Skip to main content

and
  1. No Access

    Article

    Quantifying and characterizing clones of self-admitted technical debt in build systems

    Self-Admitted Technical Debt (SATD) annotates development decisions that intentionally exchange long-term software artifact quality for short-term goals. Recent work explores the existence of SATD clones (dupl...

    Tao **ao, Zhili Zeng, Dong Wang, Hideaki Hata in Empirical Software Engineering (2024)

  2. No Access

    Article

    18 million links in commit messages: purpose, evolution, and decay

    Commit messages contain diverse and valuable types of knowledge in all aspects of software maintenance and evolution. Links are an example of such knowledge. Previous work on “9.6 million links in source code ...

    Tao **ao, Sebastian Baltes, Hideaki Hata in Empirical Software Engineering (2023)

  3. Article

    Open Access

    A framework for conditional statement technical debt identification and description

    Technical Debt occurs when development teams favour short-term operability over long-term stability. Since this places software maintainability at risk, technical debt requires early attention to avoid paying ...

    Abdulaziz Alhefdhi, Hoa Khanh Dam, Yusuf Sulistyo Nugroho in Automated Software Engineering (2022)

  4. Article

    Open Access

    GitHub Discussions: An exploratory study of early adoption

    Discussions is a new feature of GitHub for asking questions or discussing topics outside of specific Issues or Pull Requests. Before being available to all projects in December 2020, it had been tested on sele...

    Hideaki Hata, Nicole Novielli, Sebastian Baltes in Empirical Software Engineering (2021)

  5. Article

    Open Access

    How are project-specific forums utilized? A study of participation, content, and sentiment in the Eclipse ecosystem

    Although many software development projects have moved their developer discussion forums to generic platforms such as Stack Overflow, Eclipse has been steadfast in hosting their self-supported community forums...

    Yusuf Sulistyo Nugroho, Syful Islam, Keitaro Nakasai in Empirical Software Engineering (2021)

  6. No Access

    Article

    Revenue maximizing markets for zero-day exploits

    Markets for zero-day exploits (software vulnerabilities unknown to the software vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspecti...

    Mingyu Guo, Guanhua Wang, Hideaki Hata in Autonomous Agents and Multi-Agent Systems (2021)

  7. Article

    Open Access

    Correction to: Wait for it: identifying “On-Hold” self-admitted technical debt

    A Correction to this paper has been published: https://doi.org/10.1007/s10664-021-09939-7

    Rungroj Maipradit, Christoph Treude, Hideaki Hata in Empirical Software Engineering (2021)

  8. Article

    Open Access

    Pandemic programming

    As a novel coronavirus swept the world in early 2020, thousands of software developers began working from home. Many did so on short notice, under difficult and stressful conditions.

    Paul Ralph, Sebastian Baltes, Gianisa Adisaputri in Empirical Software Engineering (2020)

  9. Article

    Open Access

    Wait for it: identifying “On-Hold” self-admitted technical debt

    Self-admitted technical debt refers to situations where a software developer knows that their current implementation is not optimal and indicates this using a source code comment. In this work, we hypothesize ...

    Rungroj Maipradit, Christoph Treude, Hideaki Hata in Empirical Software Engineering (2020)

  10. Article

    Open Access

    Ammonia: an approach for deriving project-specific bug patterns

    Finding and fixing buggy code is an important and cost-intensive maintenance task, and static analysis (SA) is one of the methods developers use to perform it. SA tools warn developers about potential bugs by ...

    Yoshiki Higo, Shinpei Hayashi, Hideaki Hata in Empirical Software Engineering (2020)

  11. Article

    Open Access

    How different are different diff algorithms in Git?

    Automatic identification of the differences between two versions of a file is a common and basic task in several applications of mining code repositories. Git, a version control system, has a diff utility and ...

    Yusuf Sulistyo Nugroho, Hideaki Hata, Kenichi Matsumoto in Empirical Software Engineering (2020)

  12. No Access

    Chapter and Conference Paper

    Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets

    Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents’ valuation...

    Mingyu Guo, Hideaki Hata, Ali Babar in PRIMA 2017: Principles and Practice of Mul… (2017)

  13. No Access

    Chapter and Conference Paper

    Revenue Maximizing Markets for Zero-Day Exploits

    Markets for zero-day exploits (software vulnerabilities unknown to the vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspective. We fi...

    Mingyu Guo, Hideaki Hata, Ali Babar in PRIMA 2016: Principles and Practice of Mul… (2016)

  14. No Access

    Chapter and Conference Paper

    Impact Analysis of Granularity Levels on Feature Location Technique

    Due to the increasing of software requirements and software features, modern software systems continue to grow in size and complexity. Locating source code entities that required to implement a feature in mill...

    Chakkrit Tantithamthavorn, Akinori Ihara, Hideaki Hata in Requirements Engineering (2014)

  15. No Access

    Article

    Fault-prone module detection using large-scale text features based on spam filtering

    This paper proposes an approach using large-scale text features for fault-prone module detection inspired by spam filtering. The number of every text feature in the source code of a module is counted and used ...

    Hideaki Hata, Osamu Mizuno, Tohru Kikuno in Empirical Software Engineering (2010)

  16. No Access

    Chapter and Conference Paper

    An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics

    Early detection of fault-prone products is necessary to assure the quality of software product. Therefore, fault-prone module detection is one of the major and traditional area of software engineering. Althoug...

    Osamu Mizuno, Hideaki Hata in Advances in Computer Science and Information Technology (2010)

  17. No Access

    Chapter and Conference Paper

    Yet Another Metric for Predicting Fault-Prone Modules

    Recently, machine learning approaches have been widely used for fault-proneness detection. Introduction of machine learning approaches induces development of new software metrics for fault-prone module detecti...

    Osamu Mizuno, Hideaki Hata in Advances in Software Engineering (2009)