Software Process Extraction and Identification

نویسندگان

  • Abram Hindle
  • Michael W. Godfrey
  • Richard C. Holt
چکیده

Industrial software is planned, managed, and created using a variety of approaches: sometimes a formal Software Development Life-cycle (SDLC) model is used, sometimes an approach that is less formal but has clearly identifiable stages is employed, and sometimes little if any discernible process is followed. In this paper, we extract and correlate the software development process with behaviour and data found within a project’s source control repository. We do so by analyzing fine grained changes, revisions, and aggregations of revisions, so that we can correlate them with the stage of the software development process that the project was in at the time they were made. To label intervals of revisions we use machine learning and artificial intelligence techniques including N-Nearest Neighbours classifiers, Markov models, Hidden Markov Models, Markov Decision Processes and Partially Observable Markov Decision Processes. These techniques initially learn the stages from annotated data and then classify unknown data. We describe how to pose the problem using these tools and we evaluate their effectiveness on several case studies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extraction, Identification and Thermal Stability of Anthocyanins from Eggplant Peel as a Natural Colorant

In the present study, various mixtures of aqueous ethanol and acetone solutions were utilized to extract anthocyanins from eggplant peel by a discontinuous process to obtain a natural red-purple colorant. First, the most appropriate combination for extraction solvent was selected as ethanol 70 wt in water acidified with acetic acid 3 wt, which was determined by analysis of extraction yields and...

متن کامل

Isolation and identification of native sulfuroxidizing bacterium capable of uranium extraction

Bioleaching is the extraction of metals from their ores through the use of microorganisms. Inthis process, the use of native bacteria leads to achieve more yields of metals. So, in the presentstudy, native sulfur-oxidizing bacterium in potentiality of uranium extraction was isolated fromGhachin mine in Iran and identified by partial gene sequencing. For this purpose, the watersamples were colle...

متن کامل

Designing volleyball talent identification software based on fuzzy logic

Using appropriate devices and scientific methods by coaches and trainers can accelerate the process of sport talent identification and development, and could also provide condition in which capable athletes to be directed in to suitable sport according to their abilities and skills. Former researches in scope of sport talent identification usually have been done in order to determine or normali...

متن کامل

Medicinal Herb Extraction Strategy - A Solvent Selection and Extraction Method Study

Abstract Medicinal herbs have a long history of use in improving human health and curing diseases. Herbal materials are naturally an excellent medicine library because they provide unlimited components with complex chemical structures and a wide range of bioactivities. Herbal materials have thus attracted wide interest of researchers in the identification of the active components and verificati...

متن کامل

Aspect Extraction from Software Design Model

Aspect-Oriented programming was introduced by Gregor Kiczales in 1997 to handle concerns that could not be fully separated via Object-Oriented programming, which are called crosscutting concerns. Traditionally, aspect-oriented software development has focused on the software life cycle’s implementation phase: developers identify and capture aspects mainly in code. But aspects are evident earlie...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006