Software Process Extraction and Identification
نویسندگان
چکیده
Industrial software is planned, managed, and created using a variety of approaches: sometimes a formal Software Development Life-cycle (SDLC) model is used, sometimes an approach that is less formal but has clearly identifiable stages is employed, and sometimes little if any discernible process is followed. In this paper, we extract and correlate the software development process with behaviour and data found within a project’s source control repository. We do so by analyzing fine grained changes, revisions, and aggregations of revisions, so that we can correlate them with the stage of the software development process that the project was in at the time they were made. To label intervals of revisions we use machine learning and artificial intelligence techniques including N-Nearest Neighbours classifiers, Markov models, Hidden Markov Models, Markov Decision Processes and Partially Observable Markov Decision Processes. These techniques initially learn the stages from annotated data and then classify unknown data. We describe how to pose the problem using these tools and we evaluate their effectiveness on several case studies.
منابع مشابه
Extraction, Identification and Thermal Stability of Anthocyanins from Eggplant Peel as a Natural Colorant
In the present study, various mixtures of aqueous ethanol and acetone solutions were utilized to extract anthocyanins from eggplant peel by a discontinuous process to obtain a natural red-purple colorant. First, the most appropriate combination for extraction solvent was selected as ethanol 70 wt in water acidified with acetic acid 3 wt, which was determined by analysis of extraction yields and...
متن کاملIsolation and identification of native sulfuroxidizing bacterium capable of uranium extraction
Bioleaching is the extraction of metals from their ores through the use of microorganisms. Inthis process, the use of native bacteria leads to achieve more yields of metals. So, in the presentstudy, native sulfur-oxidizing bacterium in potentiality of uranium extraction was isolated fromGhachin mine in Iran and identified by partial gene sequencing. For this purpose, the watersamples were colle...
متن کاملDesigning volleyball talent identification software based on fuzzy logic
Using appropriate devices and scientific methods by coaches and trainers can accelerate the process of sport talent identification and development, and could also provide condition in which capable athletes to be directed in to suitable sport according to their abilities and skills. Former researches in scope of sport talent identification usually have been done in order to determine or normali...
متن کاملMedicinal Herb Extraction Strategy - A Solvent Selection and Extraction Method Study
Abstract Medicinal herbs have a long history of use in improving human health and curing diseases. Herbal materials are naturally an excellent medicine library because they provide unlimited components with complex chemical structures and a wide range of bioactivities. Herbal materials have thus attracted wide interest of researchers in the identification of the active components and verificati...
متن کاملAspect Extraction from Software Design Model
Aspect-Oriented programming was introduced by Gregor Kiczales in 1997 to handle concerns that could not be fully separated via Object-Oriented programming, which are called crosscutting concerns. Traditionally, aspect-oriented software development has focused on the software life cycle’s implementation phase: developers identify and capture aspects mainly in code. But aspects are evident earlie...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کامل