Enviar pesquisa
Carregar
Characterizing and predicting which bugs get fixed
•
4 gostaram
•
810 visualizações
Thomas Zimmermann
Seguir
Presented at ICSE 2010.
Leia menos
Leia mais
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 30
Recomendados
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
Thomas Zimmermann
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
Thomas Zimmermann
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and Testers
TechWell
Peter Zimmerer - Evolve Design For Testability To The Next Level - EuroSTAR 2012
Peter Zimmerer - Evolve Design For Testability To The Next Level - EuroSTAR 2012
TEST Huddle
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
Crystal Thomas
Software Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and Management
CSCJournals
Moxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating System
Digital River
Software Testability
Software Testability
Kai Feng Zhang
Recomendados
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
Thomas Zimmermann
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
Thomas Zimmermann
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and Testers
TechWell
Peter Zimmerer - Evolve Design For Testability To The Next Level - EuroSTAR 2012
Peter Zimmerer - Evolve Design For Testability To The Next Level - EuroSTAR 2012
TEST Huddle
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
Crystal Thomas
Software Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and Management
CSCJournals
Moxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating System
Digital River
Software Testability
Software Testability
Kai Feng Zhang
Aspect Mining for Large Systems
Aspect Mining for Large Systems
Thomas Zimmermann
Mining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software Changes
Thomas Zimmermann
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
Thomas Zimmermann
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
Thomas Zimmermann
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
yguarata
Security trend analysis with CVE topic models
Security trend analysis with CVE topic models
Thomas Zimmermann
Automatic Identification of Bug-Introducing Changes
Automatic Identification of Bug-Introducing Changes
Thomas Zimmermann
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
Thomas Zimmermann
Software Analytics = Sharing Information
Software Analytics = Sharing Information
Thomas Zimmermann
Philips lighting ppt
Philips lighting ppt
Sanju Choudhary
Analytics for smarter software development
Analytics for smarter software development
Thomas Zimmermann
Cross-project defect prediction
Cross-project defect prediction
Thomas Zimmermann
Bug best practice
Bug best practice
gaoliang641
What if you could eliminate the hidden costs of development?
What if you could eliminate the hidden costs of development?
Rogue Wave Software
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
Jeremiah Grossman
STM-UNIT-1.pptx
STM-UNIT-1.pptx
nischal55
5-Ways-to-Revolutionize-Your-Software-Testing
5-Ways-to-Revolutionize-Your-Software-Testing
Mary Clemons
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
TDC PoA submission
TDC PoA submission
Marcelo Yuri Benesciutti
Steve mcconnell
Steve mcconnell
Shiraz316
Workshop on software product development the backdrop
Workshop on software product development the backdrop
Joy Prabhakaran
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
WhiteSource
Mais conteúdo relacionado
Destaque
Aspect Mining for Large Systems
Aspect Mining for Large Systems
Thomas Zimmermann
Mining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software Changes
Thomas Zimmermann
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
Thomas Zimmermann
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
Thomas Zimmermann
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
yguarata
Security trend analysis with CVE topic models
Security trend analysis with CVE topic models
Thomas Zimmermann
Automatic Identification of Bug-Introducing Changes
Automatic Identification of Bug-Introducing Changes
Thomas Zimmermann
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
Thomas Zimmermann
Software Analytics = Sharing Information
Software Analytics = Sharing Information
Thomas Zimmermann
Philips lighting ppt
Philips lighting ppt
Sanju Choudhary
Destaque
(10)
Aspect Mining for Large Systems
Aspect Mining for Large Systems
Mining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software Changes
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
DynaMine: Finding Common Error Patterns by Mining Software Revision Histories
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
A Bug Report Analysis and Search Tool (presentation for M.Sc. degree)
Security trend analysis with CVE topic models
Security trend analysis with CVE topic models
Automatic Identification of Bug-Introducing Changes
Automatic Identification of Bug-Introducing Changes
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
Software Analytics = Sharing Information
Software Analytics = Sharing Information
Philips lighting ppt
Philips lighting ppt
Semelhante a Characterizing and predicting which bugs get fixed
Analytics for smarter software development
Analytics for smarter software development
Thomas Zimmermann
Cross-project defect prediction
Cross-project defect prediction
Thomas Zimmermann
Bug best practice
Bug best practice
gaoliang641
What if you could eliminate the hidden costs of development?
What if you could eliminate the hidden costs of development?
Rogue Wave Software
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
Jeremiah Grossman
STM-UNIT-1.pptx
STM-UNIT-1.pptx
nischal55
5-Ways-to-Revolutionize-Your-Software-Testing
5-Ways-to-Revolutionize-Your-Software-Testing
Mary Clemons
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
TDC PoA submission
TDC PoA submission
Marcelo Yuri Benesciutti
Steve mcconnell
Steve mcconnell
Shiraz316
Workshop on software product development the backdrop
Workshop on software product development the backdrop
Joy Prabhakaran
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
WhiteSource
Defect Prevention & Predictive Analytics - XBOSoft Webinar
Defect Prevention & Predictive Analytics - XBOSoft Webinar
XBOSoft
SW Engineering Management
SW Engineering Management
Robert Sayegh
Performance Testing And Beyond
Performance Testing And Beyond
Peter Brown
Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
MBA_Community
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
Savinder Puri
1. introducción a la Ingeniería de Software (UTM 2071)
1. introducción a la Ingeniería de Software (UTM 2071)
Mario A Moreno Rocha
unit 1 ppt.pptx
unit 1 ppt.pptx
SadikshyaTimilsina1
Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021
Alexandre Rebert
Semelhante a Characterizing and predicting which bugs get fixed
(20)
Analytics for smarter software development
Analytics for smarter software development
Cross-project defect prediction
Cross-project defect prediction
Bug best practice
Bug best practice
What if you could eliminate the hidden costs of development?
What if you could eliminate the hidden costs of development?
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
STM-UNIT-1.pptx
STM-UNIT-1.pptx
5-Ways-to-Revolutionize-Your-Software-Testing
5-Ways-to-Revolutionize-Your-Software-Testing
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
TDC PoA submission
TDC PoA submission
Steve mcconnell
Steve mcconnell
Workshop on software product development the backdrop
Workshop on software product development the backdrop
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
Defect Prevention & Predictive Analytics - XBOSoft Webinar
Defect Prevention & Predictive Analytics - XBOSoft Webinar
SW Engineering Management
SW Engineering Management
Performance Testing And Beyond
Performance Testing And Beyond
Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
1. introducción a la Ingeniería de Software (UTM 2071)
1. introducción a la Ingeniería de Software (UTM 2071)
unit 1 ppt.pptx
unit 1 ppt.pptx
Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021
Mais de Thomas Zimmermann
MSR 2013 Preview
MSR 2013 Preview
Thomas Zimmermann
Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode Operations
Thomas Zimmermann
Klingon Countdown Timer
Klingon Countdown Timer
Thomas Zimmermann
Data driven games user research
Data driven games user research
Thomas Zimmermann
Empirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft Research
Thomas Zimmermann
Analytics for software development
Analytics for software development
Thomas Zimmermann
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Thomas Zimmermann
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Thomas Zimmermann
Meet Tom and his Fish
Meet Tom and his Fish
Thomas Zimmermann
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities
Thomas Zimmermann
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software Engineering
Thomas Zimmermann
Mining Workspace Updates in CVS
Mining Workspace Updates in CVS
Thomas Zimmermann
Mining Software Archives to Support Software Development
Mining Software Archives to Support Software Development
Thomas Zimmermann
Unit testing with JUnit
Unit testing with JUnit
Thomas Zimmermann
esolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachen
Thomas Zimmermann
TA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software Repositories
Thomas Zimmermann
Fine-grained Processing of CVS Archives with APFEL
Fine-grained Processing of CVS Archives with APFEL
Thomas Zimmermann
How History Justifies System Architecture (or Not)
How History Justifies System Architecture (or Not)
Thomas Zimmermann
HATARI: Raising Risk Awareness
HATARI: Raising Risk Awareness
Thomas Zimmermann
Mining Version Archives for Co-changed Lines
Mining Version Archives for Co-changed Lines
Thomas Zimmermann
Mais de Thomas Zimmermann
(20)
MSR 2013 Preview
MSR 2013 Preview
Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode Operations
Klingon Countdown Timer
Klingon Countdown Timer
Data driven games user research
Data driven games user research
Empirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft Research
Analytics for software development
Analytics for software development
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Meet Tom and his Fish
Meet Tom and his Fish
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software Engineering
Mining Workspace Updates in CVS
Mining Workspace Updates in CVS
Mining Software Archives to Support Software Development
Mining Software Archives to Support Software Development
Unit testing with JUnit
Unit testing with JUnit
esolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachen
TA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software Repositories
Fine-grained Processing of CVS Archives with APFEL
Fine-grained Processing of CVS Archives with APFEL
How History Justifies System Architecture (or Not)
How History Justifies System Architecture (or Not)
HATARI: Raising Risk Awareness
HATARI: Raising Risk Awareness
Mining Version Archives for Co-changed Lines
Mining Version Archives for Co-changed Lines
Último
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Último
(20)
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Characterizing and predicting which bugs get fixed
1.
Characterizing and Predicting
Which Bugs Get Fixed Philip Guo, Stanford University Thomas Zimmermann, Microsoft Research Nachiappan Nagappan, Microsoft Research Brendan Murphy, Microsoft Research © Microsoft Corporation
2.
A confession…
3.
Opinions expressed on
this slide are the personal opinions of the presenter, not of Microsoft. ;-)
4.
5.
6.
Incomplete bugs Duplicate bugs
7.
Too many bugs
8.
Not all bugs
get fixed • Bug #1 occurs rarely and affects only a few users. – Changes required to fix Bug #1 could be large and expensive. • Fixing Bug #2 could introduce new bugs – Code changes that fix bugs are up to twice as likely to introduce new bugs as other kinds of changes. • Users are relying on existing behavior – Fixing the bug could break their systems. © Microsoft Corporation
9.
Research question
How do factors related to people and bug report edits affect whether a bug is successfully resolved as FIXED? → Inefficiencies in bug triaging process → Inform design of tools and policies © Microsoft Corporation
10.
Bug handling is
pervasive 24,000+ MSFT employees reported, commented on, or handled at least one bug in Windows (vs. 2,000+ Windows developers) © Microsoft Corporation
11.
Methodology
Qualitative Quantitative survey data analysis Reputation • Interest • Reassignments • Distance • Additional qualitative factors from survey © Microsoft Corporation
12.
Qualitative survey
• In your experience, how do each of these factors affect the chances of whether a bug will get successfully resolved as FIXED? – 7-point Likert scale • Sent to 1,773 Microsoft employees – Employees who opened OR were assigned to OR resolved most Windows Vista bugs – 358 responded (20%) © Microsoft Corporation
13.
SURVEY: How does
the bug report's activity affect the chances of it being successfully fixed? Severity upgraded Severity downgraded Few editors (<10) Many editors (>=10) No re-assignments (0) Few re-assignments (1-5) Many re-assignments (>30) At least 1 re-open -3 -2 -1 0 1 2 3 Decreases chances of fix Increases chances of fix © Microsoft Corporation
14.
SURVEY: How do
the people involved in addressing the bug affect the chances of it being successfully fixed? Opener/assignee same person Same manager Same building Same country Different managers Different countries Opened by temp. employee Assigned to temp. employee -3 -2 -1 0 1 2 3 Decreases chances of fix Increases chances of fix © Microsoft Corporation
15.
Other qualitative factors
Textual quality of bug report: “Just to re-emphasize: The quality of the bug description is very important. Not necessarily filling in the dozens of fields in the bug database with all sorts of crap (build numbers, dates, classifications, etc) - but just the plain-text description of the problem, the implication and maybe even the potential solution.” Perceived customer/business impact: “Customer impact can be a very big impact on a bug if evidence exists to show the cost of not fixing the bug for one or more customers.” Rank and seniority of bug opener: “A bug opened because something went wrong on a VPs [vice president’s] laptop has better chance [of being fixed] than a bug opened because the same thing happened to an intern.” Interpersonal skills of bug opener: “One other ‘soft’ factor is the speaking skill persuasiveness of the developer (or other representative) when arguing for the bug.” © Microsoft Corporation
16.
Quantitative data analysis
• Correlate likelihood of bug report getting fixed – Reputation • Interest • Reassignments • Distance • Windows Vista and Windows 7 bug reports – Bug lifetime: open, assign, edit, resolve, close • Microsoft employee data – Manager, Building, Country © Microsoft Corporation
17.
#1: Reputation
“A big influence [on bug fixes] is the reputation of the person opening the bug. If submitter has a history of submitting high quality bugs then new bugs from that person get better attention [...]” From anonymous survey respondent © Microsoft Corporation
18.
Quantifying reputation
For each bug, calculate opener’s reputation by aggregating over all bugs in the past. Hooimeijer and Weimer: Modeling bug report quality. ASE 2007. © Microsoft Corporation
19.
Reputation vs. bug
fixes © Microsoft Corporation
20.
Reputation vs. bug
fixes © Microsoft Corporation
21.
#2: Interest
Windows Vista Windows 7 © Microsoft Corporation
22.
#3: Reassignments
Severity upgraded Severity downgraded Few editors (<10) Many editors (>=10) No re-assignments (0) Few re-assignments (1-5) Many re-assignments (>30) At least 1 re-open -3 -2 -1 0 1 2 3 © Microsoft Corporation
23.
#3: Reassignments
Windows Vista Windows 7 © Microsoft Corporation
24.
The need for
reassignments “Bugs many times are exposed in the UI [user interface], but are not caused by the team writing the UI code. These bugs can pass down several layers of components before landing on a lower level component owner.” From anonymous survey respondent © Microsoft Corporation
25.
#4: Geographical distance ©
Microsoft Corporation
26.
#5: Organizational distance ©
Microsoft Corporation
27.
Trust vs. distance
“Whenever I open bugs assigned to people I know, they are investigated thoroughly as there is a trust in the report I write. Often when reporting a bug within areas where I don't know the owners, there is inherent distrust in the bug report.” From anonymous survey respondent © Microsoft Corporation
28.
Predictive model
• At bug opening time, predict probability of fix • Logistic regression model with 7 factors – Bug source – Reputation of bug opener – Reputation of first assignee – Initial severity level – Opened by temporary employee? – Opener & initial assignee had same manager? – Opener & initial assignee in same building? • Train on Windows Vista, predict Windows 7 fixes – 68% precision, 64% recall (0.50 cut-off) © Microsoft Corporation
29.
Recommendations
• Train and incentivize employees to write higher-quality bug reports • Improve awareness of developers’ expertise to minimize reassignments • Improve communication and trust amongst people in different teams and locations • Encourage more objectivity in prioritizing and handling bugs © Microsoft Corporation
30.
Summary
• Characterization of which bug reports get fixed. – At least one reassignment increases but too many reassignments decrease the likelihood – The higher reputation a bug opener has, the more likely his/her bugs are to get fixed. – Bugs handled by multiple teams and across multiple locations are less likely to get fixed. • Survey results provide insights into social factors that affect the bug triaging process. – Seniority, reputation, personal relations, and trust. © Microsoft Corporation