The Community for Technology Leaders
RSS Icon
Issue No.08 - August (2009 vol.42)
pp: 55-62
Suresh Thummalapenta , North Carolina State University
David Lo , Singapore Management University
Chao Liu , Microsoft Research
To improve software productivity and quality, software engineers are increasingly applying data mining algorithms to various software engineering tasks. However, mining SE data poses several challenges. The authors present various algorithms to effectively mine sequences, graphs, and text from such data.
Data mining, Software engineering, Design and test, Computational intelligence
Suresh Thummalapenta, David Lo, Chao Liu, "Data Mining for Software Engineering", Computer, vol.42, no. 8, pp. 55-62, August 2009, doi:10.1109/MC.2009.256
1. J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann, 2000.
2. M. Acharya et al., "Mining API Patterns as Partial Orders from Source Code: From Usage Scenarios to Specifications," Proc. 6th Joint Meeting European Software Eng. Conf. and ACM SIGSOFT Symp. Foundations of Software Eng. (ESEC-FSE 07), ACM Press, 2007, pp. 25-34.
3. D. Lo, S-C. Khoo, and C. Liu, "Efficient Mining of Iterative Patterns for Software Specification Discovery," Proc. 13th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD 07), ACM Press, 2007, pp. 460-469.
4. D. Lo et al., "Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD 09), ACM Press, 2009, pp. 557-566.
5. D. Lo, S-C. Khoo, and C. Liu, "Mining Temporal Rules for Software Maintenance," J. Software Maintenance and Evolution: Research and Practice, July 2008, pp. 227-247.
6. D. Lo, S-C. Khoo, and C. Liu, "Mining Past-Time Temporal Rules: A Dynamic Analysis Approach," Artificial Intelligence Applications for Improved Software Eng. Development: New Prospects, F. Mezaine, and S. Vadera eds., IGI Global, 2009, Chap. 13, pp. 259-277.
7. D. Lo, and S. Maoz, "Mining Scenario-Based Triggers and Effects," Proc. 23rd IEEE/ACM Int'l Conf. Automated Software Eng. (ASE 08), IEEE Press, 2008, pp. 109-118.
8. D. Lo and S-C. Khoo, "SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner," Proc. 14th ACM SIGSOFT Int'l Symp. Foundations on Software Eng. (FSE 06), ACM Press, 2006, pp. 265-275.
9. S. Thummalapenta and T. Xie, "Mining Exception-Handling Rules as Sequence Association Rules," Proc. 31st Int'l Conf. Software Eng. (ICSE 09), ACM Press, 2009, pp. 496-506.
10. R-Y. Chang, A. Podgurski, and J. Yang, "Finding What's Not There: A New Approach to Revealing Neglected Conditions in Software," Proc. 2007 Int'l Symp. Software Testing and Analysis (ISSTA 07), ACM Press, 2007, pp. 163-173.
11. H. Cheng et al., "Identifying Bug Signatures Using Discriminative Graph Mining," Proc. 2009 Int'l Symp. Software Testing and Analysis (ISSTA 09), ACM Press, 2009, pp. 141-152.
12. C. Liu et al., "Mining Behavior Graphs for 'Backtrace' of Noncrashing Bugs," Proc. SIAM Int'l Data Mining Conf. (SDM 05), Soc. for Industrial and Applied Mathematics, 2005, pp. 286-297.
13. X. Wang et al., "An Approach to Detecting Duplicate Bug Reports Using Natural Language and Execution Information," Proc. 30th Int'l Conf. Software Eng. (ICSE 08), ACM Press, 2008, pp. 461-470.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool