News
In this paper, we propose a method to quickly locate the buggy file in a source ... code product metrics. (3) The change history mining approach ranks files based on prediction of the fault-prone ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results