SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Characterizing
 Verification of Bug Fixes
  in Two Open Source IDEs
                   Rodrigo Souza* and Christina Chavez
                             Software Engineering Labs
                      Department of Computer Science - IM
                    Universidade Federal da Bahia (UFBA), Brazil
                            {rodrigo, flach}@dcc.ufba.br
                                      * speaker




June 2, 2012
MSR 2012, Zürich
2
NEW




2
NEW




    FI XED




2
NEW




     FI XED


           E   D
    V ERIFI



2
Characterize the verification process
    by mining bug repositories



                                 VER IFIED




                  3
Characterize the verification process
    by mining bug repositories



                                 VER IFIED




 When?          Who?          How?


                  3
Data
MSR 2011 Challenge data set
 (~ 10 years of bug reports)

                Platform
                VersionControl


           Platform
           EMF (Eclipse Modeling Framework)

            4
When?
accumulated # of verifications
   ~ 800
verifications




                      ~ 2 years
                  6
accumulated # of verifications
   ~ 800                             * = release
verifications                       *


                          *

                    *


                *

                        ~ 2 years
                    6
accumulated # of verifications
   ~ 700                                        * = release
                                            *
verifications
                                        *
                                    *
                                *
                            *
                        *
                    *
                *

                                    ~ 1 year
                            7
accumulated # of verifications
   ~ 700                                        * = release
                                            *
verifications
                                        *
                                    *
  verification                   *
     phase                  *
                        *
                    *
                *

                                    ~ 1 year
                            7
Who?
QA developer


bug fixes   x       ≥ 10x   verifications




                9
QA
     team




10
20% of developers
                          QA
                         team




                    10
20% of developers
                            QA
                           team


                          80% of the
                         verifications
                    10
QA
team



       11
How?
13
Most comments just state the obvious.




                   4% refer to
           Less than
  automated testing or code inspection.

     Further research needed
                       14
Pitfalls
accumulated # of verifications
   ~ 14k
verifications




                       ~ 10 years
                  16
accumulated # of verifications
   ~ 14k
verifications




                       ~ 10 years
                  16
17
2.6k bugs




            17
2.6k bugs




            17
2.6k bugs




            17
 

Mass verifications: represent
repository cleanup, not software
verification.

They may represent a large part of the
verifications and bias your analyses.




                  18
 

Pseudo verifications: In some
projects, marking a bug as VERIFIED
means something else!

(e.g., in Eclipse/EMF, since 2007, it
means that the fix is available in a build)




                    19
Future Work
process




 product
(software)



    21
process


                               verification
                                 process*
  product
 (software)




* qa team,                     reopening
verification phase etc.
                          22
causal
   process           (bayesian)
                      network

                                  verification
                                    process*
  product
 (software)




* qa team,                        reopening
verification phase etc.
                            22
Thanks!

Verification
                        ✓                  ✗
  phase
 QA team                ✗                  ✓

 Comments rarely state the verification technique.
 Beware of mass verifications and pseudo verifications.

                        23

Weitere ähnliche Inhalte

Andere mochten auch

Psikologi Industri Pengetahuan Konsumen
Psikologi Industri Pengetahuan KonsumenPsikologi Industri Pengetahuan Konsumen
Psikologi Industri Pengetahuan Konsumen
Ken Ayu Mutia
 
New EEOC Guidelines Regarding Criminal Background Checks
New EEOC Guidelines Regarding Criminal Background ChecksNew EEOC Guidelines Regarding Criminal Background Checks
New EEOC Guidelines Regarding Criminal Background Checks
Parsons Behle & Latimer
 
サテライトラブ
サテライトラブサテライトラブ
サテライトラブ
健太 田上
 
Social networking as an esol strategy
Social networking as an esol strategySocial networking as an esol strategy
Social networking as an esol strategy
Rhonda101
 
Bullying at school
Bullying at schoolBullying at school
Bullying at school
Abdulla Ali
 

Andere mochten auch (18)

Psikologi Industri Pengetahuan Konsumen
Psikologi Industri Pengetahuan KonsumenPsikologi Industri Pengetahuan Konsumen
Psikologi Industri Pengetahuan Konsumen
 
камянець подільський
камянець   подільськийкамянець   подільський
камянець подільський
 
Dealing fairly with interest-only customers; a good practice guide from HML -...
Dealing fairly with interest-only customers; a good practice guide from HML -...Dealing fairly with interest-only customers; a good practice guide from HML -...
Dealing fairly with interest-only customers; a good practice guide from HML -...
 
Freello Eventi Live
Freello Eventi LiveFreello Eventi Live
Freello Eventi Live
 
New EEOC Guidelines Regarding Criminal Background Checks
New EEOC Guidelines Regarding Criminal Background ChecksNew EEOC Guidelines Regarding Criminal Background Checks
New EEOC Guidelines Regarding Criminal Background Checks
 
サテライトラブ
サテライトラブサテライトラブ
サテライトラブ
 
The Ins and Outs of the R15 Grant
The Ins and Outs of the R15 GrantThe Ins and Outs of the R15 Grant
The Ins and Outs of the R15 Grant
 
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
 
Memòria
Memòria Memòria
Memòria
 
Transitioning from an Early Investigator Award to the Coveted R01
Transitioning from an Early Investigator Award to the Coveted R01Transitioning from an Early Investigator Award to the Coveted R01
Transitioning from an Early Investigator Award to the Coveted R01
 
Family Violence
Family ViolenceFamily Violence
Family Violence
 
Social networking as an esol strategy
Social networking as an esol strategySocial networking as an esol strategy
Social networking as an esol strategy
 
Tizen & Crosswalk
Tizen & CrosswalkTizen & Crosswalk
Tizen & Crosswalk
 
Employers_on_the_Edge_Strategies_for_Dealing_with_the_Affordable_Care_Act
Employers_on_the_Edge_Strategies_for_Dealing_with_the_Affordable_Care_ActEmployers_on_the_Edge_Strategies_for_Dealing_with_the_Affordable_Care_Act
Employers_on_the_Edge_Strategies_for_Dealing_with_the_Affordable_Care_Act
 
Reactive extensions - secondnug
Reactive extensions - secondnugReactive extensions - secondnug
Reactive extensions - secondnug
 
Communication skills (5)
Communication skills (5)Communication skills (5)
Communication skills (5)
 
Семейное образование и образование будущего
Семейное образование и образование будущегоСемейное образование и образование будущего
Семейное образование и образование будущего
 
Bullying at school
Bullying at schoolBullying at school
Bullying at school
 

Ähnlich wie Characterizing Verification of Bug Fixes in Two Open Source IDEs (MSR 2012)

Continuous deployment
Continuous deploymentContinuous deployment
Continuous deployment
Daniel
 
InduSoft VBScript Webinar
 InduSoft VBScript Webinar InduSoft VBScript Webinar
InduSoft VBScript Webinar
AVEVA
 
Testing in an Open Source Middleware Platform Space The WSO2 Way.
Testing in an Open Source Middleware Platform Space  The WSO2 Way.Testing in an Open Source Middleware Platform Space  The WSO2 Way.
Testing in an Open Source Middleware Platform Space The WSO2 Way.
WSO2
 
Datasheet Squishjava Testing Tools
Datasheet Squishjava Testing ToolsDatasheet Squishjava Testing Tools
Datasheet Squishjava Testing Tools
vivek jog
 
service quality & usability
service quality & usabilityservice quality & usability
service quality & usability
Yves Pigneur
 

Ähnlich wie Characterizing Verification of Bug Fixes in Two Open Source IDEs (MSR 2012) (20)

Madrid JAM limitaciones - dificultades
Madrid JAM limitaciones - dificultadesMadrid JAM limitaciones - dificultades
Madrid JAM limitaciones - dificultades
 
Continuous deployment
Continuous deploymentContinuous deployment
Continuous deployment
 
Docker In Bank Unrated
Docker In Bank UnratedDocker In Bank Unrated
Docker In Bank Unrated
 
the grinder testing certification
the grinder testing certificationthe grinder testing certification
the grinder testing certification
 
Continuous Deployment – Nextdoor.fi released every day at Scan-Agile 2011
Continuous Deployment – Nextdoor.fi released every day at Scan-Agile 2011Continuous Deployment – Nextdoor.fi released every day at Scan-Agile 2011
Continuous Deployment – Nextdoor.fi released every day at Scan-Agile 2011
 
InduSoft VBScript Webinar
 InduSoft VBScript Webinar InduSoft VBScript Webinar
InduSoft VBScript Webinar
 
Testing in an Open Source Middleware Platform Space The WSO2 Way.
Testing in an Open Source Middleware Platform Space  The WSO2 Way.Testing in an Open Source Middleware Platform Space  The WSO2 Way.
Testing in an Open Source Middleware Platform Space The WSO2 Way.
 
PL/SQL Development
PL/SQL DevelopmentPL/SQL Development
PL/SQL Development
 
Coding Naked
Coding NakedCoding Naked
Coding Naked
 
Agile Open Source Performance Testing Workshop for Business Managers
Agile Open Source Performance Testing Workshop for Business ManagersAgile Open Source Performance Testing Workshop for Business Managers
Agile Open Source Performance Testing Workshop for Business Managers
 
Datasheet Squishjava Testing Tools
Datasheet Squishjava Testing ToolsDatasheet Squishjava Testing Tools
Datasheet Squishjava Testing Tools
 
5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing5 Tips for Agile Mobile App Security Testing
5 Tips for Agile Mobile App Security Testing
 
Continuous delivery chernivcy
Continuous delivery chernivcyContinuous delivery chernivcy
Continuous delivery chernivcy
 
Team Development and Release Management
Team Development and Release ManagementTeam Development and Release Management
Team Development and Release Management
 
Let’s start Continuous Integration with jenkins
Let’s start Continuous Integration with jenkinsLet’s start Continuous Integration with jenkins
Let’s start Continuous Integration with jenkins
 
How to Introduce Continuous Delivery
How to Introduce Continuous DeliveryHow to Introduce Continuous Delivery
How to Introduce Continuous Delivery
 
service quality & usability
service quality & usabilityservice quality & usability
service quality & usability
 
Cisco DevNet CREATE 2019 - NetBeez Network Performance API
Cisco DevNet CREATE 2019 - NetBeez Network Performance APICisco DevNet CREATE 2019 - NetBeez Network Performance API
Cisco DevNet CREATE 2019 - NetBeez Network Performance API
 
Revision Control DrupalCampLA
Revision Control DrupalCampLARevision Control DrupalCampLA
Revision Control DrupalCampLA
 
Peer Code Review: In a Nutshell and The Tantric Team: Getting Your Automated ...
Peer Code Review: In a Nutshell and The Tantric Team: Getting Your Automated ...Peer Code Review: In a Nutshell and The Tantric Team: Getting Your Automated ...
Peer Code Review: In a Nutshell and The Tantric Team: Getting Your Automated ...
 

Mehr von Rodrigo Rocha

2011 seminario rodrigo 2011
2011 seminario rodrigo 20112011 seminario rodrigo 2011
2011 seminario rodrigo 2011
Rodrigo Rocha
 
2012 qualificacao-rodrigo-2012
2012 qualificacao-rodrigo-20122012 qualificacao-rodrigo-2012
2012 qualificacao-rodrigo-2012
Rodrigo Rocha
 
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
Rodrigo Rocha
 
Características de apps
Características de appsCaracterísticas de apps
Características de apps
Rodrigo Rocha
 

Mehr von Rodrigo Rocha (11)

Aula: busca e ordenação
Aula: busca e ordenaçãoAula: busca e ordenação
Aula: busca e ordenação
 
Patterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug ReportsPatterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug Reports
 
Patterns for Cleaning Up Bug Data
Patterns for Cleaning Up Bug DataPatterns for Cleaning Up Bug Data
Patterns for Cleaning Up Bug Data
 
Introdução ao Android (minicurso 4h)
Introdução ao Android (minicurso 4h)Introdução ao Android (minicurso 4h)
Introdução ao Android (minicurso 4h)
 
Beabá do R
Beabá do RBeabá do R
Beabá do R
 
Mineração de Repositórios de Defeitos
Mineração de Repositórios de DefeitosMineração de Repositórios de Defeitos
Mineração de Repositórios de Defeitos
 
2011 seminario rodrigo 2011
2011 seminario rodrigo 20112011 seminario rodrigo 2011
2011 seminario rodrigo 2011
 
2012 qualificacao-rodrigo-2012
2012 qualificacao-rodrigo-20122012 qualificacao-rodrigo-2012
2012 qualificacao-rodrigo-2012
 
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
2012 doutorado - visita de dalton - comentarios de dalton, roberto e christina
 
Características de apps
Características de appsCaracterísticas de apps
Características de apps
 
Mercado de apps
Mercado de appsMercado de apps
Mercado de apps
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Characterizing Verification of Bug Fixes in Two Open Source IDEs (MSR 2012)

Hinweis der Redaktion

  1. \n
  2. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  3. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  4. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  5. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  6. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  7. First of all, this is how a bug report works.\nFirst someone reports a new bug.\nAfter some discussion, a developer submits a bug fix for the problem, and marks the bug as FIXED.\nThen, someone else verifies that the bug fix is appropriate, and marks the bug as VERIFIED.\n
  8. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  9. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  10. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  11. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  12. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  13. In this exploratory work, we try to characterize the process of verifying bug fixes by mining bug repositories.\nWe investigated three questions: when are bug fixes verified? who verifies them? and how are them verified?\n\n
  14. We used data from the previous MSR Challenge, containing about 10 years of bug reports from two open source IDEs: Eclipse and NetBeans. We analyzed two subprojects for each IDE.\n
  15. So, first, when are bug fixes verified?\n
  16. We have plotted the accumulated number of verifications over time for the projects.\nFor NetBeans, the verification rate is almost constant, meaning that bug fixes are verified all the time.\n\n
  17. We have plotted the accumulated number of verifications over time for the projects.\nFor NetBeans, the verification rate is almost constant, meaning that bug fixes are verified all the time.\n\n
  18. We have plotted the accumulated number of verifications over time for the projects.\nFor NetBeans, the verification rate is almost constant, meaning that bug fixes are verified all the time.\n\n
  19. We have plotted the accumulated number of verifications over time for the projects.\nFor NetBeans, the verification rate is almost constant, meaning that bug fixes are verified all the time.\n\n
  20. We have plotted the accumulated number of verifications over time for the projects.\nFor NetBeans, the verification rate is almost constant, meaning that bug fixes are verified all the time.\n\n
  21. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  22. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  23. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  24. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  25. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  26. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  27. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  28. For Eclipse/Platform, however, verifications are much more frequent just before a release,\nwhich suggests that there’s a verification phase in Eclipse’s process.\n
  29. Next, who verifies the bug fixes? In some projects, there is a team dedicated to verifications: Quality Assurance team, or QA team.\n
  30. We defined that the QA team of a project is formed by all developers that perform at least 10 times more verifications than bug fixes.\n
  31. Using this definition, we found that in NetBeans the QA team contains 20% of its developers, who perform more than 80% of the verifications.\n
  32. Using this definition, we found that in NetBeans the QA team contains 20% of its developers, who perform more than 80% of the verifications.\n
  33. Using this definition, we found that in NetBeans the QA team contains 20% of its developers, who perform more than 80% of the verifications.\n
  34. Using this definition, we found that in NetBeans the QA team contains 20% of its developers, who perform more than 80% of the verifications.\n
  35. Using this definition, we found that in NetBeans the QA team contains 20% of its developers, who perform more than 80% of the verifications.\n
  36. In Eclipse, we found no evidence of a QA team.\n
  37. Finally, how are the bug fixes verified?\nThat is, what are the techniques used to verify each bug fix?\n
  38. We looked at the comments developers write when they mark a bug as VERIFIED.\n
  39. But it appears that most comments just state the obvious: that the bug fix was verified using some version of the software.\nUsing regular expressions, we found that less than 4% of the comments refer to automated testing or code inspection, although further research is needed.\n
  40. We’d also like to share some pitfalls we’ve found during this research.\n
  41. Plotting the number of verifications in NetBeans/Platform over its lifetime, we found what appears to be a huge verification effort, represented by a big rise in the graph.\nHowever, by looking at the data, we discovered that this big rise represents...\n\n
  42. More than 2 thousand bugs that were verified... in just 5 hours... by only 1 guy!\nOf course, no human being can do that.\nThe developer was not actually verifying the bug fixes. It turns out, Superman was just doing some cleanup by marking old bugs as verified.\n\n2003-07-01, 2676 bugs, user 17822, 2003-07-01 10:52:14 to 2003-07-01 16:08:14 (about 5 hours)\n
  43. More than 2 thousand bugs that were verified... in just 5 hours... by only 1 guy!\nOf course, no human being can do that.\nThe developer was not actually verifying the bug fixes. It turns out, Superman was just doing some cleanup by marking old bugs as verified.\n\n2003-07-01, 2676 bugs, user 17822, 2003-07-01 10:52:14 to 2003-07-01 16:08:14 (about 5 hours)\n
  44. More than 2 thousand bugs that were verified... in just 5 hours... by only 1 guy!\nOf course, no human being can do that.\nThe developer was not actually verifying the bug fixes. It turns out, Superman was just doing some cleanup by marking old bugs as verified.\n\n2003-07-01, 2676 bugs, user 17822, 2003-07-01 10:52:14 to 2003-07-01 16:08:14 (about 5 hours)\n
  45. So, be careful: mass verifications may represent a large part of the verifications in a project, but they are not really software verification and may bias your analyses.\nIn the previous analyses, mass verifications were discarded.\n\n-- Be careful, because such mass verifications may bias your analyses\n
  46. Also, by reading a few comments, we found that, in some projects, marking a bug as VERIFIED has a special meaning. \nFor example, in Eclipse/EMF it just means that the bug fix was made available in a build).\n\n
  47. Future work\n
  48. People say that, if you control your process, you can control the quality of your product. \n
  49. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  50. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  51. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  52. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  53. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  54. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  55. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  56. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  57. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  58. So we want to investigate how particular features of the bug verification process may influence (directly or indirectly) the reopening of bugs.\n For example, is it more effective to have a verification phase or to verify bug fixes all the time?\n\nWe intend to build a causal network to investigate this question, so we are looking for variables that influence the verification process or the reopening of bugs.\n
  59. Thank you very much!\n