Open Access   Article Go Back

BUG TRACING

S.Keerthika 1 , V.Geetha 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 62-66, May-2015

Online published on May 30, 2015

Copyright © S.Keerthika , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Keerthika , V.Geetha , “BUG TRACING,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.62-66, 2015.

MLA Style Citation: S.Keerthika , V.Geetha "BUG TRACING." International Journal of Computer Sciences and Engineering 3.5 (2015): 62-66.

APA Style Citation: S.Keerthika , V.Geetha , (2015). BUG TRACING. International Journal of Computer Sciences and Engineering, 3(5), 62-66.

BibTex Style Citation:
@article{_2015,
author = {S.Keerthika , V.Geetha },
title = {BUG TRACING},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {62-66},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=479},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=479
TI - BUG TRACING
T2 - International Journal of Computer Sciences and Engineering
AU - S.Keerthika , V.Geetha
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 62-66
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2456 2340 downloads 2385 downloads
  
  
           

Abstract

Affording to the current setting, open foundation programs revolt is attaining motion in information system epoch. In the arena of program skill, the open foundation programs cannot be overlooked. The thinking overdue open foundation ranges towards superiority and proficiency. In Open Foundation Program growth there is a communal considerate between open foundation Programmers, correspondents and managers that professionally progresses the product quality. However superiority and adeptness of Open foundation programs be contingent upon the bug’s contemporary in the merchandise. Thus considerate and following of organization is energetic development. In Open foundation programs progress tracing of bug is most significant period. Bug Tracing scheme plays an important role in hunting of bugs. Bug succeeding system contains the large amount of substantial about the bug in open foundation programs. Signifying a good bug tracing system for any merchandise will escalation efficiency of program. So we examined the remaining bug tracing classification and find out the restrictions. Later we suggested the framework for bug tracing system based on the restrictions originated in existing bug tracing system.

Key-Words / Index Term

Open foundation programs, Bug tracing system, Bug Report, Bugs, Programmers, Reporter

References

[1] Van Hentenryck, P., “Modularity in Logic Programming”, Publisher : MIT Press Edition : 1 Pages : 15 – 17.
[2] Jann, J. ; IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA ; Dubey, N. ; Burugula, R.S. ; Pattnaik, P., “AHAFS subsystem for enhancing operating system health in the cloud computing era”, Published in: IBM Journal of Research and Development (Volume:54 , Issue: 5 ) Page(s): 6:1 - 6:11.
[3] Tobbicke, R. ; CERN, Geneva, Switzerland, “Distributed file systems: focus on Andrew File System/Distributed File Service (AFS/DFS)”, Published in: Mass Storage Systems, 1994. 'Towards Distributed Storage and Data Management Systems.' First International Symposium. Proceedings., Thirteenth IEEE Symposium on Date of Conference: 1994 Page(s): 23 – 26.
[4] Goh, J.C.H. ; Dept. of Bioeng., Nat. Univ. of Singapore, Singapore, Singapore, “Manpower development for the biomedical industry space”, Published in: Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE Date of Conference: 3-7 July 2013 Page(s): 3138 – 3141.
[5] Correa, D. ; Indraprastha Inst. of Inf. Technol., New Delhi, India ; Lal, S. ; Saini, A. ; Sureka, A., “Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion Forum”, Published in: Software Engineering Conference (APSEC), 2013 20th Asia-Pacific (Volume:1 ) Date of Conference: 2-5 Dec. 2013 Page(s): 25 – 33.
[6] Sureka, A. ; IIIT-D, New Delhi, India ; Lal, S. ; Agarwal, L., “Applying Fellegi-Sunter (FS) Model for Traceability Link Recovery between Bug Databases and Version Archives”, Published in: Software Engineering Conference (APSEC), 2011 18th Asia Pacific Date of Conference: 5-8 Dec. 2011 Page(s): 146 – 153.
[7] Kefa Lu ; Dept. of Electr. Eng. & Comput. Sci., Univ. of Tennessee, Knoxville, TN, USA ; Qing Cao ; Thomason, M., “Bugs or anomalies? Sequence mining based debugging in wireless sensor networks”, Published in: Mobile Adhoc and Sensor Systems (MASS), 2012 IEEE 9th International Conference on Date of Conference: 8-11 Oct. 2012 Page(s): 463 – 467.
[8] Su, A.P. ; kuo, j. ; Kuen-Jong Lee ; Ing-Jer Huang, “Multi-core software/hardware co-debug platform with ARM CoreSight™, on-chip test architecture and AXI/AHB bus monitor”, Published in: VLSI Design, Automation and Test (VLSI-DAT), 2011 International Symposium on Date of Conference: 25-28 April 2011 Page(s): 1 – 6.
[9] Xin Xia ; Coll. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China ; Lo, D. ; Ming Wen ; Shihab, E., “An empirical study of bug report field reassignment”, Published in: Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week - IEEE Conference on Date of Conference: 3-6 Feb. 2014 Page(s): 174 – 183.
[10] Yuan Tian ; Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore ; Chengnian Sun ; Lo, D., “Improved Duplicate Bug Report Identification”, Published in: Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on Date of Conference: 27-30 March 2012 Page(s): 385 – 390.
[11] Xiaoyin Wang ; Inst. of Software, Peking Univ., Beijing; Lu Zhang ; Tao Xie ; Anvik, J., “An approach to detecting duplicate bug reports using natural language and execution information”, Published in: Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on Date of Conference: 10-18 May 2008 Page(s): 461 – 470.
[12] Geunseok Yang ; Dept. of Comput. Sci., Univ. of Seoul, Seoul, South Korea ; Tao Zhang ; Byungjeong Lee, “Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports”, Published in: Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual Date of Conference: 21-25 July 2014 Page(s): 97 – 106.