Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Efficient static analysis and verification of featured transition systems
Abstract

A Featured Transition System (FTS) models the behaviour of all products of a Software Product Line (SPL) in a single compact structure, by associating action-labelled transitions with features that condition their presence in product behaviour. It ...

research-article
Conclusion stability for natural language based mining of design discussions
Abstract

Developer discussions range from in-person hallway chats to comment chains on bug reports. Being able to identify discussions that touch on software design would be helpful in documentation and refactoring software. Design mining is the ...

research-article
TaintBench: Automatic real-world malware benchmarking of Android taint analyses
Abstract

Due to the lack of established real-world benchmark suites for static taint analyses of Android applications, evaluations of these analyses are often restricted and hard to compare. Even in evaluations that do use real-world apps, details about ...

research-article
Studying eventual connectivity issues in Android apps
Abstract

Mobile apps have become indispensable for daily life, not only for individuals but also for companies/organizations that offer their services digitally. Inherited by the mobility of devices, there are no limitations regarding the locations or ...

research-article
An exploratory study on the repeatedly shared external links on Stack Overflow
Abstract

On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack ...

research-article
Deep security analysis of program code: A systematic literature review
Abstract

Due to the continuous digitalization of our society, distributed and web-based applications become omnipresent and making them more secure gains paramount relevance. Deep learning (DL) and its representation learning approach are increasingly been ...

research-article
Demystifying regular expression bugs: A comprehensive study on regular expression bug causes, fixes, and testing
Abstract

Regular expressions cause string-related bugs and open security vulnerabilities for DOS attacks. However, beyond ReDoS (Regular expression Denial of Service), little is known about the extent to which regular expression issues affect software ...

research-article
Mining and relating design contexts and design patterns from Stack Overflow
Abstract

Design contexts are factors that shape a design, and whilst they are recognised by developers, they are typically tacit. Unlike software requirements, software engineering researchers have paid little attention to design contexts and there is ...

research-article
Reviewing rounds prediction for code patches
Abstract

Code review is one of the common activities to guarantee the reliability of software, while code review is time-consuming as it requires reviewers to inspect the source code of each patch. A patch may be reviewed more than once before it is ...

research-article
“More Than Deep Learning”: post-processing for API sequence recommendation
Abstract

In the daily development process, developers often need assistance in finding a sequence of APIs to accomplish their development tasks. Existing deep learning models, which have recently been developed for recommending one single API, can be ...

research-article
Game-based Sprint retrospectives: multiple action research
Abstract

In today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important ...

research-article
How do i refactor this? An empirical study on refactoring trends and topics in Stack Overflow
Abstract

An essential part of software maintenance and evolution, refactoring is performed by developers, regardless of technology or domain, to improve the internal quality of the system, and reduce its technical debt. However, choosing the appropriate ...

research-article
Dynamical analysis of diversity in rule-based open source network intrusion detection systems
Abstract

Diverse layers of defence play an important role in the design of defence-in-depth architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design. But the selection of the “right” IDSs in various configurations is an ...

research-article
Injecting software faults in Python applications: The OpenStack case study
Abstract

Software fault injection techniques have been largely used as means for evaluating the dependability of systems in presence of certain types of faults. Despite the large diversity of tools offering the possibility of emulating the presence of ...

research-article
Information retrieval versus deep learning approaches for generating traceability links in bilingual projects
Abstract

Software traceability links are established between diverse artifacts of the software development process in order to support tasks such as compliance analysis, safety assurance, and requirements validation. However, practice has shown that it is ...

research-article
Quick remedy commits and their impact on mining software repositories
Abstract

Most changes during software maintenance and evolution are not atomic changes, but rather the result of several related changes affecting different parts of the code. It may happen that developers omit needed changes, thus leaving a task partially ...

research-article
Developers perception of peer code review in research software development
AbstractContext

Research software is software developed by and/or used by researchers, across a wide variety of domains, to perform their research. Because of the complexity of research software, developers cannot conduct exhaustive testing. As a result, ...

research-article
An empirical study of developers’ discussions about security challenges of different programming languages
Abstract

Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting programming languages for developing software systems. Inadequate consideration of ...

research-article
Ethics in the mining of software repositories
Abstract

Research in Mining Software Repositories (MSR) is research involving human subjects, as the repositories usually contain data about developers’ and users’ interactions with the repositories and with each other. The ethics issues raised by such ...

research-article
GitHub Discussions: An exploratory study of early adoption
Abstract

Discussions is a new feature of GitHub for asking questions or discussing topics outside of specific Issues or Pull Requests. Before being available to all projects in December 2020, it had been tested on selected open source software projects. To ...

research-article
Studying donations and their expenses in open source projects: a case study of GitHub projects collecting donations through open collectives
Abstract

Operating an open source project requires not only intrinsic motivation (e.g., the joy of participation) but also extrinsic motivation (e.g., financial incentives). Almost 95% of open source projects are no longer maintained after a year. Nowadays,...

research-article
On the analysis of non-coding roles in open source development: An empirical study of NPM package projects
Abstract

The role of non-coding contributors in Open Source Software (OSS) is poorly understood. Most of current research around OSS development focuses on the coding aspects of the project (e.g., commits, pull requests or code reviews) while ignoring the ...

research-article
Enjoy your observability: an industrial survey of microservice tracing and analysis
Abstract

Microservice systems are often deployed in complex cloud-based environments and may involve a large number of service instances being dynamically created and destroyed. It is thus essential to ensure observability to understand these microservice ...

research-article
Omni: automated ensemble with unexpected models against adversarial evasion attack
AbstractContext

Machine learning-based security detection models have become prevalent in modern malware and intrusion detection systems. However, previous studies show that such models are susceptible to adversarial evasion attacks. In this type of attack,...

research-article
Rap4DQ: Learning to recommend relevant API documentation for developer questions
Abstract

Developers often face difficulties in using different API methods during the software development process. Answering API related questions on API Q&A forums often costs API development teams a lot of time. To help save time for API development ...

research-article
Using code reviews to automatically configure static analysis tools
Abstract

Developers often use Static Code Analysis Tools (SCAT) to automatically detect different kinds of quality flaws in their source code. Since many warnings raised by SCATs may be irrelevant for a project/organization, it can be possible to leverage ...

Comments