2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)

2-3 May 2010

Filter Results

Displaying Results 1 - 25 of 41
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (537 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • MSR 2010 table of contents

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • MSR 2010 brief author index

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • MSR 2010 detailed author index

    Publication Year: 2010, Page(s):1 - 26
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Welcome from the chairs

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (295 KB) | HTML iconHTML
    Freely Available from IEEE
  • MSR 2010 Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • MSR 2010 Program Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • MSR 2010 challenge Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • MSR: Mining for scientific results?

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    MSR has established an impressive presence in the intellectual landscape of software engineering in its seven short years. Insights accumulate as methods continue to mature. Results of practical significance attract increasing numbers of papers and attendees each year. Yet I will argue that MSR is insufficiently ambitious. The community should be seeking enduring scientific results as well as imme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The visual terminator

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB)

    Summary form only given. In this talk, machines take over the world in the near future, directed by the artificially intelligent computer Vinet. With its sole mission to completely annihilate developers, it creates emacs assassins called Terminators that carry the outward appearance of software engineers. The software visualization resistance is there to defeat them and free developers. With a hum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using differences among replications of software engineering experiments to gain knowledge

    Publication Year: 2010, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    In no science or engineering discipline does it make sense to speak of isolated experiments. The results of a single experiment cannot be viewed as representative of the underlying reality. The concept of experiment is closely related to replication. Experiment replication is the repetition of an experiment to double-check its results. Multiple replications of an experiment increase the credibilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the severity of a reported bug

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (82)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    The severity of a reported bug is a critical factor in deciding how soon it needs to be fixed. Unfortunately, while clear guidelines exist on how to assign the severity of a bug, it remains an inherent manual process left to the person reporting the bug. In this paper we investigate whether we can accurately predict the severity of a reported bug by analyzing its textual description using text min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying security bug reports via text mining: An industrial case study

    Publication Year: 2010, Page(s):11 - 20
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters submit bug reports to a bug-tracking system, the bug reporters need to label the bug reports as security bug reports (SBRs) or not, to indicate whether the involved bugs are security problems. These SBRs generally deserve highe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing UML design metrics for predicting fault-prone classes in a Java system

    Publication Year: 2010, Page(s):21 - 30
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Identifying and fixing software problems before implementation are believed to be much cheaper than after implementation. Hence, it follows that predicting fault-proneness of software modules based on early software artifacts like software design is beneficial as it allows software engineers to perform early predictions to anticipate and avoid faults early enough. Taking this motivation into consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extensive comparison of bug prediction approaches

    Publication Year: 2010, Page(s):31 - 41
    Cited by:  Papers (104)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Reliably predicting software defects is one of software engineering's holy grails. Researchers have devised and implemented a plethora of bug prediction approaches varying in terms of accuracy, complexity and the input data they require. However, the absence of an established benchmark makes it hard, if not impossible, to compare approaches. We present a benchmark for defect prediction, in the for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of ANT build systems

    Publication Year: 2010, Page(s):42 - 51
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Build systems are responsible for transforming static source code artifacts into executable software. While build systems play such a crucial role in software development and maintenance, they have been largely ignored by software evolution researchers. With a firm understanding of build system aging processes, project managers could allocate personnel and resources to build system maintenance tas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining

    Publication Year: 2010, Page(s):52 - 61
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, the development of such an infrastructure is often not very organized, leading to new data sources being added in an impromptu manner while hackers set up new services that gain acceptance in the community. Mixing and match... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When process data quality affects the number of bugs: Correlations in software engineering datasets

    Publication Year: 2010, Page(s):62 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Software engineering process information extracted from version control systems and bug tracking databases are widely used in empirical software engineering. In prior work, we showed that these data are plagued by quality deficiencies, which vary in its characteristics across projects. In addition, we showed that those deficiencies in the form of bias do impact the results of studies in empirical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clones: What is that smell?

    Publication Year: 2010, Page(s):72 - 81
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance difficulties. Clones inherently cause code bloat, thus increasing project size and maintenance costs. In this work, we try to validate the conventional wisdom empirically to see whether cloning makes code more defect prone. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Challenge 2010: FreeBSD, GNOME Desktop and Debian/Ubuntu

    Publication Year: 2010, Page(s):82 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    In a young field, such as Mining Software Repositories (MSR), there is always a call for benchmarks so that researchers can compare their results against others. Thus in order to explore and discover the breadth of MSR research, the MSR community has banded together behind the MSR Mining Challenge. The mining challenge allows researchers to demonstrate current working techniques against a common s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives on bugs in the Debian bug tracking system

    Publication Year: 2010, Page(s):86 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Bugs in Debian differ from regular software bugs. They are usually associated with packages, instead of software modules. They are caused and fixed by source package uploads instead of code commits. The majority are reported by individuals who appear in the bug database once, and only once. There also exists a small group of bug reporters with over 1,000 bug reports each to their name. We also exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining security changes in FreeBSD

    Publication Year: 2010, Page(s):90 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB) | HTML iconHTML

    Current research on historical project data is rarely touching on the subject of security related information. Learning how security is treated in projects and which parts of a software are historically security relevant or prone to security changes can enhance the security strategy of a software project. We present a mining methodology for security related changes by modifying an existing method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of issue handling efficiency

    Publication Year: 2010, Page(s):94 - 97
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    We mined the issue database of GNOME to assess how issues are handled. How many issues are submitted and resolved? Does the backlog grow or decrease? How fast are issues resolved? Does issue resolution speed increase or decrease over time? In which subproject are issues handled most efficiently? To answer such questions, we apply several visualization and quantification instruments to the raw issu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.