This paper explores the concepts of modelling a software development project as a process that
results in the creation of a continuous stream of data. In terms of the Jazz repository used in this
research, one aspect of that stream of data would be developer communication. Such data can
be used to create an evolving social network characterized by a range of metrics. This paper
presents the application of data stream mining techniques to identify the most useful metrics for
predicting build outcomes. Results are presented from applying the Hoeffding Tree
classification method used in conjunction with the Adaptive Sliding Window (ADWIN) method
for detecting concept drift. The results indicate that only a small number of the available metrics
considered have any significance for predicting the outcome of a build
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
Garro abarca, palos-sanchez y aguayo-camacho, 2021ppalos68
This document summarizes research on factors that influence the performance of virtual teams. It begins by providing background on the rise of virtual teams and remote work. It then reviews literature on key factors for virtual team performance, organizing them into an input-process-output model. The main inputs discussed are task characteristics related to communication, and trust related to leadership, cohesion, and empowerment. The document describes a study examining how these factors influence the performance of 317 software engineering virtual teams during the COVID-19 pandemic. The results provide insight into determinants of virtual team performance that can guide future research and work strategies.
M phil-computer-science-data-mining-projectsVijay Karan
This document provides summaries for several M.Phil Computer Science Data Mining Projects written in C#. The projects cover topics such as bridging virtual communities, mood recognition during online tests, surveying the size of the World Wide Web, knowledge sharing in virtual organizations, adaptive provisioning of human expertise in service-oriented systems, cost-aware rank joins with random and sorted access, improving data quality with dynamic forms, targeted data delivery algorithms, and sentiment classification using feature relation networks.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
The document summarizes the accomplishments of the National Resource for Network Biology (NRNB) over the past year, including:
- Over 100 publications citing NRNB funding and high usage of Cytoscape tools
- 18 supported tools, 93 collaborations, and training of over 100 users
- Progress on developing algorithms for differential network analysis, predictive networks, and multi-scale networks
- Launch of two new NRNB workgroups on single cell genomics and patient similarity networks
- 18 new collaboration projects in areas like cancer, neuroinflammation, and drug transporters
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...IOSR Journals
This document discusses link prediction in social networks. It analyzes shortcomings of existing leading link prediction methods like common neighbor. It then proposes a modified common neighbor approach that takes into account both topological network structure and node similarities based on features. The approach generates a weight for each link based on the number of common features between nodes, divided by the total number of features. It then calculates a contribution score for each common neighbor by multiplying the weights of that neighbor's links to the two nodes. Experimental results on co-authorship networks show the modified common neighbor approach outperforms existing methods.
This document provides a summary of the 2013 annual progress report for the National Resource for Network Biology (NRNB). It describes the NRNB network in 2013, including personnel from various institutions collaborating on projects. It also summarizes the findings of the NRNB External Advisory Committee meeting in December 2012. The Committee found that the NRNB had made strong progress in developing new network analysis tools and demonstrating their value. They provided suggestions to optimize projects, measure success beyond citations, and prepare for renewal. Specific projects like TRD C on network-extracted ontologies were praised for progress. Cytoscape 3.0 development was also discussed.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
Garro abarca, palos-sanchez y aguayo-camacho, 2021ppalos68
This document summarizes research on factors that influence the performance of virtual teams. It begins by providing background on the rise of virtual teams and remote work. It then reviews literature on key factors for virtual team performance, organizing them into an input-process-output model. The main inputs discussed are task characteristics related to communication, and trust related to leadership, cohesion, and empowerment. The document describes a study examining how these factors influence the performance of 317 software engineering virtual teams during the COVID-19 pandemic. The results provide insight into determinants of virtual team performance that can guide future research and work strategies.
M phil-computer-science-data-mining-projectsVijay Karan
This document provides summaries for several M.Phil Computer Science Data Mining Projects written in C#. The projects cover topics such as bridging virtual communities, mood recognition during online tests, surveying the size of the World Wide Web, knowledge sharing in virtual organizations, adaptive provisioning of human expertise in service-oriented systems, cost-aware rank joins with random and sorted access, improving data quality with dynamic forms, targeted data delivery algorithms, and sentiment classification using feature relation networks.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
The document summarizes the accomplishments of the National Resource for Network Biology (NRNB) over the past year, including:
- Over 100 publications citing NRNB funding and high usage of Cytoscape tools
- 18 supported tools, 93 collaborations, and training of over 100 users
- Progress on developing algorithms for differential network analysis, predictive networks, and multi-scale networks
- Launch of two new NRNB workgroups on single cell genomics and patient similarity networks
- 18 new collaboration projects in areas like cancer, neuroinflammation, and drug transporters
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...IOSR Journals
This document discusses link prediction in social networks. It analyzes shortcomings of existing leading link prediction methods like common neighbor. It then proposes a modified common neighbor approach that takes into account both topological network structure and node similarities based on features. The approach generates a weight for each link based on the number of common features between nodes, divided by the total number of features. It then calculates a contribution score for each common neighbor by multiplying the weights of that neighbor's links to the two nodes. Experimental results on co-authorship networks show the modified common neighbor approach outperforms existing methods.
This document provides a summary of the 2013 annual progress report for the National Resource for Network Biology (NRNB). It describes the NRNB network in 2013, including personnel from various institutions collaborating on projects. It also summarizes the findings of the NRNB External Advisory Committee meeting in December 2012. The Committee found that the NRNB had made strong progress in developing new network analysis tools and demonstrating their value. They provided suggestions to optimize projects, measure success beyond citations, and prepare for renewal. Specific projects like TRD C on network-extracted ontologies were praised for progress. Cytoscape 3.0 development was also discussed.
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASESIJCSEIT Journal
Keyword search in relational databases allows user to search information without knowing database
schema and using structural query language (SQL). In this paper, we address the problem of generating
and evaluating candidate networks. In candidate network generation, the overhead is caused by raising the
number of joining tuples for the size of minimal candidate network. To reduce overhead, we propose
candidate network generation algorithms to generate a minimum number of joining tuples according to the
maximum number of tuple set. We first generate a set of joining tuples, candidate networks (CNs). It is
difficult to obtain an optimal query processing plan during generating a number of joins. We also develop a
dynamic CN evaluation algorithm (D_CNEval) to generate connected tuple trees (CTTs) by reducing the
size of intermediate joining results. The performance evaluation of the proposed algorithms is conducted
on IMDB and DBLP datasets and also compared with existing algorithms.
Sociotechnical Systems in Virtual Organization: The Challenge of Coordinating...Sociotechnical Roundtable
This document summarizes a study examining how work and knowledge are coordinated across time and space in virtual research and development organizations. It analyzes three virtual R&D projects located at different points along an R&D continuum, from basic research to commercial development. The study uses a sociotechnical systems framework to understand how each project addresses the challenges of virtual collaboration. It identifies different types of coordinating mechanisms used across the projects and how these mechanisms help manage knowledge barriers. The findings suggest that understanding a project's position on the R&D continuum can help organizations select coordinating mechanisms to enhance effectiveness in virtual work environments.
Opportunity and risk in social computing environmentsHazel Hall
Hazel Hall's invited paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada, 29 April 2009. This presentation draws on the project work discussed in the report at: http://drhazelhall.files.wordpress.com/2013/01/soc_comp_proj_rep_public_2008.pdf
Wikidata is a collaborative knowledge graph edited by both humans and bots. Research found that a mix of human and bot edits, along with diversity in editor tenure and interests, led to higher quality items. Most external references in Wikidata were found to be relevant and from authoritative sources like governments and academics. Neural networks can generate multilingual summaries for Wikidata items that match Wikipedia style and are useful for editors in underserved language editions.
This document provides an annual progress report for the National Resource for Network Biology (NRNB) for the period of May 1, 2011 to April 30, 2012. It summarizes the following:
1) Advances made in developing algorithms to identify network modules and use modules as biomarkers for disease. This includes methods to capture complex logical relationships within modules.
2) Progress on tools to enable new network analysis and visualization capabilities, including a new version of Cytoscape.
3) Growth of collaborations through the NRNB, which have nearly doubled over the past year to around 100 projects.
4) Continued development of the Cytoscape App Store to support the user and developer community.
This document compares the k-means data mining and outlier detection approaches for network-based intrusion detection. It analyzes four datasets capturing network traffic using both approaches. The k-means approach clusters traffic into normal and abnormal flows, while outlier detection calculates an outlier score for each flow. The document finds that k-means was more accurate and precise, with a better classification rate than outlier detection. It requires less computer resources than outlier detection. This comparison of the approaches can help network administrators choose the best intrusion detection method.
This document summarizes the accomplishments of the National Resource for Network Biology over a reporting period. It lists numerous quantitative metrics of success, including over 100 publications citing their grants, thousands of daily downloads and uses of their software tools, and training over 100 users. It also provides details on improvements and developments made to several of their modeling frameworks, algorithms, and software applications. Finally, it outlines the formation of a new working group on single-cell RNA-seq analysis and visualization, and improvements made to their computing infrastructure.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document summarizes Tamara Lopez's PhD research proposal on reasoning about flaws in software design. The research aims to analyze software failures by taking a situational approach between the broad scope of systemic analyses and narrow focus of means analyses. It will apply qualitative methods to examine how failures manifest and are addressed in software development. The goal is to better understand why some software fails and other succeeds.
The document describes a Semantic Wiki system called SoWiSE that was developed to help software developers collaborate more effectively. SoWiSE combines Wiki and Semantic Web technologies to allow developers to tag and search software documentation based on ontologies. It was built as an Eclipse plugin to integrate with the developer's IDE. SoWiSE enhances an existing Wiki plugin for Eclipse called EclipseWiki by adding semantic search capabilities and customizations for software development tasks.
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...ijseajournal
This document presents an algorithm to extract data from open source software project repositories on GitHub for building duration estimation models. The algorithm extracts data on contributors, commits, lines of code added and removed, and active days for each contributor within a release period. This data is then used to build linear regression models to estimate project duration based on the number of commits by contributor type (full-time, part-time, occasional). The algorithm is tested on data extracted from 21 releases of the WordPress project hosted on GitHub.
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...ijseajournal
Software project estimation is important for allocating resources and planning a reasonable work
schedule. Estimation models are typically built using data from completed projects. While organizations
have their historical data repositories, it is difficult to obtain their collaboration due to privacy and
competitive concerns. To overcome the issue of public access to private data repositories this study
proposes an algorithm to extract sufficient data from the GitHub repository for building duration
estimation models. More specifically, this study extracts and analyses historical data on WordPress
projects to estimate OSS project duration using commits as an independent variable as well as an
improved classification of contributors based on the number of active days for each contributor within a
release period. The results indicate that duration estimation models using data from OSS repositories
perform well and partially solves the problem of lack of data encountered in empirical research in software
engineering
Understanding Continuous Design in F/OSS ProjectsBetsey Merkel
By authors Les Gasser1,2
gasser@uiuc.edu
Gabriel Ripoche1, 3
gripoche@uiuc.edu
Walt Scacchi2
wscacchi@ics.uci.edu
Bryan Penne1
bpenne@uiuc.edu
Abstract
Open Source Software (OSS) is in regular widespread use supporting critical
applications and infrastructure, including the Internet and World Wide Web themselves. The communities of OSS users and developers are often interwoven. The deep engagement of users and developers, coupled with the openness of systems lead to community-based system design and re-design activities that are continuous. Continuous redesign is facilitated by communication and knowledge-
sharing infrastructures such as persistent chat rooms, newsgroups, issue-
reporting/tracking repositories, sharable design representations and many kinds of
"software informalisms." These tools are arenas for managing the extensive, varied,
multimedia community knowledge that forms the foundation and the substance of
system requirements. Active community-based design processes and knowledge repositories create new ways of learning about, representing, and defining systems that challenge current models of representation and design. This paper presents several aspects of our research into continuous, open, community-based design
practices. We discuss several new insights into how communities represent
knowledge and capture requirements that derive from our qualitative empirical
studies of large (ca. 2GB+) repositories of problem-report data, primarily from the
Mozilla project.
The document proposes an Interactive Application Service (IAS) that uses cloud computing and social networking technologies to allow researchers to easily discover, share, and access applications from anywhere at any time. The IAS architecture includes a cloud infrastructure layer, IAS service layer, and social networking front-end layer. Users can run applications in the cloud through the social networking portal. The IAS has been implemented on the GeoChronos portal to enable earth observation scientists to share applications and data.
Linked Data Generation for the University Data From Legacy Database dannyijwest
Web was developed to share information among the users through internet as some hyperlinked documents.
If someone wants to collect some data from the web he has to search and crawl through the documents to
fulfil his needs. Concept of Linked Data creates a breakthrough at this stage by enabling the links within
data. So, besides the web of connected documents a new web developed both for humans and machines, i.e.,
the web of connected data, simply known as Linked Data Web. Since it is a very new domain, still a very
few works has been done, specially the publication of legacy data within a University domain as Linked
Data.
This document provides an overview of the technologies used to develop the graphical user interface for the Tell Me Quality tool. It describes Node.js, D3.js, Git, JSON, Mustache, REST, and SHACL which were used for the frontend and backend. The frontend allows users to upload files and configuration data, view available measurements, visualize data, and see detailed results. The backend performs tasks like uploading files, configuring shape files, selecting measurements, and exporting results. An example usage is also provided.
AGILE SOFTWARE ARCHITECTURE INGLOBAL SOFTWARE DEVELOPMENT ENVIRONMENT:SYSTEMA...ijseajournal
In recent years, software development companies started to adopt Global Software Development (GSD) to
explore the benefits of this approach, mainly cost reduction. However, the GSD environment also brings
more complexity and challenges. Some challenges are related to communication aspects like cultural differences, time zone, and language. This paper is the first step in an extensive study to understand if the
software architecture can ease communication in GSD environments. We conducted a Systematic Literature Mapping (SLM) to catalog relevant studies about software architecture and GSD teams and identify
potential practices for use in the software industry. This paper’s findings contribute to the GSD body of
knowledge by exploring the impact of software architecture strategy on the GSD environment. It presents
hypotheses regarding the relationship between software architecture and GSD challenges, which will guide
future research.
In the present paper, applicability and
capability of A.I techniques for effort estimation prediction has
been investigated. It is seen that neuro fuzzy models are very
robust, characterized by fast computation, capable of handling
the distorted data. Due to the presence of data non-linearity, it is
an efficient quantitative tool to predict effort estimation. The one
hidden layer network has been developed named as OHLANFIS
using MATLAB simulation environment.
Here the initial parameters of the OHLANFIS are
identified using the subtractive clustering method. Parameters of
the Gaussian membership function are optimally determined
using the hybrid learning algorithm. From the analysis it is seen
that the Effort Estimation prediction model developed using
OHLANFIS technique has been able to perform well over normal
ANFIS Model.
Personal dashboards for individual learning and project awareness in social s...Wolfgang Reinhardt
The document discusses the concept and implementation of personal dashboards within the eCopSoft collaborative development environment. It aims to enhance awareness, learning, and coordination for developers working on multiple projects. There are three types of dashboards proposed: 1) a community dashboard, 2) a project dashboard, and 3) a my-eCopSoft dashboard for individual users. The dashboards will combine and display data from different eCopSoft tools and projects through customizable "pods". This will provide developers with an integrated view of their work across multiple teams and contexts.
[This is work presented at SIGMOD'13.]
The use of large-scale data mining and machine learning has proliferated through the adoption of technologies such as Hadoop, with its simple programming semantics and rich and active ecosystem. This paper presents LinkedIn's Hadoop-based analytics stack, which allows data scientists and machine learning researchers to extract insights and build product features from massive amounts of data. In particular, we present our solutions to the "last mile" issues in providing a rich developer ecosystem. This includes easy ingress from and egress to online systems, and managing workflows as production processes. A key characteristic of our solution is that these distributed system concerns are completely abstracted away from researchers. For example, deploying data back into the online system is simply a 1-line Pig command that a data scientist can add to the end of their script. We also present case studies on how this ecosystem is used to solve problems ranging from recommendations to news feed updates to email digesting to descriptive analytical dashboards for our members.
This document describes LinkedIn's "Big Data" ecosystem for machine learning and data mining. It discusses how LinkedIn uses Hadoop and related tools to extract insights from massive amounts of data and build predictive analytics applications. It outlines LinkedIn's solutions for easing the process of deploying machine learning models into production by providing seamless ingress of data into Hadoop and egress of results to various systems, abstracting away distributed systems concerns for researchers.
OpenVis Conference Report Part 1 (and Introduction to D3.js)Keiichiro Ono
This document summarizes a cytoscape team meeting on May 8, 2014. It discusses the OpenVis conference, which brings together practitioners in visualization including developers, designers, and analysts. The keynote speakers were introduced, including Mike Bostock who created the D3.js library. Bostock's talk focused on how D3 works and its use of data-driven documents to create interactive visualizations in web browsers. The document notes that while cytoscape uses Java for desktop apps, web technologies like cytoscape.js should be used for sharing data. It relates D3 and the team's projects, suggesting D3 could be used to visualize the cytoscape design process from Git commits.
EFFICIENT SCHEMA BASED KEYWORD SEARCH IN RELATIONAL DATABASESIJCSEIT Journal
Keyword search in relational databases allows user to search information without knowing database
schema and using structural query language (SQL). In this paper, we address the problem of generating
and evaluating candidate networks. In candidate network generation, the overhead is caused by raising the
number of joining tuples for the size of minimal candidate network. To reduce overhead, we propose
candidate network generation algorithms to generate a minimum number of joining tuples according to the
maximum number of tuple set. We first generate a set of joining tuples, candidate networks (CNs). It is
difficult to obtain an optimal query processing plan during generating a number of joins. We also develop a
dynamic CN evaluation algorithm (D_CNEval) to generate connected tuple trees (CTTs) by reducing the
size of intermediate joining results. The performance evaluation of the proposed algorithms is conducted
on IMDB and DBLP datasets and also compared with existing algorithms.
Sociotechnical Systems in Virtual Organization: The Challenge of Coordinating...Sociotechnical Roundtable
This document summarizes a study examining how work and knowledge are coordinated across time and space in virtual research and development organizations. It analyzes three virtual R&D projects located at different points along an R&D continuum, from basic research to commercial development. The study uses a sociotechnical systems framework to understand how each project addresses the challenges of virtual collaboration. It identifies different types of coordinating mechanisms used across the projects and how these mechanisms help manage knowledge barriers. The findings suggest that understanding a project's position on the R&D continuum can help organizations select coordinating mechanisms to enhance effectiveness in virtual work environments.
Opportunity and risk in social computing environmentsHazel Hall
Hazel Hall's invited paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada, 29 April 2009. This presentation draws on the project work discussed in the report at: http://drhazelhall.files.wordpress.com/2013/01/soc_comp_proj_rep_public_2008.pdf
Wikidata is a collaborative knowledge graph edited by both humans and bots. Research found that a mix of human and bot edits, along with diversity in editor tenure and interests, led to higher quality items. Most external references in Wikidata were found to be relevant and from authoritative sources like governments and academics. Neural networks can generate multilingual summaries for Wikidata items that match Wikipedia style and are useful for editors in underserved language editions.
This document provides an annual progress report for the National Resource for Network Biology (NRNB) for the period of May 1, 2011 to April 30, 2012. It summarizes the following:
1) Advances made in developing algorithms to identify network modules and use modules as biomarkers for disease. This includes methods to capture complex logical relationships within modules.
2) Progress on tools to enable new network analysis and visualization capabilities, including a new version of Cytoscape.
3) Growth of collaborations through the NRNB, which have nearly doubled over the past year to around 100 projects.
4) Continued development of the Cytoscape App Store to support the user and developer community.
This document compares the k-means data mining and outlier detection approaches for network-based intrusion detection. It analyzes four datasets capturing network traffic using both approaches. The k-means approach clusters traffic into normal and abnormal flows, while outlier detection calculates an outlier score for each flow. The document finds that k-means was more accurate and precise, with a better classification rate than outlier detection. It requires less computer resources than outlier detection. This comparison of the approaches can help network administrators choose the best intrusion detection method.
This document summarizes the accomplishments of the National Resource for Network Biology over a reporting period. It lists numerous quantitative metrics of success, including over 100 publications citing their grants, thousands of daily downloads and uses of their software tools, and training over 100 users. It also provides details on improvements and developments made to several of their modeling frameworks, algorithms, and software applications. Finally, it outlines the formation of a new working group on single-cell RNA-seq analysis and visualization, and improvements made to their computing infrastructure.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document summarizes Tamara Lopez's PhD research proposal on reasoning about flaws in software design. The research aims to analyze software failures by taking a situational approach between the broad scope of systemic analyses and narrow focus of means analyses. It will apply qualitative methods to examine how failures manifest and are addressed in software development. The goal is to better understand why some software fails and other succeeds.
The document describes a Semantic Wiki system called SoWiSE that was developed to help software developers collaborate more effectively. SoWiSE combines Wiki and Semantic Web technologies to allow developers to tag and search software documentation based on ontologies. It was built as an Eclipse plugin to integrate with the developer's IDE. SoWiSE enhances an existing Wiki plugin for Eclipse called EclipseWiki by adding semantic search capabilities and customizations for software development tasks.
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...ijseajournal
This document presents an algorithm to extract data from open source software project repositories on GitHub for building duration estimation models. The algorithm extracts data on contributors, commits, lines of code added and removed, and active days for each contributor within a release period. This data is then used to build linear regression models to estimate project duration based on the number of commits by contributor type (full-time, part-time, occasional). The algorithm is tested on data extracted from 21 releases of the WordPress project hosted on GitHub.
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...ijseajournal
Software project estimation is important for allocating resources and planning a reasonable work
schedule. Estimation models are typically built using data from completed projects. While organizations
have their historical data repositories, it is difficult to obtain their collaboration due to privacy and
competitive concerns. To overcome the issue of public access to private data repositories this study
proposes an algorithm to extract sufficient data from the GitHub repository for building duration
estimation models. More specifically, this study extracts and analyses historical data on WordPress
projects to estimate OSS project duration using commits as an independent variable as well as an
improved classification of contributors based on the number of active days for each contributor within a
release period. The results indicate that duration estimation models using data from OSS repositories
perform well and partially solves the problem of lack of data encountered in empirical research in software
engineering
Understanding Continuous Design in F/OSS ProjectsBetsey Merkel
By authors Les Gasser1,2
gasser@uiuc.edu
Gabriel Ripoche1, 3
gripoche@uiuc.edu
Walt Scacchi2
wscacchi@ics.uci.edu
Bryan Penne1
bpenne@uiuc.edu
Abstract
Open Source Software (OSS) is in regular widespread use supporting critical
applications and infrastructure, including the Internet and World Wide Web themselves. The communities of OSS users and developers are often interwoven. The deep engagement of users and developers, coupled with the openness of systems lead to community-based system design and re-design activities that are continuous. Continuous redesign is facilitated by communication and knowledge-
sharing infrastructures such as persistent chat rooms, newsgroups, issue-
reporting/tracking repositories, sharable design representations and many kinds of
"software informalisms." These tools are arenas for managing the extensive, varied,
multimedia community knowledge that forms the foundation and the substance of
system requirements. Active community-based design processes and knowledge repositories create new ways of learning about, representing, and defining systems that challenge current models of representation and design. This paper presents several aspects of our research into continuous, open, community-based design
practices. We discuss several new insights into how communities represent
knowledge and capture requirements that derive from our qualitative empirical
studies of large (ca. 2GB+) repositories of problem-report data, primarily from the
Mozilla project.
The document proposes an Interactive Application Service (IAS) that uses cloud computing and social networking technologies to allow researchers to easily discover, share, and access applications from anywhere at any time. The IAS architecture includes a cloud infrastructure layer, IAS service layer, and social networking front-end layer. Users can run applications in the cloud through the social networking portal. The IAS has been implemented on the GeoChronos portal to enable earth observation scientists to share applications and data.
Linked Data Generation for the University Data From Legacy Database dannyijwest
Web was developed to share information among the users through internet as some hyperlinked documents.
If someone wants to collect some data from the web he has to search and crawl through the documents to
fulfil his needs. Concept of Linked Data creates a breakthrough at this stage by enabling the links within
data. So, besides the web of connected documents a new web developed both for humans and machines, i.e.,
the web of connected data, simply known as Linked Data Web. Since it is a very new domain, still a very
few works has been done, specially the publication of legacy data within a University domain as Linked
Data.
This document provides an overview of the technologies used to develop the graphical user interface for the Tell Me Quality tool. It describes Node.js, D3.js, Git, JSON, Mustache, REST, and SHACL which were used for the frontend and backend. The frontend allows users to upload files and configuration data, view available measurements, visualize data, and see detailed results. The backend performs tasks like uploading files, configuring shape files, selecting measurements, and exporting results. An example usage is also provided.
AGILE SOFTWARE ARCHITECTURE INGLOBAL SOFTWARE DEVELOPMENT ENVIRONMENT:SYSTEMA...ijseajournal
In recent years, software development companies started to adopt Global Software Development (GSD) to
explore the benefits of this approach, mainly cost reduction. However, the GSD environment also brings
more complexity and challenges. Some challenges are related to communication aspects like cultural differences, time zone, and language. This paper is the first step in an extensive study to understand if the
software architecture can ease communication in GSD environments. We conducted a Systematic Literature Mapping (SLM) to catalog relevant studies about software architecture and GSD teams and identify
potential practices for use in the software industry. This paper’s findings contribute to the GSD body of
knowledge by exploring the impact of software architecture strategy on the GSD environment. It presents
hypotheses regarding the relationship between software architecture and GSD challenges, which will guide
future research.
In the present paper, applicability and
capability of A.I techniques for effort estimation prediction has
been investigated. It is seen that neuro fuzzy models are very
robust, characterized by fast computation, capable of handling
the distorted data. Due to the presence of data non-linearity, it is
an efficient quantitative tool to predict effort estimation. The one
hidden layer network has been developed named as OHLANFIS
using MATLAB simulation environment.
Here the initial parameters of the OHLANFIS are
identified using the subtractive clustering method. Parameters of
the Gaussian membership function are optimally determined
using the hybrid learning algorithm. From the analysis it is seen
that the Effort Estimation prediction model developed using
OHLANFIS technique has been able to perform well over normal
ANFIS Model.
Personal dashboards for individual learning and project awareness in social s...Wolfgang Reinhardt
The document discusses the concept and implementation of personal dashboards within the eCopSoft collaborative development environment. It aims to enhance awareness, learning, and coordination for developers working on multiple projects. There are three types of dashboards proposed: 1) a community dashboard, 2) a project dashboard, and 3) a my-eCopSoft dashboard for individual users. The dashboards will combine and display data from different eCopSoft tools and projects through customizable "pods". This will provide developers with an integrated view of their work across multiple teams and contexts.
[This is work presented at SIGMOD'13.]
The use of large-scale data mining and machine learning has proliferated through the adoption of technologies such as Hadoop, with its simple programming semantics and rich and active ecosystem. This paper presents LinkedIn's Hadoop-based analytics stack, which allows data scientists and machine learning researchers to extract insights and build product features from massive amounts of data. In particular, we present our solutions to the "last mile" issues in providing a rich developer ecosystem. This includes easy ingress from and egress to online systems, and managing workflows as production processes. A key characteristic of our solution is that these distributed system concerns are completely abstracted away from researchers. For example, deploying data back into the online system is simply a 1-line Pig command that a data scientist can add to the end of their script. We also present case studies on how this ecosystem is used to solve problems ranging from recommendations to news feed updates to email digesting to descriptive analytical dashboards for our members.
This document describes LinkedIn's "Big Data" ecosystem for machine learning and data mining. It discusses how LinkedIn uses Hadoop and related tools to extract insights from massive amounts of data and build predictive analytics applications. It outlines LinkedIn's solutions for easing the process of deploying machine learning models into production by providing seamless ingress of data into Hadoop and egress of results to various systems, abstracting away distributed systems concerns for researchers.
OpenVis Conference Report Part 1 (and Introduction to D3.js)Keiichiro Ono
This document summarizes a cytoscape team meeting on May 8, 2014. It discusses the OpenVis conference, which brings together practitioners in visualization including developers, designers, and analysts. The keynote speakers were introduced, including Mike Bostock who created the D3.js library. Bostock's talk focused on how D3 works and its use of data-driven documents to create interactive visualizations in web browsers. The document notes that while cytoscape uses Java for desktop apps, web technologies like cytoscape.js should be used for sharing data. It relates D3 and the team's projects, suggesting D3 could be used to visualize the cytoscape design process from Git commits.
Developers spend much of their time understanding unfamiliar code during software maintenance tasks. The study found that developers interleaved three activities: searching for relevant code using manual and tool-based searches, following code dependencies, and collecting relevant code by encoding it in Eclipse interfaces. However, developers' searches were often unsuccessful due to misleading cues, and navigation tools caused overhead. Developers lost track of collected code, forcing re-finding. On average, developers spent 35% of time on redundant navigation. This suggests a new model of understanding as searching, relating, and collecting relevant information, and ideas for more effective tools.
The document discusses applying collaborative technologies to software development. It outlines the contents, which include introducing collaboration, discussing problems with non-collaborative work, and describing the proposed collaborative application's attributes and capabilities. The document aims to design an architecture that enables easy collaboration between distributed software engineers to reduce costs and improve productivity.
A Review on Software Mining: Current Trends and MethodologiesIJERA Editor
With the evolution of Software Mining, it has enabled to play a crucial role in the day to day activities .By empowering the software with the data mining methods it aids to all the software developers and the managers at all the managerial levels to use it as a tool so that the relative software engineering data (in the form of code, design documents, bug reports) to visualize the project‟s status of evolution and progress. To add on, further all the mining methods and algorithms help to device the models to develop any fault prone real time system for the real world more prior to the testing phase or the evolution phase. Also , in this review paper it will highlight the different methodologies for software mining along with its extension as a tool for fault tolerance and as well as a bibliography with the special prominence on mining the software engineering information.
Open Source Software Survivability Analysis Using Communication Pattern Valid...IOSR Journals
This document proposes a communication validation tool to analyze the communication patterns of open source software developer communities. The tool would calculate metrics like contribution index, community betweenness centrality, and community density for the Apache Qpid open source project. It outlines formulas to measure these metrics from data extracted from emails between developers, such as number of messages sent and received. The metrics are intended to provide insight into developer contributions, the flow of information between developers, and the cohesiveness of the community over time.
Semantically Enriched Knowledge Extraction With Data MiningEditor IJCATR
This document discusses using data mining techniques to extract knowledge from data and representing that knowledge in both human-understandable and machine-understandable formats. It uses an input dataset, applies data mining methods like regression using WEKA and SAS, extracts natural language triples about the results, and generates RDF triples to represent the knowledge in a machine-readable format.
Similar to Mining developer communication data streams (20)
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
2. 14
Computer Science & Information Technology (CS & IT)
between contributors in a development project and examine the artefacts produced. Such
interactions are captured from user comments on work items, which is the primary
communication channel used within the Jazz project. As a result Jazz provides the capability to
extract social network data and link such data to the software project outcomes.
This paper describes an attempt to fully extract the richness available in the IBM Jazz data set by
representing the emergence of develop communication as a data stream as a means of predicting
software build outcomes. Traditional data mining methods and software measurement studies are
tailored to static data environments. These methods are typically not suitable for streaming data
which is a feature of many real-world applications. Software project data is produced
continuously and is accumulated over long periods of time for large systems. The dynamic nature
of software and the resulting changes in software development strategies over time causes
changes in the patterns that govern software project outcomes. This phenomenon has been
recognized in many other domains and is referred to as data evolution, dynamic streaming or
concept drifting. However there has been little research to date that investigates concept drifting
in software development data. Changes in a data stream can evolve slowly or quickly and the
rates of change can be queried within stream-based tools. This paper describes an initial attempt
to fully extract the richness available in the Jazz data set by constructing predictive models to
classify a given build as being either successful or not, using developer communication metrics as
the predictors for a build outcome.
2. BACKGROUND & RELATED WORK
The mining of software repositories involves the extraction of both basic and value-added
information from existing software repositories [4]. The repositories are generally mined to
extract facts by different stakeholders for different purposes. Data mining is becoming
increasingly deployed in software engineering environments [3, 5, 6] and the applications of
mining software repositories include areas as diverse as the development of fault prediction
models [7], impact analysis [8], effort prediction [9, 10], similarity analysis [11] and the
prediction of architectural change [12] to name but a few.
According to Herzig & Zeller [2], Jazz offers huge opportunities for software repository mining
but such usage also comes with a number of challenges. One of the main advantages of Jazz is the
provision of a detailed dataset in which all of the software artefacts are linked to each other in
single repository. This simplifies the process of linking artefacts that exist in different
repositories. To date, much of the work that utilizes Jazz as a repository has focused on the
convenience provided by this linking of artefacts, such as bug reports to specification items, along
with the team communication history. Researchers in this area have focused on areas such as
whether there is an association between team communication and build failure [13] or software
quality in general [14]. Other work has focused on whether it is possible to identify relationships
among requirements, people and software defects [15].
Previous research has investigated the prediction of build outcomes for the Jazz repository by
developing decision models based on the extraction of software metrics from the source code
included in the repository [16] including the modeling of the available data as a data stream in
order to apply data stream mining techniques [17] to facilitate the mining of project data on the
fly to provide rapid just-in-time information to guide software decisions. The research presented
in this paper extends the work of applying data stream mining techniques by considering the role
3. Computer Science & Information Technology (CS & IT)
15
of developer communication metrics in the prediction of build outcomes. The data used in this
work is consistent with previous work [17] in that the developer communication metrics are
extracted from the same builds as were used for extracting software metrics which allows direct
comparison of the predictive power of the two approaches.
3. THE JAZZ REPOSITORY
What makes the Jazz repository unique is that there is full traceability between a wide range of
software artefacts. The Jazz team itself is globally distributed and therefore the existing repository
data provides the opportunity to data mine developer communication, bug databases and version
control systems at the same time. Within the repository each software build may have a number
of work items associated to it. These work items represent various types of units of work and can
represent defects, enhancements and general development tasks. Work items provide traceable
evidence for coordination between people as they can also be commented. In addition to this they
are one of the main channels of communication and collaboration used by contributors of the Jazz
project.
That being said there are, of course, other channels of communications which are not captured by
work items, these include email, on-line chats and face-to-face meetings. Even though these
elements are not captured, exploration of communication on work items offers a non-intrusive
means to explore much of the collaboration that has occurred during the Jazz project. The Jazz
team itself is fairly large, with 66 team areas for approximately 160 contributors that are globally
distributed over various sites across the United States of America, Canada and Europe.
To explore the communication between contributors involved in builds, social network metrics
are derived from the communication networks that are present within work items. Each work
items is able to be commented on and this is the main task-related communication channel for the
Jazz project. This enables contributors to coordinate with each other during the implementation of
a work item. There are many elements, in regards to contributors, of a work item to consider.
This makes the process of constructing a social network a little more challenging. In doing so
some basic assumptions about the data has been made. Work items can have various contributors
assigned to various roles, for example there are creators, modifiers, owners, resolvers, approvers,
commenters and subscribers. For the purposes of this research a social network is constructed
similar to the work presented by Wolf et al. [13].
For each social network constructed, nodes represent contributors involved with a build. A series
of directed edges/links represent the communication flow from one contributor to another. A
build can have any number of work items associated with it. Therefore the social networks
generated at the work item level are required to be propagated to the build level for analysis of its
impact on build success. To do this if a contributor appears within multiple work items that are
associated with a single build, only one node is created to represent that contributor (there are no
duplicate nodes). However additional edges are added to reflect entirely new instances
communication that takes place between contributors. All edges within a network are treated as
unique (there are no duplicate edges). This is because it would threaten the validity of metrics
such as density. For example if a as a network that is fully connected has a density of 1. If there
are edges which represent each individual flow of communication the density metric would no
longer be valid (potentially being greater than 1), which would make comparisons between
networks metrics challenging.
4. 16
Computer Science & Information Technology (CS & IT)
For this research, roles which are used to construct the network nodes include committers of
change sets, creators, commenters and subscribers. Committers of change sets for a build are
presented as node, as they have a direct influence on the result of the build. Creators of a work
item are communicating the work item itself with other members of the team. Commenters are
contributors that are discussing issues about a work item. Subscribers are people who may be
interested on the status of a work item as it has impact on their own work/other modules. In order
to generate the edges between nodes, rules have been implemented to establish connections
between people.
From these elements constructing the social networks for each build, the metrics are calculated
are:
• Social Network Centrality Metrics:
Group In-Degree Centrality, Group Out Degree Centrality, Group InOut-Degree
Centrality, Highest In-Degree Centrality, Highest Out-Degree Centrality
Node Group Betweenness Centrality and Edge Group Betweenness Centrality
Group Markov Centrality
• Structural Hole Metrics:
Effective Size and Efficiency
• Basic Network Metrics:
Density, Sum of vertices and sum of edges
• Additional Basic Count Metrics:
Number of work items the communication metrics were extracted from
Number of change sets associated with those work items
The process of generating the underlying data consisted of first selecting the appropriate builds
for analysis. As the intention was to allow comparison with previous work [17], only builds that
had associated source code were selected. In total this resulted in 199 builds of which 127 builds
were successful and 72 failed. The builds were comprised of 15 nightly builds (incorporating
changes from the local site), 34 integration builds (integrating components from remote sites),
143 continuous builds (regular user builds) and 7 connector Jazz builds. Builds were ordered
chronologically to simulate the emergence of a stream of data over time and then work items
extracted for each build to allow the social network for the build to be constructed.
4. DATA STREAM MINING
Most software repositories are structured that over time the underlying database grows and
evolves resulting in large volumes of data. The data from this perspective arrives in the form of
streams. Data streams are generated continuously and are often time-based. In large and complex
systems the data, arriving in a stream form, takes its toll on resources, particular the need for large
capacity data storage. In some cases it is impossible to store the entire steam, which is the case for
the Jazz repository. This is because streams themselves can be overwhelming. Often in these
cases the data is processed once and then is disposed of.
5. Computer Science & Information Technology (CS & IT)
17
The implications of data stream mining in the context of real-time software artefacts is yet to be
fully explored. Currently there is little research that has explored whether or not stream mining
methods can be used in Software Engineering in general, let alone for predicting software build
outcomes. In large development teams software builds are performed in a local and general sense.
In a local sense developers perform personal builds of their code. In a general sense the entire
system is built (continuous and integration builds). These builds occur regularly within the
software development lifecycle. As there can be a large amount of source code from build to
build, the data and information associated with a build is usually discarded due to system size
constraints. More specifically, in the IBM Jazz repository, whiles there are thousands of builds
performed by developers; only the latest few hundred builds can be retrieved from the repository.
Data stream mining offers a potential solution to provide developers real-time insights into fault
detection, based from source code and communication metrics. In doing so it enables developers
to mitigate risks of potential failure during system development and maintenance and track
evolutions within source code over time.
This work revolves around the use of a data stream mining techniques for the analysis of
developer communication metrics derived from the IBM Jazz repository. For this purpose the
Massive Online Analysis (MOA) software environment was used [29]. Data streams provide
unique opportunities as software development dynamics can be examined and captured through
the incremental construction of models over time that predict project outcome. Two outcomes are
possible: success, or failure. A successful outcome signals that each of the constituent work items
in a project has been built as per the specification and that the items have been integrated with
each other without generating any errors. On the other hand, the failure outcome is caused by one
or more work items malfunctioning and/or errors being generated in the integration process.
Instances within the stream are sorted via the starting date/time property of a software build
(oldest to newest) to simulate software project build processes. Using the Hoeffding tree [18], a
model is built using the first 20 instances for training. Prediction is performed on each of the
remaining 179 instances which are used to incrementally update the model built. Furthermore, as
the outcomes are known in advance, model accuracy can be evaluated on an ongoing basis. This
was possible as we used a static dataset which contained pre-assigned class labels to simulate a
data stream environment. The methods used to mine the simulated data stream are described in
the following section.
4.1 Hoeffding Tree
Decision trees were selected as the machine learning outcome for this research. This choice was
influenced by the fact that the decision tree has proven to be amongst the most accurate of
machine learning algorithms while providing models with a high degree of interpretability.
However, the basic version of the decision tree algorithm in its basic form cannot be deployed in
a data stream environment as it is incapable of incrementally updating its model, a key
requirement in a data stream environment. As such, an incremental version, called the Hoeffding
tree was deployed.
The Hoeffding tree is a commonly used incremental decision tree learner designed to operate in a
data stream environment [19]. Unlike in a static data environment decision tree learners in a data
stream environment are faced with the difficult choice of deciding whether a given decision node
in the tree should be split or not. In making this decision, the information gain measure that drives
6. 18
Computer Science & Information Technology (CS & IT)
this decision needs to take into account not just the instances accumulated in the node so far, but
must also make an assessment of information gain that would result from future, unseen instances
that could navigate down to the node in question from the root node. This issue is resolved
through the use of the Hoeffding bound [20].
The Hoeffding bound is expressed as:
1
ଶ
ඨܴ ln (ߜ )
∈=
2݊
Where R is a random variable of interest, n is the observations and d is a confidence parameter.
Essentially, the Hoeffding bound states that with confidence 1-δ, the population mean of R is at
least r - ∈, where r is the sample mean computed from n observations.
In the context of data mining, the variable R is the information gain measure which ranges from 0
to 1 in value. One key advantage of the bound is that it holds true irrespective of the underlying
data distribution, thus making it more applicable than bounds that assume a certain distribution,
for example the Gaussian distribution.
The Hoeffding tree implementation available from MOA was used and coupled with a concept
drift mechanism called the Adaptive Sliding Window (ADWIN) which was also available from
the MOA environment. Most machine learner algorithms in a data stream environment use fixed
size sliding window widths to incrementally maintain models. Sliding windows offer the
advantage of purging old data while retaining a manageable amount of recent data to update
models. However, while the concept of windows is attractive in the sense that memory
requirements are kept within manageable bounds, fixed sized window are often sub-optimal from
the viewpoint of model accuracy. This is due to the fact that concept change or drift may not align
with window boundaries. When changes occur within a window, all instance before the change
point should be purged leaving the rest of the instances intact for updating the model built so far.
The ADWIN approach has many merits in terms of detecting concept drifts in dynamic data
streams.
4.2 Concept Drift Detection
ADWIN works on the principle of statistical hypothesis testing. It maintains a window consisting
of all instances that have arrived since the last detected change point. In its most basic form, the
arrival of each new instance causes ADWIN to split the current window into two sub-windows,
left and right. The sample means of the data in the two sub-windows are compared under a null
hypothesis H0 that the means across the sub-windows are not significantly different from each
other. If H0 is rejected, concept drift is taken to have occurred and ADWIN shrinks the window
to only include instances in the right sub-window, thus removing instances in the left window
representing the “old” concept. Simultaneously, the Hoeffding tree is updated to remove subtree(s) representing the old or outdated concept.
7. Computer Science & Information Technology (CS & IT)
19
5. EXPERIMENTAL RESULTS
The experimental approach used in this work involves simulating a data stream by stepping
this
through historical data in a sequential manner. The aim is to track key performance aspects of the
predictive model as a function of time as well as also quantifying the level of drift in the features
used by the model that determine build outcomes over the progression of the data stream over
sed
time. This experimentation revealed that the model was robust to concept drift as the overall
classification accuracy recorded a steady increase over time.
Due to the limited size of the data set the default value of grace period for the Hoeffding tree is
lowered from the default 200 instances. At the beginning of this set of experiments various grace
periods were trailed to see whether or not the beginning set of training instances had an effect on
the final classification accuracy. The results indicated that if the grace period is set too high it will
result in a loss of final accuracy, as the initial model built is over fitted to the data. In terms of
results for sections 4.10.1 and 4.10.2 a grace period of 20 was found to generate the highest level
r
of accuracy for the 199 instances. The split confidence is 0.05 and the tie threshold option is set to
0.1.
5.1 Hoeffding Tree Classification
The graph presented in Figure 1 presents the trend of overall classification accuracy for builds
over time using the Hoeffding Tree method for the developer communication metrics. It is
observed that after approximately 100 builds the prediction accuracy begins to stabilize and
improve. This is to be expected because at the start of the training process insufficient instances
exist, resulting in model under-fitting. The final overall prediction accuracy is approximately 63%
fitting.
which is only a nominal improvement from the earlier prediction accuracies which start around
prediction
52%. The overall trend shows that, as more instances are trained, the classification accuracy
steadily improves but does not appears to have the same predictive power as source code metrics
for which the same datastream mining approach produces models that have an overall accuracy of
am
approximately 72% [17]. Figure 2 and Figure 3 show the sensitivity measures for actual
successful and failed builds.
Figure 1. Overall prediction accuracy
8. 20
Computer Science & Information Technology (CS & IT)
Figure 2. Sensitivity measures for successful builds
Figure 3. Sensitivity measures for failed builds
The results shown in Figure 2 and Figure 3 demonstrate that the evolution of the decision tree
model is a complex scenario. Over the duration of the simulated data stream, the proportion of
stream,
successful builds that are correctly classified by the decision tree steadily increases to around
70%., Over the same simulated period the proportion of failed builds that are correctly classified
drops from a very high initial value to around 54%. Clearly the initial value is a result of the lack
of data causing model under-fitting, but the outcomes of the end of simulating the data stream
fitting,
support observations made in previous work [16, 17] that it is significantly more challenging to
identify a failed build than it is a successful one. In this case it appears that the developer
dentify
communication metrics are equally as effective in this regard when compared to source code
metrics [17]. From the false positive data it is clear that there is a significant problem in failed
builds being misclassified as successful builds.
To fully understand the application of the Hoeffding tree approach it is important to analyze the
emergence of the decision tree model, not just the final model itself. By examining Figure 1 it
would seem reasonable to conclude that the minimum number of instances required to develop a
instances
classification tree that is reasonably stable would be around 100 instances. It is at this point that
9. Computer Science & Information Technology (CS & IT)
21
the prediction accuracy starts to stabilize and show a trend to improving asymptotically.
However, an examination of the Hoeffding tree outcomes at this point shows that no actual
decision tree has been generated by the model at this point in time. In fact, the Hoeffding tree
approach has not identified a single feature that has sufficient predictive power to use effectively.
The approach is therefore attempting to classify a new build in the data stream against the
majority taken over all instances and all attribute values. So, for example, if there were 60%
successful builds, then all builds would be labeled success. This is an exceptionally degenerate
case where severe model under-fitting is occurring due to lack of training examples resulting in
no clear predictors. The Hoeffding tree approach identifies an actual decision tree only after 160
builds. This first decision tree identifies only a single attribute against which to classify a given
build and the resulting decision tree is shown in Figure 4.
Figure 4. Decision tree at 160 builds
This decision tree indicates that the metric GroupInOutCentrality has emerged as the only
significant predictor of success and failure. This outcome differs somewhat from previous work
investigating the use of developer communication in predicting build outcomes for the Jazz
repository [13] which indicated that there were no individual metrics that were statistical
significant in terms of predicting outcomes. The leaves of the tree show the predicted outcome
and the numeric values represent the votes used in the majority vote classifier. The value on left
represents the weighted votes for failed builds and the value on the right represented the weighted
votes for successful builds (i.e. failed builds | successful builds). Again, this indicates that there
are a large number of failed builds being mis-classified as successful builds. So whilst it may
appear that the outcomes differ from previous studies [13] there is not sufficient evidence to
suggest that GroupInOutCentrality is a strong indicator of outcomes, particularly for the builds
that would be of most interest, i.e. failed builds.
One of the advantages of the use of the ADWIN approach for concept drift detection and the
result in terms of the Hoeffding tree approach, that results in only detecting and responding to
changes that are statistically significant. After the initial model emerges at 160 builds there are no
significant changes for a further 10 builds. At 180 builds such a change is detected but rather than
see a different model appear it is expected that the model will evolve. The resulting model is
shown in Figure 5.
10. 22
Computer Science & Information Technology (CS & IT)
Figure 5. Decision tree at 180 builds
The addition of EdgeGroupBetweennessCentrality as a new metric has an interesting effect in
that it refines the classification of successful builds only and does not improve the classification
of failed builds at all. Of the 39 builds used in this incremental change, 15 of them are failed
builds that are mis-classified as successful builds by the addition of the new metric. In percentage
terms, the false positive rate for successful builds in these leaves of the tree is 38% which
compares to a false positive rate for successful builds in Figure 4 of 27%. Therefore it is arguable
that the model that has evolved is in fact a worse prediction model than its predecessor because
whilst it has improved classification for successful builds this has been at the cost of a reduced
ability to classify failed builds.
However, such variations are very small to the point of being insignificant and the reduction in
quality of the model may be reversed in the long term as more data is captured.
5.2 Comparison with k-NN Clustering
A full validation of the Hoeffding tree approach by comparing to other methods has not yet been
completed, however an initial comparison to the k-nearest neighbor (k-NN) algorithm has been
undertaken. In this case, the initial 20 builds are excluded from the analysis and the k-NN
algorithm is trained on the remaining 179 builds, of which 116 were successful builds and 63
were failed. The final prediction accuracies of the Hoeffding tree and the k-NN when applied to
communication network metrics are shown in Table 1, where k = 5. The Hoeffding tree has
performed better in terms of overall correctly classified instances for both successful and failed
build outcomes when compared to the k-NN method.
11. Computer Science & Information Technology (CS & IT)
23
Table 1. Comparison of Hoeffding Tree & k-NN (179 instances).
Correctly Classified Instances
Incorrectly Classified Instances
Correctly Classified Instances
Failed Builds
Incorrectly Classified Instances
Overall Accuracy of Prediction
Successful Builds
Hoeffding
Tree
83
33
32
31
64.24%
k-NN
80
36
23
40
57.54%
6. LIMITATIONS & FUTURE WORK
Most of the limitations in the current study are products of the relatively small sample size of
build data from the Jazz project. With only 199 builds available it is difficult to truly identify
significant metrics and evaluate the efficacy of the data stream mining approach. It has been
observed that predicting failure is more challenging than predicting success and that not
predicting failure doesn’t mean that success has been predicted. This is due to the fact that the
build successes and failures overlap in feature space and “failure” signatures have a greater
degree of fragmentation than their “success” counterparts. This overlap is a strong symptom of
the fact that some vital predictors of software build failure have not been captured in the Jazz
repository. This is consistent with previous that utilized source code metrics for build outcome
prediction. It is an open question as to whether any such predictors can indeed be quantified in a
form suitable for use in a machine learning predictive context, however future work will
investigate the combination of software metrics with developer communication metrics.
7. CONCLUSIONS
This paper presents the outcomes of an attempt to predict build success and/or failure for a
software product by modeling the emergence of developer communication as a datastream and
applying datastream mining techniques. Overall prediction accuracies of 63% have been achieved
through the use of the Hoeffding Tree algorithm. This is a lower prediction accuracy than is
obtained when source code metrics are mined as a datastream [17].
This research has presented a potential solution for encoding developer communication metrics as
data streams. In the case of Jazz the data streams would be provided when a software build was
executed, though this study simulated such a datastream from historical data. The real-time
streams can be run against the model which has been generated from software build histories.
From the real-time based predictions developers may delay a build to proactively make changes
on a failed build prediction. One of the advantages of building predictive models using data
stream mining methods is that they do not have large permanent storage requirements.
The results have shown that data stream mining techniques holds much potential as the Jazz
environment, as the platform can continue to store the latest builds without losing relevant
information for a prediction model that has been built over an extended series of (older) software
builds. Future work will investigate the combination of developer communication metrics with
source code metrics [17] into a unified predictive model.
12. 24
Computer Science & Information Technology (CS & IT)
ACKNOWLEDGEMENTS
Our thanks go to IBM for providing access to the Jazz repository and the BuildIT consortium that
has funded this research.
REFERENCES
[1]
[2]
[3]
[4]
[3]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
D. Rodriguez, I. Herraiz, and R. Harrison, "On software engineering repositories and their open
problems," in 2012 First International Workshop on Realizing Artificial Intelligence Synergies in
Software Engineering (RAISE), 2012, pp. 52-56.
K. Herzig and A. Zeller, "Mining the Jazz Repository: Challenges and Opportunities," Mining
Software Repositories MSR '09. 6th IEEE International Working Conference, pp. 159-162, 2009.
T. Nguyen, A. Schröter, and D. Damian, "Mining Jazz: An Experience Report," Infrastructure for
Research in Collaborative Software, pp. 1 - 4, 2009.
I. Keivanloo, C. Forbes, A. Hmood, M. Erfani, C. Neal, G. Peristerakis, and J. Rilling, "A Linked
Data platform for mining software repositories," in Mining Software Repositories (MSR), 2012 9th
IEEE Working Conference on, 2012, pp. 32-35.
T. Xie, S. Thummalapenta, D. Lo, and C. Liu, "Data mining for software engineering," Computer,
vol. 42, pp. 55-62, 2009.
M. Halkidi, D. Spinellis, G. Tsatsaronis, and M. Vazirgiannis, "Data mining in software engineering,"
Intelligent Data Analysis, vol. 15, pp. 413-441, 2011.
T. Xie, J. Pei, and A. E. Hassan, "Mining Software Engineering Data," in Software Engineering Companion, 2007. ICSE 2007 Companion. 29th International Conference on, 2007, pp. 172-173.
O. Vandecruys, D. Martens, B. Baesens, C. Mues, M. De Backer, and R. Haesen, "Mining software
repositories for comprehensible software fault prediction models," Journal of Systems and Software,
vol. 81, pp. 823-839, 2008.
G. Canfora and L. Cerulo, "Impact analysis by mining software and change request repositories," in
Software Metrics, 2005. 11th IEEE International Symposium, 2005, pp. 9 pp.-29.
R. Moser, W. Pedrycz, A. Sillitti, and G. Succi, "A Model to Identify Refactoring Effort during
Maintenance by Mining Source Code Repositories," in Product-Focused Software Process
Improvement. vol. 5089, A. Jedlitschka and O. Salo, Eds., ed: Springer Berlin Heidelberg, 2008, pp.
360-370.
C. Weiss, R. Premraj, T. Zimmermann, and A. Zeller, "How Long Will It Take to Fix This Bug?,"
presented at the Proceedings of the Fourth International Workshop on Mining Software Repositories,
2007.
T. Sager, A. Bernstein, M. Pinzger, and C. Kiefer, "Detecting similar Java classes using tree
algorithms," presented at the Proceedings of the 2006 international workshop on Mining software
repositories, Shanghai, China, 2006.
J. Ratzinger, T. Sigmund, P. Vorburger, and H. Gall, "Mining Software Evolution to Predict
Refactoring," in Empirical Software Engineering and Measurement, 2007. ESEM 2007. First
International Symposium on, 2007, pp. 354-363.
T. Wolf, A. Schroeter, D. Damian, and T. Nguyen, "Predicting build failures using social network
analysis on developer communication," Proceedings of the IEEE International Conference on
Software Engineering (ICSE), Vancouver, 2009.
M. Di Penta, "Mining developers' communication to assess software quality: Promises, challenges,
perils," in Emerging Trends in Software Metrics (WETSoM), 2012 3rd International Workshop on,
2012, pp. 1-1.
H. Park, and Baek, S., "An empirical validation of a neural network model for software effort
estimation," Expert Systems with Applications, vol. 35, pp. 929-937, 2008.
J. Finlay, A. M. Connor, and R. Pears, "Mining Software Metrics from Jazz," in Software Engineering
Research, Management and Applications (SERA), 2011 9th International Conference on, 2011, pp.
39-45.
13. Computer Science & Information Technology (CS & IT)
25
[17] J. Finlay, R. Pears, R. & A.M. Connor “Data stream mining for predicting software build outcomes
using source code metrics”, Information & Software Technology, 2014, 56( 2), 183-198
[18] A. Bifet, G. Holmes, B. Pfahringer, J. Read, P. Kranen, H. Kremer, T. Jansen, and T. Seidl, "MOA: A
Real-Time Analytics Open Source Framework," in Machine Learning and Knowledge Discovery in
Databases. vol. 6913, D. Gunopulos, T. Hofmann, D. Malerba, and M. Vazirgiannis, Eds., ed:
Springer Berlin / Heidelberg, 2011, pp. 617-620.
[19] B. Pfahringer, G. Holmes, and R. Kirkby, "Handling Numeric Attributes in Hoeffding Trees," in
Advances in Knowledge Discovery and Data Mining. vol. 5012, T. Washio, E. Suzuki, K. Ting, and
A. Inokuchi, Eds., ed: Springer Berlin Heidelberg, 2008, pp. 296-307.
[20] W. Hoeffding, "Probability Inequalities for Sums of Bounded Random Variables," Journal of the
American Statistical Association, vol. 58, pp. 13-30, 1963/03/01 1963.
AUTHORS
Andy Connor is a Senior Lecturer in CoLab and has previously worked in the School
of Computing & Mathematical Sciences at AUT. Prior to this he worked as a Senior
Consultant for the INBIS Group on a wide range of systems engineering projects. He
has also worked as a software development engineer and held postdoctoral research
positions at Engineering Design Centres at the University of Cambridge and the
University of Bath
Jacqui Finlay completed her PhD in Computer Science at Auckland University of
Technology, investigating the use of data mining in the use of software engineering
management. Previously she was employed as Senior Systems Architect at GBR
Research ltd.
Russel Pears is a Senior Lecturer in the School of Computing & Mathematical Sciences at AUT, where he
teaches Data Mining and Research methods. He has a strong interest in Machine Learning and is currently
involved in several projects in this area, including classification methods for imbalanced data sets, dynamic
credit scoring methods, contextual search techniques and mining high speed data streams.