Computer Science ›› 2022, Vol. 49 ›› Issue (11): 8-23.doi: 10.11896/jsjkx.220200117

• Computer Software • Previous Articles     Next Articles

Research and Progress on Bug Report-oriented Bug Localization Techniques

NI Zhen1, LI Bin1, SUN Xiao-bing1,2, LI Bi-xin3, ZHU Cheng1   

  1. 1 School of Information Engineering,Yangzhou University,Yangzhou,Jiangsu 225127,China
    2 State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210023,China
    3 School of Computer Science and Engineering,Southeast University,Nanjing 211189,China
  • Received:2022-02-21 Revised:2022-05-12 Online:2022-11-15 Published:2022-11-03
  • About author:NI Zhen,born in 1987.Ph.D candidate.Her main research interests include software data analysis,data-driven automated bug localization and software repair.
    LI Bin,born in 1965,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include cloud computing and intelligent software.
  • Supported by:
    National Natural Science Foundation of China(61972335,61872312) and Open Funds of State Key Laboratory for Novel Software Technology(Nanjing University)(KFKT2020B16).

Abstract: Software bug localization is an important task in bug fixing process.The bug report-oriented localization approaches typically use software bug reports that describe the phenomenon of bugs as queries,and source code as corpus.First,correlations between the bug report and each source code unit are analyzed.Then,a bug localization data set is created by mining the software repository,aiming to construct a bug localization model to localize the source code unit(i.e.bug location) corresponding to the bug report.This paper offers a systematic survey of existing research achievements of the domestic and foreign studies of bug localization in recent years.First,the related concepts in bug report-oriented bug localization are introduced,and the main localization process is summarized,followed by discussing the existing research works that focus on the three key steps in the localization process.Then,the commonly used data sets and evaluation metrics for bug localization are summarized.Finally,future work in this research area is discussed.

Key words: Software bug localization, Software bug report, Localization model, Information retrieval, Deep learning

CLC Number: 

  • TP311
[1]BRAUDE E J,BERNSTEIN M E.Software engineering:modern approaches[M].Long Grove:Waveland Press,2016.
[2]ABREU R,ZOETEWEIJ P,GOLSTEIJN R,et al.A practicalevaluation of spectrum-based fault localization[J].Journal of Systems and Software,2009,82(11):1780-1792.
[3]KOCHHAR P S,XIA X,LO D,et al.Practitioners' expectations on automated fault localization[C]//Proceedings of the 25th International Symposium on Software Testing and Analysis.New York:ACM,2016:165-176.
[4]YE X,SHEN H,MA X,et al.From word embeddings to document similarities for improved information retrieval in software engineering[C]//Proceedings of the 38th International Confe-rence on Software Engineering.New York:ACM,2016:404-415.
[5]AKBAR S,KAK A.SCOR:source code retrieval with semantics and order[C]//2019 IEEE/ACM 16th International Conference on Mining Software Repositories(MSR).Piscataway,NJ:IEEE,2019:1-12.
[6]XIAO Y,KEUNG J,BENNIN K E,et al.Machine translation-based bug localization technique for bridging lexical gap[J].Information and Software Technology,2018,99:58-61.
[7]XIAO Y,KEUNG J.Improving bug localization with character-level convolutional neural network and recurrent neural network[C]//2018 25th Asia-Pacific Software Engineering Conference(APSEC).2018:703-704.
[8]LIANG H,SUN L,WANG M,et al.Deep learning with custo-mized abstract syntax tree for bug localization[J].IEEE Access,2019,7:116309-116320.
[9]DISTANTE D,FARALLI S.A two-phase bug localization approach based on multi-layer perceptrons and distributional features[C]//International Conference on Computational Science and Its Applications.Berlin:Springer,2019:518-532.
[10]GUPTA R,KANADE A,SHEVADE S.Deep learning for bug-localization in student programs[J].arXiv:1905.12454,2019.
[11]YE X,FANG F,WU J,et al.Bug Report Classification usingLSTM architecture for more accurate software defect locating[C]//2018 17th IEEE International Conference on Machine Learning and Applications(ICMLA).Piscataway,NJ:IEEE,2018:1438-1445.
[12]LIU G,LU Y,SHI K,et al.Mapping bug reports to relevantsource code files based on the vector space model and word embedding[J].IEEE Access,2019,7:78870-78881.
[13]KIM D,TAO Y,KIM S,et al.Where should we fix this bug? a two-phase recommendation model[J].IEEE Transactions on Software Engineering,2013,39(11):1597-1610.
[14]UNENO Y,MIZUNO O,CHOI E H.Using a distributed representation of words in localizing relevant files for bug reports[C]//2016 IEEE International Conference on Software Quality,Reliability and Security(QRS).Piscataway,NJ:IEEE,2016:183-190.
[15]XIAO Y,KEUNG J,MI Q,et al.Bug localization with semantic and structural features using convolutional neural network and cascade forest[C]//Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018.ACM,2018:101-111.
[16]BARBOSA J R,MARCACINI R M,BRITTO R,et al.BUL-NER:Bug Localization with word embeddings and network regu-larization[J].arXiv:1908.09876,2019.
[17]LOYOLA P,GAJANANAN K,SATOH F.Bug localization by learning to rank and represent bug inducing changes[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Management.New York:ACM,2018:657-665.
[18]JIANG B,LIU P,XU J.A Deep Learning Approach to Locate Buggy Files[C]//2020 IEEE 11th International Conference on Dependable Systems,Services and Technologies(DESSERT).IEEE,2020:219-223.
[19]HUO X,LI M,ZHOUZ H.Control flow graph embedding based on multi-instance decomposition for bug localization[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020:4223-4230.
[20]ZHU Z,LI Y,TONG H,et al.CooBa:Cross-project Bug Localization via Adversarial Transfer Learning[C]//IJCAI.2020:3565-3571.
[21]ZHANG J,XIE R,YE W,et al.Exploiting code knowledgegraph for bug localization via bi-directional attention[C]//Proceedings of the 28th International Conference on Program Comprehension.2020:219-229.
[22]WANG B,XU L,YAN M,et al.Multi-dimension convolutional neural network for bug localization[J].IEEE Transactions on Services Computing,2020,15(3):1649-1663.
[23]PRADEL M,MURALI V,QIAN R,et al.Scaffle:bug localization on millions of files[C]//Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis.New York:ACM,2020:225-236.
[24]CHENG S,YAN X,KHAN A A.A Similarity IntegrationMethod based Information Retrieval and Word Embedding in Bug Localization[C]//2020 IEEE 20th International Confe-rence on Software Quality,Reliability and Security(QRS).Piscataway,NJ:IEEE,2020:180-187.
[25]SANGLE S,MUVVA S,CHIMALAKONDA S,et al.DRAST--A Deep Learning and AST Based Approach for Bug Localization[J].arXiv:2011.03449,2020.
[26]LAM A N,NGUYEN A T,NGUYEN H A,et al.Combining deep learning with information retrieval to localize buggy files for bug reports(n)[C]//2015 30th IEEE/ACM International Conference on Automated Software Engineering(ASE).Pisca-taway,NJ:IEEE,2015:476-481.
[27]LAM A N,NGUYEN A T,NGUYEN H A,et al.Bug localization with combination of deep learning and information retrieval[C]//2017 IEEE/ACM 25th International Conference on Program Comprehension(ICPC).Piscataway,NJ:IEEE,2017:218-229.
[28]HUO X,LI M,ZHOU Z H.Learning unified features from na-tural and programming languages for locating buggy source code[C]//IJCAI.2016:1606-1612.
[29]HUO X,LI M.Enhancing the Unified Features to Locate Buggy Files by Exploiting the Sequential Nature of Source Code[C]//IJCAI.2017:1909-1915.
[30]HUO X,THUNG F,LI M,et al.Deep transfer bug localization[J].IEEE Transactions on Software Engineering,2019,47(7):1368-1380.
[31]XIAO Y,KEUNG J,MI Q,et al.Improving bug localizationwith an enhanced convolutional neural network[C]//2017 24th Asia-Pacific Software Engineering Conference(APSEC).Pisca-taway,NJ:IEEE,2017:338-347.
[32]XIAO Y,KEUNG J,BENNIN K E,et al.Improving bug localization with word embedding and enhanced convolutional neural networks[J].Information and Software Technology,2019,105:17-29.
[33]SANGWAN O P.Review of text mining techniques for software bug localization[C]//2019 9th International Conference on Cloud Computing,Data Science & Engineering(Confluence).IEEE,2019:208-211.
[34]ZHANG Y,LIU J K,XIA X,et al.Information retrieval-based based bug localization:a literature review [J].Journal of Software,2020,31(8):2432-2452.
[35]GUO Z Q,ZHOU H C,LIU S R,et al.Information retrieval based bug localization:research problem,progress,and challenges[J].Journal of Software,2020,31(9):2826-2854.
[36]LI Z L,CHEN X,JIANG Z W,et al.Survey of information retrieval-based software bug localization.[J].Journal of Software,2021,32(2):247-276.
[37]LUKINS S K,KRAFT N A,ETZKORN L H.Source code retrieval for bug localization using latent dirichlet allocation[C]//2008 15th Working Conference on Reverse Engineering.Pisca-taway,NJ:IEEE,2008:155-164.
[38]NICHOLS B D.Augmented bug localization using past bug information[C]//Proceedings of the 48th Annual Southeast Regional Conference.New York:ACM,2010:1-6.
[39]DE ALMEIDA MAIA M,COSTA A,DA SILVA I R.On the Influence of Latent Semantic Analysis Parameterization for Bug Localization[J].Revista de Informática Teórica e Aplicada,2013,20(3):49-76.
[40]WANG S,LO D,LAWALL J.Compositional vector space mo-dels for improved bug localization[C]//2014 IEEE International Conference on Software Maintenance and Evolution.Pisca-taway,NJ:IEEE,2014:171-180.
[41]MORENO L,TREADWAY J J,MARCUS A,et al.On the use of stack traces to improve text retrieval-based bug localization[C]//2014 IEEE International Conference on Software Maintenance and Evolution.IEEE,2014:151-160.
[42]PATHAK D P,DHARAVATH S.Automation framework forbug localization using information retrieval techniques[J].International Journal of Innovative Research in Computer and Communication Engineering,2015,3(6):5720-5727.
[43]KUMAR D,SHARMA R.Bug localization using ldacg approach[J].International Journal of Engineering Research and Techno-logy,2015,4(5):155-160.
[44]RAO S,MEDEIROS H,KAK A.Comparing incremental latent semantic analysis algorithms for efficient retrieval from software libraries for bug localization[J].ACM SIGSOFT Software Engineering Notes,2015,40(1):1-8.
[45]RAHMAN S,SAKIB K.An Appropriate Method RankingApproach for Localizing Bugs using Minimized Search Space[C]//ENASE.2016:303-309.
[46]RAHMAN S,RAHMAN M M,SAKIB K.An improved method level bug localization approach using minimized code space[C]//International Conference on Evaluation of Novel Approaches to Software Engineering.Berlin:Springer,2016:179-200.
[47]GORE A,CHOUBEY S D,GANGRADE K.Improved Bug Localization Technique Using Hybrid Information Retrieval Model[C]//International Conference on Distributed Computing and Internet Technology.Berlin:Springer,2016:127-131.
[48]KILINÇ D,YÜCALAR F,BORANDAĞE,et al.Multi-levelreranking approach for bug localization[J].Expert Systems,2016,33(3):286-294.
[49]LUKINS S K,KRAFT N A,ETZKORN L H.Bug localization using latent dirichlet allocation[J].Information and Software Technology,2010,52(9):972-990.
[50]SHARMA T,SHARMA K,SHARMA T.Software bug localization using pachinko allocation model[C]//2016 3rd International Conference on Computing for Sustainable Global Development(INDIACom).IEEE,2016:3603-3608.
[51]RAHMAN S,RAHMAN M M,SAKIB K.A Statement Level Bug Localization Technique using Statement Dependency Graph[C]//ENASE.2017:171-178.
[52]ZHANG X,YAO Y,WANG Y,et al.Exploring metadata in bug reports for bug localization[C]//2017 24th Asia-Pacific Software Engineering Conference(APSEC).Piscataway,NJ:IEEE,2017:328-337.
[53]WANG Y,YAO Y,TONG H,et al.Enhancing supervised bug localization with metadata and stack-trace[J].Knowledge and Information Systems,2020,62(6):2461-2484.
[54]WANG Y,YAO Y,TONG H,et al.Bug localization via supervised topic modeling[C]//2018 IEEE International Conference on Data Mining(ICDM).Piscataway,NJ:IEEE,2018:607-616.
[55]NGUYEN A T,NGUYEN T T,AL-KOFAHI J,et al.A topic-based approach for narrowing the search space of buggy files from a bug report[C]//2011 26th IEEE/ACM International Conference on Automated Software Engineering(ASE 2011).Piscataway,NJ:IEEE,2011:263-272.
[56]SWE K E E,OO H M.Source code retrieval for bug localization using bug report[C]//2019 IEEE 15th International Conference on Intelligent Computer Communication and Processing(ICCP).IEEE,2019:241-247.
[57]KHATIWADA S,TUSHEV M,MAHMOUD A.On Combining IR Methods to Improve Bug Localization[C]//Proceedings of the 28th International Conference on Program Comprehension.New York:ACM,2020:252-262.
[58]BEARD M.Extending bug localization using information re-trieval and code clone location techniques[C]//2011 18th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2011:425-428.
[59]SISMAN B,KAK A C.Incorporating version histories in information retrieval based bug localization[C]//2012 9th IEEE Working Conference on Mining Software Repositories(MSR).Piscataway,NJ:IEEE,2012:50-59.
[60]MOIN A H,KHANSARI M.Bug localization using revision log analysis and open bug repository text categorization[C]//IFIP International Conference on Open Source Systems.Berlin:Springer,2010:188-199.
[61]DAVIES S,ROPER M,WOOD M.Using bug report similarity to enhance bug localisation[C]//2012 19th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2012:125-134.
[62]SAHA R K,LEASE M,KHURSHID S,et al.Improving bug localization using structured information retrieval[C]//2013 28th IEEE/ACM International Conference on Automated Software Engineering(ASE).Piscataway,NJ:IEEE,2013:345-355.
[63]TANTITHAMTHAVORN C,TEEKAVANICH R,IHARAA,et al.Mining A change history to quickly identify bug locations:A case study of the Eclipse project[C]//2013 IEEE International Symposium on Software Reliability Engineering Workshops(ISSREW).Piscataway,NJ:IEEE,2013:108-113.
[64]TANTITHAMTHAVORN C,IHARA A,MATSUMOTO K.Using co-change histories to improve bug localization perfor-mance[C]//2013 14th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Piscataway,NJ:IEEE,2013:543-548.
[65]WONG C P,XIONG Y,ZHANG H,et al.Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis[C]//2014 IEEE International Conferenceon Software Maintenance and Evolution.Piscataway,NJ:IEEE,2014:181-190.
[66]WANG S,LO D.Version history,similar report,and structure:Putting them together for improved bug localization[C]//Proceedings of the 22nd International Conference on Program Comprehension.2014:53-63.
[67]RAHMAN S,GANGULY K K,SAKIB K.An improved bug localization using structured information retrieval and version history[C]//International Conference on Computer and Information Technology.2016:190-195.
[68]YOUM K C,AHN J,KIM J,et al.Bug localization based oncode change histories and bug reports[C]//2015 Asia-Pacific Software Engineering Conference(APSEC).Piscataway,NJ:IEEE,2015:190-197.
[69]YOUM K C,AHN J,LEE E.Improved bug localization based on code change histories and bug reports[J].Information and Software Technology,2017,82:177-192.
[70]LE T D B,OENTARYO R J,LO D.Information retrieval and spectrum based bug localization:Better together[C]//Procee-dings of the 2015 10th Joint Meeting on Foundations of Software Engineering.ACM,2015:579-590.
[71]SHAO P.Combining information retrieval modules and struc-tural information for source code bug localization and feature location[M].The University of Alabama,Ann Arbor:ProQuest,2011.
[72]TONG Y,ZHOU Y,FANG L,et al.Towards a novel approach for defect localization based on part-of-speech and invocation[C]//Proceedings of the 7th Asia-Pacific Symposium on Internetware.ACM,2015:52-61.
[73]YE X,BUNESCU R,LIU C.Learning to rank relevant files for bug reports using domain knowledge[C]//Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2014:689-699.
[74]WANG S,LO D.Amalgam+:Composing rich informationsources for accurate bug localization[J].Journal of Software:Evolution and Process,2016,28(10):921-942.
[75]WEN M,WU R,CHEUNG S C.Locus:Locating bugs fromsoftware changes[C]//2016 31st IEEE/ACM International Conference on Automated Software Engineering(ASE).Pisca-taway,NJ:IEEE,2016:262-273.
[76]ZHOU Y,TONG Y,CHEN T,et al.Augmenting bug localization with part-of-speech and invocation[J].International Journal of Software Engineering and Knowledge Engineering,2017,27(6):925-949.
[77]GHARIBI R,RASEKH A H,SADREDDINI M H.Locating rele-vant source files for bug reports using textual analysis[C]//2017 International Symposium on Computer Science and Software Engineering Conference(CSSE).Piscataway,NJ:IEEE,2017:67-72.
[78]TAKAHASHI A,SAE-LIM N,HAYASHI S,et al.A preliminary study on using code smells to improve bug localization[C]//Proceedings of the 26th Conference on Program Comprehension.New York:ACM,2018:324-327.
[79]SWE K E E,OO H M.Bug Localization Approach Using Source Code Structure with Different Structure Fields[C]//2018 IEEE 16th International Conference on Software Engineering Research,Management and Applications(SERA).Piscataway,NJ:IEEE,2018:159-164.
[80]KHATIWADA S,TUSHEV M,MAHMOUD A.Just enoughsemantics:An information theoretic approach for IR-based software bug localization[J].Information and Software Technology,2018,93:45-57.
[81]ZHANG T,HU W,LUO X,et al.A commit messages-based bug localization for android applications[J].International Journal of Software Engineering and Knowledge Engineering,2019,29(4):457-487.
[82]LAL S,SUREKA A.A static technique for fault localizationusing character n-gram based information retrieval model[C]//Proceedings of the 5th India Software Engineering Conference.New York:ACM,2012:109-118.
[83]SUN X,ZHOU W,LI B,et al.Bug localization for version issues with defect patterns[J].IEEE Access,2019,7:18811-18820.
[84]HOANG T,OENTARYO R J,LE T D B,et al.Network-clustered multi-modal bug localization[J].IEEE Transactions on Software Engineering,2018,45(10):1002-1023.
[85]RATH M,LO D,MÄDER P.Analyzing requirements and traceability information to improve bug localization[C]//Proceedings of the 15th International Conference on Mining Software Reposi-tories.2018:442-453.
[86]DILSHENER T,WERMELINGER M,YU Y.Locating bugswithout looking back[J].Automated Software Engineering,2018,25(3):383-434.
[87]KOYUNCU A,BISSYANDÉ T F,KIM D,et al.D&c:A divide-and-conquer approach to ir-based bug localization[J].arXiv:1902.02703,2019.
[88]YE X,BUNESCU R,LIU C.Mapping bug reports to relevant files:A ranking model,a fine-grained benchmark,and feature evaluation[J].IEEE Transactions on Software Engineering,2015,42(4):379-402.
[89]ASATO M,AMAN H,AMASAKI S,et al.A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization[C]//2020 27th Asia-Pacific Software Engineering Confe-rence(APSEC).2020:475-479.
[90]LI Z,JIANG Z,CHEN X,et al.Laprob:A Label propagation-Based software bug localization method[J].Information and Software Technology,2021,130:106410.
[91]ALMHANA R,KESSENTINI M,MKAOUER W.Method-level bug localization using hybrid multi-objective search[J].Information and Software Technology,2021,131:106474.
[92]SHAO P,ATKISON T,KRAFT N A,et al.Combining lexical and structural information for static bug localisation[J].International Journal of Computer Applications in Technology,2012,44(1):61-71.
[93]BANGCHAROENSAP P,IHARA A,KAMEI Y,et al.Locating source code to be fixed based on initial bug reports-a case study on the eclipse project[C]//2012 Fourth International Workshop on Empirical Software Engineering in Practice.Piscataway,NJ:IEEE,2012:10-15.
[94]ZHOU J,ZHANG H,LO D.Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports[C]//2012 34th International Conference on Software Engineering(ICSE).Piscataway,NJ:IEEE,2012:14-24.
[95]RAO S,MEDEIROS H,KAK A.An incremental update framework for efficient retrieval from software libraries for bug localization[C]//2013 20th Working Conference on Reverse Engineering(WCRE).IEEE,2013:62-71.
[96]SISMAN B,KAK A C.Assisting code search with automatic query reformulation for bug localization[C]//2013 10th Wor-king Conference on Mining Software Repositories(MSR).IEEE,2013:309-318.
[97]CHAPARRO O,FLOREZ J M,MARCUS A.Using observed behavior to reformulate queries during text retrieval-based bug localization[C]//2017 IEEE International Conference on Software Maintenance and Evolution(ICSME).Piscataway,NJ:IEEE,2017:376-387.
[98]KIM M,LEE E.ManQ:Many-objective optimization-based automatic query reduction for IR-based bug localization[J].Information and Software Technology,2020,125:106334.
[99]MILLS C,PARRA E,PANTIUCHINA J,et al.On the relationship between bug reports and queries for text retrieval-based bug localization[J].Empirical Software Engineering,2020,25(5):3086-3127.
[100]ZHANG W,LI Z,WANG Q,et al.FineLocator:A novel ap-proach to method-level fine-grained bug localization by query expansion[J].Information and Software Technology,2019,110:121-135.
[101]ZHANG W,LI Z Q,DU Y H,et al.Fine-grained software bug location approach at method level[J].Journal of Software,2019,30(2):195-210.
[102]RAHMAN M M,ROY C.Poster:improving bug localizationwith report quality dynamics and query reformulation[C]//2018 IEEE/ACM 40th International Conference on Software Engineering:Companion(ICSE-Companion).Piscataway,NJ:IEEE,2018:348-349.
[103]LAWRIE D,BINKLEY D.On the value of bug reports for retrieval-based bug localization[C]//2018 IEEE International Conference on Software Maintenance and Evolution(ICSME).IEEE,2018:524-528.
[104]RAHMAN M M,ROY C K.Improving ir-based bug localization with context-aware query reformulation[C]//Proceedings of the 2018 26th ACM Joint Meeting on European Software Enginee-ring Conference and Symposium on the Foundations of Software Engineering.2018:621-632.
[105]MILLS C,PANTIUCHINA J,PARRA E,et al.Are bug reports enough for text retrieval-based bug localization?[C]//2018 IEEE International Conference on Software Maintenance and Evolution(ICSME).IEEE,2018:381-392.
[106]CHAPARRO O,FLOREZ J M,MARCUS A.Using bug de-scriptions to reformulate queries during text-retrieval-based bug localization[J].Empirical Software Engineering,2019,24(5):2947-3007.
[107]RAHMAN M M.Supporting code search with context-aware,analytics-driven,effective query reformulation[C]//2019 IEEE/ACM 41st International Conference on Software Engineering:Companion Proceedings(ICSE-Companion).Piscataway,NJ:IEEE,2019:226-229.
[108]KIM M,LEE E.A novel approach to automatic query reformulation for ir-based bug localization[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.New York:ACM,2019:1752-1759.
[109]CHAPARRO O.Improving bug reporting,duplicate detection,and localization[C]//2017 IEEE/ACM 39th International Conference on Software Engineering Companion(ICSE-C).IEEE,2017:421-424.
[110]KOCHHAR P S,TIAN Y,LO D.Potential biases in bug localization:Do they matter?[C]//Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering.New York:ACM,2014:803-814.
[111]LE T D B,THUNG F,LO D.Predicting effectiveness of ir-based bug localization techniques[C]//2014 IEEE 25th International Symposium on Software Reliability Engineering.Pisca-taway,NJ:IEEE,2014:335-345.
[112]SAHA R K,LAWALL J,KHURSHID S,et al.On the effectiveness of information retrieval based bug localization for c programs[C]//2014 IEEE International Conference on Software Maintenance and Evolution.IEEE,2014:161-170.
[113]ALDUAILIJ M,AL-DUAILEJ M.Performance evaluation ofinformation retrieval models in bug localization on the method level[C]//2015 International Conference on Collaboration Technologies and Systems(CTS).Piscataway,NJ:IEEE,2015:305-313.
[114]MORENO L,BAVOTA G,HAIDUC S,et al.Query-based configuration of text retrieval solutions for software engineering tasks[C]//Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering.New York:ACM,2015:567-578.
[115]ZHAO F,TANG Y,YANG Y,et al.Is learning-to-rank cost-effective in recommending relevant files for bug localization?[C]//2015 IEEE International Conference on Software Quality,Reliability and Security.Piscataway,NJ:IEEE,2015:298-303.
[116]SHI Z,KEUNG J,BENNIN K E,et al.A Strategy to Determine When to Stop Using Automatic Bug Localization[C]//2016 IEEE 40th Annual Computer Software and Applications Confe-rence(COMPSAC).2016,1:185-190.
[117]DAO T,ZHANG L,MENG N.How does execution information help with information-retrieval based bug localization?[C]//2017 IEEE/ACM 25th International Conference on Program Comprehension(ICPC).Piscataway,NJ:IEEE,2017:241-250.
[118]LE T D B,THUNG F,LO D.Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools[J].Empirical Software Engineering,2017,22(4):2237-2279.
[119]KIM M,LEE E.Poster:Are Information Retrieval-Based Bug Localization Techniques Trustworthy?[C]//2018 IEEE/ACM 40th International Conference on Software Engineering:Companion(ICSE-Companion).Piscataway,NJ:IEEE,2018:248-249.
[120]LEE J,KIM D,BISSYANDÉ T F,et al.Bench4bl:reproducibility study on the performance of ir-based bug localization[C]//Proceedings of the 27th ACM SIGSOFT International Sympo-sium on Software Testing and Analysis.New York:ACM,2018:61-72.
[121]RATH M,MÄDER P.Influence of structured information inbug report descriptions on ir-based bug localization[C]//2018 44th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).Piscataway,NJ:IEEE,2018:26-32.
[122]RATH M,MÄDER P.Structured information in bug report descriptions—influence on IR-based bug localization and develo-pers[J].Software Quality Journal,2019,27(3):1315-1337.
[123]SHI Z,KEUNG J,BENNIN K E,et al.Comparing learning to rank techniques in hybrid bug localization[J].Applied Soft Computing,2018,62:636-648.
[124]TANTITHAMTHAVORN C,ABEBE S L,HASSAN A E,et al.The impact of IR-based classifier configuration on the performance and the effort of method-level bug localization[J].Information and Software Technology,2018,102:160-174.
[125]AMASAKI S,AMAN H,YOKOGAWA T.A ComparativeStudy of Vectorization Methods on BugLocator[C]//2019 45th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).IEEE,2019:236-243.
[126]POLISETTY S,MIRANSKYY A,BAŞAR A.On usefulness of the deep-learning-based bug localization models to practitioners[C]//Proceedings of the Fifteenth International Conference on Predictive Models and Data Analytics in Software Engineering.New York:ACM,2019:16-25.
[127]RAHMAN M M,CHAKRABORTYS,KAISER G,et al.To-ward Optimal Selection of Information Retrieval Models for Software Engineering Tasks[C]//2019 19th International Working Conference on Source Code Analysis and Manipulation(SCAM).Piscataway,NJ:IEEE,2019:127-138.
[128]GARNIER M,GARCIA A.On the evaluation of structured information retrieval-based bug localization on 20 C# projects[C]//Proceedings of the 30th Brazilian Symposium on Software Engineering.ACM,2016:123-132.
[129]GARNIER M,FERREIRA I,GARCIA A.On the influence of program constructs on bug localization effectiveness[J].Journal of Software Engineering Research and Development,2017,5(1):1-29.
[130]AKBAR S A,KAK A C.A large-scale comparative evaluation of IR-based tools for bug localization[C]//Proceedings of the 17th International Conference on Mining Software Repositories.ACM,2020:21-31.
[131]HERZIG K,JUST S,ZELLER A.It’s not a bug,it’s a feature:how misclassification impacts bug prediction[C]//2013 35th International Conference on Software Engineering(ICSE).IEEE,2013:392-401.
[132]AMASAKI S,AMAN H,YOKOGAWA T.On the Effects ofFile-level Information on Method-level Bug Localization[C]//2020 46th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).Piscataway,NJ:IEEE,2020:314-321.
[133]XIA X,LO D,WANG X,et al.Cross-language bug localization[C]//Proceedings of the 22nd International Conference on Program Comprehension.New York:ACM,2014:275-278.
[134]THUNG F,LE T D B,KOCHHAR P S,et al.Buglocalizer:Integrated tool support for bug localization[C]//Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2014:767-770.
[135]WANG X,LO D,XIA X,et al.BOAT:an experimental platform for researchers to comparatively and reproducibly evaluate bug localization techniques[C]//Companion Proceedings of the 36th International Conference on Software Engineering.New York:ACM,2014:572-575.
[136]MUVVA S,RAO A E,CHIMALAKONDA S.BuGL--A Cross-Language Dataset for Bug Localization[J].arXiv:2004.08846,2020.
[137]DIT B,REVELLE M,GETHERS M,et al.Feature location in source code:a taxonomy and survey[J].Journal of Software:Evolution and Process,2013,25(1):53-95.
[138]JUST R,JALALI D,ERNST M D.Defects4J:A database ofexisting faults to enable controlled testing studies for Java programs[C]//Proceedings of the 2014 International Symposium on Software Testing and Analysis.New York:ACM,2014:437-440.
[139]RATH M,REMPEL P,MÄDER P.The ilmseven dataset[C]//2017 IEEE 25th International Requirements Engineering Conference(RE).2017:516-519.
[140]DALLMEIER V,ZIMMERMANN T.Extraction of bug localization benchmarks from history[C]//Proceedings of the twenty-second IEEE/ACM International Conference on Automated Software Engineering.New York:ACM,2007:433-436.
[141]BEARD M,KRAFT N,ETZKORN L,et al.Measuring the accuracy of information retrieval based bug localization techniques[C]//2011 18th Working Conference on Reverse Engineering.Piscataway,NJ:IEEE,2011:124-128.
[142]RAO S,KAK A.Retrieval from software libraries for bug localization:a comparative study of generic and composite text models[C]//Proceedings of the 8th Working Conference on Mining Software Repositories.New York:ACM,2011:43-52.
[143]MORENO L,BANDARA W,HAIDUC S,et al.On the relationship between the vocabulary of bug reports and source code[C]//2013 IEEE International Conference on Software Maintenance.IEEE,2013:452-455.
[144]THOMAS S W,NAGAPPAN M,BLOSTEIN D,et al.The impact of classifier configuration and classifier combination on bug localization[J].IEEE Transactions on Software Engineering,2013,39(10):1427-1443.
[145]KOCHHAR P S,LE T D B,LO D.It’s not a bug,it’s a feature:does misclassification affect bug localization?[C]//Proceedings of the 11th Working Conference on Mining Software Repositories.2014:296-299.
[146]POSHYVANYK D,MARCUS A,RAJLICH V,et al.Combi-ning probabilistic ranking and latent semantic indexing for feature identification[C]//14th IEEE International Conference on Program Comprehension(ICPC’06).Piscataway,NJ:IEEE,2006:137-148.
[147]LEVY O,GOLDBERG Y.Neural word embedding as implicit matrix factorization[J].Advances in Neural Information Processing Systems,2014,27:2177-2185.
[148]BENGIO Y,DUCHARME R,VINCENT P,et al.A neuralprobabilistic language model[J].Journal of Machine Learning Research,2003,3:1137-1155.
[149]GONZALEZ T F.ImageNet classification with deep convolu-tional neural networks[J].Handbook of Approximation Algorithms and Metaheuristics,2007:1-1432.
[150]KIM Y.Convolutional neural networks for sentence classification[C]//Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing.Doha,Qatar:ACL,2014:1746-1751.
[151]WHITE M,VENDOME C,LINARES-VÁSQUEZ M,et al.Toward deep learning software repositories[C]//2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.IEEE,2015:334-345.
[152]NGUYEN A T,NGUYEN T N.Graph-based statistical lan-guage model for code[C]//2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.IEEE,2015:858-868.
[153]MOU L,LI G,ZHANG L,et al.Convolutional neural networks over tree structures for programming language processing[C]//Thirtieth AAAI Conference on Artificial Intelligence.2016:1287-1293.
[154]MIKOLOV T,KARAFIÁT M,BURGET L,et al.Recurrentneural network based language model[C]//Eleventh Annual Conference of the International Speech Communication Association.New York:ACM,2010:1045-1048.
[155]HOCHREITER S,SCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780.
[156]RAHMAN F,DEVANBU P.How,and why,process metrics are better[C]//2013 35th International Conference on Software Engineering(ICSE).Piscataway,NJ:IEEE,2013:432-441.
[157]BETTENBURG N,PREMRAJ R,ZIMMERMANN T,et al.Extracting structural information from bug reports[C]//Proceedings of the 2008 International Working Conference on Mi-ning Software Repositories.ACM,2008:27-30.
[158]POSHYVANYK D,GUÉHÉNEUC Y G,MARCUS A,et al.Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval[J].IEEE Transa-ctions on Software Engineering,2007,33(6):420-432.
[159]ZHANG Y,LO D,XIA X,et al.Fusing multi-abstraction vector space models for concern localization[J].Empirical Software Engineering,2018,23(4):2279-2322.
[160]PARNIN C,ORSO A.Are automated debugging techniques actually helping programmers?[C]//Proceedings of the 2011 International Symposium on Software Testing and Analysis.New York:ACM,2011:199-209.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[3] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[4] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[5] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[6] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[7] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[8] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[9] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[10] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[11] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[12] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[13] SUN Fu-quan, CUI Zhi-qing, ZOU Peng, ZHANG Kun. Brain Tumor Segmentation Algorithm Based on Multi-scale Features [J]. Computer Science, 2022, 49(6A): 12-16.
[14] KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21.
[15] CHANG Bing-guo, SHI Hua-long, CHANG Yu-xin. Multi Model Algorithm for Intelligent Diagnosis of Melanoma Based on Deep Learning [J]. Computer Science, 2022, 49(6A): 22-26.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!