![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Quantifying and characterizing clones of self-admitted technical debt in build systems
Self-Admitted Technical Debt (SATD) annotates development decisions that intentionally exchange long-term software artifact quality for short-term goals. Recent work explores the existence of SATD clones (dupl...
-
Article
18 million links in commit messages: purpose, evolution, and decay
Commit messages contain diverse and valuable types of knowledge in all aspects of software maintenance and evolution. Links are an example of such knowledge. Previous work on “9.6 million links in source code ...
-
Article
Open AccessA framework for conditional statement technical debt identification and description
Technical Debt occurs when development teams favour short-term operability over long-term stability. Since this places software maintainability at risk, technical debt requires early attention to avoid paying ...
-
Article
Open AccessGitHub Discussions: An exploratory study of early adoption
Discussions is a new feature of GitHub for asking questions or discussing topics outside of specific Issues or Pull Requests. Before being available to all projects in December 2020, it had been tested on sele...
-
Article
Open AccessHow are project-specific forums utilized? A study of participation, content, and sentiment in the Eclipse ecosystem
Although many software development projects have moved their developer discussion forums to generic platforms such as Stack Overflow, Eclipse has been steadfast in hosting their self-supported community forums...
-
Article
Revenue maximizing markets for zero-day exploits
Markets for zero-day exploits (software vulnerabilities unknown to the software vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspecti...
-
Article
Open AccessCorrection to: Wait for it: identifying “On-Hold” self-admitted technical debt
A Correction to this paper has been published: https://doi.org/10.1007/s10664-021-09939-7
-
Article
Open AccessPandemic programming
As a novel coronavirus swept the world in early 2020, thousands of software developers began working from home. Many did so on short notice, under difficult and stressful conditions.
-
Article
Open AccessWait for it: identifying “On-Hold” self-admitted technical debt
Self-admitted technical debt refers to situations where a software developer knows that their current implementation is not optimal and indicates this using a source code comment. In this work, we hypothesize ...
-
Article
Open AccessAmmonia: an approach for deriving project-specific bug patterns
Finding and fixing buggy code is an important and cost-intensive maintenance task, and static analysis (SA) is one of the methods developers use to perform it. SA tools warn developers about potential bugs by ...
-
Article
Open AccessHow different are different diff algorithms in Git?
Automatic identification of the differences between two versions of a file is a common and basic task in several applications of mining code repositories. Git, a version control system, has a diff utility and ...
-
Chapter and Conference Paper
Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets
Optimizing within the affine maximizer auctions (AMA) is an effective approach for revenue maximizing mechanism design. The AMA mechanisms are strategy-proof and individually rational (if the agents’ valuation...
-
Chapter and Conference Paper
Revenue Maximizing Markets for Zero-Day Exploits
Markets for zero-day exploits (software vulnerabilities unknown to the vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspective. We fi...
-
Chapter and Conference Paper
Impact Analysis of Granularity Levels on Feature Location Technique
Due to the increasing of software requirements and software features, modern software systems continue to grow in size and complexity. Locating source code entities that required to implement a feature in mill...
-
Article
Fault-prone module detection using large-scale text features based on spam filtering
This paper proposes an approach using large-scale text features for fault-prone module detection inspired by spam filtering. The number of every text feature in the source code of a module is counted and used ...
-
Chapter and Conference Paper
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics
Early detection of fault-prone products is necessary to assure the quality of software product. Therefore, fault-prone module detection is one of the major and traditional area of software engineering. Althoug...
-
Chapter and Conference Paper
Yet Another Metric for Predicting Fault-Prone Modules
Recently, machine learning approaches have been widely used for fault-proneness detection. Introduction of machine learning approaches induces development of new software metrics for fault-prone module detecti...