Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/MSR.2007.29acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Spam Filter Based Approach for Finding Fault-Prone Software Modules

Published: 20 May 2007 Publication History

Abstract

Because of the increase of needs for spam e-mail detection, the spam filtering technique has been improved as a convenient and effective technique for text mining. We propose a novel approach to detect fault-prone modules in a way that the source code modules are considered as text files and are applied to the spam filter directly. In order to show the applicability of our approach, we conducted experimental applications using source code repositories of Java based open source developments. The result of experiments shows that our approach can classify more than 75% of software modules correctly.

References

[1]
{1} ArgoUML Project. http://argouml.tigris.org/.
[2]
{2} V. R. Basili, L. C. Briand, and W. L. Melo. A validation of object oriented metrics as quality indicators. IEEE Trans. on Software Engineering, 22(10):751-761, 1996.
[3]
{3} S. Chhabra, W. S. Yerazunis, and C. Siefkes. Spam filtering using a markov random field model with variable weighting schemas. In Proc. 4th IEEE International Conference on Data Mining (ICDM 2004), pages 347-350, 2004.
[4]
{4} CRM114 - the Controllable Regex Mutilator. http://crm114.sourceforge.net/.
[5]
{5} S. Diehl, H. Gall, and A. E. Hassan, editors. Proc. 2006 International Workshop on Mining Software Repositories, MSR 2006. ACM, 2006.
[6]
{6} Eclipse Project. http://www.eclipse.org/.
[7]
{7} N. E. Fenton and M. Neil. A critique of software defect prediction models. IEEE Trans. on Software Engineering, 25(5):675-689, 1999.
[8]
{8} T. M. Khoshgoftaar and N. Seliya. Comparative assessment of software quality classification techniques: An empirical study. Empirical Software Engineering, 9:229-257, 2004.
[9]
{9} M. Kubat and S. Matwin. Addressing the curse of imbalanced training sets: One-sided selection. In Proc. 14th Intl Conf. on Machine Learning, pages 179-186, 1997.
[10]
{10} J. C. Munson and T. M. Khoshgoftaar. The detection of fault-prone programs. IEEE Trans. on Software Engineering , 18(5):423-433, 1992.
[11]
{11} J. Sliwerski, T. Zimmermann, and A. Zeller. When do changes induce fixes? (on fridays.). In Proc. 2005 International Workshop on Mining Software Repository, pages 24-28, 2005.

Cited By

View all
  • (2018)Data mining in software engineeringIntelligent Data Analysis10.5555/2010978.201098715:3(413-441)Online publication date: 27-Dec-2018
  • (2016)An Empirical Study on Fault Prediction using Token-Based ApproachProceedings of the International Conference on Advances in Information Communication Technology & Computing10.1145/2979779.2979811(1-7)Online publication date: 12-Aug-2016
  • (2014)A proposed method to evaluate and compare fault predictions across studiesProceedings of the 10th International Conference on Predictive Models in Software Engineering10.1145/2639490.2639504(2-11)Online publication date: 17-Sep-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories
May 2007
186 pages
ISBN:076952950X

Sponsors

Publisher

IEEE Computer Society

United States

Publication History

Published: 20 May 2007

Check for updates

Qualifiers

  • Article

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Data mining in software engineeringIntelligent Data Analysis10.5555/2010978.201098715:3(413-441)Online publication date: 27-Dec-2018
  • (2016)An Empirical Study on Fault Prediction using Token-Based ApproachProceedings of the International Conference on Advances in Information Communication Technology & Computing10.1145/2979779.2979811(1-7)Online publication date: 12-Aug-2016
  • (2014)A proposed method to evaluate and compare fault predictions across studiesProceedings of the 10th International Conference on Predictive Models in Software Engineering10.1145/2639490.2639504(2-11)Online publication date: 17-Sep-2014
  • (2013)Creating Process-Agents incrementally by mining process asset libraryInformation Sciences: an International Journal10.1016/j.ins.2012.12.052233(183-199)Online publication date: 1-Jun-2013
  • (2008)Mining software repositories for software change impact analysisProceedings of the 23rd Brazilian symposium on Databases10.5555/1498932.1498953(210-223)Online publication date: 13-Oct-2008
  • (2008)An extension of fault-prone filtering using precise training and a dynamic thresholdProceedings of the 2008 international working conference on Mining software repositories10.1145/1370750.1370772(89-98)Online publication date: 10-May-2008
  • (2007)Training on errors experiment to detect fault-prone software modules by spam filterProceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering10.1145/1287624.1287683(405-414)Online publication date: 7-Sep-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media