Abstract
In open source software development we have bug repository to which both developers and users can report bugs. Bug triage, deciding what to do with an incoming bug report, takes a large amount of developer resources and time. All newly coming bug reports must be triaged to determine whether the report is correct and requires attention and if it is, which potentially experienced developer/fixer will be assigned the responsibility of resolving the bug report. In this paper, we propose to apply association mining to assist in bug triage by using Apriori algorithm to predict the developer that should work on the bug based on the bug’s severity, priority and summary terms. We demonstrate our approach on collection of 1,695 bug reports of Thunderbird, AddOnSDK and Bugzilla products of Mozilla open source project. We have analyzed the association rules for top five assignee of the three products. Association rules can support the managers to improve its process during development and save time and resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE Int. Conf. Software Maintenance, pp. 346–355 (2008)
Lamkanfi, A., Demeyer, S., Giger, E., Goethals, B.: Predicting the severity of a reported bug. In: Mining Software Repositories, MSR, pp. 1–10 (2010)
Lamkanfi, A., Demeyer, S., Soetens, Q.D., Verdonck, T.: Comparing mining algorithms for predicting the severity of a reported bug. In: CSMR, pp. 249–258 (2011)
Chaturvedi, K.K., Singh, V.B.: Determining bug severity using machine learning techniques. In: CSI-IEEE Int. Conf. Software Engineering (CONSEG), pp. 378–387 (2012)
Chaturvedi, K.K., Singh, V.B.: An empirical Comparison of Machine Learning Techniques in Predicting the Bug Severity of Open and Close Source Projects. Int. J. Open Source Software and Processes 4(2), 32–59 (2013)
Sharma, M., Bedi, P., Chaturvedi, K.K., Singh, V. B.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: IEEE Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 27–29 (2012)
Cubranic, D., Murphy G.C.: Automatic bug triage using text categorization. In: Intl. Conf. Software Engineering. Citeseer, pp. 92–97 (2004)
Sharma, M., Kumari, M., Singh, V.B.: Understanding the meaning of bug attributes and prediction models. In: I-CARE 5th IBM Collaborative Academia Research Exchange Workshop, Article No. 15. ACM (2013)
Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: SIGMOD Conf. Management of Data. ACM, May 1993
Song, Q., Shepperd, M., Cartwright, M., Mair, C.: Software defect association mining and defect correction effort prediction. IEEE Transactions on Software Engineering 32(2), 69–82 (2006)
Ali, K., Manganaris, S., Srikant, R.: Partial classification using association rules. In: Int. Conf. Knowledge Discovery and Data Mining, pp. 115–118 (1997)
Dong, G., Zhang, X., Wong, L., Li, J.: CAEP: classification by aggregating emerging patterns. In: Arikawa, S., Nakata, I. (eds.) DS 1999. LNCS (LNAI), vol. 1721, pp. 30–42. Springer, Heidelberg (1999)
Liu, B., Hsu, W., Ma, Y.: Integrating classification and association rule mining. In: Int. Conf. Knowledge Discovery and Data Mining, pp. 80–86 (1998)
She, R., Chen, F., Wang, K., Ester, M., Gardy, J.L., Brinkman, F.L.: Frequent-subsequence-based prediction of outer membrane proteins. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (2003)
Wang, K., Zhou, S.Q., Liew, S.C.: Building hierarchical classifiers using class proximity. In: Int. Conf. Very Large Data Bases, pp. 363–374 (1999)
Wang, K., Zhou, S., He, Y.: Growing decision tree on support-less association rules. In: Int. Conf. Knowledge Discovery and Data Mining (2000)
Yang, Q., Zhang, H.H., Li, T.: Mining web logs for prediction models in WWW caching and prefetching. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (2001)
Yin, X., Han, J.: CPAR: classification based on predictive association rules. In: SIAM Int. Conf. Data Mining (2003)
Ying, A.T.T., Murphy, C.G., Ng, R., Chu-Carroll, M.C.: Predicting source code changes by mining revision history. In: Int. Workshop Mining Software Repositories (2004)
Zimmermann, T., Weigerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Int. Conf. Software Engineering (2004)
Mierswa, I., Wurst, M., Klinkenberg, R., Scholz, M., Euler, T.: YALE: rapid prototyping for complex data mining tasks. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD 2006) (2006). http://www.rapid-i.com
Porter, M.: An algorithm for suffix stripping. Program. 14(3), 130–137 (2008)
Anvik, J., Hiew, L., Murphy, G.C.: Who should fix this bug? In: Int. Conf. Software Engineering (ICSE) (2006)
Amir, H.M., Neumann, G.: Assisting bug triage in large open source projects using approximate string matching. In: Int. Conf. Software Engineering Advances (ICSEA 2012), Lisbon, Portugal (2012)
Canfora, G., Cerulo, L.: How software repositories can help in resolving a new change request. In: Workshop on Empirical Studies in Reverse Engineering (2005)
Servant, F., Jones, J.A.: Whose fault: automatic developer-to-fault assignment through fault localization. In: Int. Conf. Software Engineering (ICSE 2012), pp. 36–46. IEEE Press, Piscataway (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sharma, M., Kumari, M., Singh, V.B. (2015). Bug Assignee Prediction Using Association Rule Mining. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9158. Springer, Cham. https://doi.org/10.1007/978-3-319-21410-8_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-21410-8_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21409-2
Online ISBN: 978-3-319-21410-8
eBook Packages: Computer ScienceComputer Science (R0)