A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model

被引:14
|
作者
Li, Biwen [1 ]
Shen, Beijun [1 ]
Wang, Jun [1 ]
Chen, Yuting [1 ]
Zhang, Tao [2 ]
Wang, Jinshuang [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Software, Shanghai 200030, Peoples R China
[2] PLA Univ Sci & Technol, Inst Command Informat Syst, Nanjing, Jiangsu, Peoples R China
关键词
Defect Prediction; Scenario; Software Clustering; C4.5; Model; ENSEMBLE; METRICS; FAULTS;
D O I
10.1109/COMPSAC.2014.64
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Defect prediction approaches use software metrics and fault data to learn which software properties are associated with what kinds of software faults in programs. One trend of existing techniques is to predict the software defects in a program construct (file, class, method, and so on) rather than in a specific function scenario, while the latter is important for assessing software quality and tracking the defects in software functionalities. However, it still remains a challenge in that how a functional scenario is derived and how a defect prediction technique should be applied to a scenario. In this paper, we propose a scenario-based approach to defect prediction using compressed C4.5 model. The essential idea of this approach is to use a k-medoids algorithm to cluster functions followed by deriving functional scenarios, and then to use the C4.5 model to predict the fault in the scenarios. We have also conducted an experiment to evaluate the scenario-based approach and compared it with a file-based prediction approach. The experimental results show that the scenario-based approach provides with high performance by reducing the size of the decision tree by 52.65% on average and also slightly increasing the accuracy.
引用
收藏
页码:406 / 415
页数:10
相关论文
共 50 条
  • [21] Intrusion Detection Model Based on TF.IDF and C4.5 Algorithms
    Awadh, Khaldoon
    Akbas, Ayhan
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2021, 24 (04): : 1691 - 1698
  • [22] Parameter determination and feature selection for C4.5 algorithm using scatter search approach
    Lin, Shih-Wei
    Chen, Shih-Chieh
    [J]. SOFT COMPUTING, 2012, 16 (01) : 63 - 75
  • [23] Parameter determination and feature selection for C4.5 algorithm using scatter search approach
    Shih-Wei Lin
    Shih-Chieh Chen
    [J]. Soft Computing, 2012, 16 : 63 - 75
  • [24] Scenario-based verification in presence of variability using a synchronous approach
    JeanVivienMILLO
    FrdricMALLET
    AnthonyCOADOU
    SRAMESH
    [J]. Frontiers of Computer Science, 2013, 7 (05) - 672
  • [25] A scenario-based approach to protocol design using evolutionary techniques
    Araújo, SG
    Mesquita, AC
    Pedroza, ACP
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, 2004, 3005 : 178 - 187
  • [26] Scenario-based verification in presence of variability using a synchronous approach
    Millo, Jean-Vivien
    Mallet, Frederic
    Coadou, Anthony
    Ramesh, S.
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (05) : 650 - 672
  • [27] Scenario-based verification in presence of variability using a synchronous approach
    Jean-Vivien Millo
    Frédéric Mallet
    Anthony Coadou
    S. Ramesh
    [J]. Frontiers of Computer Science, 2013, 7 : 650 - 672
  • [28] Trust Based Secure Friend Recommendation System for OSN Using C4.5
    Jadhav, Pooja
    Barkade, V. M.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [29] Formal Modeling of C. elegans development: A scenario-based approach
    Kam, N
    Harel, D
    Kugler, H
    Marelly, R
    Pnueli, A
    Hubbard, EJA
    Stern, MJ
    [J]. COMPUTATIONAL METHODS IN SYSTEMS BIOLOGY, PROCEEDINGS, 2003, 2602 : 4 - 20
  • [30] Discrimination of Particle-Initiated Defects in Gas-Insulated System Using C4.5 Algorithm
    Budiman, Firmansyah Nur
    Wahyuni, Elvira Sukma
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 191 - 196