Gal et al., 2019 - Google Patents
Risk analysis based on design version control dataGal et al., 2019
- Document ID
- 4944284411276008178
- Author
- Gal R
- Shurek G
- Simchoni G
- Ziv A
- Publication year
- Publication venue
- 2019 ACM/IEEE 1st Workshop on Machine Learning for CAD (MLCAD)
External Links
Snippet
Early identification of areas that are at-risk in a design under development can help design and verification teams take early preventive and corrective measures. We propose a novel system that predicts which files are at risk of being buggy. Our simple, machine learning …
- 238000004458 analytical method 0 title description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10860312B1 (en) | Defect ownership assignment system and predictive analysis for codebases | |
Mehdiyev et al. | Explainable artificial intelligence for process mining: A general overview and application of a novel local explanation approach for predictive process monitoring | |
Thota et al. | Survey on software defect prediction techniques | |
Bertolino et al. | Learning-to-rank vs ranking-to-learn: Strategies for regression testing in continuous integration | |
US11487996B2 (en) | Real-time predictive maintenance of hardware components using a stacked deep learning architecture on time-variant parameters combined with a dense neural network supplied with exogeneous static outputs | |
US6542881B1 (en) | System and method for revealing necessary and sufficient conditions for database analysis | |
Park et al. | Improving software reliability prediction through multi-criteria based dynamic model selection and combination | |
Shafiq et al. | Retracted: Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality | |
US11481707B2 (en) | Risk prediction system and operation method thereof | |
US7558803B1 (en) | Computer-implemented systems and methods for bottom-up induction of decision trees | |
Devine et al. | Assessment and cross-product prediction of software product line quality: accounting for reuse across products, over multiple releases | |
Popova et al. | Discovering unbounded synchronization conditions in artifact-centric process models | |
Torkamani et al. | Streamlining Security Vulnerability Triage with Large Language Models | |
Gal et al. | Risk analysis based on design version control data | |
Khramov | Robotic and machine learning: how to help support to process customer tickets more effectively | |
Akkus et al. | A novel method for weighting decision makers for failure mode and effect analysis under intuitionistic fuzzy environment | |
CN119417305A (en) | A software quality integrated management method and system | |
You | A generalized three-type lifetime probabilistic models-based hybrid maintenance policy with a practical switcher for time-based preventive maintenance and condition-based maintenance | |
Karim et al. | Decision support for increasing the efficiency of crowdsourced software development | |
Andrade et al. | BugHub: A large scale issue report dataset | |
CN111209214B (en) | Code test processing method and device, electronic equipment and medium | |
Cavezza et al. | Performance of defect prediction in rapidly evolving software | |
Ouyang et al. | Explainable ai enabled inspection of business process prediction models | |
Shivaji | Efficient bug prediction and fix suggestions | |
Uddin | A NOVEL BUG TRIAGING STRATEGY USING DEVELOPER RECOMMENDATION AND LOAD BALANCING MODEL |