2019
DOI: 10.1002/smr.2162
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring the software bug‐fixing process through the process mining approach

Abstract: In the era of information technology, businesses have changed the way they work.Operations, which have become digitalized and managed via software systems, have increased in competitiveness. Software developers have been forced to design and implement their quality standards products by focusing on process-oriented management. Software quality aims to gain a high-performance level in the both development and managerial processes to maintain continuous improvements. Continuous improvements require more efficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…This technique has been used for some years in software engineering 33–35 . It is applied to various software reengineering topics such as bug fixing 36 . Process mining is mainly used to reverse engineering of a work process.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This technique has been used for some years in software engineering 33–35 . It is applied to various software reengineering topics such as bug fixing 36 . Process mining is mainly used to reverse engineering of a work process.…”
Section: Related Workmentioning
confidence: 99%
“…[33][34][35] It is applied to various software reengineering topics such as bug fixing. 36 Process mining is mainly used to reverse engineering of a work process. Given the dynamics and reliability analysis, this work is not suitable and needs to be coupled with a dynamic process analysis system and semantics to facilitate the analysis of interoperability problems.…”
Section: Related Workmentioning
confidence: 99%
“…Data extraction can be applied after understanding the data structure and system design [13]. The activities Extraction, Transformation, and Load (ETL) of event logs are the first step to applying Process Mining [8,11,13].…”
Section: Introductionmentioning
confidence: 99%
“…Data extraction can be applied after understanding the data structure and system design [13]. The activities Extraction, Transformation, and Load (ETL) of event logs are the first step to applying Process Mining [8,11,13]. The extracted data are transformed into a standard data format and loaded into a system or database [11] as event logs.…”
Section: Introductionmentioning
confidence: 99%
“…In software evolution, it is essential to work on sections of a source code to implement a particular change request [1], managing code clones [2], possibly refactoring code to enhance functionality [3], fix an implementation bug [4], fixing code smells [5], or adapting the system to changes in the framework, physical machine [6,7], or APIs [8,9]. Since evolution is an often process, developers need frequently to migrate to new releases of their employed API for improved services [10,11].…”
Section: Introductionmentioning
confidence: 99%