software developers can benefit from machinelearning solutions to predict bugs. machinelearning solutions usually require a lot of data to train a model in order to achieve reliable results. In this context, develop...
详细信息
machinelearning (ML) has been extensively utilized in various scientific and engineering domains. But the inherent constraints and computational complexity that arise in classical machinelearning are particularly ev...
详细信息
The Open Radio Access Network (O-RAN) uses a virtualization architecture to disaggregate components and connect them through open interfaces, and also uses software defined networking (SDN) technology for decoupling. ...
详细信息
software defect and code smell prediction help developers identify problems in the code and fix them before they degrade the quality or the user experience. The prediction of software defects and code smells is challe...
详细信息
ISBN:
(数字)9783031308260
ISBN:
(纸本)9783031308253;9783031308260
software defect and code smell prediction help developers identify problems in the code and fix them before they degrade the quality or the user experience. The prediction of software defects and code smells is challenging, since it involves many factors inherent to the development process. Many studies propose machinelearning models for defects and code smells. However, we have not found studies that explore and compare these machinelearning models, nor that focus on the explainability of the models. This analysis allows us to verify which features and quality attributes influence software defects and code smells. Hence, developers can use this information to predict if a class may be faulty or smelly through the evaluation of a few features and quality attributes. In this study, we fill this gap by comparing machinelearning models for predicting defects and seven code smells. We trained in a dataset composed of 19,024 classes and 70 software features that range from different quality attributes extracted from 14 Java open-source projects. We then ensemble five machinelearning models and employed explainability concepts to explore the redundancies in the models using the top-10 software features and quality attributes that are known to contribute to the defects and code smell predictions. Furthermore, we conclude that although the quality attributes vary among the models, the complexity, documentation, and size are the most relevant. More specifically, Nesting Level Else-If is the only software feature relevant to all models.
The prevalence of mobile phones and messaging apps has made smishing attacks a growing concern. Attackers use smishing to deceive individuals into revealing sensitive information, downloading malicious software, or pe...
详细信息
With the rapid development of modern society, the power load is also growing rapidly. Whether in terms of power supply quality or power supply service, users have various demands for power. As the direct service objec...
详细信息
Positive and Unlabeled (PU) learning is a learning method which can be applied to various field such as recommendation and big data analysis. A direct method to solve PU learning is transform it into a weighted classi...
详细信息
In today's connected world, malware attacks, especially Trojan attacks are rapidly rising. A Trojan is a form of malware that takes on a legitimate piece of software but is malicious and uses the victim's devi...
详细信息
Dynamic tolling of toll roads is a way to dynamically adjust the toll rates according to the changing road traffic conditions in order to alleviate traffic congestion and improve commuting efficiency. Aiming at the dy...
详细信息
The proceedings contain 14 papers. The topics discussed include: goal controller synthesis for self-adaptive systems;verifying binary neural networks on continuous input space using star reachability;explainable human...
ISBN:
(纸本)9798350312638
The proceedings contain 14 papers. The topics discussed include: goal controller synthesis for self-adaptive systems;verifying binary neural networks on continuous input space using star reachability;explainable human-machine teaming using model checking and interpretable machinelearning;contract-based specification refinement and repair for mission planning;patch specifications via product programs;an empirical study assessing software modeling in alloy;mutant equivalence as monotonicity in parametric timed games;differential testing of a verification framework for compiler optimizations (case study);formalizing path explosion for recursive functions via asymptotic path complexity;a Dafny-based approach to thread-local information flow analysis;transparent actor model;using scylindric algebra to support local variables in rely/guarantee concurrency;a formal approach to the verification of protection systems in low-voltage distribution grids;and a verified UAV flight plan generator.
暂无评论