Clustering Similar Text Elements and Finding Duplicates Sample Clauses

Clustering Similar Text Elements and Finding Duplicates. In software projects, especially open source projects, there are often issue trackers where users can submit bug reports and feature requests. Popular projects have hundreds or even thousands of open issues. Once a new issue is submitted, one of the project maintainer needs to check and mark duplicates. Such task is important as it helps to reduce the number of open issues to those that matter. Research has tackled this problem by introducing automated approaches for detecting duplicates [40], [18]. In addition, research had tried to understand whether duplicates are harmful or not. For example, Xxxxxxxxxx et al. [2] found that duplicates are created because previous reports lack information and that duplicates can add value by including more information. Sometimes, bug reports are only interesting for developers if they have a certain level of severity and if a xxxxxxxx xxxx of people are affected [28]. Therefore, there are approaches that group issues by their type (e.g. bug reports, feature requests) and then cluster them by their similarity (e.g., based on NLP metrics, such as tf-idf). These clusters need to reach a minimum size to be considered for the next release of the software [37]. The specific approach to issues and bug report clustering varies a lot based on context. For example, developers and technical savvy stakeholders attach the stack trace (i.e., information about the active subroutines of the program affected by the bug) to the report. Consequently, machine learning techniques leverage these information to group stack traces together, which are more structured than natural language text, and extrapolate similar reports [53]. Evaluated internally at Microsoft, this approach resulted in a F-measure of 0.88 and can facilitate diagnosis and prioritization of issues to be addressed. However, as the authors report [53], its efficacy in large scale open source projects. Similarly, Xxxxx et al. [54] augmented natural language processing features with execution information about the context in which the issue/bug was observed. They were able, training their model on the Firefox bug report dataset, to detect up to 93% of duplicate bugs (compared to the 72% of using natural language features alone). Clustering issue trackers items and bug reports according to their text element is useful to automatically generate summaries. To that end, Xxxxxxx et al. [55] clustered bug reports leveraging their conversational features1 such as the position of the s...
AutoNDA by SimpleDocs

Related to Clustering Similar Text Elements and Finding Duplicates

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria

  • Unbundled Copper Loop – Designed (UCL-D) 2.4.2.1 The UCL-D will be provisioned as a dry copper twisted pair (2- or 4-wire) Loop that is unencumbered by any intervening equipment (e.g., filters, load coils, range extenders, digital loop carrier, or repeaters). 2.4.2.2 A UCL-D will be 18,000 feet or less in length and is provisioned according to Resistance Design parameters, may have up to 6,000 feet of bridged tap and will have up to 1300 Ohms of resistance. 2.4.2.3 The UCL-D is a designed circuit, is provisioned with a test point, and comes standard with a DLR. OC is a chargeable option for a UCL-D; however, OC is always required on UCLs where a reuse of existing facilities has been requested by Telepak Networks. 2.4.2.4 These Loops are not intended to support any particular services and may be utilized by Telepak Networks to provide a wide-range of telecommunications services as long as those services do not adversely affect BellSouth’s network. This facility will include a Network Interface Device (NID) at the customer’s location for the purpose of connecting the Loop to the customer’s inside wire. 2.4.2.5 Upon the Effective Date of this Agreement, Unbundled Copper Loop – Long (UCL-L) elements will no longer be offered by BellSouth and no new orders for UCL-L will be accepted. Any existing UCL-Ls that were provisioned prior to the Effective Date of this Agreement will be grandfathered at the rates set forth in the Parties’ interconnection agreement that was in effect immediately prior to the Effective Date of this Agreement. Existing UCL-Ls that were provisioned prior to the Effective Date of this Agreement may remain connected, maintained and repaired according to BellSouth’s TR73600 and may remain connected until such time as they are disconnected by Telepak Networks or BellSouth provides ninety

  • Unbundled Sub-Loop Distribution Voice Grade (USLD-VG) is a copper sub- loop facility from the cross-box in the field up to and including the point of demarcation at the End User’s premises and may have load coils.

  • Sub-loop Elements 2.8.1 Where facilities permit, BellSouth shall offer access to its Unbundled Sub-Loop (USL) elements as specified herein.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • Third Party Components The Products and Services may contain third party components (including open source software) subject to separate license agreements. To the limited extent a third party license expressly supersedes this XXXX, such third party license governs Customer’s use of that third party component.

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only)

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!