2018
DOI: 10.1166/jctn.2018.7506
|View full text |Cite
|
Sign up to set email alerts
|

Effective Bug Processing and Tracking System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The information is also target at finer granularity by the pre-defined filters which are included separately for every dimension of input word embedding's as described in Figure 3. Suppose for every dimension k of word embedding's, where and = gives the output vector for every k dimension where i th entry (for i ) is expressed as (2) The utilization of word embedding's in both ways helps in extracting richer sentence modeling. Furthermore, by updating the word embedding in training phase capture more distinct information.…”
Section: A Cnn Based Feature Extraction Layermentioning
confidence: 99%
See 1 more Smart Citation
“…The information is also target at finer granularity by the pre-defined filters which are included separately for every dimension of input word embedding's as described in Figure 3. Suppose for every dimension k of word embedding's, where and = gives the output vector for every k dimension where i th entry (for i ) is expressed as (2) The utilization of word embedding's in both ways helps in extracting richer sentence modeling. Furthermore, by updating the word embedding in training phase capture more distinct information.…”
Section: A Cnn Based Feature Extraction Layermentioning
confidence: 99%
“…Further, if the new bug report is not duplicate then it is added to the master bug report list else, it is considered as a duplicate bug report. However, the filtering process of duplicate bug report requires extensive amount of manual effort, time and complete knowledge of bugs [2]. Previously study showed that near about 220 bug reports are submitted in BST per day in which 25-30% reports are duplicates [3].…”
Section: Introductionmentioning
confidence: 99%
“…It is a fundamental characteristic that gives general advantages to the industry, which requires earnestness in its resolution with respect to resources. It proves that 80% of bug reports goes through severity reassignment, even after the bug report has been sent to a developer [4]. Additionally, it demonstrates that bug reports with severity reassignment have fundamentally longer resolution times than those with no reassigned severity.…”
Section: Introductionmentioning
confidence: 97%
“…The developer (triager) uses this information to resolve the costly bug, which is a time-consuming process. The triager has to choose and identify the issue from a large number of communicated software bugs [2,3,4]. Different bugs have different impacts upon the quality, based on the functionality of software.…”
Section: Introductionmentioning
confidence: 99%
“…For this reason, software organizations utilize bug tracking system (BTS) primarily to handle bug reporting, and bug fixing processes. These large software organizations receive numerous bug reports submissions per day through the BTS provided to the users (Angel, Kumar, Sehgal and Nayak, 2018). A bug report contains the description, summary, reporter, and sometimes stack trace of the buggy code, and many other information.…”
Section: Introductionmentioning
confidence: 99%