Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Tsunoda, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.06268  [pdf

    cs.SE

    On Applying Bandit Algorithm to Fault Localization Techniques

    Authors: Masato Nakao, Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Koji Toda, Akito Monden, Keitaro Nakasai, Kenichi Matsumoto

    Abstract: Developers must select a high-performance fault localization (FL) technique from available ones. A conventional approach is to try to select only one FL technique that is expected to attain high performance before debugging activity. In contrast, we propose a new approach that dynamically selects better FL techniques during debugging activity.

    Submitted 10 September, 2024; originally announced September 2024.

    Comments: 2 pages, 2 figures, 1 table

  2. arXiv:2409.06264  [pdf

    cs.SE

    An Empirical Study of the Impact of Test Strategies on Online Optimization for Ensemble-Learning Defect Prediction

    Authors: Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto

    Abstract: Ensemble learning methods have been used to enhance the reliability of defect prediction models. However, there is an inconclusive stability of a single method attaining the highest accuracy among various software projects. This work aims to improve the performance of ensemble-learning defect prediction among such projects by helping select the highest accuracy ensemble methods. We employ bandit a… ▽ More

    Submitted 10 September, 2024; originally announced September 2024.

    Comments: 6 pages, 6 figures, 6 tables

  3. arXiv:2404.11040  [pdf

    cs.SE

    The Impact of Defect (Re) Prediction on Software Testing

    Authors: Yukasa Murakami, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai

    Abstract: Cross-project defect prediction (CPDP) aims to use data from external projects as historical data may not be available from the same project. In CPDP, deciding on a particular historical project to build a training model can be difficult. To help with this decision, a Bandit Algorithm (BA) based approach has been proposed in prior research to select the most suitable learning project. However, thi… ▽ More

    Submitted 10 September, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

    Comments: 5 pages, 3 figures, 2 table. The paper is published from IEICE

  4. arXiv:2404.11033  [pdf

    cs.SE

    Building Defect Prediction Models by Online Learning Considering Defect Overlooking

    Authors: Nikolay Fedorov, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai

    Abstract: Building defect prediction models based on online learning can enhance prediction accuracy. It continuously rebuilds a new prediction model, when a new data point is added. However, a module predicted as "non-defective" can result in fewer test cases for such modules. Thus, a defective module can be overlooked during testing. The erroneous test results are used as learning data by online learning,… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 4 pages, 4 figures, 4 tables. The paper is currently under review in IEICE. arXiv admin note: text overlap with arXiv:2308.13582

  5. arXiv:2312.12813  [pdf

    cs.SE

    Selecting Source Code Generation Tools Based on Bandit Algorithms

    Authors: Ryoto Shima, Masateru Tsunoda, Yukasa Murakami, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai

    Abstract: Background: Recently, code generation tools such as ChatGPT have drawn attention to their performance. Generally, a prior analysis of their performance is needed to select new code-generation tools from a list of candidates. Without such analysis, there is a higher risk of selecting an ineffective tool, negatively affecting software development productivity. Additionally, conducting prior analysis… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  6. arXiv:2308.13582  [pdf

    cs.SE

    Software Defect Prediction by Online Learning Considering Defect Overlooking

    Authors: Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai

    Abstract: Building defect prediction models based on online learning can enhance prediction accuracy. It continuously rebuilds a new prediction model when adding a new data point. However, predicting a module as "non-defective" (i.e., negative prediction) can result in fewer test cases for such modules. Therefore, defects can be overlooked during testing, even when the module is defective. The erroneous tes… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 2 pages

  7. arXiv:2209.03518  [pdf

    cs.SE

    Analyzing and Calibrating Risk Assessment by Software Developers

    Authors: Yukasa Murakami, Masateru Tsunoda, Eduardo C. Campos

    Abstract: In software project management, risk management is a critical factor. Project managers use existing lists of risk or perform brainstorming to identify the risks. However, it is not easy to perceive all the risks objectively. As a result, some risks are perceived based on subjective impression, which leads to risk biases. So, our goals are (i) We clarify the risk perception of developers to enhance… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: Japanese letter version is available at: https://www.jstage.jst.go.jp/article/jssst/35/4/35_37/_article/-char/en

  8. arXiv:2209.03516  [pdf

    cs.SE

    Relationship between Gender and Code Reading Speed in Software Development

    Authors: Yuriko Takatsuka, Yukasa Murakami, Masateru Tsunoda, Masahide Nakamura

    Abstract: Recently, workforce shortage has become a popular issue in information technology (IT). One solution to increasing the workforce supply is to increase the number of female IT professionals. This is because there is gender imbalance in information technology area. To accomplish this, it is important to suppress the influence of biases, such as the belief that men are more suited for careers in scie… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: Japanese letter version is available at: https://search.ieice.org/bin/summary.php?id=j104-d_5_521&category=D&year=2021&lang=J&abst=

  9. arXiv:2204.00197  [pdf

    cs.SE

    Measuring Cognitive Load of Software Developers Based on Nasal Skin Temperature

    Authors: Keitaro Nakasai, Shin Komeda, Masateru Tsunoda, Masayuki Kashima

    Abstract: It has recently become increasingly important to measure the cognitive load of developers. This is because continuing with a development under a high cognitive load may cause human errors. Therefore, to automatically measure the cognitive load, existing studies have used biometric measures such as brain waves and the heart rate. However, developers are often required to equip certain devices when… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 4 pages, 2 figures, 2 tables

  10. arXiv:2003.05094  [pdf

    cs.SE cs.LG

    A Simulation Study of Bandit Algorithms to Address External Validity of Software Fault Prediction

    Authors: Teruki Hayakawa, Masateru Tsunoda, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto

    Abstract: Various software fault prediction models and techniques for building algorithms have been proposed. Many studies have compared and evaluated them to identify the most effective ones. However, in most cases, such models and techniques do not have the best performance on every dataset. This is because there is diversity of software development datasets, and therefore, there is a risk that the select… ▽ More

    Submitted 17 March, 2020; v1 submitted 10 March, 2020; originally announced March 2020.

    Comments: 5 pages