Trends in Software Engineering Processes using Deep Learning: A Systematic Literature Review

被引:17
作者
Fernandez Del Carpio, Alvaro [1 ]
Bermon Angarita, Leonardo [2 ]
机构
[1] Univ La Salle, Software Engn Dept, Arequipa, Peru
[2] Univ Nacl Colombia, Comp Dept, Manizales, Colombia
来源
2020 46TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2020) | 2020年
关键词
Deep Learning; Machine Learning; Software Processes; Systematic Review;
D O I
10.1109/SEAA51224.2020.00077
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, several researchers have applied machine learning techniques to several knowledge areas achieving acceptable results. Thus, a considerable number of deep learning models are focused on a wide range of software processes. This systematic review investigates the software processes supported by deep learning models, determining relevant results for the software community. This research identified that the most extensively investigated sub-processes are software testing and maintenance. In such sub-processes, deep learning models such as CNN, RNN, and LSTM are widely used to process bug reports, malware classification, libraries and commits recommendations generation. Some solutions are oriented to effort estimation, classify software requirements, identify GUI visual elements, identification of code authors, the similarity of source codes, predict and classify defects, and analyze bug reports in testing and maintenance processes.
引用
收藏
页码:445 / 454
页数:10
相关论文
共 55 条
[1]   Code authorship identification using convolutional neural networks [J].
Abuhamad, Mohammed ;
Rhim, Ji-su ;
AbuHmed, Tamer ;
Ullah, Sana ;
Kang, Sanggil ;
Nyang, DaeHun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 :104-115
[2]   Compilation Error Repair: For the Student Programs, From the Student Programs [J].
Ahmed, Umair Z. ;
Kumar, Pawan ;
Karkare, Amey ;
Kar, Purushottam ;
Gulwani, Sumit .
2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-SEET), 2018, :78-87
[3]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[4]   Bad Smell Detection Using Machine Learning Techniques: A Systematic Literature Review [J].
Al-Shaaby, Ahmed ;
Aljamaan, Hamoud ;
Alshayeb, Mohammad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :2341-2369
[5]   Generating Pseudo-Code from Source Code Using Deep Learning [J].
Alhefdhi, Abdulaziz ;
Dam, Hoa Khanh ;
Hata, Hideaki ;
Ghose, Aditya .
2018 25TH AUSTRALASIAN SOFTWARE ENGINEERING CONFERENCE (ASWEC), 2018, :21-25
[6]  
Nguyen AT, 2018, 2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), P323, DOI 10.1109/SANER.2018.8330220
[7]  
Phan AV, 2017, 2017 21ST ASIA PACIFIC SYMPOSIUM ON INTELLIGENT AND EVOLUTIONARY SYSTEMS (IES), P37, DOI 10.1109/IESYS.2017.8233558
[8]  
Bourque Pierre, 2014, SWEBOK: Guide to the Software Engineering Body of Knowledge
[9]  
CASP, 2019, CRITICAL APPRAISAL S
[10]   Tools in Mining Software Repositories [J].
Chaturvedi, K. K. ;
Singh, V. B. ;
Singh, Prashast .
PROCEEDINGS OF THE 2013 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2013), 2013, :89-98