PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM

Hiearchical Instrumentation Mining Predicated Bug Signature (HIMPS) is a method for localizing bug that produces bug signatures in the form of predicate set. In general, HIMPS consists of 2 stages, namely the coarse-grained level and the fine-grained level. These two stages have differences in th...

Full description

Saved in:
Bibliographic Details
Main Author: Azka Widyanto, Muhammad
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/53923
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:53923
spelling id-itb.:539232021-03-12T10:59:48ZPREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM Azka Widyanto, Muhammad Indonesia Final Project HIMPS, Bug Localization, Predicate INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/53923 Hiearchical Instrumentation Mining Predicated Bug Signature (HIMPS) is a method for localizing bug that produces bug signatures in the form of predicate set. In general, HIMPS consists of 2 stages, namely the coarse-grained level and the fine-grained level. These two stages have differences in the signature profile that is processed. At the coarse-grained level, input of a program is received to be used as a coarse-grained profile, so that a function list is generated with its Discriminative Significance value. Then, the function list is used as input in the initial stage of the fine-grained level which is then processed into a predicate set. This predicate set will be pre-processed and bug signature mining will be carried out so that the Discriminative Significance value that meets a threshold will be obtained for top-K bug Signature. This final project aims to test and analyze the performance of the HIMPS bug localization method against the Predicated Bug Signature. This is done by conducting theoretical studies as well as experiments using several input programs that have various number of predicates. With the various number of predicates, HIMPS performance is obtained which will be the data to be analyzed against the experimental results of the Predicated Bug Signature. In this final project, 2 programs were built, namely the Code Processor program and the HIMPS program. The experimental scheme is to run the two programs which are built to localize bugs for several input programs with a varying number of functions and predicates. From the experiment, the number of input program predicates, the execution time, and the amount of memory used during bug localization for an input program is obtained. After that, an analysis of the results of the HIMPS and Predicated Bug Signature experiments was carried out based on the number of input program predicates, execution time, and memory used. The experimental results show that HIMPS has a faster time performance than the Predicated Bug Signature. However, in terms of memory, HIMPS uses more memory than the Predicated Bug Signature. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Hiearchical Instrumentation Mining Predicated Bug Signature (HIMPS) is a method for localizing bug that produces bug signatures in the form of predicate set. In general, HIMPS consists of 2 stages, namely the coarse-grained level and the fine-grained level. These two stages have differences in the signature profile that is processed. At the coarse-grained level, input of a program is received to be used as a coarse-grained profile, so that a function list is generated with its Discriminative Significance value. Then, the function list is used as input in the initial stage of the fine-grained level which is then processed into a predicate set. This predicate set will be pre-processed and bug signature mining will be carried out so that the Discriminative Significance value that meets a threshold will be obtained for top-K bug Signature. This final project aims to test and analyze the performance of the HIMPS bug localization method against the Predicated Bug Signature. This is done by conducting theoretical studies as well as experiments using several input programs that have various number of predicates. With the various number of predicates, HIMPS performance is obtained which will be the data to be analyzed against the experimental results of the Predicated Bug Signature. In this final project, 2 programs were built, namely the Code Processor program and the HIMPS program. The experimental scheme is to run the two programs which are built to localize bugs for several input programs with a varying number of functions and predicates. From the experiment, the number of input program predicates, the execution time, and the amount of memory used during bug localization for an input program is obtained. After that, an analysis of the results of the HIMPS and Predicated Bug Signature experiments was carried out based on the number of input program predicates, execution time, and memory used. The experimental results show that HIMPS has a faster time performance than the Predicated Bug Signature. However, in terms of memory, HIMPS uses more memory than the Predicated Bug Signature.
format Final Project
author Azka Widyanto, Muhammad
spellingShingle Azka Widyanto, Muhammad
PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
author_facet Azka Widyanto, Muhammad
author_sort Azka Widyanto, Muhammad
title PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
title_short PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
title_full PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
title_fullStr PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
title_full_unstemmed PREDICATED BUG SIGNATURE MINING VIA HIERARCHICAL INSTRUMENTATION METHOD DEVELOPMENT FOR BUG LOCALIZATION IN PROGRAM
title_sort predicated bug signature mining via hierarchical instrumentation method development for bug localization in program
url https://digilib.itb.ac.id/gdl/view/53923
_version_ 1822929468935634944