{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T06:14:20Z","timestamp":1673936060101},"reference-count":51,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"abstract":"

Bug triage is an essential task in the software maintenance phase. It is the process of assigning a developer (fixer) to a bug report. A personnel (triager) has to analyze the developers' profiles and bug reports for the purpose of making a suitable assignment. Manual bug triage consumes time and effort, so automating this process is a necessity. The previous research studies addressed the triage problem as an information retrieval problem, where the new bug report is the query. Other researchers tackled this problem as a classification problem and utilized traditional machine learning or deep learning techniques. A handful of research studies handled this problem as an optimization problem and utilized optimization algorithms such as Hungarian. This paper briefs and analyzes the previous bug triage approaches in addition to conducting an empirical comparison among five of the previous approaches.<\/p>","DOI":"10.4018\/ijossp.313183","type":"journal-article","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T17:58:44Z","timestamp":1666807124000},"page":"1-19","source":"Crossref","is-referenced-by-count":0,"title":["Bug Triage Automation Approaches"],"prefix":"10.4018","volume":"13","author":[{"given":"Madonna","family":"Fanoos","sequence":"first","affiliation":[{"name":"British University in Egypt, Egypt"}]},{"given":"Abeer","family":"Hamdy","sequence":"additional","affiliation":[{"name":"British University in Egypt, Egypt"}]},{"given":"Khaled A.","family":"Nagaty","sequence":"additional","affiliation":[{"name":"British University in Egypt, Egypt"}]}],"member":"2432","reference":[{"key":"IJOSSP.313183-0","doi-asserted-by":"crossref","unstructured":"Adam Thornton, B. M. (2020). Latent Dirichlet Allocation (LDA) for Anomaly Detection in Ground Vehicle Network Traffic. Proceedings of IEEE 39th Digital Avionics Systems Conference (DASC).","DOI":"10.1109\/DASC50938.2020.9256582"},{"key":"IJOSSP.313183-1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3017501"},{"key":"IJOSSP.313183-2","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2018.9203"},{"issue":"1","key":"IJOSSP.313183-3","first-page":"36","article-title":"Bug Triaging: Profile Oriented Developer Recommendation.","volume":"2","author":"S. K.Anjali","year":"2015","journal-title":"International Journal of Innovative Research in Advanced Engineering"},{"key":"IJOSSP.313183-4","doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., & Murphy, G. (2006). Who should fix this bug? Proceedings of ACM International Conference on Software Engineering, 361\u2013370.","DOI":"10.1145\/1134285.1134336"},{"key":"IJOSSP.313183-5","doi-asserted-by":"crossref","unstructured":"Bahzad Taha Jijo, A. M. (2020). Classification Based on Decision Tree Algorithm for Machine Learning. Journal of Applied Science and Technology Trends, 20-28.","DOI":"10.38094\/jastt20165"},{"key":"IJOSSP.313183-6","first-page":"217","article-title":"When Is \u201cNearest Neighbor\u201d Meaningful?","author":"K. G.Beyer","year":"1999","journal-title":"International Conference of Database Theory"},{"key":"IJOSSP.313183-7","doi-asserted-by":"crossref","unstructured":"Bhattacharya, P., & Neamtiu, I. (2010). Fine-grained Incremental Learning and Multi-feature Tossing Graphs to Improve Bug Triaging. Proceedings of IEEE International Conference on Software Maintenance.","DOI":"10.1109\/ICSM.2010.5609736"},{"key":"IJOSSP.313183-8","unstructured":"Bugzilla. (2014). Retrieved September 15, 2019, from https:\/\/bugzilla.org\/"},{"key":"IJOSSP.313183-9","article-title":"T-REC: Towards Accurate Bug Triage for Technical Group.","author":"A. L.C\u2019\u0131cero","year":"2019","journal-title":"18th IEEE International Conference on Machine Learning and Applications (ICMLA)"},{"key":"IJOSSP.313183-10","doi-asserted-by":"crossref","unstructured":"Cristianini, N.-T. (2000). An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press.","DOI":"10.1017\/CBO9780511801389"},{"key":"IJOSSP.313183-11","unstructured":"Eclipse bug tracking system. (2016). Retrieved September 15, 2019, from https:\/\/bugs.eclipse.org\/bugs\/"},{"key":"IJOSSP.313183-12","author":"P.Flach","year":"2012","journal-title":"The art and science of algorithms that make sense of data"},{"key":"IJOSSP.313183-13","unstructured":"Gcc bug tracking system. (2016). Retrieved September 15, 2019, from https:\/\/gcc.gnu.org\/bugzilla\/"},{"key":"IJOSSP.313183-14","unstructured":"Glassdoor. (n.d.). Retrieved October 9, 2019, from https:\/\/www.glassdoor.com\/Salaries\/senior-bug-fixer-aka-software-engineer-salary-SRCH_KO0,38.htm"},{"key":"IJOSSP.313183-15","unstructured":"Gondaliya, K., Peters, J., & Rueckert, E. (2018). Learning to Categorize Bug Reports with LSTM Networks. Proceedings of The10th International Conference on Advances in System Testing and Validation Lifecycle."},{"key":"IJOSSP.313183-16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTM.2019.8776800"},{"key":"IJOSSP.313183-17","doi-asserted-by":"crossref","unstructured":"Hofmann, T. (1999). Probabilistic latent semantic indexing. Proceeding of Research and development in information retrieval.","DOI":"10.1145\/312624.312649"},{"key":"IJOSSP.313183-18","first-page":"1157","article-title":"An Introduction of Variable and Feature Selection.","author":"A. E.Isabelle Guyon","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"IJOSSP.313183-19","doi-asserted-by":"crossref","unstructured":"Jeong, G., Zimmermann, T., & Kim, S. (2009). Improving Bug Triage with Bug Tossing Graphs. Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering.","DOI":"10.1145\/1595696.1595715"},{"key":"IJOSSP.313183-20","unstructured":"Jira Software. (n.d.). Retrieved September 15, 2019, from https:\/\/www.atlassian.com\/software\/jira\/bug-tracking"},{"key":"IJOSSP.313183-21","article-title":"Linear Support Vector Machines.","author":"P. H.Lubor Ladicky","year":"2011","journal-title":"Proceedings of the 28th International Conference on Machine Learning"},{"key":"IJOSSP.313183-22","doi-asserted-by":"crossref","unstructured":"Mani, S., Sankaran, A., & Aralikatte, R. (2018). DeepTriage: Exploring the Effectiveness of Deep Learning for Bug Triaging. Proceedings of the ACM India Joint International Conference.","DOI":"10.1145\/3297001.3297023"},{"key":"IJOSSP.313183-23","doi-asserted-by":"crossref","unstructured":"Matter, D., Kuhn, A., & Nierstrasz, O. (2009). Assigning Bug Reports using a Vocabulary-based Expertise Model of Developers. In Proceedings of 6th IEEE Working Con. on Mining Software Repositories (MSR\u2019 09) (pp. 131-140). IEEE.","DOI":"10.1109\/MSR.2009.5069491"},{"key":"IJOSSP.313183-24","unstructured":"Mozilla bug tracking system. (2016). Retrieved September 15, 2019, from https:\/\/bugzilla.mozilla.org\/"},{"key":"IJOSSP.313183-25","unstructured":"Muhammad Abbas, K. A. (2019). Multinomial Naive Bayes Classification Model for Sentiment Analysis. International Journal of Computer Science and Network Security, 62-67."},{"key":"IJOSSP.313183-26","unstructured":"Netbeans bug tracking system. (2016). Retrieved September 15, 2019, from https:\/\/netbeans.org\/bugzilla\/"},{"key":"IJOSSP.313183-27","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Nguyen, T. T., & Lo, D. (2012). Duplicate bug report detection with a combination of information retrieval and topic modeling. In Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering (pp. 70-79). IEEE.","DOI":"10.1145\/2351676.2351687"},{"key":"IJOSSP.313183-28","unstructured":"NIST. (2002). The economic impacts of inadequate infrastructure for software Testing. U.S. Department of Commerce."},{"key":"IJOSSP.313183-29","unstructured":"Openoffice bug tracking system. (2016). Retrieved September 15, 2019, from https:\/\/bz.apache.org\/ooo\/"},{"key":"IJOSSP.313183-30","doi-asserted-by":"crossref","unstructured":"Panjer, L. D. (2007). Predicting Eclipse Bug Lifetimes. Proceedings of Mining Software Repositories.","DOI":"10.1109\/MSR.2007.25"},{"key":"IJOSSP.313183-31","article-title":"CosTriage: A Cost-Aware Triage Algorithm for Bug Reporting Systems.","year":"2011","journal-title":"Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence"},{"key":"IJOSSP.313183-32","first-page":"142","article-title":"The Decision Tree Classifier: Design and Potential.","author":"H.Philip","year":"1977","journal-title":"IEEE Transactions on Geoscience Electronics"},{"key":"IJOSSP.313183-33","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2959260"},{"key":"IJOSSP.313183-34","doi-asserted-by":"crossref","unstructured":"Robertson, S., Taylor, M., & Zaragoza, H. (2004). Simple BM25 Extension to Multiple Weighted Fields. Proceedings of the Thirteenth ACM International Conference on Information and Knowledge Management.","DOI":"10.1145\/1031171.1031181"},{"issue":"5","key":"IJOSSP.313183-35","first-page":"2456","article-title":"An Improved Data Reduction Technique Based On KNN & NB with Hybrid Selection Method for Effective Software Bugs Triage. International Journal of Scientific Research in Computer Science","volume":"3","author":"K.Sahu","year":"2018","journal-title":"Engineering and Information Technology"},{"key":"IJOSSP.313183-36","doi-asserted-by":"crossref","unstructured":"Stephen Robertson, H. Z. (2009). The Probabilistic Relevance Framework: BM25 and Beyond. Found. Trends Inf. Retr., 333-389.","DOI":"10.1561\/1500000019"},{"key":"IJOSSP.313183-37","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"IJOSSP.313183-38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3040065"},{"key":"IJOSSP.313183-39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3153075"},{"key":"IJOSSP.313183-40","doi-asserted-by":"crossref","unstructured":"Tamrawi, A., Nguyen, T. T., Al-Kofahi, J., & Nguyen, T. (2011). Fuzzy Set and Cache-based Approach for Bug Triaging. Proceedings of 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13rd European Software Engineering.","DOI":"10.1145\/2025113.2025163"},{"key":"IJOSSP.313183-41","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.31"},{"key":"IJOSSP.313183-42","first-page":"13","article-title":"A Survey of Text Similarity Approaches. International","author":"G. a.Wael","year":"2013","journal-title":"Jisuanji Yingyong"},{"key":"IJOSSP.313183-43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576454"},{"key":"IJOSSP.313183-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.03.014"},{"key":"IJOSSP.313183-45","doi-asserted-by":"crossref","unstructured":"Yin, Y. X. D. (2018). Rapid and Efficient Bug Assignment Using ELM for IOT Software. IEEE Access.","DOI":"10.1109\/ACCESS.2018.2869306"},{"key":"IJOSSP.313183-46","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019EDP7152"},{"key":"IJOSSP.313183-47","doi-asserted-by":"crossref","unstructured":"Fuli Zhang, X. B. (2019). Author Impact: Evaluations, Predictions and Challenges. 2019 IEEE. Translations and content mining are permitted for academic research only, 38657-38669.","DOI":"10.1109\/ACCESS.2019.2905955"},{"key":"IJOSSP.313183-48","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007741"},{"key":"IJOSSP.313183-49","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, H., & Lo, D. (2012). Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. 34th International Conference on Software Engineering (ICSE), 14-24.","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"IJOSSP.313183-50","doi-asserted-by":"crossref","unstructured":"Zou, X., Hu, Y., Tian, Z., & Shen, K. (2019). Logistic Regression Model Optimization and Case Analysis. IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT).","DOI":"10.1109\/ICCSNT47585.2019.8962457"}],"container-title":["International Journal of Open Source Software and Processes"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=313183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:01:11Z","timestamp":1673910071000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJOSSP.313183"}},"subtitle":["A Comparative Study"],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijossp.313183","relation":{},"ISSN":["1942-3926","1942-3934"],"issn-type":[{"value":"1942-3926","type":"print"},{"value":"1942-3934","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,26]]}}}