Risk Analysis Based On Design Version Control Data

被引:1
|
作者
Gal, Raviv [1 ]
Shurek, Gil [1 ]
Simchoni, Giora [1 ]
Ziv, Avi [1 ]
机构
[1] IBM Res, Haifa, Israel
关键词
D O I
10.1109/mlcad48534.2019.9142105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Early identification of areas that are at-risk in a design under development can help design and verification teams take early preventive and corrective measures. We propose a novel system that predicts which files are at risk of being buggy. Our simple, machine learning-based, regression system receives data from various sources, including the version control and defect tracking tools. After automatically labeling historic data and training sets, the system predicts the risk level of each file. Experimental results show that the proposed system has fairly high positive precision and recall and that its predictions are better than trivial predictions, such as files that recently changed or had bugs.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] FAULT SENSITIVITY ANALYSIS OF DATA FEEDBACK CONTROL DESIGN BASED ON MULTIOBJECTIVE OPTIMIZATION
    Kim, Young-Man
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, 2016, VOL. 4A, 2017,
  • [2] Analysis and design of a linear input/output data-based predictive control
    Song, IH
    Yoo, KY
    Rhee, HK
    [J]. INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 2001, 40 (20) : 4292 - 4301
  • [3] Design of Group Enterprise Financial Risk Control System Based on Big Data Clustering Algorithm
    Jiang, Min
    [J]. Engineering Intelligent Systems, 2023, 31 (03): : 183 - 193
  • [4] A novel predicated data flow analysis based memory design for data and control intensive multimedia applications
    Sudarsanam, A
    Panchanathan, S
    [J]. EMBEDDED PROCESSORS FOR MULTIMEDIA AND COMMUNICATIONS II, 2005, 5683 : 64 - 71
  • [5] Big Data Information Security Risk Framework Design and Countermeasures Based on DDoS Analysis
    Li Yuxiang
    Zhang Haitao
    Bo Jingyi
    Shen Nan
    Wang Zhenyu
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1517 - 1520
  • [6] Component Based Design Data Version Management and Visualization in IMS-DATE
    Cui, D. L.
    Feng, G. Q.
    [J]. IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1529 - +
  • [7] Computer security economics based on risk analysis of multilevel authentication design for access control
    Gaol, Ford Lumban
    [J]. WSEAS Transactions on Information Science and Applications, 2011, 8 (11): : 417 - 429
  • [8] Research on version storage control strategy in collaborative design system based on STEP
    Chen, Jiaxin
    Fu, Ximei
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 296 - 300
  • [9] Design and Analysis of Data-Driven Learning Control: An Optimization-Based Approach
    Meng, Deyuan
    Zhang, Jingyao
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (10) : 5527 - 5541
  • [10] Enterprise Financial Risk Prevention and Control and Data Analysis Method Based on Blockchain Technology
    Liu, Julin
    Chen, Ken
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022