Alternative approach to utilize software defect reports

Rattikorn Hewett, Aniruddha Kulkarni

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Much research in software reliability focuses on using software defect reports, mostly number of defects, to construct reliability models to assess software quality. While this traditional approach is useful, it does not fully utilize information in the reports nor provides time-oriented predictions, which are important for resource scheduling and management of software testing. This paper proposes a novel approach that utilizes software defect reports to predict an estimated time required for fixing the defects found during software testing. The proposed approach applies four data mining algorithms that exploit historical qualitative and quantitative defect data for constructing predictive models. We validate the proposed approach in an empirical study using a dataset of defect reports obtained from testing of a release of a large medical system. The paper describes detailed results of our experiments.

Original languageEnglish
Title of host publicationProceedings of the ISCA 15th International Conference on Software Engineering and Data Engineering, SEDE 2006
Pages57-62
Number of pages6
StatePublished - 2006
EventISCA 15th International Conference on Software Engineering and Data Engineering, SEDE 2006 - Los Angeles, CA, United States
Duration: Jul 6 2006Jul 8 2006

Publication series

NameProceedings of the ISCA 15th International Conference on Software Engineering and Data Engineering, SEDE 2006

Conference

ConferenceISCA 15th International Conference on Software Engineering and Data Engineering, SEDE 2006
Country/TerritoryUnited States
CityLos Angeles, CA
Period07/6/0607/8/06

Keywords

  • Empirical software engineering
  • Software quality
  • Software reliability and predictability

Fingerprint

Dive into the research topics of 'Alternative approach to utilize software defect reports'. Together they form a unique fingerprint.

Cite this