2020
DOI: 10.1080/1206212x.2020.1855705
|View full text |Cite
|
Sign up to set email alerts
|

Deep mining of open source software bug repositories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…But, in the proposed CNN network, deep features are routed to the LSTM layer instead of the fully connected layer. The CNN network captures and interprets LSA‐based semantic vectors effectively, whereas the LSTM network identifies long‐short‐term dependencies 46 . To benefit from the advantages of both models, the proposed approach presents a combined CNN‐LSTM model for the automatic identification and classification of programming codes.…”
Section: Proposed Method: Cross‐language Oss Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…But, in the proposed CNN network, deep features are routed to the LSTM layer instead of the fully connected layer. The CNN network captures and interprets LSA‐based semantic vectors effectively, whereas the LSTM network identifies long‐short‐term dependencies 46 . To benefit from the advantages of both models, the proposed approach presents a combined CNN‐LSTM model for the automatic identification and classification of programming codes.…”
Section: Proposed Method: Cross‐language Oss Classificationmentioning
confidence: 99%
“…The CNN network captures and interprets LSA-based semantic vectors effectively, whereas the LSTM network identifies long-short-term dependencies. 46 To benefit from the advantages of both models, the proposed approach presents a combined CNN-LSTM model for the automatic identification and classification of programming codes. The proposed CNN-LSTM model is separated into two phases, as shown in Figure 6.…”
Section: Features Detection and Classification Using Cnn-lstmmentioning
confidence: 99%
“…If needed, these can be used to gain additional insights into the software development process as a whole as well as into specific SDM activities. 64 As we focus on a single case, we use process mining to support exploring these different aspects related to the selected SDM elements.…”
Section: Phase 3-analysis Of Software Development Tools Logs For Sele...mentioning
confidence: 99%
“…Moreover, some software development tools logs contain additional information like priority of specific types of activities, pointers to related or preceding activities, and detailed unstructured descriptions of preformed activities and comments. If needed, these can be used to gain additional insights into the software development process as a whole as well as into specific SDM activities 64 . As we focus on a single case, we use process mining to support exploring these different aspects related to the selected SDM elements.…”
Section: Proposed Approachmentioning
confidence: 99%
“…Many neural algorithms use different processing approaches or incorporate a range of techniques to provide a better system, which can result in a time-consuming and costly task that might hinder real-time inspection and analysis. The technique’s purpose is to identify automobiles within the provided traffic data [ 11 ]. The collection consists of numerous forms of roadside objects, including several types of cars and other things, such as roads and passengers.…”
Section: Introductionmentioning
confidence: 99%