-
Article
Post deployment recycling of machine learning models
Once a Machine Learning (ML) model is deployed, the same model is typically retrained from scratch, either on a scheduled interval or as soon as model drift is detected, to make sure the model reflects current...
-
Article
An empirical study of challenges in machine learning asset management
In machine learning (ML) applications, assets include not only the ML models themselves, but also the datasets, algorithms, and deployment tools that are essential in the development, training, and implementat...
-
Article
VulNet: Towards improving vulnerability management in the Maven ecosystem
Developers rely on software ecosystems such as Maven to manage and reuse external libraries (i.e., dependencies). Due to the complexity of the used dependencies, developers may face challenges in choosing whic...
-
Article
A large-scale exploratory study on the proxy pattern in Ethereum
The proxy pattern is a well-known design pattern with numerous use cases in several sectors of the software industry (e.g., network applications, microservices, and IoT). As such, the use of the proxy pattern ...
-
Article
Using knowledge units of programming languages to recommend reviewers for pull requests: an empirical study
Determining the right code reviewer for a given code change requires understanding the characteristics of the changed code, identifying the skills of each potential reviewer (expertise profile), and finding a ...
-
Article
Unreproducible builds: time to fix, causes, and correlation with external ecosystem factors
A reproducible build occurs if, given the same source code, build instructions, and build environment (i.e., installed build dependencies), compiling a software project repeatedly generates the same build arti...
-
Article
On the coordination of vulnerability fixes
The Common Vulnerabilities and Exposures (CVE) program is dedicated to analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the vulnerabilities to affected software vendors. A CVE Nu...
-
Article
On practitioners’ concerns when adopting service mesh frameworks
The emerging service mesh architecture tries to simplify microservices by delegating crucial tasks to dedicated infrastructure. However, service mesh introduces new notions and enables complex capabilities suc...
-
Article
Open AccessExperimental and Numerical Investigations of Using Nanoparticles in Groundwater Remediation
The efficiency of using zeolite nano-clay and silica sand in removing iron from groundwater is investigated experimentally as an application of in situ remediation technique using permeable reactive barrier (P...
-
Article
Vulnerability management in Linux distributions
Vulnerabilities in software systems not only lead to loss of revenue, but also to loss of reputation and trust. To avoid this, software providers strive to remedy vulnerabilities rapidly for their customers. H...
-
Article
What makes Ethereum blockchain transactions be processed fast or slow? An empirical study
The Ethereum platform allows developers to implement and deploy applications called ÐApps onto the blockchain for public use through the use of smart contracts. To execute code within a smart contract, a paid ...
-
Article
An empirical study of question discussions on Stack Overflow
Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments ...
-
Article
Upstream bug management in Linux distributions
A Linux distribution consists of thousands of packages that are either developed by in-house developers (in-house packages) or by external projects (upstream packages). Leveraging upstream packages speeds up d...
-
Article
Revisiting reopened bugs in open source software systems
Reopened bugs can degrade the overall quality of a software system since they require unnecessary rework by developers. Moreover, reopened bugs also lead to a loss of trust in the end-users regarding the quali...
-
Article
Tracking bad updates in mobile apps: a search-based approach
The rapid growth of the mobile applications development industry raises several new challenges to developers as they need to respond quickly to the users’ needs in a world of continuous changes. Indeed, mobile...
-
Article
An empirical study on release notes patterns of popular apps in the Google Play Store
Release notes of a new mobile release provide valuable information for app users about the updated functionality of an app. Moreover, app developers can use the release notes to inform users about the resoluti...
-
Article
Open AccessModeling radial groundwater flow in fractured media using fracture continuum approach
Two modeling approaches are commonly utilized for simulating flow in fractured formations: the discrete fracture network (DFN) approach and the stochastic continuum (SC) approach. Although the DFN approach is ...
-
Article
Studying donations and their expenses in open source projects: a case study of GitHub projects collecting donations through open collectives
Operating an open source project requires not only intrinsic motivation (e.g., the joy of participation) but also extrinsic motivation (e.g., financial incentives). Almost 95% of open source projects are no lo...
-
Article
An exploratory study on the repeatedly shared external links on Stack Overflow
On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend th...
-
Article
Assessment of groundwater development potential in Upper Cretaceous aquifer in Sinai, Egypt
Regular assessment of groundwater potential is vital especi...