On the Use of Stack Traces to Improve Text Retrieval-based Bug Localization

被引:75
作者
Moreno, Laura [1 ]
Treadway, John Joseph
Marcus, Andrian
Shen, Wuwei
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
来源
2014 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME) | 2014年
关键词
bug localization; stack traces; static analysis; text retrieval; INFORMATION-RETRIEVAL; FEATURE LOCATION; EXECUTION;
D O I
10.1109/ICSME.2014.37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many bug localization techniques rely on Text Retrieval (TR) models. The most successful approaches have been proven to be the ones combining TR techniques with static analysis, dynamic analysis, and/or software repositories information. Dynamic software analysis and software repositories mining bring a significant overhead, as they require instrumenting and executing the software, and analyzing large amounts of data, respectively. We propose a new static technique, named Lobster (LOcating Bugs using Stack Traces and tExt Retrieval), which is meant to improve TR-based bug localization without the overhead associated with dynamic analysis and repository mining. Specifically, we use the stack traces submitted in a bug report to compute the similarity between their code elements and the source code of a software system. We combine the stack trace based similarity and the textual similarity provided by TR techniques to retrieve code elements relevant to bug reports. We empirically evaluated Lobster using 155 bug reports containing stack traces from 14 open source software systems. We used Lucene, an optimized version of VSM, as baseline of comparison. The results show that, in average, Lobster improves or maintains the effectiveness of Lucene-based bug localization in 82% of the cases.
引用
收藏
页码:151 / 160
页数:10
相关论文
共 30 条
  • [1] ALI N, 2012, P 12 INT WORK C SOUR
  • [2] [Anonymous], 2000, HDB PARAMETRIC NONPA
  • [3] [Anonymous], 2004, Lucene in Action
  • [4] Bassett B, 2013, CONF PROC INT SYMP C, P133, DOI 10.1109/ICPC.2013.6613841
  • [5] Bettenburg N., 2008, P 5 INT WORK C MIN S
  • [6] BIGGERSTAFF TJ, 1993, PROC INT CONF SOFTW, P482, DOI 10.1109/ICSE.1993.346017
  • [7] Latent Dirichlet allocation
    Blei, DM
    Ng, AY
    Jordan, MI
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) : 993 - 1022
  • [8] Case study of feature location using dependence graph
    Chen, KR
    Rajlich, V
    [J]. 8TH INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION (IWPC 2000), PROCEEDINGS, 2000, : 241 - 249
  • [9] Comparing text-based and dependence-based approaches for determining the origins of bugs
    Davies, Steven
    Roper, Marc
    Wood, Murray
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2014, 26 (01) : 107 - 139
  • [10] DAVIS S, 2013, P IEEE INT S SOFTW R, P123