SlideShare ist ein Scribd-Unternehmen logo
1 von 8
A replicated study on duplicate 
detection: 
Using Apache Lucene to search among 
Android defects 
M. BORG, P. RUNESON, J. JOHANSSON, M. MÄNTYLÄ
Core problem: 
Issue Duplicate Detection 
Issue inflow 
Analyst 
Merge
Background 
ICSE 07 paper 
[cited by 57(ISI), 214 (GS)]: 
• Mobile w proprietary 
embedded OS 
• 1,000’s of reports, 
10% duplications 
• 40% of true duplicates 
found 
• 2/3 is conceptual limit 
• Save 20h/1000 issues 
Detection of Duplicate Defect Reports Using Natural Language Processing 
Per Runeson, Magnus Alexandersson and Oskar Nyholm 
Software Engineering Research Group 
Lund University, 
Box 118, SE-221 00 Lund, Sweden 
per.runeson@telecom.lth.se 
Abstract 
Defect reports are generated from various testing and 
development activities in software engineering. Some-times 
two reports are submitted that describe the same 
problem, leading to duplicate reports. These reports 
are mostly written in structured natural language, and 
as such, it is hard to compare two reports for similarity 
with formal methods. In order to identify duplicates, 
we investigate using Natural Language Processing 
(NLP) techniques to support the identification. A pro-totype 
tool is developed and evaluated in a case study 
analyzing defect reports at Sony Ericsson Mobile Com-munications. 
The evaluation shows that about 2/3 of 
the duplicates can possibly be found using the NLP 
techniques. Different variants of the techniques pro-vide 
only minor result differences, indicating a robust 
technology. User testing shows that the overall attitude 
towards the technique is positive and that it has a 
growth potential. 
1. Introduction 
When a complex software product like a mobile 
phone is developed, it is natural and common that 
software defects slip into the product, leading to func-tional 
failures, i.e. the phone does not have the ex-pected 
behavior. These failures are found in testing or 
other development activities and reported in a defect 
management system [5][18]. If the development proc-ess 
is highly parallel, or a product line architecture is 
used, where components are used in different products, 
the same defect may easily be reported multiple times, 
resulting in duplicate reports in the defect management 
system. These duplicates cost effort in identification 
and handling, hence support to speed up the duplicate 
detection process is appreciated. 
The defect reports are written in natural language, 
and the duplicate identification requires suitable infor-mation 
retrieval methods. In this study, we investigate 
the use of Natural Language Processing (NLP) [17] 
techniques to help automate this process. NLP is previ-ously 
used in requirements engineering [12][3][19], 
program comprehension [2] and in defect report man-agement 
[15], although with a different angle. 
Basically, we take the words in the defect report in 
plain English, make some processing of the text and 
then use the statistics on the occurrences of the words 
to identify similar defect reports. We implemented a 
prototype tool and evaluated its effects on the internal 
defect reporting system of Sony Ericsson Mobile 
Communications which contained thousands of reports. 
Further, we interviewed some users of the prototype 
tool to get a qualitative view of the effects. The proto-type 
tool identified about 40% of the marked duplicate 
defect reports, which can be seen as low figure. How-ever, 
since only one type of duplicate reports are possi-bly 
found by the technique, we estimate that the tech-nique 
finds 2/3 of the possible duplicates. Also, in 
terms of working hours, reducing the effort to identify 
duplicate reports with 40% is still a substantial saving 
for a major software development company, which 
handles thousands of defect reports every year. 
The paper is outlined as follows. Section 2 intro-duces 
the theory on defect reporting and on natural 
language processing. Section 3 presents the tailoring 
made of the NLP techniques to fit the duplicate detec-tion 
purpose. In Section 4, we specify the case study 
conducted for evaluation of the technique, and Section 
5 presents the case study results. Finally Section 6 con-cludes 
the paper and outlines further work. 
29th International Conference on Software Engineering (ICSE'07) 
0-7695-2828-7/07 $20.00 © 2007
Conceptual replication study 
This paper: 
• Android OS 
• 20,175 reports, 
1,158 duplicates 
(5.7%) 
• 14% of true 
duplicates found 
• Did it replicate??
Replication study methodology 
• Use all defect reports as search queries in Apache 
Lucene 
• Evaluate the output at cut-off 10 defect reports 
– RQ1: Recall and Mean Average Precision, Rc@10 
MAP@10 
– RQ2: Relative importance of title and description 
– RQ3: Filter on submission date
Results 
• RQ1: Rc@10= 0.138, MAP@10=0.632 
• RQ2: Title is more important than description, but 
differences are small 
• RQ3: Time filtering is not beneficial
Replication? 
Original study 
• Search one by one 
• Unique master report 
(not realistic) 
• Precision not reported 
Conceptual replication 
• Search for all duplicates 
• Clusters of duplicates 
(160 reports have 20+ 
duplicates) 
• Recall much lower 
Conclusions on replication 
• Precision-Recall numbers not comparable 
• Principal results confirmed (weighting) or rejected 
(time filter) 
• Needs for empirical evaluations beyond the basic 
Precision-Recall “race”
178 - A replicated study on duplicate detection: Using Apache Lucene to search among Android defects

Weitere ähnliche Inhalte

Andere mochten auch

201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
ESEM 2014
 
166 - ISBSG variables most frequently used for software effort estimation: A ...
166 - ISBSG variables most frequently used for software effort estimation: A ...166 - ISBSG variables most frequently used for software effort estimation: A ...
166 - ISBSG variables most frequently used for software effort estimation: A ...
ESEM 2014
 
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
ESEM 2014
 
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
ESEM 2014
 
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
ESEM 2014
 
130 - Motivated software engineers are engaged and focused, while satisfied o...
130 - Motivated software engineers are engaged and focused, while satisfied o...130 - Motivated software engineers are engaged and focused, while satisfied o...
130 - Motivated software engineers are engaged and focused, while satisfied o...
ESEM 2014
 
Tiki-VUL-ARTICLE-DO-final-AS1mai2016
Tiki-VUL-ARTICLE-DO-final-AS1mai2016Tiki-VUL-ARTICLE-DO-final-AS1mai2016
Tiki-VUL-ARTICLE-DO-final-AS1mai2016
Dany Ouellet
 

Andere mochten auch (20)

196 - Evaluation in Practice: Artifact-based Requirements Engineering and Sc...
196  - Evaluation in Practice: Artifact-based Requirements Engineering and Sc...196  - Evaluation in Practice: Artifact-based Requirements Engineering and Sc...
196 - Evaluation in Practice: Artifact-based Requirements Engineering and Sc...
 
214 - Sampling Improvement in Software Engineering Surveys
214 - Sampling Improvement in Software Engineering Surveys214 - Sampling Improvement in Software Engineering Surveys
214 - Sampling Improvement in Software Engineering Surveys
 
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
 
201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
201 - Using Qualitative Metasummary to Synthesize Empirical Findings in Liter...
 
210 - Software Population Pyramids: The Current and the Future of OSS Develop...
210 - Software Population Pyramids: The Current and the Future of OSS Develop...210 - Software Population Pyramids: The Current and the Future of OSS Develop...
210 - Software Population Pyramids: The Current and the Future of OSS Develop...
 
166 - ISBSG variables most frequently used for software effort estimation: A ...
166 - ISBSG variables most frequently used for software effort estimation: A ...166 - ISBSG variables most frequently used for software effort estimation: A ...
166 - ISBSG variables most frequently used for software effort estimation: A ...
 
33 - On Knowledge Transfer Skill in Pair Programming
33 - On Knowledge Transfer Skill in Pair Programming33 - On Knowledge Transfer Skill in Pair Programming
33 - On Knowledge Transfer Skill in Pair Programming
 
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
112 - The Role of Mentoring and Project Characteristics for Onboarding in Ope...
 
181 - Evaluating strategies for study selection in systematic literature studies
181 - Evaluating strategies for study selection in systematic literature studies181 - Evaluating strategies for study selection in systematic literature studies
181 - Evaluating strategies for study selection in systematic literature studies
 
What Do Game Developers Test in Their Products?
What Do Game Developers Test in Their Products?What Do Game Developers Test in Their Products?
What Do Game Developers Test in Their Products?
 
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
124 - Impact of Developer Reputation on Code Review Outcomes in OSS Projects:...
 
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
52 - The Impact of Test Ownership and Team Structure on the Reliability and E...
 
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
Keynote 2 - The 20% of software engineering practices that contribute to 80% ...
 
65 - An Empirical Simulation-based Study of Real-Time Speech Translation for ...
65 - An Empirical Simulation-based Study of Real-Time Speech Translation for ...65 - An Empirical Simulation-based Study of Real-Time Speech Translation for ...
65 - An Empirical Simulation-based Study of Real-Time Speech Translation for ...
 
130 - Motivated software engineers are engaged and focused, while satisfied o...
130 - Motivated software engineers are engaged and focused, while satisfied o...130 - Motivated software engineers are engaged and focused, while satisfied o...
130 - Motivated software engineers are engaged and focused, while satisfied o...
 
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
 
GeoInTalk 2010 : Philippe Goudal (V-Trafic / Mediamobile) - Fourniture d’Info...
GeoInTalk 2010 : Philippe Goudal (V-Trafic / Mediamobile) - Fourniture d’Info...GeoInTalk 2010 : Philippe Goudal (V-Trafic / Mediamobile) - Fourniture d’Info...
GeoInTalk 2010 : Philippe Goudal (V-Trafic / Mediamobile) - Fourniture d’Info...
 
Etude E-marketing : Email mobile - maelle urban
Etude E-marketing : Email mobile - maelle urbanEtude E-marketing : Email mobile - maelle urban
Etude E-marketing : Email mobile - maelle urban
 
Tiki-VUL-ARTICLE-DO-final-AS1mai2016
Tiki-VUL-ARTICLE-DO-final-AS1mai2016Tiki-VUL-ARTICLE-DO-final-AS1mai2016
Tiki-VUL-ARTICLE-DO-final-AS1mai2016
 
Atelier 13 - Réenchanter les destinations pour conquérir et transformer - ET8
Atelier 13 - Réenchanter les destinations pour conquérir et transformer - ET8Atelier 13 - Réenchanter les destinations pour conquérir et transformer - ET8
Atelier 13 - Réenchanter les destinations pour conquérir et transformer - ET8
 

Ähnlich wie 178 - A replicated study on duplicate detection: Using Apache Lucene to search among Android defects

Embedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_finalEmbedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_final
TAMILMARAN C
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
ijcsit
 
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction TechniquesTowards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques
1crore projects
 

Ähnlich wie 178 - A replicated study on duplicate detection: Using Apache Lucene to search among Android defects (20)

Re2018 Semios for Requirements
Re2018 Semios for RequirementsRe2018 Semios for Requirements
Re2018 Semios for Requirements
 
Embedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_finalEmbedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_final
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
IRJET - Text Optimization/Summarizer using Natural Language Processing
IRJET - Text Optimization/Summarizer using Natural Language Processing IRJET - Text Optimization/Summarizer using Natural Language Processing
IRJET - Text Optimization/Summarizer using Natural Language Processing
 
Association Rule Mining Scheme for Software Failure Analysis
Association Rule Mining Scheme for Software Failure AnalysisAssociation Rule Mining Scheme for Software Failure Analysis
Association Rule Mining Scheme for Software Failure Analysis
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
From requirements to ready to run
From requirements to ready to runFrom requirements to ready to run
From requirements to ready to run
 
IRJET- ASL Language Translation using ML
IRJET- ASL Language Translation using MLIRJET- ASL Language Translation using ML
IRJET- ASL Language Translation using ML
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
 
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
 
M018147883
M018147883M018147883
M018147883
 
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniquesTowards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
 
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction TechniquesTowards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques
 
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & Autocorrection
 
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Ijetr011834
Ijetr011834Ijetr011834
Ijetr011834
 
sample PPT.pptx
sample PPT.pptxsample PPT.pptx
sample PPT.pptx
 

Mehr von ESEM 2014

42- Using Templates to Elicit Implied Security Requirements from Functional R...
42- Using Templates to Elicit Implied Security Requirements from Functional R...42- Using Templates to Elicit Implied Security Requirements from Functional R...
42- Using Templates to Elicit Implied Security Requirements from Functional R...
ESEM 2014
 

Mehr von ESEM 2014 (8)

Keynote 1 - Engineering Software Analytics Studies
Keynote 1 - Engineering Software Analytics StudiesKeynote 1 - Engineering Software Analytics Studies
Keynote 1 - Engineering Software Analytics Studies
 
222 - Design Pattern Decay: The Case for Class Grime
222 - Design Pattern Decay: The Case for Class Grime222 - Design Pattern Decay: The Case for Class Grime
222 - Design Pattern Decay: The Case for Class Grime
 
169 - Bridging the Gap: SE Technology Transfer into Practice - Study Design a...
169 - Bridging the Gap: SE Technology Transfer into Practice - Study Design a...169 - Bridging the Gap: SE Technology Transfer into Practice - Study Design a...
169 - Bridging the Gap: SE Technology Transfer into Practice - Study Design a...
 
42- Using Templates to Elicit Implied Security Requirements from Functional R...
42- Using Templates to Elicit Implied Security Requirements from Functional R...42- Using Templates to Elicit Implied Security Requirements from Functional R...
42- Using Templates to Elicit Implied Security Requirements from Functional R...
 
224 - Factors Impacting Rapid Releases: An Industrial Case Study
224 - Factors Impacting Rapid Releases: An Industrial Case Study224 - Factors Impacting Rapid Releases: An Industrial Case Study
224 - Factors Impacting Rapid Releases: An Industrial Case Study
 
18 - Impact of Process Conformance on the Effects of Test-driven Development
18 - Impact of Process Conformance on the Effects of Test-driven Development18 - Impact of Process Conformance on the Effects of Test-driven Development
18 - Impact of Process Conformance on the Effects of Test-driven Development
 
167 - Productivity for proof engineering
167 - Productivity for proof engineering167 - Productivity for proof engineering
167 - Productivity for proof engineering
 
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
 

Kürzlich hochgeladen

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Kürzlich hochgeladen (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 

178 - A replicated study on duplicate detection: Using Apache Lucene to search among Android defects

  • 1. A replicated study on duplicate detection: Using Apache Lucene to search among Android defects M. BORG, P. RUNESON, J. JOHANSSON, M. MÄNTYLÄ
  • 2. Core problem: Issue Duplicate Detection Issue inflow Analyst Merge
  • 3. Background ICSE 07 paper [cited by 57(ISI), 214 (GS)]: • Mobile w proprietary embedded OS • 1,000’s of reports, 10% duplications • 40% of true duplicates found • 2/3 is conceptual limit • Save 20h/1000 issues Detection of Duplicate Defect Reports Using Natural Language Processing Per Runeson, Magnus Alexandersson and Oskar Nyholm Software Engineering Research Group Lund University, Box 118, SE-221 00 Lund, Sweden per.runeson@telecom.lth.se Abstract Defect reports are generated from various testing and development activities in software engineering. Some-times two reports are submitted that describe the same problem, leading to duplicate reports. These reports are mostly written in structured natural language, and as such, it is hard to compare two reports for similarity with formal methods. In order to identify duplicates, we investigate using Natural Language Processing (NLP) techniques to support the identification. A pro-totype tool is developed and evaluated in a case study analyzing defect reports at Sony Ericsson Mobile Com-munications. The evaluation shows that about 2/3 of the duplicates can possibly be found using the NLP techniques. Different variants of the techniques pro-vide only minor result differences, indicating a robust technology. User testing shows that the overall attitude towards the technique is positive and that it has a growth potential. 1. Introduction When a complex software product like a mobile phone is developed, it is natural and common that software defects slip into the product, leading to func-tional failures, i.e. the phone does not have the ex-pected behavior. These failures are found in testing or other development activities and reported in a defect management system [5][18]. If the development proc-ess is highly parallel, or a product line architecture is used, where components are used in different products, the same defect may easily be reported multiple times, resulting in duplicate reports in the defect management system. These duplicates cost effort in identification and handling, hence support to speed up the duplicate detection process is appreciated. The defect reports are written in natural language, and the duplicate identification requires suitable infor-mation retrieval methods. In this study, we investigate the use of Natural Language Processing (NLP) [17] techniques to help automate this process. NLP is previ-ously used in requirements engineering [12][3][19], program comprehension [2] and in defect report man-agement [15], although with a different angle. Basically, we take the words in the defect report in plain English, make some processing of the text and then use the statistics on the occurrences of the words to identify similar defect reports. We implemented a prototype tool and evaluated its effects on the internal defect reporting system of Sony Ericsson Mobile Communications which contained thousands of reports. Further, we interviewed some users of the prototype tool to get a qualitative view of the effects. The proto-type tool identified about 40% of the marked duplicate defect reports, which can be seen as low figure. How-ever, since only one type of duplicate reports are possi-bly found by the technique, we estimate that the tech-nique finds 2/3 of the possible duplicates. Also, in terms of working hours, reducing the effort to identify duplicate reports with 40% is still a substantial saving for a major software development company, which handles thousands of defect reports every year. The paper is outlined as follows. Section 2 intro-duces the theory on defect reporting and on natural language processing. Section 3 presents the tailoring made of the NLP techniques to fit the duplicate detec-tion purpose. In Section 4, we specify the case study conducted for evaluation of the technique, and Section 5 presents the case study results. Finally Section 6 con-cludes the paper and outlines further work. 29th International Conference on Software Engineering (ICSE'07) 0-7695-2828-7/07 $20.00 © 2007
  • 4. Conceptual replication study This paper: • Android OS • 20,175 reports, 1,158 duplicates (5.7%) • 14% of true duplicates found • Did it replicate??
  • 5. Replication study methodology • Use all defect reports as search queries in Apache Lucene • Evaluate the output at cut-off 10 defect reports – RQ1: Recall and Mean Average Precision, Rc@10 MAP@10 – RQ2: Relative importance of title and description – RQ3: Filter on submission date
  • 6. Results • RQ1: Rc@10= 0.138, MAP@10=0.632 • RQ2: Title is more important than description, but differences are small • RQ3: Time filtering is not beneficial
  • 7. Replication? Original study • Search one by one • Unique master report (not realistic) • Precision not reported Conceptual replication • Search for all duplicates • Clusters of duplicates (160 reports have 20+ duplicates) • Recall much lower Conclusions on replication • Precision-Recall numbers not comparable • Principal results confirmed (weighting) or rejected (time filter) • Needs for empirical evaluations beyond the basic Precision-Recall “race”