No abstract available.
Proceeding Downloads
Addressing scalability in API method call analytics
Intelligent code completion recommends relevant code to developers by comparing the editor content to code patterns extracted by analyzing large repositories. However, with the vast amount of data available in such repositories, scalability of the ...
Vulnerability severity scoring and bounties: why the disconnect?
The Common Vulnerability Scoring System (CVSS) is the de facto standard for vulnerability severity measurement today and is crucial in the analytics driving software fortification. Required by the U.S. National Vulnerability Database, over 75,000 ...
A replication study: mining a proprietary temporal defect dataset
We conduct a replication study to define temporal patterns of activity sequences in a proprietary dataset, and compare them with an open-source dataset. Temporal bug repository data may give many insights in the context of root-cause analysis of ...
A hybrid model for task completion effort estimation
Predicting time and effort of software task completion has been an active area of research for a long time. Previous studies have proposed predictive models based on either text data or metadata of software tasks to estimate either completion time or ...
Analyzing on-boarding time in context of crowdsourcing
Crowdsourcing is an emerging area which leverages collective intelligence of the crowd. Although crowdsourcing provides several benefits, it also brings uncertainty in any project execution. The uncertainty may be because of the time taken in on-...
Software crowdsourcing reliability: an empirical study on developers behavior
Crowdsourcing has become an emergent paradigm for software production in recent decades. Its open-call format attracts the participation of hundreds of thousands of developers. To ensure the success of software crowdsourcing, we must accurately measure ...
FourD: do developers discuss design? revisited
Software repositories contain a variety of information that can be mined and utilized to enhance software engineering processes. Patterns stored in software repository meta-data can provide useful and informative information about different aspects of a ...
Sampling code clones from program dependence graphs with GRAPLE
We present GRAPLE, a method to generate a representative sample of recurring (frequent) subgraphs of any directed labeled graph(s). GRAPLE is based on frequent subgraph mining, absorbing Markov chains, and Horvitz-Thompson estimation. It can be used to ...
Index Terms
- Proceedings of the 2nd International Workshop on Software Analytics