ARTÍCULO
TITULO

On data mining for software repositories

Dmitry Namiot    
Vladimir Romanov    

Resumen

The article discusses issues related to the use of data science and data mining methods for software repositories. The paper attempts to provide an overview of the technologies that are used in the analysis of programs and are based on static data that can be extracted directly from the code or the code repositories. The paper reviews papers using deep learning methods (recurrent neural networks), classification methods based on other machine learning models, and the use of clustering in software engineering. Practical applications of the methods under consideration include, for example, classification and prediction of errors, determining the characteristics of code change over time, searching for duplicate fragments, automatically detecting design errors, recommending code refactoring.

 Artículos similares

       
 
Margarida Mendonça and Álvaro Figueira    
As social media (SM) becomes increasingly prevalent, its impact on society is expected to grow accordingly. While SM has brought positive transformations, it has also amplified pre-existing issues such as misinformation, echo chambers, manipulation, and ... ver más
Revista: Informatics

 
Hamad Almaghrabi, Ben Soh and Alice Li    
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users? satisfact... ver más
Revista: Information

 
George Papageorgiou, Vangelis Sarlis and Christos Tjortjis    
This study utilized advanced data mining and machine learning to examine player injuries in the National Basketball Association (NBA) from 2000?01 to 2022?23. By analyzing a dataset of 2296 players, including sociodemographics, injury records, and financ... ver más
Revista: Information

 
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information

 
Zhen Liu, Qifeng Yang, Anlue Wang and Xingyu Gu    
In the process of driving in an underground interchange, drivers are faced with many challenges, such as being in a closed space, visual changes alternating between light and dark conditions, complex road conditions in the confluence section, and dense s... ver más
Revista: Infrastructures