The building of software packages is a compute-intensive process, especially for relatively large software. Changes that can detrimentally affect the build process are often not detected until resource consumption impact reaches critical levels. These changes become increasingly difficult to detect and isolate as time passes from the date of the change, resulting in capacity crunches and an overall slowdown of the build process. This disclosure provides techniques to automatically detect resource consumption anomalies in the build process either in real time or soon after such anomalies arise. Anomalous events, e.g., relatively large changes in resource consumption not attributable to changes in the number of users or projects, are detected...
Security is becoming a must in the current all-connected paradigm. Software updates are essential to...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Part 3: Mining OSS DataInternational audienceWith almost 20 years of research, Process Mining can no...
Large-scale software codebases are updated frequently by a large number of developers, leading to a ...
This paper analyses the effect of the effort distribution along the software development lifecycle o...
Automated build systems are routinely used by software engineers to minimize the number of objects t...
In the era of information technology, businesses have changed the way they work. Operations, which h...
The configuration management repository includes abundant data not only on configuration items, but ...
Copyright © 2014 Javier Alfonso-Cendón et al. This is an open access article distributed under the ...
This thesis aims to uncover anomalies in the data describing the performance behavior of a "robot co...
In some domains of application, like software development and health care processes, a normative bus...
International audienceModern component frameworks support continuous deployment and simultaneous exe...
Software developers' activities are in general recorded in software repositories such as version con...
We present Build Analyzer, a tool that helps developers optimize the build performance of huge syste...
Security is becoming a must in the current all-connected paradigm. Software updates are essential to...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Part 3: Mining OSS DataInternational audienceWith almost 20 years of research, Process Mining can no...
Large-scale software codebases are updated frequently by a large number of developers, leading to a ...
This paper analyses the effect of the effort distribution along the software development lifecycle o...
Automated build systems are routinely used by software engineers to minimize the number of objects t...
In the era of information technology, businesses have changed the way they work. Operations, which h...
The configuration management repository includes abundant data not only on configuration items, but ...
Copyright © 2014 Javier Alfonso-Cendón et al. This is an open access article distributed under the ...
This thesis aims to uncover anomalies in the data describing the performance behavior of a "robot co...
In some domains of application, like software development and health care processes, a normative bus...
International audienceModern component frameworks support continuous deployment and simultaneous exe...
Software developers' activities are in general recorded in software repositories such as version con...
We present Build Analyzer, a tool that helps developers optimize the build performance of huge syste...
Security is becoming a must in the current all-connected paradigm. Software updates are essential to...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Part 3: Mining OSS DataInternational audienceWith almost 20 years of research, Process Mining can no...