4.6 Article

A data-driven risk measurement model of software developer turnover

Journal

SOFT COMPUTING
Volume 24, Issue 2, Pages 825-842

Publisher

SPRINGER
DOI: 10.1007/s00500-019-04540-z

Keywords

Data mining; Staff turnover; Risk measurement; Software project management; Information entropy

Funding

  1. National Natural Science Foundation of China [61662085, 61763048, 71972165]
  2. Yunnan University Data-Driven Software Engineering Provincial Science and Technology Innovation Team Project [2017HC012]
  3. 9th Post-Graduate Research Innovation Project of Yunnan University [YDY17093]
  4. Science and Technology Foundation of Yunnan Province [2017FB095, 201901S070110]
  5. Yunnan Provincial Natural Science Foundation Fundamental Research Project [2019FB-16]
  6. Yunnan University Dong Lu Young-backbone Teacher'' Training Program [C176220200]

Ask authors/readers for more resources

During the software development life cycle, the turnover of software developers is one of the critical risks that may lead to severe problems (such as postponement and failure of projects), which is often ignored by many professionals. To address this problem, we focus on the uncertainty of turnover risk of software developer (TRSD) and its loss incurred to projects. To tackle this problem, we propose a method to quantify the uncertain risks related to developer turnover, including resignation and replacement. Additionally, to calculate the extent of loss caused by TRSD, we employed machine learning, natural language processing, and data mining techniques to identify software development activities and establish the importance of developers by mining and analyzing the commit event logs. Moreover, based on the information entropy theory, we established a risk measurement model of TRSD that can be used to measure the risk level of each developer and the holistic risk of ongoing software projects. Finally, we validated the feasibility and efficacy through a case study.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification

Ming Zheng, Tong Li, Rui Zhu, Yahui Tang, Mingjing Tang, Leilei Lin, Zifei Ma

INFORMATION SCIENCES (2020)

Article Engineering, Electrical & Electronic

ETC-Oriented Efficient and Secure Blockchain: Credit-Based Mechanism and Evidence Framework for Vehicle Management

Jishu Wang, Rui Zhu, Tong Li, Fengsen Gao, Qiang Wang, Qiang Xiao

Summary: The study proposes a blockchain architecture for an electronic toll collection system, incorporating a vehicle behavior management mechanism based on credit value and an evidence chain framework. Additionally, a data protection method is designed to encrypt transaction data for data security during transactions.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Review Computer Science, Software Engineering

Understanding software architecture erosion: A systematic mapping study

Ruiyin Li, Peng Liang, Mohamed Soliman, Paris Avgeriou

Summary: This research systematically investigates the reasons, consequences, and ways of detecting and handling Architecture Erosion (AEr). It finds that AEr not only leads to architectural violations and structural issues, but also affects software quality and evolution. Non-technical reasons for AEr should receive equal attention as technical reasons, and a range of approaches and tools have been proposed to detect and tackle AEr. Empirical studies are needed to understand the practices of addressing AEr in industrial settings.

JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS (2022)

Article Chemistry, Multidisciplinary

Analysis of Malicious Node Identification Algorithm of Internet of Vehicles under Blockchain Technology: A Case Study of Intelligent Technology in Automotive Engineering

Jing Chen, Tong Li, Rui Zhu

Summary: This paper presents a block-network-based malicious node detection mechanism, which utilizes blockchain technology and malicious node identification algorithm to ensure smooth communication between vehicles and improve network transmission performance in the Internet of Vehicles.

APPLIED SCIENCES-BASEL (2022)

Article Engineering, Civil

BPR: Blockchain-Enabled Efficient and Secure Parking Reservation Framework With Block Size Dynamic Adjustment Method

Jishu Wang, Chao Zhu, Chen Miao, Rui Zhu, Xuan Zhang, Yahui Tang, Hexiang Huang, Chen Gao

Summary: This paper introduces a blockchain-enabled parking reservation framework to address the issues of low efficiency and malicious reservations in traditional parking lots. By designing a reputation mechanism and dynamically adjusting the block size, it effectively reduces malicious nodes and improves the performance balance of the blockchain.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Software Engineering

A-PGRD: Attention-based automatic business process model generation from RPA process description

Rui Zhu, Hang Liu, Xiaolong Xu, Leilei Lin, Yeting Chen, Wenxin Li

Summary: In this study, a neural network-based method with an attention mechanism is proposed for automatic business process model generation from RPA process descriptions. By analyzing natural language text documents and using unsupervised automation to generate tree-like business process graphs, the method improves learning efficiency and optimizes business processes.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Information Systems

GIMM: A graph convolutional network-based paraphrase identification model to detecting duplicate questions in QA communities

Kunpeng Du, Xuan Zhang, Chen Gao, Rui Zhu, Qiong Nong, Xianyu Yang, Chunlin Yin

Summary: Paraphrase Identification is a crucial task in NLP that aims to determine the semantic consistency between sentence pairs. This paper proposes a Graph-based Interaction Matching model (GIMM) that utilizes graph convolutional networks to effectively integrate the interactive information between sentences. Experimental results demonstrate the excellent performance of the proposed model.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Symptoms of Architecture Erosion in Code Reviews: A Study of Two OpenStack Projects

Ruiyin Li, Mohamed Soliman, Peng Liang, Paris Avgeriou

Summary: This study investigates the erosion symptoms discussed in code reviews, their trends, and the actions taken by developers in the OpenStack community. The findings show that code review is an effective way to reduce erosion symptoms, and analyzing the trend of erosion symptoms can provide insights into the erosion status of software systems and help avoid potential risks.

IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2022) (2022)

Proceedings Paper Computer Science, Software Engineering

Understanding Architecture Erosion: The Practitioners' Perceptive

Ruiyin Li, Peng Liang, Mohamed Soliman, Paris Avgeriou

Summary: As software systems evolve, their architecture can deviate from the changes in requirements, the environment, and the implementation, causing architecture erosion and impacting system maintenance and evolution. Developers usually identify architecture erosion through symptoms and find that it is caused not only by technical factors but also by non-technical factors.

2021 IEEE/ACM 29TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2021) (2021)

Article Computer Science, Software Engineering

A Discovery Method for Hierarchical Software Execution Behavior Models Based on Components

Yahui Tang, Tong Li, Rui Zhu, Fei Du, Jishu Wang, Zifei Ma

Summary: The paper proposes a component-based hierarchical software behavior model discovery method that can discover hierarchical nested call structures during software runtime, improving the fitness of the model. By partitioning the discovery model into several parts, it aims to improve the comprehensibility of the model and reflect the interaction behavior within and between components.

SCIENTIFIC PROGRAMMING (2021)

Proceedings Paper Computer Science, Software Engineering

Automatic Identification of Assumptions from the Hibernate Developer Mailing List

Ruiyin Li, Peng Liang, Chen Yang, Georgios Digkas, Alexander Chatzigeorgiou, Zhuang Xiong

2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC) (2019)

Article Computer Science, Information Systems

Automatic Real-Time Mining Software Process Activities From SVN Logs Using a Naive Bayes Classifier

Rui Zhu, Yichao Dai, Tong Li, Zifei Ma, Ming Zhen, Yahui Tang, Jiayi Yuan, Yue Huang

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Traffic Accident's Severity Prediction: A Deep-Learning Approach-Based CNN Network

Ming Zheng, Tong Li, Rui Zhu, Jing Chen, Zifei Ma, Mingjing Tang, Zhongqiang Cui, Zhan Wang

IEEE ACCESS (2019)

No Data Available