Security and privacy are always major issues in Vehicular ad hoc networks. For ensuring privacy and avoiding tracking of the vehicle, recently some researchers proposed the idea of providing multiple pseudo identities...
详细信息
Optimized Fog colony is one of the aid of fog computing, consisting of fog devices, enable efficient management of large fog domains. Well-designed fog colonies can operate independently, resulting in effectively reso...
详细信息
Wave Function Collapse (WFC) is a widely used tile-based algorithm in procedural content generation, including textures, objects, and scenes. However, the current WFC algorithm and related research lack the ability to...
详细信息
This research project focuses on utilizing machine learning techniques to predict loan default among applicants in the context of financial organizations. Loan approval decisions carry substantial risks, and not all a...
详细信息
Malware remains one of the most critical digital threats today due to the rapidly evolving landscape of online activities. Detecting malware has become a pivotal aspect of safeguarding computer system, especially as p...
详细信息
Agriculture plays a significant role in India's economy, not only in terms of its GDP share but also in employment, rural development, and food security. As per the 2022-2023 economic survey, the gross value added...
详细信息
The present article explores the most critical criteria organizations must consider in choosing a proper Cloud Service Provider (CSP) to enable growth strategies and optimize Return on Investment (ROI). It assists org...
详细信息
Distinguished from traditional knowledge graphs (KGs), temporal knowledge graphs (TKGs) must explore and reason over temporally evolving facts adequately. However, existing TKG approaches still face two main challenge...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an import...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an important dimension to inform software quality. Recent studies have revealed that most bug-prone files are always architecturally connected with dependencies, and as one of the best practices in the industry,changes in dependencies should be avoided or carefully made during bug fixing. Hence, in this paper, we take the first attempt to understand bug fixes from the dependencies perspective, which can complement existing code change perspectives. Based on this new perspective, we conducted a systematic and comprehensive study on bug fixes collected from 157 Apache open source projects, involving 140456 bug reports and182621 bug fixes in total. Our study results show that a relatively high proportion of bug fixes(30%) introduce dependency-level changes when fixing the corresponding 33% bugs. The bugs, whose fixes introduce dependency-level changes, have a strong correlation with high priority, large fixing churn, long fixing time,frequent bug reopening, and bug inducing. More importantly, patched files with dependency-level changes in their fixes, consume much more maintenance costs compared with those without these changes. We further summarized three representative patch patterns to explain the reasons for the increasing costs. Our study unveils useful findings based on qualitative and quantitative analysis and also provides new insights that might benefit existing bug prediction techniques. We release a large set of benchmarks and also implement a prototype tool to automatically detect dependency-level changes from bug fixes, which can warn developers and remind them to design a better fix.
Malicious activity includes intentionally disrupting or damaging computer systems, networks, or data, including distributing malware, phishing attempts, denial of service, and unauthorized access. Criminals exploit vu...
详细信息
暂无评论