Predicting Software Defectiveness by Mining Software Repositories". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78729.
Pełny tekst źródłaPortnoy, William. "Distributable defect localization using Markov models /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6883.
Pełny tekst źródłaLiljeson, Mattias, i Alexander Mohlin. "Software defect prediction using machine learning on test and source code metrics". Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4162.
Pełny tekst źródłaMahmood, Zaheed. "An analysis of software defect prediction studies through reproducibility and replication". Thesis, University of Hertfordshire, 2018. http://hdl.handle.net/2299/20826.
Pełny tekst źródłaCurhan, Lisa A. 1961. "Software defect tracking during new product development of a computer system". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34824.
Pełny tekst źródłaIncludes bibliographical references (p. 74-75).
Software defects (colloquially known as "bugs") have a major impact on the market acceptance and profitability of computer systems. Sun Microsystems markets both hardware and software for a wide variety of customer needs. The integration of hardware and software is a key core capability for Sun. Minimizing the quantity and impact of software defects on this integration during new product development is essential to execution of a timely and high-quality product. To analyze the effect of software defects on the product development cycle for a midrange computer system, I have used a particular computer platform, the Productl server, as a case study. The objective of this work was to use Sun's extensive database of software defects as a source for data-mining in order to draw conclusions about the types of software defects that tend to occur during new product development and early production ramp. I also interviewed key players on the Productl development team for more insight into the causes and impacts of software defects for this platform. Some of the major themes that resulted from this study include: The impact of defects is not necessarily proportional to their quantity. Some types of defects have a much higher cost to fix due to customer impact, time needed to fix, or the wide distribution of the software in which they are embedded. Software Requirements need to be vetted extensively before production of new code. This is especially critical for platform-specific requirements. The confluence of new features, new software structure and new hardware can lead to a greater density of software defects. The higher number of defects associated with the new System Controller code supports this conclusion. Current Limitations of Defect Data Mining: Automated extraction
(cont.) of information is most efficient when it can be applied to numbers and short text strings. However, the evaluation of software defects for root cause cannot be easily summarized in a few words or numbers. Therefore, an intelligent classification methodology for root causes of software defects, to be included in Sun's defect database, would be extremely useful to increase the utility of the database for institutional learning. Software Defect Data Mining seems to be underutilized at Sun. I have barely touched the surface of the information that can be extracted from our "BugDB" defect database. This data resource is rich with history. We should extract and analyze this type of data frequently.
by Lisa A. Curhan.
S.M.
Isunza, Navarro Abgeiba Yaroslava. "Evaluation of Attention Mechanisms for Just-In-Time Software Defect Prediction". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-288724.
Pełny tekst źródłaJust-In-Time Defect Prediction (JIT-DP) fokuserar på att förutspå fel i mjukvara vid ändringar i koden, med målet att hjälpa utvecklare att identifiera defekter medan utvecklingsprocessen fortfarande är pågående, och att förbättra kvaliteten hos applikationsprogramvara. Detta arbete studerar djupinlärningstekniker genom att tillämpa attentionmekanismer som har varit framgångsrika inom, bland annat, språkteknologi (NLP). Vi introducerar två nätverk vid namn Convolutional Neural Network with Bidirectional Attention (BACNN), och Bidirectional Attention Code Network (BACoN), som använder en tvåriktad attentionmekanism mellan koden och meddelandet om en mjukvaruändring. Dessutom undersöker vi BERT [17] och RoBERTa [57], attentionarkitekturer för JIT-DP. Mer specifikt studerar vi hur effektivt dessa attentionbaserade modeller kan förutspå defekta ändringar, och jämför dem med de bästa tillgängliga arkitekturerna DeePJIT [37] och TLEL [101]. Våra experiment utvärderar modellerna genom att använda mjukvaruändringar från det öppna källkodsprojektet OpenStack. Våra resultat visar att attentionbaserade nätverk överträffar referensmodellen sett till träffsäkerheten i de olika scenarierna. De attentionbaserade modellerna, framför allt BERT och RoBERTa, demonstrerade lovade resultat när det kommer till att identifiera defekta mjukvaruändringar och visade sig vara effektiva på att förutspå defekter i ändringar av nya mjukvaruversioner.
DUTTA, BINAMRA. "Enterprise Software Metrics: How To Add Business Value". Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1239239432.
Pełny tekst źródłaSiahaan, Antony. "Defect correction based domain decomposition methods for some nonlinear problems". Thesis, University of Greenwich, 2011. http://gala.gre.ac.uk/7144/.
Pełny tekst źródłaLand, Lesley Pek Wee Information Systems Technology & Management Australian School of Business UNSW. "Software group reviews and the impact of procedural roles on defect detection performance". Awarded by:University of New South Wales. School of Information Systems, Technology and Management, 2000. http://handle.unsw.edu.au/1959.4/21838.
Pełny tekst źródłaFreitas, Diogo Machado de. "Geração evolucionária de heurísticas para localização de defeitos de software". Universidade Federal de Goiás, 2018. http://repositorio.bc.ufg.br/tede/handle/tede/9010.
Pełny tekst źródłaApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2018-10-30T13:41:38Z (GMT) No. of bitstreams: 2 Dissertação - Diogo Machado de Freitas - 2018.pdf: 1477764 bytes, checksum: 73759c5ece96bf48ffd4d698f14026b9 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-10-30T13:41:38Z (GMT). No. of bitstreams: 2 Dissertação - Diogo Machado de Freitas - 2018.pdf: 1477764 bytes, checksum: 73759c5ece96bf48ffd4d698f14026b9 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2018-09-24
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
Fault Localization is one stage of the software life cycle, which demands important resources such as time and effort spent on a project. There are several initiatives towards the automation of the fault localization process and the reduction of the associated resources. Many techniques are based on heuristics that use information obtained (spectrum) from the execution of test cases, in order to measure the suspiciousness of each program element to be defective. Spectrum data generally refers to code coverage and test results (positive or negative). The present work presents two approaches based on the Genetic Programming algorithm for the problem of Fault Localization: a method to compose a new heuristic from a set of existing ones; and a method for constructing heuristics based on data from program mutation analysis. The innovative aspects of both methods refer to the joint investigation of: (i) specialization of heuristics for certain programs; (ii) application of an evolutionary approach to the generation of heuristics with non-linear equations; (iii) creation of heuristics based on the combination of traditional heuristics; (iv) use of coverage and mutation spectra extracted from the test activity; (v) analyzing and comparing the efficacy of methods that use coverage and mutation spectra for fault localization; and (vi) quality analysis of the mutation spectra as a data source for fault localization. The results have pointed to the competitiveness of both approaches in their contexts.
Localização de Defeitos é uma etapa do ciclo de vida de software, que demanda recursos importantes tais como o tempo e o esforço gastos em um projeto. Existem diversas iniciativas na direção da automação do processo de localização de defeitos e da redução dos recursos associados. Muitas técnicas são baseadas heurísticas que utilizam informação obtida (espectro) a partir da execução de casos de teste, visando a medir a suspeita de cada elemento de programa para ser defeituoso. Os dados de espectro referem-se, em geral, à cobertura de código e aos resultados dos teste (positivo ou negativo). O presente trabalho apresenta duas abordagens baseadas no algoritmo Programação Genética para o problema de Localização de Defeitos: um método para compor automaticamente novas heurísticas a partir de um conjunto de heurísticas existentes; e um método para a construção de heurísticas baseadas em dados oriundos da análise de mutação de programas. Os aspectos inovadores de ambos os métodos referem-se à investigação conjunta de: (i) especialização de heurísticas para determinados programas; (ii) aplicação de abordagem evolutiva para a geração de heurísticas com equações não lineares; (iii) criação de heurísticas a partir da combinação de heurísticas tradicionais; (iv) uso de espectro de cobertura e de mutação extraídos da atividade de teste; (v) análise e comparação da eficácia de métodos que usam os espectros de cobertura e de mutação para a localização de defeitos; e (vi) análise da qualidade dos espectros de mutação como fonte de dados para a localização de defeitos. Os resultados apontaram competitividade de ambas as abordagens em seus contextos.
Sun, Boya. "PRECISION IMPROVEMENT AND COST REDUCTION FOR DEFECT MINING AND TESTING". Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1321827962.
Pełny tekst źródłaSaxena, Kaustubh. "Investigation of the Effect of the Number of Inspectors on the Software Defect Estimates". Thesis, North Dakota State University, 2012. https://hdl.handle.net/10365/26714.
Pełny tekst źródłaSilva, Maria Goreti Simão da. "Mineração de repositórios de software modelos de previsão de pedidos de evolução de software". Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/10983.
Pełny tekst źródłaA descoberta, ou confirmação, de tendências e padrões na evolução de sistemas de software tem vindo a conferir relevância à mineração de repositórios de software. A Engenharia de Software recorre assim a abordagens específicas para a mineração de dados, originários da construção de software, tais como: código-fonte, histórico de versões (logs), relatórios de erros (rastreio de defeitos), entre outros. Os membros da equipa de desenvolvimento são um recurso valioso no processo de desenvolvimento e manutenção de um software. Para otimizar o seu trabalho têm surgido ferramentas de software integradas e ligadas às atividades de desenvolvimento que permitem que os dados (tais como, pedidos de evolução, repositórios de controlo de versões, entre outros) sejam armazenados automaticamente. Estes dados poderão então ser recuperados e devidamente tratados para que se obtenha informação importante para uma melhoria do processo de desenvolvimento de software. A mineração de dados nos repositórios do processo de desenvolvimento permite detetar tendências e padrões quer no processo de desenvolvimento quer nos artefactos desenvolvidos, constituindo assim uma importante ferramenta de apoio à gestão desse processo. Pretendemos com este estudo usar a informação contida em repositórios de pedidos de evolução para criar modelos de previsão da distribuição desses pedidos ao longo do tempo. Esse tipo de modelos é útil para facilitar a gestão do processo de desenvolvimento e manutenção de software, na medida em que permitem prever períodos em que a densidade de pedidos será maior, contrastando com outros em que há menos pedidos, sendo essa informação relevante para a alocação de recursos humanos ao processo de desenvolvimento e manutenção. A abordagem a utilizar visa estudar que tipos de modelos são mais adequados, conforme o volume de dados histórico existente e o padrão de versões a que o repositório diz respeito. Em particular, queremos saber: - Será que a escolha do “melhor” modelo é relativamente estável, ou muito volátil? A implicação é que podemos ter de atualizar modelos muito frequentemente, ou nem por isso. - Será que os modelos que integram informação sazonal se tornam dominantes? Se sim, quanto tempo de dados históricos é necessário para que a informação sazonal seja relevante?
Kristiansen, Jan Maximilian Winther. "Software Defect Analysis : An Empirical Study of Causes and Costs in the Information Technology Industry". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11120.
Pełny tekst źródłaDavis, James Collins. "On the Impact and Defeat of Regular Expression Denial of Service". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98593.
Pełny tekst źródłaDoctor of Philosophy
Software commonly performs pattern-matching tasks on strings. For example, when validating input in a Web form, software commonly tests whether an input fits the pattern of a credit card number or an email address. Software engineers often implement such string-based pattern matching using a tool called regular expressions (regexes). Regexes permit software engineers to succinctly describe the sequences of characters that make up common "languages" like the set of valid Visa credit card numbers (16 digits, starting with a 4) or the set of valid emails (some characters, an '@', and more characters including at least one'.'). Using regexes on untrusted user input in this manner may be a dangerous decision because some regexes take a long time to evaluate. These slow regexes can be exploited by attackers in order to carry out a denial of service attack known as Regular expression Denial of Service (ReDoS). To date, ReDoS has led to outages affecting hundreds of websites and tens of thousands of users. While the risk of ReDoS is well known in theory, in this dissertation I present the first large-scale empirical studies measuring the extent to which slow regular expressions are used in practice. I found that about 10% of real regular expressions extracted from hundreds of thousands of software projects can exhibit longer-than-expected worst-case behavior in popular programming languages including JavaScript, Python, and Ruby. Motivated by these findings, I then consider a range of ReDoS solution approaches: application refactoring, regex engine replacement, regex engine optimization, and resource caps. I report that application refactoring is error-prone, and that regex engine replacement seems unlikely due to incompatibilities between regex engines. Some resource caps are more successful than others, but all resource cap approaches struggle with adoption. My novel regex engine optimizations seem the most promising approach for protecting existing regex engines, offering significant time reductions with acceptable space overheads.
Nakagawa, Elisa Yumi. "Um Sistema de Injeção de Defeitos de Software Baseado em Operadores de Mutação". Universidade de São Paulo, 1998. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-14032018-162534/.
Pełny tekst źródłaFault Injection is a technique that has been widely used in the development of computer systems that need to be very reliable. In this area, there are studies related with hardware and software fault injection. It should be pointed out that there are few works related to software fault injection in the literature as well as software fault model and injection methods. The objective of this work is to study software fault models and investigate injection methods based on concepts and principies taken from Mutation Analysis Criterion. Considering the increasing complexity of computer systems, the project and implementation of supporting tools to fault injection become necessary. In this perspective, in this work a software fault injection tool, named ITool, is presented. This tool is based on a fault injection scheme that defines the mapping of a software fault taxonomy (DeMillo\'s Taxonomy) to the mutation operators of the Mutation Analysis criterion for C language. To illustrate the relevance and feasibility of the ideas presented in this work, a pilot experience was carried out using the Space program, a real system developed by ESA (European Space Agency).
Ferrari, Fabiano Cutigi. "Uma contribuição para o teste baseado em defeitos de software orientado a aspectos". Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-19012011-090923/.
Pełny tekst źródłaAspect-Oriented Programming (AOP) is a contemporary software development technique that strongly relies on the Separation of Concerns principle. It aims to tackle software modularisation problems by introducing the aspect as a new implementation unit to encapsulate behaviour required to realise the so-called crosscutting concerns. Despite the benefits that may be achieved with AOP, its implementation mechanisms represent new potential sources of faults that should be handled during the testing phase. In this context, mutation testing is a widely investigated fault-based test selection criterion that can help to demonstrate the absence of prespecified faults in the software. It is believed to be an adequate tool to deal with testing-related specificities of contemporary programming techniques such as AOP. However, to date, the few initiatives for customising the mutation testing for aspect-oriented (AO) programs show either limited coverage with respect to the types of simulated faults, or a need for both adequate tool support and proper evaluation. This thesis tackles these limitations by defining a comprehensive mutation-based testing approach for AO programs written in the AspectJ language. It starts with a fault-proneness investigation in order to define a fault taxonomy for AO software. Such taxonomy encompasses a range of fault types and underlay the definition of a set of mutation operators for AO programs. Automated tool support is also provided. A series of quantitative studies show that the proposed fault taxonomy is able to categorise faults identified from several available AO systems. Moreover, the studies show that the mutation operators are able to simulate faults that may not be revealed by pre-existing, non-mutation-based test suites. Furthermore, the effort required to augment the test suites to provide adequate coverage of mutants does not tend to overwhelm the testers. This provides evidence of the feasibility of the proposed approach and represents a step towards the practical fault-based testing of AO programs