Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1858996.1859027acmconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
poster

Text mining in supporting software systems risk assurance

Published: 20 September 2010 Publication History

Abstract

Insufficient risk analysis often leads to software system design defects and system failures. Assurance of software risk documents aims to increase the confidence that identified risks are complete, specific, and correct. Yet assurance methods rely heavily on manual analysis that requires significant knowledge of historical projects and subjective, perhaps biased judgment from domain experts. To address the issue, we have developed RARGen, a text mining-based approach based on well-established methods aiming to automatically create and maintain risk repositories to identify usable risk association rules (RARs) from a corpus of risk analysis documents. RARs are risks that have frequently occurred in historical projects. We evaluate RARGen on 20 publicly available e-service projects. Our evaluation results show that RARGen can effectively reason about RARs, increase confidence and cost-effectiveness of risk assurance, and support difficult-to-perform activities such as assuring complete-risk identification.

References

[1]
}}B. W. Boehm, "Software Risk Management: Principles and Practice". IEEE Software, 8(1): 32--41.
[2]
}}N. Leveson, Safeware System Safety and Computers, Addison-Wesley, 1995.
[3]
}}Stemming: http://www.tartarus.org/martin/PorterStemmer/
[4]
}}J. B. MacQueen: "Some Methods for classification and Analysis of Multivariate Observations," Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, UC Berkley Press, 1:281--297, 1967.
[5]
}}S. C. Deerwester, S. T. Dumais, T. K. Landauer, G. W. Furnas, and R. A. Harshman. "Indexing by latent semantic analysis" Journal of the American Society of Information Science, 41(6):391--407, 1990.
[6]
}}T. Landauer, P. Foltz, and D. Laham, Introduction to Latent Semantic Analysis, Discourse Processes, 25:259--284, 1998.
[7]
}}G. Grahne, J. Zhu, "Efficiently using prefix-trees in mining frequent itemsets", In Proc. 1st IEEE ICDM Workshop on Frequent Itemset Mining Implementations, 2003.
[8]
}}R. Lutz, C. Mikulski. "Operational anomalies as a cause of safety-critical requirements evolution", Journal of Systems and Software, 65(2):155--161, 2003.
[9]
}}D. Carney, E. Morris, and P. Place, "Identifying Commercial Off-the-Shelf (COTS) Product Risks: The COTS Usage Risk Evaluation", TECHNICAL REPORT. CMU/SEI-2003-TR-023. September 2003.
[10]
}}Ron. Kohavi, "A study of cross-validation and bootstrap for accuracy estimation and model selection", Proc. of the 14th International Joint Conference on Artificial Intelligence 2 (12): 1137--1143, 1995.

Cited By

View all
  • (2022)An extended study on applicability and performance of homogeneous cross-project defect prediction approaches under homogeneous cross-company effort estimation situationEmpirical Software Engineering10.1007/s10664-021-10103-427:2Online publication date: 27-Jan-2022
  • (2020)An exploratory study on applicability of cross project defect prediction approaches to cross-company effort estimationProceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering10.1145/3416508.3417118(71-80)Online publication date: 8-Nov-2020
  • (2018)Predicting Delivery Capability in Iterative Software DevelopmentIEEE Transactions on Software Engineering10.1109/TSE.2017.269398944:6(551-573)Online publication date: 1-Jun-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASE '10: Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering
September 2010
534 pages
ISBN:9781450301169
DOI:10.1145/1858996
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. association rule
  2. latent semantic analysis
  3. mining software repositories
  4. risk assurance
  5. risk reduction
  6. text mining

Qualifiers

  • Poster

Conference

ASE10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 82 of 337 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)An extended study on applicability and performance of homogeneous cross-project defect prediction approaches under homogeneous cross-company effort estimation situationEmpirical Software Engineering10.1007/s10664-021-10103-427:2Online publication date: 27-Jan-2022
  • (2020)An exploratory study on applicability of cross project defect prediction approaches to cross-company effort estimationProceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering10.1145/3416508.3417118(71-80)Online publication date: 8-Nov-2020
  • (2018)Predicting Delivery Capability in Iterative Software DevelopmentIEEE Transactions on Software Engineering10.1109/TSE.2017.269398944:6(551-573)Online publication date: 1-Jun-2018
  • (2017)Global vs. local models for cross-project defect predictionEmpirical Software Engineering10.1007/s10664-016-9468-y22:4(1866-1902)Online publication date: 1-Aug-2017
  • (2015)Characterization and prediction of issue-related risks in software projectsProceedings of the 12th Working Conference on Mining Software Repositories10.5555/2820518.2820552(280-291)Online publication date: 16-May-2015
  • (2015)Characterization and Prediction of Issue-Related Risks in Software Projects2015 IEEE/ACM 12th Working Conference on Mining Software Repositories10.1109/MSR.2015.33(280-291)Online publication date: May-2015
  • (2014)Textual risk mining for maritime situational awareness2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)10.1109/CogSIMA.2014.6816558(167-173)Online publication date: Mar-2014
  • (2013)Beyond data mining; towards "idea engineering"Proceedings of the 9th International Conference on Predictive Models in Software Engineering10.1145/2499393.2499401(1-6)Online publication date: 9-Oct-2013
  • (2013)Text-Driven Multi-structured Data Analytics for Enterprise IntelligenceProceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 0310.1109/WI-IAT.2013.186(213-220)Online publication date: 17-Nov-2013
  • (2011)Experiences with text mining large collections of unstructured systems development artifacts at jplProceedings of the 33rd International Conference on Software Engineering10.1145/1985793.1985891(701-710)Online publication date: 21-May-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media