SlideShare a Scribd company logo
1 of 21
Download to read offline
Improving Bug Location Using
                Binary Class Relationships
                                  SCAM 2012, Riva Del Garda, Italy




Nasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, and Giuliano Antoniol
What is bug location?



                                            rt
                                      epo
           CODE               B   ug R
     UR CE
SO




                   SCAM 201                      2
How to find a buggy class(es)?




             SCAM 201            3
How to find a buggy class(es)?



                      rie val
                      t
                  Re
             tion
          rma         ues
     Info         niq
            T ech




                  SCAM 201       4
Problem with IR techniques

                                     Bug
IR Techniques
 Searching!              LSI




“Bugs” Bunny


                                Developer

                     SCAM 201               5
Our Conjecture!
                                                Send Email
                                                 Feature
  Aggregation


Association
                       Binary Class
                    Relationships (BCR)
Use


      Inheritance
                                          “Good” Developer


                              SCAM 201                       6
Our Conjecture!

                                  Bug
IR + BCR
Searching!            LSI                BCR




                             Developer

                  SCAM 201                 7
Proposed Approach

                          LIBCROOS




         IR
BCR




              SCAM 201               8
LInguistic (textual) and BCRs of Object
    Oriented Systems (LIBCROOS)




                 SCAM 201                 9
IR Engine
• Input: Bug reports and source code
  •   Filter (#43@$)
  •   Stop words (the, is, an….)
  •   Stemmer (attachment, attached -> attach)



• IR Techniques
  •   Latent Semantic Indexing (LSI)
  •   Vector Space Model (VSM)



• Output
  •   Ranked list of linked bug reports and source code files based on
      textual similarity
                                                                         10
                              SCAM 201
Example of IR ranked list
0.70
0.65
0.59
0.56
0.35
0.34
0.27
0.19
0.12
0.09
0.06
                                   11
                 SCAM 201
Relational Model
• Input
  •   IR generated ranked list
  •   Source code OR binary classes



• Binary Class Relationships
  •   PADL model creator
  •   BCRs recovery
  •   BCRs filter



• Output
  •   Ranked list of linked bug reports and source code files based on
      BCRs
                                 SCAM 201                                12
Example of BCRs
      0.70
      0.65
      0.59
      0.56
BCR




      0.35
      0.34             IR
      0.27
      0.19
      0.12
      0.09
      0.06
                  SCAM 201     13
Ranker
• Input
  •   IR generated ranked list
  •   Relational model generated ranked list



• Assign weights
  •   Assign weight to IR ranked list
  •   Assign weight to relational model generated ranked list



• Output
  •   New ranked list


                                 SCAM 201                       14
BCR   Example of Ranker




                 IR




            SCAM 201      15
Case Study
• Goal: Investigate the effectiveness of LIBCROOS in
  improving the accuracy of VSM and LSI techniques

• Quality focus: Ability to decrease the rank of
  buggy classes in ranked list produced by IR
  techniques

• Context: Linking bug reports with source code of
  four open-source programs, ……


                         SCAM 201                      16
Research Questions (RQs)
R01: Does LIBCROOS provide better accuracy, in
  terms of ranking, than IR techniques?



R02: What are the important BCRs that help to
  improve IR techniques accuracy more than
  the others?


                     SCAM 201                    17
Datasets
Dataset Name   Version    Bug Reports     Source Code   Classes   LOC
                                          Files
Rhino          1.5R4.1    41              111           111       94,078

Jabref         2.6        36              579           579       287,791

Lucene         3.1        89              434           434       111,117

muCommander    0.8.5      81              1,069         1,069     124,944




                               SCAM 201                                     18
Case Studies Results (RQ1)




Y axis shows buggy classes’ rank and X axis shows approaches
                           SCAM 201                     19
Case Studies Results




        SCAM 201       20
RQs Answers
• R01: LIBCROOS helps to decrease the rank of culprit
  classes and put culprit classes higher in the ranked
  lists when compared to “traditional” IR techniques
  alone.

R02: All BCRs helps to decrease the rank of culprit
  classes. However, inheritance is the most important
  BCR to decrease the ranking, then aggregation, use,
  and association.


                         SCAM 201                        21

More Related Content

Similar to SCAM12.ppt

Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsThomas Zimmermann
 
How does a barcode scanner work.pdf
How does a barcode scanner work.pdfHow does a barcode scanner work.pdf
How does a barcode scanner work.pdfBarcode Live
 
Predicting Defects in SAP Java Code: An Experience Report
Predicting Defects in SAP Java Code: An Experience ReportPredicting Defects in SAP Java Code: An Experience Report
Predicting Defects in SAP Java Code: An Experience Reporttilman.holschuh
 
13986149 c-pgming-for-embedded-systems
13986149 c-pgming-for-embedded-systems13986149 c-pgming-for-embedded-systems
13986149 c-pgming-for-embedded-systemsPRADEEP
 
Studying the impact of dependency network measures on software quality
Studying the impact of dependency network measures on software quality	Studying the impact of dependency network measures on software quality
Studying the impact of dependency network measures on software quality ICSM 2010
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDLkpyes34
 

Similar to SCAM12.ppt (8)

Scam12.ppt
Scam12.pptScam12.ppt
Scam12.ppt
 
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
 
How does a barcode scanner work.pdf
How does a barcode scanner work.pdfHow does a barcode scanner work.pdf
How does a barcode scanner work.pdf
 
Predicting Defects in SAP Java Code: An Experience Report
Predicting Defects in SAP Java Code: An Experience ReportPredicting Defects in SAP Java Code: An Experience Report
Predicting Defects in SAP Java Code: An Experience Report
 
13986149 c-pgming-for-embedded-systems
13986149 c-pgming-for-embedded-systems13986149 c-pgming-for-embedded-systems
13986149 c-pgming-for-embedded-systems
 
Studying the impact of dependency network measures on software quality
Studying the impact of dependency network measures on software quality	Studying the impact of dependency network measures on software quality
Studying the impact of dependency network measures on software quality
 
Spark Technology Center IBM
Spark Technology Center IBMSpark Technology Center IBM
Spark Technology Center IBM
 
Easy Learn to Verilog HDL
Easy Learn to Verilog HDLEasy Learn to Verilog HDL
Easy Learn to Verilog HDL
 

More from Ptidej Team

From IoT to Software Miniaturisation
From IoT to Software MiniaturisationFrom IoT to Software Miniaturisation
From IoT to Software MiniaturisationPtidej Team
 
Presentation by Lionel Briand
Presentation by Lionel BriandPresentation by Lionel Briand
Presentation by Lionel BriandPtidej Team
 
Manel Abdellatif
Manel AbdellatifManel Abdellatif
Manel AbdellatifPtidej Team
 
Azadeh Kermansaravi
Azadeh KermansaraviAzadeh Kermansaravi
Azadeh KermansaraviPtidej Team
 
CSED - Manel Grichi
CSED - Manel GrichiCSED - Manel Grichi
CSED - Manel GrichiPtidej Team
 
Cristiano Politowski
Cristiano PolitowskiCristiano Politowski
Cristiano PolitowskiPtidej Team
 
Will io t trigger the next software crisis
Will io t trigger the next software crisisWill io t trigger the next software crisis
Will io t trigger the next software crisisPtidej Team
 
Thesis+of+laleh+eshkevari.ppt
Thesis+of+laleh+eshkevari.pptThesis+of+laleh+eshkevari.ppt
Thesis+of+laleh+eshkevari.pptPtidej Team
 
Thesis+of+nesrine+abdelkafi.ppt
Thesis+of+nesrine+abdelkafi.pptThesis+of+nesrine+abdelkafi.ppt
Thesis+of+nesrine+abdelkafi.pptPtidej Team
 

More from Ptidej Team (20)

From IoT to Software Miniaturisation
From IoT to Software MiniaturisationFrom IoT to Software Miniaturisation
From IoT to Software Miniaturisation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation by Lionel Briand
Presentation by Lionel BriandPresentation by Lionel Briand
Presentation by Lionel Briand
 
Manel Abdellatif
Manel AbdellatifManel Abdellatif
Manel Abdellatif
 
Azadeh Kermansaravi
Azadeh KermansaraviAzadeh Kermansaravi
Azadeh Kermansaravi
 
Mouna Abidi
Mouna AbidiMouna Abidi
Mouna Abidi
 
CSED - Manel Grichi
CSED - Manel GrichiCSED - Manel Grichi
CSED - Manel Grichi
 
Cristiano Politowski
Cristiano PolitowskiCristiano Politowski
Cristiano Politowski
 
Will io t trigger the next software crisis
Will io t trigger the next software crisisWill io t trigger the next software crisis
Will io t trigger the next software crisis
 
MIPA
MIPAMIPA
MIPA
 
Thesis+of+laleh+eshkevari.ppt
Thesis+of+laleh+eshkevari.pptThesis+of+laleh+eshkevari.ppt
Thesis+of+laleh+eshkevari.ppt
 
Thesis+of+nesrine+abdelkafi.ppt
Thesis+of+nesrine+abdelkafi.pptThesis+of+nesrine+abdelkafi.ppt
Thesis+of+nesrine+abdelkafi.ppt
 
Medicine15.ppt
Medicine15.pptMedicine15.ppt
Medicine15.ppt
 
Qrs17b.ppt
Qrs17b.pptQrs17b.ppt
Qrs17b.ppt
 
Icpc11c.ppt
Icpc11c.pptIcpc11c.ppt
Icpc11c.ppt
 
Icsme16.ppt
Icsme16.pptIcsme16.ppt
Icsme16.ppt
 
Msr17a.ppt
Msr17a.pptMsr17a.ppt
Msr17a.ppt
 
Icsoc15.ppt
Icsoc15.pptIcsoc15.ppt
Icsoc15.ppt
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

SCAM12.ppt

  • 1. Improving Bug Location Using Binary Class Relationships SCAM 2012, Riva Del Garda, Italy Nasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, and Giuliano Antoniol
  • 2. What is bug location? rt epo CODE B ug R UR CE SO SCAM 201 2
  • 3. How to find a buggy class(es)? SCAM 201 3
  • 4. How to find a buggy class(es)? rie val t Re tion rma ues Info niq T ech SCAM 201 4
  • 5. Problem with IR techniques Bug IR Techniques Searching! LSI “Bugs” Bunny Developer SCAM 201 5
  • 6. Our Conjecture! Send Email Feature Aggregation Association Binary Class Relationships (BCR) Use Inheritance “Good” Developer SCAM 201 6
  • 7. Our Conjecture! Bug IR + BCR Searching! LSI BCR Developer SCAM 201 7
  • 8. Proposed Approach LIBCROOS IR BCR SCAM 201 8
  • 9. LInguistic (textual) and BCRs of Object Oriented Systems (LIBCROOS) SCAM 201 9
  • 10. IR Engine • Input: Bug reports and source code • Filter (#43@$) • Stop words (the, is, an….) • Stemmer (attachment, attached -> attach) • IR Techniques • Latent Semantic Indexing (LSI) • Vector Space Model (VSM) • Output • Ranked list of linked bug reports and source code files based on textual similarity 10 SCAM 201
  • 11. Example of IR ranked list 0.70 0.65 0.59 0.56 0.35 0.34 0.27 0.19 0.12 0.09 0.06 11 SCAM 201
  • 12. Relational Model • Input • IR generated ranked list • Source code OR binary classes • Binary Class Relationships • PADL model creator • BCRs recovery • BCRs filter • Output • Ranked list of linked bug reports and source code files based on BCRs SCAM 201 12
  • 13. Example of BCRs 0.70 0.65 0.59 0.56 BCR 0.35 0.34 IR 0.27 0.19 0.12 0.09 0.06 SCAM 201 13
  • 14. Ranker • Input • IR generated ranked list • Relational model generated ranked list • Assign weights • Assign weight to IR ranked list • Assign weight to relational model generated ranked list • Output • New ranked list SCAM 201 14
  • 15. BCR Example of Ranker IR SCAM 201 15
  • 16. Case Study • Goal: Investigate the effectiveness of LIBCROOS in improving the accuracy of VSM and LSI techniques • Quality focus: Ability to decrease the rank of buggy classes in ranked list produced by IR techniques • Context: Linking bug reports with source code of four open-source programs, …… SCAM 201 16
  • 17. Research Questions (RQs) R01: Does LIBCROOS provide better accuracy, in terms of ranking, than IR techniques? R02: What are the important BCRs that help to improve IR techniques accuracy more than the others? SCAM 201 17
  • 18. Datasets Dataset Name Version Bug Reports Source Code Classes LOC Files Rhino 1.5R4.1 41 111 111 94,078 Jabref 2.6 36 579 579 287,791 Lucene 3.1 89 434 434 111,117 muCommander 0.8.5 81 1,069 1,069 124,944 SCAM 201 18
  • 19. Case Studies Results (RQ1) Y axis shows buggy classes’ rank and X axis shows approaches SCAM 201 19
  • 20. Case Studies Results SCAM 201 20
  • 21. RQs Answers • R01: LIBCROOS helps to decrease the rank of culprit classes and put culprit classes higher in the ranked lists when compared to “traditional” IR techniques alone. R02: All BCRs helps to decrease the rank of culprit classes. However, inheritance is the most important BCR to decrease the ranking, then aggregation, use, and association. SCAM 201 21