Computer Science ›› 2022, Vol. 49 ›› Issue (11): 8-23.doi: 10.11896/jsjkx.220200117
• Computer Software • Previous Articles Next Articles
NI Zhen1, LI Bin1, SUN Xiao-bing1,2, LI Bi-xin3, ZHU Cheng1
CLC Number:
[1]BRAUDE E J,BERNSTEIN M E.Software engineering:modern approaches[M].Long Grove:Waveland Press,2016. [2]ABREU R,ZOETEWEIJ P,GOLSTEIJN R,et al.A practicalevaluation of spectrum-based fault localization[J].Journal of Systems and Software,2009,82(11):1780-1792. [3]KOCHHAR P S,XIA X,LO D,et al.Practitioners' expectations on automated fault localization[C]//Proceedings of the 25th International Symposium on Software Testing and Analysis.New York:ACM,2016:165-176. [4]YE X,SHEN H,MA X,et al.From word embeddings to document similarities for improved information retrieval in software engineering[C]//Proceedings of the 38th International Confe-rence on Software Engineering.New York:ACM,2016:404-415. [5]AKBAR S,KAK A.SCOR:source code retrieval with semantics and order[C]//2019 IEEE/ACM 16th International Conference on Mining Software Repositories(MSR).Piscataway,NJ:IEEE,2019:1-12. [6]XIAO Y,KEUNG J,BENNIN K E,et al.Machine translation-based bug localization technique for bridging lexical gap[J].Information and Software Technology,2018,99:58-61. [7]XIAO Y,KEUNG J.Improving bug localization with character-level convolutional neural network and recurrent neural network[C]//2018 25th Asia-Pacific Software Engineering Conference(APSEC).2018:703-704. [8]LIANG H,SUN L,WANG M,et al.Deep learning with custo-mized abstract syntax tree for bug localization[J].IEEE Access,2019,7:116309-116320. [9]DISTANTE D,FARALLI S.A two-phase bug localization approach based on multi-layer perceptrons and distributional features[C]//International Conference on Computational Science and Its Applications.Berlin:Springer,2019:518-532. [10]GUPTA R,KANADE A,SHEVADE S.Deep learning for bug-localization in student programs[J].arXiv:1905.12454,2019. [11]YE X,FANG F,WU J,et al.Bug Report Classification usingLSTM architecture for more accurate software defect locating[C]//2018 17th IEEE International Conference on Machine Learning and Applications(ICMLA).Piscataway,NJ:IEEE,2018:1438-1445. [12]LIU G,LU Y,SHI K,et al.Mapping bug reports to relevantsource code files based on the vector space model and word embedding[J].IEEE Access,2019,7:78870-78881. [13]KIM D,TAO Y,KIM S,et al.Where should we fix this bug? a two-phase recommendation model[J].IEEE Transactions on Software Engineering,2013,39(11):1597-1610. [14]UNENO Y,MIZUNO O,CHOI E H.Using a distributed representation of words in localizing relevant files for bug reports[C]//2016 IEEE International Conference on Software Quality,Reliability and Security(QRS).Piscataway,NJ:IEEE,2016:183-190. [15]XIAO Y,KEUNG J,MI Q,et al.Bug localization with semantic and structural features using convolutional neural network and cascade forest[C]//Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018.ACM,2018:101-111. [16]BARBOSA J R,MARCACINI R M,BRITTO R,et al.BUL-NER:Bug Localization with word embeddings and network regu-larization[J].arXiv:1908.09876,2019. [17]LOYOLA P,GAJANANAN K,SATOH F.Bug localization by learning to rank and represent bug inducing changes[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Management.New York:ACM,2018:657-665. [18]JIANG B,LIU P,XU J.A Deep Learning Approach to Locate Buggy Files[C]//2020 IEEE 11th International Conference on Dependable Systems,Services and Technologies(DESSERT).IEEE,2020:219-223. [19]HUO X,LI M,ZHOUZ H.Control flow graph embedding based on multi-instance decomposition for bug localization[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020:4223-4230. [20]ZHU Z,LI Y,TONG H,et al.CooBa:Cross-project Bug Localization via Adversarial Transfer Learning[C]//IJCAI.2020:3565-3571. [21]ZHANG J,XIE R,YE W,et al.Exploiting code knowledgegraph for bug localization via bi-directional attention[C]//Proceedings of the 28th International Conference on Program Comprehension.2020:219-229. [22]WANG B,XU L,YAN M,et al.Multi-dimension convolutional neural network for bug localization[J].IEEE Transactions on Services Computing,2020,15(3):1649-1663. [23]PRADEL M,MURALI V,QIAN R,et al.Scaffle:bug localization on millions of files[C]//Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis.New York:ACM,2020:225-236. [24]CHENG S,YAN X,KHAN A A.A Similarity IntegrationMethod based Information Retrieval and Word Embedding in Bug Localization[C]//2020 IEEE 20th International Confe-rence on Software Quality,Reliability and Security(QRS).Piscataway,NJ:IEEE,2020:180-187. [25]SANGLE S,MUVVA S,CHIMALAKONDA S,et al.DRAST--A Deep Learning and AST Based Approach for Bug Localization[J].arXiv:2011.03449,2020. [26]LAM A N,NGUYEN A T,NGUYEN H A,et al.Combining deep learning with information retrieval to localize buggy files for bug reports(n)[C]//2015 30th IEEE/ACM International Conference on Automated Software Engineering(ASE).Pisca-taway,NJ:IEEE,2015:476-481. [27]LAM A N,NGUYEN A T,NGUYEN H A,et al.Bug localization with combination of deep learning and information retrieval[C]//2017 IEEE/ACM 25th International Conference on Program Comprehension(ICPC).Piscataway,NJ:IEEE,2017:218-229. [28]HUO X,LI M,ZHOU Z H.Learning unified features from na-tural and programming languages for locating buggy source code[C]//IJCAI.2016:1606-1612. [29]HUO X,LI M.Enhancing the Unified Features to Locate Buggy Files by Exploiting the Sequential Nature of Source Code[C]//IJCAI.2017:1909-1915. [30]HUO X,THUNG F,LI M,et al.Deep transfer bug localization[J].IEEE Transactions on Software Engineering,2019,47(7):1368-1380. [31]XIAO Y,KEUNG J,MI Q,et al.Improving bug localizationwith an enhanced convolutional neural network[C]//2017 24th Asia-Pacific Software Engineering Conference(APSEC).Pisca-taway,NJ:IEEE,2017:338-347. [32]XIAO Y,KEUNG J,BENNIN K E,et al.Improving bug localization with word embedding and enhanced convolutional neural networks[J].Information and Software Technology,2019,105:17-29. [33]SANGWAN O P.Review of text mining techniques for software bug localization[C]//2019 9th International Conference on Cloud Computing,Data Science & Engineering(Confluence).IEEE,2019:208-211. [34]ZHANG Y,LIU J K,XIA X,et al.Information retrieval-based based bug localization:a literature review [J].Journal of Software,2020,31(8):2432-2452. [35]GUO Z Q,ZHOU H C,LIU S R,et al.Information retrieval based bug localization:research problem,progress,and challenges[J].Journal of Software,2020,31(9):2826-2854. [36]LI Z L,CHEN X,JIANG Z W,et al.Survey of information retrieval-based software bug localization.[J].Journal of Software,2021,32(2):247-276. [37]LUKINS S K,KRAFT N A,ETZKORN L H.Source code retrieval for bug localization using latent dirichlet allocation[C]//2008 15th Working Conference on Reverse Engineering.Pisca-taway,NJ:IEEE,2008:155-164. [38]NICHOLS B D.Augmented bug localization using past bug information[C]//Proceedings of the 48th Annual Southeast Regional Conference.New York:ACM,2010:1-6. [39]DE ALMEIDA MAIA M,COSTA A,DA SILVA I R.On the Influence of Latent Semantic Analysis Parameterization for Bug Localization[J].Revista de Informática Teórica e Aplicada,2013,20(3):49-76. [40]WANG S,LO D,LAWALL J.Compositional vector space mo-dels for improved bug localization[C]//2014 IEEE International Conference on Software Maintenance and Evolution.Pisca-taway,NJ:IEEE,2014:171-180. [41]MORENO L,TREADWAY J J,MARCUS A,et al.On the use of stack traces to improve text retrieval-based bug localization[C]//2014 IEEE International Conference on Software Maintenance and Evolution.IEEE,2014:151-160. [42]PATHAK D P,DHARAVATH S.Automation framework forbug localization using information retrieval techniques[J].International Journal of Innovative Research in Computer and Communication Engineering,2015,3(6):5720-5727. [43]KUMAR D,SHARMA R.Bug localization using ldacg approach[J].International Journal of Engineering Research and Techno-logy,2015,4(5):155-160. [44]RAO S,MEDEIROS H,KAK A.Comparing incremental latent semantic analysis algorithms for efficient retrieval from software libraries for bug localization[J].ACM SIGSOFT Software Engineering Notes,2015,40(1):1-8. [45]RAHMAN S,SAKIB K.An Appropriate Method RankingApproach for Localizing Bugs using Minimized Search Space[C]//ENASE.2016:303-309. [46]RAHMAN S,RAHMAN M M,SAKIB K.An improved method level bug localization approach using minimized code space[C]//International Conference on Evaluation of Novel Approaches to Software Engineering.Berlin:Springer,2016:179-200. [47]GORE A,CHOUBEY S D,GANGRADE K.Improved Bug Localization Technique Using Hybrid Information Retrieval Model[C]//International Conference on Distributed Computing and Internet Technology.Berlin:Springer,2016:127-131. [48]KILINÇ D,YÜCALAR F,BORANDAĞE,et al.Multi-levelreranking approach for bug localization[J].Expert Systems,2016,33(3):286-294. [49]LUKINS S K,KRAFT N A,ETZKORN L H.Bug localization using latent dirichlet allocation[J].Information and Software Technology,2010,52(9):972-990. [50]SHARMA T,SHARMA K,SHARMA T.Software bug localization using pachinko allocation model[C]//2016 3rd International Conference on Computing for Sustainable Global Development(INDIACom).IEEE,2016:3603-3608. [51]RAHMAN S,RAHMAN M M,SAKIB K.A Statement Level Bug Localization Technique using Statement Dependency Graph[C]//ENASE.2017:171-178. [52]ZHANG X,YAO Y,WANG Y,et al.Exploring metadata in bug reports for bug localization[C]//2017 24th Asia-Pacific Software Engineering Conference(APSEC).Piscataway,NJ:IEEE,2017:328-337. [53]WANG Y,YAO Y,TONG H,et al.Enhancing supervised bug localization with metadata and stack-trace[J].Knowledge and Information Systems,2020,62(6):2461-2484. [54]WANG Y,YAO Y,TONG H,et al.Bug localization via supervised topic modeling[C]//2018 IEEE International Conference on Data Mining(ICDM).Piscataway,NJ:IEEE,2018:607-616. [55]NGUYEN A T,NGUYEN T T,AL-KOFAHI J,et al.A topic-based approach for narrowing the search space of buggy files from a bug report[C]//2011 26th IEEE/ACM International Conference on Automated Software Engineering(ASE 2011).Piscataway,NJ:IEEE,2011:263-272. [56]SWE K E E,OO H M.Source code retrieval for bug localization using bug report[C]//2019 IEEE 15th International Conference on Intelligent Computer Communication and Processing(ICCP).IEEE,2019:241-247. [57]KHATIWADA S,TUSHEV M,MAHMOUD A.On Combining IR Methods to Improve Bug Localization[C]//Proceedings of the 28th International Conference on Program Comprehension.New York:ACM,2020:252-262. [58]BEARD M.Extending bug localization using information re-trieval and code clone location techniques[C]//2011 18th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2011:425-428. [59]SISMAN B,KAK A C.Incorporating version histories in information retrieval based bug localization[C]//2012 9th IEEE Working Conference on Mining Software Repositories(MSR).Piscataway,NJ:IEEE,2012:50-59. [60]MOIN A H,KHANSARI M.Bug localization using revision log analysis and open bug repository text categorization[C]//IFIP International Conference on Open Source Systems.Berlin:Springer,2010:188-199. [61]DAVIES S,ROPER M,WOOD M.Using bug report similarity to enhance bug localisation[C]//2012 19th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2012:125-134. [62]SAHA R K,LEASE M,KHURSHID S,et al.Improving bug localization using structured information retrieval[C]//2013 28th IEEE/ACM International Conference on Automated Software Engineering(ASE).Piscataway,NJ:IEEE,2013:345-355. [63]TANTITHAMTHAVORN C,TEEKAVANICH R,IHARAA,et al.Mining A change history to quickly identify bug locations:A case study of the Eclipse project[C]//2013 IEEE International Symposium on Software Reliability Engineering Workshops(ISSREW).Piscataway,NJ:IEEE,2013:108-113. [64]TANTITHAMTHAVORN C,IHARA A,MATSUMOTO K.Using co-change histories to improve bug localization perfor-mance[C]//2013 14th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Piscataway,NJ:IEEE,2013:543-548. [65]WONG C P,XIONG Y,ZHANG H,et al.Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis[C]//2014 IEEE International Conferenceon Software Maintenance and Evolution.Piscataway,NJ:IEEE,2014:181-190. [66]WANG S,LO D.Version history,similar report,and structure:Putting them together for improved bug localization[C]//Proceedings of the 22nd International Conference on Program Comprehension.2014:53-63. [67]RAHMAN S,GANGULY K K,SAKIB K.An improved bug localization using structured information retrieval and version history[C]//International Conference on Computer and Information Technology.2016:190-195. [68]YOUM K C,AHN J,KIM J,et al.Bug localization based oncode change histories and bug reports[C]//2015 Asia-Pacific Software Engineering Conference(APSEC).Piscataway,NJ:IEEE,2015:190-197. [69]YOUM K C,AHN J,LEE E.Improved bug localization based on code change histories and bug reports[J].Information and Software Technology,2017,82:177-192. [70]LE T D B,OENTARYO R J,LO D.Information retrieval and spectrum based bug localization:Better together[C]//Procee-dings of the 2015 10th Joint Meeting on Foundations of Software Engineering.ACM,2015:579-590. [71]SHAO P.Combining information retrieval modules and struc-tural information for source code bug localization and feature location[M].The University of Alabama,Ann Arbor:ProQuest,2011. [72]TONG Y,ZHOU Y,FANG L,et al.Towards a novel approach for defect localization based on part-of-speech and invocation[C]//Proceedings of the 7th Asia-Pacific Symposium on Internetware.ACM,2015:52-61. [73]YE X,BUNESCU R,LIU C.Learning to rank relevant files for bug reports using domain knowledge[C]//Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2014:689-699. [74]WANG S,LO D.Amalgam+:Composing rich informationsources for accurate bug localization[J].Journal of Software:Evolution and Process,2016,28(10):921-942. [75]WEN M,WU R,CHEUNG S C.Locus:Locating bugs fromsoftware changes[C]//2016 31st IEEE/ACM International Conference on Automated Software Engineering(ASE).Pisca-taway,NJ:IEEE,2016:262-273. [76]ZHOU Y,TONG Y,CHEN T,et al.Augmenting bug localization with part-of-speech and invocation[J].International Journal of Software Engineering and Knowledge Engineering,2017,27(6):925-949. [77]GHARIBI R,RASEKH A H,SADREDDINI M H.Locating rele-vant source files for bug reports using textual analysis[C]//2017 International Symposium on Computer Science and Software Engineering Conference(CSSE).Piscataway,NJ:IEEE,2017:67-72. [78]TAKAHASHI A,SAE-LIM N,HAYASHI S,et al.A preliminary study on using code smells to improve bug localization[C]//Proceedings of the 26th Conference on Program Comprehension.New York:ACM,2018:324-327. [79]SWE K E E,OO H M.Bug Localization Approach Using Source Code Structure with Different Structure Fields[C]//2018 IEEE 16th International Conference on Software Engineering Research,Management and Applications(SERA).Piscataway,NJ:IEEE,2018:159-164. [80]KHATIWADA S,TUSHEV M,MAHMOUD A.Just enoughsemantics:An information theoretic approach for IR-based software bug localization[J].Information and Software Technology,2018,93:45-57. [81]ZHANG T,HU W,LUO X,et al.A commit messages-based bug localization for android applications[J].International Journal of Software Engineering and Knowledge Engineering,2019,29(4):457-487. [82]LAL S,SUREKA A.A static technique for fault localizationusing character n-gram based information retrieval model[C]//Proceedings of the 5th India Software Engineering Conference.New York:ACM,2012:109-118. [83]SUN X,ZHOU W,LI B,et al.Bug localization for version issues with defect patterns[J].IEEE Access,2019,7:18811-18820. [84]HOANG T,OENTARYO R J,LE T D B,et al.Network-clustered multi-modal bug localization[J].IEEE Transactions on Software Engineering,2018,45(10):1002-1023. [85]RATH M,LO D,MÄDER P.Analyzing requirements and traceability information to improve bug localization[C]//Proceedings of the 15th International Conference on Mining Software Reposi-tories.2018:442-453. [86]DILSHENER T,WERMELINGER M,YU Y.Locating bugswithout looking back[J].Automated Software Engineering,2018,25(3):383-434. [87]KOYUNCU A,BISSYANDÉ T F,KIM D,et al.D&c:A divide-and-conquer approach to ir-based bug localization[J].arXiv:1902.02703,2019. [88]YE X,BUNESCU R,LIU C.Mapping bug reports to relevant files:A ranking model,a fine-grained benchmark,and feature evaluation[J].IEEE Transactions on Software Engineering,2015,42(4):379-402. [89]ASATO M,AMAN H,AMASAKI S,et al.A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization[C]//2020 27th Asia-Pacific Software Engineering Confe-rence(APSEC).2020:475-479. [90]LI Z,JIANG Z,CHEN X,et al.Laprob:A Label propagation-Based software bug localization method[J].Information and Software Technology,2021,130:106410. [91]ALMHANA R,KESSENTINI M,MKAOUER W.Method-level bug localization using hybrid multi-objective search[J].Information and Software Technology,2021,131:106474. [92]SHAO P,ATKISON T,KRAFT N A,et al.Combining lexical and structural information for static bug localisation[J].International Journal of Computer Applications in Technology,2012,44(1):61-71. [93]BANGCHAROENSAP P,IHARA A,KAMEI Y,et al.Locating source code to be fixed based on initial bug reports-a case study on the eclipse project[C]//2012 Fourth International Workshop on Empirical Software Engineering in Practice.Piscataway,NJ:IEEE,2012:10-15. [94]ZHOU J,ZHANG H,LO D.Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports[C]//2012 34th International Conference on Software Engineering(ICSE).Piscataway,NJ:IEEE,2012:14-24. [95]RAO S,MEDEIROS H,KAK A.An incremental update framework for efficient retrieval from software libraries for bug localization[C]//2013 20th Working Conference on Reverse Engineering(WCRE).IEEE,2013:62-71. [96]SISMAN B,KAK A C.Assisting code search with automatic query reformulation for bug localization[C]//2013 10th Wor-king Conference on Mining Software Repositories(MSR).IEEE,2013:309-318. [97]CHAPARRO O,FLOREZ J M,MARCUS A.Using observed behavior to reformulate queries during text retrieval-based bug localization[C]//2017 IEEE International Conference on Software Maintenance and Evolution(ICSME).Piscataway,NJ:IEEE,2017:376-387. [98]KIM M,LEE E.ManQ:Many-objective optimization-based automatic query reduction for IR-based bug localization[J].Information and Software Technology,2020,125:106334. [99]MILLS C,PARRA E,PANTIUCHINA J,et al.On the relationship between bug reports and queries for text retrieval-based bug localization[J].Empirical Software Engineering,2020,25(5):3086-3127. [100]ZHANG W,LI Z,WANG Q,et al.FineLocator:A novel ap-proach to method-level fine-grained bug localization by query expansion[J].Information and Software Technology,2019,110:121-135. [101]ZHANG W,LI Z Q,DU Y H,et al.Fine-grained software bug location approach at method level[J].Journal of Software,2019,30(2):195-210. [102]RAHMAN M M,ROY C.Poster:improving bug localizationwith report quality dynamics and query reformulation[C]//2018 IEEE/ACM 40th International Conference on Software Engineering:Companion(ICSE-Companion).Piscataway,NJ:IEEE,2018:348-349. [103]LAWRIE D,BINKLEY D.On the value of bug reports for retrieval-based bug localization[C]//2018 IEEE International Conference on Software Maintenance and Evolution(ICSME).IEEE,2018:524-528. [104]RAHMAN M M,ROY C K.Improving ir-based bug localization with context-aware query reformulation[C]//Proceedings of the 2018 26th ACM Joint Meeting on European Software Enginee-ring Conference and Symposium on the Foundations of Software Engineering.2018:621-632. [105]MILLS C,PANTIUCHINA J,PARRA E,et al.Are bug reports enough for text retrieval-based bug localization?[C]//2018 IEEE International Conference on Software Maintenance and Evolution(ICSME).IEEE,2018:381-392. [106]CHAPARRO O,FLOREZ J M,MARCUS A.Using bug de-scriptions to reformulate queries during text-retrieval-based bug localization[J].Empirical Software Engineering,2019,24(5):2947-3007. [107]RAHMAN M M.Supporting code search with context-aware,analytics-driven,effective query reformulation[C]//2019 IEEE/ACM 41st International Conference on Software Engineering:Companion Proceedings(ICSE-Companion).Piscataway,NJ:IEEE,2019:226-229. [108]KIM M,LEE E.A novel approach to automatic query reformulation for ir-based bug localization[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.New York:ACM,2019:1752-1759. [109]CHAPARRO O.Improving bug reporting,duplicate detection,and localization[C]//2017 IEEE/ACM 39th International Conference on Software Engineering Companion(ICSE-C).IEEE,2017:421-424. [110]KOCHHAR P S,TIAN Y,LO D.Potential biases in bug localization:Do they matter?[C]//Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering.New York:ACM,2014:803-814. [111]LE T D B,THUNG F,LO D.Predicting effectiveness of ir-based bug localization techniques[C]//2014 IEEE 25th International Symposium on Software Reliability Engineering.Pisca-taway,NJ:IEEE,2014:335-345. [112]SAHA R K,LAWALL J,KHURSHID S,et al.On the effectiveness of information retrieval based bug localization for c programs[C]//2014 IEEE International Conference on Software Maintenance and Evolution.IEEE,2014:161-170. [113]ALDUAILIJ M,AL-DUAILEJ M.Performance evaluation ofinformation retrieval models in bug localization on the method level[C]//2015 International Conference on Collaboration Technologies and Systems(CTS).Piscataway,NJ:IEEE,2015:305-313. [114]MORENO L,BAVOTA G,HAIDUC S,et al.Query-based configuration of text retrieval solutions for software engineering tasks[C]//Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering.New York:ACM,2015:567-578. [115]ZHAO F,TANG Y,YANG Y,et al.Is learning-to-rank cost-effective in recommending relevant files for bug localization?[C]//2015 IEEE International Conference on Software Quality,Reliability and Security.Piscataway,NJ:IEEE,2015:298-303. [116]SHI Z,KEUNG J,BENNIN K E,et al.A Strategy to Determine When to Stop Using Automatic Bug Localization[C]//2016 IEEE 40th Annual Computer Software and Applications Confe-rence(COMPSAC).2016,1:185-190. [117]DAO T,ZHANG L,MENG N.How does execution information help with information-retrieval based bug localization?[C]//2017 IEEE/ACM 25th International Conference on Program Comprehension(ICPC).Piscataway,NJ:IEEE,2017:241-250. [118]LE T D B,THUNG F,LO D.Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools[J].Empirical Software Engineering,2017,22(4):2237-2279. [119]KIM M,LEE E.Poster:Are Information Retrieval-Based Bug Localization Techniques Trustworthy?[C]//2018 IEEE/ACM 40th International Conference on Software Engineering:Companion(ICSE-Companion).Piscataway,NJ:IEEE,2018:248-249. [120]LEE J,KIM D,BISSYANDÉ T F,et al.Bench4bl:reproducibility study on the performance of ir-based bug localization[C]//Proceedings of the 27th ACM SIGSOFT International Sympo-sium on Software Testing and Analysis.New York:ACM,2018:61-72. [121]RATH M,MÄDER P.Influence of structured information inbug report descriptions on ir-based bug localization[C]//2018 44th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).Piscataway,NJ:IEEE,2018:26-32. [122]RATH M,MÄDER P.Structured information in bug report descriptions—influence on IR-based bug localization and develo-pers[J].Software Quality Journal,2019,27(3):1315-1337. [123]SHI Z,KEUNG J,BENNIN K E,et al.Comparing learning to rank techniques in hybrid bug localization[J].Applied Soft Computing,2018,62:636-648. [124]TANTITHAMTHAVORN C,ABEBE S L,HASSAN A E,et al.The impact of IR-based classifier configuration on the performance and the effort of method-level bug localization[J].Information and Software Technology,2018,102:160-174. [125]AMASAKI S,AMAN H,YOKOGAWA T.A ComparativeStudy of Vectorization Methods on BugLocator[C]//2019 45th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).IEEE,2019:236-243. [126]POLISETTY S,MIRANSKYY A,BAŞAR A.On usefulness of the deep-learning-based bug localization models to practitioners[C]//Proceedings of the Fifteenth International Conference on Predictive Models and Data Analytics in Software Engineering.New York:ACM,2019:16-25. [127]RAHMAN M M,CHAKRABORTYS,KAISER G,et al.To-ward Optimal Selection of Information Retrieval Models for Software Engineering Tasks[C]//2019 19th International Working Conference on Source Code Analysis and Manipulation(SCAM).Piscataway,NJ:IEEE,2019:127-138. [128]GARNIER M,GARCIA A.On the evaluation of structured information retrieval-based bug localization on 20 C# projects[C]//Proceedings of the 30th Brazilian Symposium on Software Engineering.ACM,2016:123-132. [129]GARNIER M,FERREIRA I,GARCIA A.On the influence of program constructs on bug localization effectiveness[J].Journal of Software Engineering Research and Development,2017,5(1):1-29. [130]AKBAR S A,KAK A C.A large-scale comparative evaluation of IR-based tools for bug localization[C]//Proceedings of the 17th International Conference on Mining Software Repositories.ACM,2020:21-31. [131]HERZIG K,JUST S,ZELLER A.It’s not a bug,it’s a feature:how misclassification impacts bug prediction[C]//2013 35th International Conference on Software Engineering(ICSE).IEEE,2013:392-401. [132]AMASAKI S,AMAN H,YOKOGAWA T.On the Effects ofFile-level Information on Method-level Bug Localization[C]//2020 46th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).Piscataway,NJ:IEEE,2020:314-321. [133]XIA X,LO D,WANG X,et al.Cross-language bug localization[C]//Proceedings of the 22nd International Conference on Program Comprehension.New York:ACM,2014:275-278. [134]THUNG F,LE T D B,KOCHHAR P S,et al.Buglocalizer:Integrated tool support for bug localization[C]//Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2014:767-770. [135]WANG X,LO D,XIA X,et al.BOAT:an experimental platform for researchers to comparatively and reproducibly evaluate bug localization techniques[C]//Companion Proceedings of the 36th International Conference on Software Engineering.New York:ACM,2014:572-575. [136]MUVVA S,RAO A E,CHIMALAKONDA S.BuGL--A Cross-Language Dataset for Bug Localization[J].arXiv:2004.08846,2020. [137]DIT B,REVELLE M,GETHERS M,et al.Feature location in source code:a taxonomy and survey[J].Journal of Software:Evolution and Process,2013,25(1):53-95. [138]JUST R,JALALI D,ERNST M D.Defects4J:A database ofexisting faults to enable controlled testing studies for Java programs[C]//Proceedings of the 2014 International Symposium on Software Testing and Analysis.New York:ACM,2014:437-440. [139]RATH M,REMPEL P,MÄDER P.The ilmseven dataset[C]//2017 IEEE 25th International Requirements Engineering Conference(RE).2017:516-519. [140]DALLMEIER V,ZIMMERMANN T.Extraction of bug localization benchmarks from history[C]//Proceedings of the twenty-second IEEE/ACM International Conference on Automated Software Engineering.New York:ACM,2007:433-436. [141]BEARD M,KRAFT N,ETZKORN L,et al.Measuring the accuracy of information retrieval based bug localization techniques[C]//2011 18th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2011:124-128. [142]RAO S,KAK A.Retrieval from software libraries for bug localization:a comparative study of generic and composite text models[C]//Proceedings of the 8th Working Conference on Mining Software Repositories.New York:ACM,2011:43-52. [143]MORENO L,BANDARA W,HAIDUC S,et al.On the relationship between the vocabulary of bug reports and source code[C]//2013 IEEE International Conference on Software Maintenance.IEEE,2013:452-455. [144]THOMAS S W,NAGAPPAN M,BLOSTEIN D,et al.The impact of classifier configuration and classifier combination on bug localization[J].IEEE Transactions on Software Engineering,2013,39(10):1427-1443. [145]KOCHHAR P S,LE T D B,LO D.It’s not a bug,it’s a feature:does misclassification affect bug localization?[C]//Proceedings of the 11th Working Conference on Mining Software Repositories.2014:296-299. [146]POSHYVANYK D,MARCUS A,RAJLICH V,et al.Combi-ning probabilistic ranking and latent semantic indexing for feature identification[C]//14th IEEE International Conference on Program Comprehension(ICPC’06).Piscataway,NJ:IEEE,2006:137-148. [147]LEVY O,GOLDBERG Y.Neural word embedding as implicit matrix factorization[J].Advances in Neural Information Processing Systems,2014,27:2177-2185. [148]BENGIO Y,DUCHARME R,VINCENT P,et al.A neuralprobabilistic language model[J].Journal of Machine Learning Research,2003,3:1137-1155. [149]GONZALEZ T F.ImageNet classification with deep convolu-tional neural networks[J].Handbook of Approximation Algorithms and Metaheuristics,2007:1-1432. [150]KIM Y.Convolutional neural networks for sentence classification[C]//Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing.Doha,Qatar:ACL,2014:1746-1751. [151]WHITE M,VENDOME C,LINARES-VÁSQUEZ M,et al.Toward deep learning software repositories[C]//2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.IEEE,2015:334-345. [152]NGUYEN A T,NGUYEN T N.Graph-based statistical lan-guage model for code[C]//2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.IEEE,2015:858-868. [153]MOU L,LI G,ZHANG L,et al.Convolutional neural networks over tree structures for programming language processing[C]//Thirtieth AAAI Conference on Artificial Intelligence.2016:1287-1293. [154]MIKOLOV T,KARAFIÁT M,BURGET L,et al.Recurrentneural network based language model[C]//Eleventh Annual Conference of the International Speech Communication Association.New York:ACM,2010:1045-1048. [155]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780. [156]RAHMAN F,DEVANBU P.How,and why,process metrics are better[C]//2013 35th International Conference on Software Engineering(ICSE).Piscataway,NJ:IEEE,2013:432-441. [157]BETTENBURG N,PREMRAJ R,ZIMMERMANN T,et al.Extracting structural information from bug reports[C]//Proceedings of the 2008 International Working Conference on Mi-ning Software Repositories.ACM,2008:27-30. [158]POSHYVANYK D,GUÉHÉNEUC Y G,MARCUS A,et al.Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval[J].IEEE Transa-ctions on Software Engineering,2007,33(6):420-432. [159]ZHANG Y,LO D,XIA X,et al.Fusing multi-abstraction vector space models for concern localization[J].Empirical Software Engineering,2018,23(4):2279-2322. [160]PARNIN C,ORSO A.Are automated debugging techniques actually helping programmers?[C]//Proceedings of the 2011 International Symposium on Software Testing and Analysis.New York:ACM,2011:199-209. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[4] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[5] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | SUN Fu-quan, CUI Zhi-qing, ZOU Peng, ZHANG Kun. Brain Tumor Segmentation Algorithm Based on Multi-scale Features [J]. Computer Science, 2022, 49(6A): 12-16. |
[14] | KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21. |
[15] | CHANG Bing-guo, SHI Hua-long, CHANG Yu-xin. Multi Model Algorithm for Intelligent Diagnosis of Melanoma Based on Deep Learning [J]. Computer Science, 2022, 49(6A): 22-26. |
|