Bug localisation through diverse sources of information

Steven Davies, Marc Roper

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

18 Citations (Scopus)

Abstract

Many approaches have been proposed to address the problem of bug localisation – taking a bug report and recommending to developers the possible locations of the bug in the project. However, these can often require significant up-front work from developers, and are not widely adopted. Furthermore, those techniques which do not require this up-front investment are often far from accurate, and do not take advantage of all of the information that they could. We propose a technique for combining information from multiple, novel sources of information about a project and a bug, and use this to recommend bug locations to developers. We also identify how this technique could be used to create a low-effort tool for bug localisation, with the aim of increasing developer adoption. We evaluate the technique on 1143 bugs in three open-source projects, and find that it can be used to increase the number of bugs where the first relevant method recommended to developers is the top result from 98 to 132 and in the top-10 from 271 to 322.
Original languageEnglish
Title of host publication2013 IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2013
Place of PublicationPiscataway, NJ.
PublisherIEEE
Pages126-131
Number of pages6
ISBN (Print)9781479925520
DOIs
Publication statusPublished - 2013
Event2013 IEEE International Symposium on Software Reliability Engineering Workshops - Pasadena, United States
Duration: 4 Nov 20137 Nov 2013

Conference

Conference2013 IEEE International Symposium on Software Reliability Engineering Workshops
Abbreviated titleISSREW
Country/TerritoryUnited States
CityPasadena
Period4/11/137/11/13

Keywords

  • bug localisation
  • mining software repositories
  • program debugging

Fingerprint

Dive into the research topics of 'Bug localisation through diverse sources of information'. Together they form a unique fingerprint.

Cite this