Threats to validity in search-based predictive modelling for software engineering

被引:10
|
作者
Malhotra, Ruchika [1 ]
Khanna, Megha [1 ,2 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Discipline Software Engn, Delhi, India
[2] Univ Delhi, Sri Guru Gobind Singh Coll Commerce, Delhi, India
关键词
software quality; software maintenance; project management; software reliability; search-based predictive modelling; software engineering; software product; development effort; change; defect proneness; weak areas; software project managers; project resources; weak parts; search-based approaches; SBAs; software prediction models; practical SPMs; maintainability; change-proneness; common threats; quality software products; software attributes; GENETIC ALGORITHM; DEFECT PREDICTION; EVOLUTIONARY ALGORITHMS; FEATURE-SELECTION; TABU SEARCH; CLASSIFICATION; OPTIMIZATION; ACCURACY; PROJECTS; NETWORK;
D O I
10.1049/iet-sen.2018.5143
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A number of studies in the literature have developed effective models to address prediction tasks related to a software product such as estimating its development effort, or its change/defect proneness. These predictions are critical as they help in identifying weak areas of a software product and thus guide software project managers in effective allocation of project resources to these weak parts. Such practices assure good quality software products. Recently, the use of search-based approaches (SBAs) for developing software prediction models (SPMs) has been successfully explored by a number of researchers. However, in order to develop effective and practical SPMs it is imperative to analyse various sources of threats. This study extensively reviews 93 primary studies, which use SBAs for developing SPMs of four commonly used software attributes (effort, defect-proneness, maintainability and change-proneness) in order to discuss and identify the various sources of threats while using these approaches for SPMs. The study also lists various actions that may be taken in order to minimise these threats. Furthermore, best practice examples in literature and the year-wise trends of threats indicating the most common threats missed by researchers are provided to help academicians and practitioners in designing effective studies for developing SPMs using SBAs.
引用
收藏
页码:293 / 305
页数:13
相关论文
共 50 条
  • [1] Search-Based Predictive Modelling for Software Engineering: How Far Have We Gone?
    Sarro, Federica
    [J]. SEARCH-BASED SOFTWARE ENGINEERING, SSBSE 2019, 2019, 11664 : 3 - 7
  • [2] Search-based software engineering
    Gutjahr, Walter J.
    Harman, Mark
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (10) : 3049 - 3051
  • [3] Search-based software engineering
    Harman, M
    Jones, BF
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2001, 43 (14) : 833 - 839
  • [4] Common Threats to Software Quality Predictive Modeling Studies Using Search-based Techniques
    Malhotra, Ruchika
    Khanna, Megha
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 554 - 560
  • [5] Special Issue on Search-Based Software Engineering
    Sarro, Federica
    Kessentini, Marouane
    Deb, Kalayanmoy
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2018, 22 (03) : 333 - 333
  • [6] Search-based software engineering for maintenance and reengineering
    Harman, Mark
    [J]. 10th European Conference on Software Maintenance and Reengineering, Proceedings, 2006, : 309 - 309
  • [7] Guest editorial: Search-based software engineering
    Gordon Fraser
    Jerffeson Teixeira de Souza
    [J]. Empirical Software Engineering, 2014, 19 : 1421 - 1422
  • [8] A Watershed Moment for Search-Based Software Engineering
    Ozkaya, Ipek
    [J]. IEEE SOFTWARE, 2021, 38 (04) : 3 - 6
  • [9] Guest Editorial: Search-Based Software Engineering
    Harman, Mark
    [J]. IET SOFTWARE, 2018, 12 (04) : 291 - 292
  • [10] Guest editorial: Search-based software engineering
    Fraser, Gordon
    de Souza, Jerffeson Teixeira
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2014, 19 (05) : 1421 - 1422