Main Article Content
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
A. Lamkanfi, . S. Demeyer , Q. D. Soetens and T. Verdonck, "Comparing Mining Algorithms for Predicting the Severity of a Reported Bug," in 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011, Oldenburg, Germany, 2011.
N. Serrano and . I. Ciordia, "Bugzilla, ITracker, and Other Bug Trackers," IEEE Software, pp. 11-13, MarchApril 2005.
Y. Tian, D. Lo and C. Sun, "DRONE: Predicting Priority of Reported Bugs by Multi-Factor Analysis," in 2013 IEEE International Conference on Software Maintenance, 2013.
J. Kanwal and O. Maqbool, "Bug prioritization to facilitate bug report triage," Journal of Computer Science and Technology, vol. 27, no. 2, pp. 397-412, March 2012.
M. Porter, "An Algorithm for Suffix Stripping, Program," Program, vol. 14, no. 3, pp. 130-137, 1980.
A. Lamkanfi, S. Demeyer, E. Giger and B. Goethals, "Predicting the Severity of a Reported Bug," in Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, Cape Town, South Africa, 2010.
X. Wang, L. Zhang, T. Xie, J. Anvik and J. Sun, "An Approach to Detecting Duplicate Bug Reports Using Natural Language and Execution Information.," in Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on, Leipzig, Germany, 2008.
C. Sun, . D. Lo, S.-C. Khoo and J. Jiang, "Towards more accurate retrieval of duplicate bug reports," in Automated Software Engineering (ASE), 2011 26th IEEE/ACM International Conference on, Lawrence, KS, USA, 2011.
Y. Singh, A. Kaur and R. Malhotra, "Empirical validation of object-oriented metrics for predicting fault proneness models," Software Quality Journal, vol. 18, no. 3, pp. 3-35, March 2010.
. I. G. Permata and Sari, "An Attribute Selection For Severity Level Determination According To The Support Vector Machine Classification Result," in 1st International Conference on Information Systems For Business Competitiveness (ICISBC) 2011, 2011.
T. Menzies and A. Marcus, "Automated Severity Assessment of Software Defect Reports," in Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM'08), Beijing, China, 2008.
F. Khomh, . B. Chan, Y. Zou and . A. . E. Hassan, "An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox," in Reverse Engineering (WCRE), 2011 18th Working Conference on, Limerick, Ireland, 2011.
L. Huang, V. Ng, I. Persing, M. Chen, Z. Li, R. Geng and J. Tian, "AutoODC: Automated generation of orthogonal defect classifications," Automated Software Engineering, vol. 22, no. 1, p. 3â€“46, March 2015.
. Y. Tian, D. Lo and C. Sun, "Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction," in Reverse Engineering (WCRE), 2012 19th Working Conference on, Kingston, ON, Canada, 2012.
Eclipse, "http://wiki.eclipse.org/Bug Reporting FAQ#What is the difference between Severity and Priority.3F," 2012. [Online].
H. Hosseini, . R. Nguyen and M. W. Godfrey, "A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes," in Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on, Szeged, Hungary, 2012.
G. . D. Boetticher, "Applying Machine Learners to GUI Specifications in Formulating Early Life Cycle Project Estimations," in Software Engineering with Computational Intelligence, Springer, 2003, pp. 1-16.
S. R. Chidamber and C. F. Kemerer, "A Metrics Suite for Object Oriented Design," IEEE Transactions on Software Engineering, vol. 20, no. 6, pp. 476-493, June 1994.
M. Gayathri and A. Sudha, "Software defect prediction system using multilayer perceptron neural network with data mining," International Journal of Recent Technology and Engineering, vol. 3, no. 2, pp. 54-59, May 2014.
H. Kapila and S. Singh, "Analysis of CK Metrics to Predict Software Fault-Proneness using Bayesian Inference," International Journal of Computer Applications, vol. 74, no. 2, July 2013.
N. Katiyar and R. Singh, "Prediction of Software Development Faults Using Neural Network," VSRD-IJCSIT, vol. 1, no. 8, pp. 556-566, 2011.
Y. Tian, D. Lo, X. Xia and C. Sun, "Automated prediction of bug report priority using multi-factor analysis," Empirical Software Engineering, vol. 20, no. 5, pp. 1354-1383, 2014.
A. Lazar, S. Ritchey and B. Sharif, "Improving the Accuracy of Duplicate Bug Report Detection Using Textual Similarity Measures," in 11th Working Conference on Mining Software Repositories, Hyderabad, India, 2014.
Y. Bengio and Y. Grandvalet, "No unbiased estimator of the variance of k-fold cross-validation," The Journal of Machine Learning Research, vol. 5, pp. 1089-1105, 2004.
P. Cohen and D. Jensen, "Overfitting explained," in Preliminary Papers of the Sixth International Workshop on Artificial Intelligence and Statistics, 1997.
M. Stone, "Cross-Validatory Choice and Assessment of Statistical Predictions," Journal of the Royal Statistical Society,Ser B, vol. 36, no. 2, pp. 111-147, 1974.
Y. Singh, A. Kaur and R. Malhotra, "Prediction of Fault-Prone Software Modules using," International Journal of Computer Applications, vol. 1, no. 22, pp. 8-15, 2010.