Abstract is missing.
- The Software Heritage Graph Dataset: Large-scale Analysis of Public Software Development HistoryAntoine Pietri, Diomidis Spinellis, Stefano Zacchiroli. 1-5 [doi]
- Cheating Death: A Statistical Survival Analysis of Publicly Available Python ProjectsRao Hamza Ali, Chelsea Parlett-Pelleriti, Erik Linstead. 6-10 [doi]
- An Exploratory Study to Find Motives Behind Cross-platform Forks from Software Heritage DatasetAvijit Bhattacharjee, Sristy Sumana Nath, Shurui Zhou, Debasish Chakroborti, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 11-15 [doi]
- Exploring the Security Awareness of the Python and JavaScript Open Source CommunitiesGábor Antal, Márton Keleti, Péter Hegedüs. 16-20 [doi]
- A Large-Scale Comparative Evaluation of IR-Based Tools for Bug LocalizationShayan A. Akbar, Avinash C. Kak. 21-31 [doi]
- A Machine Learning Approach for Vulnerability CurationYang Chen, Andrew E. Santosa, Ming Yi Ang, Abhishek Sharma 0002, Asankhaya Sharma, David Lo 0001. 32-42 [doi]
- A Soft Alignment Model for Bug DeduplicationIrving Muller Rodrigues, Daniel Aloise, Eraldo Rezende Fernandes, Michel Dagenais. 43-53 [doi]
- A Study of Potential Code Borrowing and License Violations in Java Projects on GitHubYaroslav Golubev, Maria Eliseeva, Nikita Povarov, Timofey Bryksin. 54-64 [doi]
- A Study on the Accuracy of OCR Engines for Source Code Transcription from Programming ScreencastsAbdulkarim Khormi, Mohammad Alahmadi, Sonia Haiduc. 65-75 [doi]
- An Empirical Study of Build Failures in the Docker ContextYiwen Wu, Yang Zhang, Tao Wang, Huaimin Wang. 76-80 [doi]
- AIMMX: Artificial Intelligence Model Metadata ExtractorJason Tsay, Alan Braz, Martin Hirzel, Avraham Shinnar, Todd Mummert. 81-92 [doi]
- An Empirical Study of Method Chaining in JavaTomoki Nakamaru, Tomomasa Matsunaga, Tetsuro Yamazaki, Soramichi Akiyama, Shigeru Chiba. 93-102 [doi]
- An Empirical Study on Regular Expression BugsPeipei Wang, Chris Brown, Jamie A. Jennings, Kathryn T. Stolee. 103-113 [doi]
- Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for PrivacyPaolo Calciati, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller. 114-124 [doi]
- Behind the Intents: An In-depth Empirical Study on Software Refactoring in Modern Code ReviewMatheus Paixão, Anderson G. Uchôa, Ana Carla Bibiano, Daniel Oliveira, Alessandro Garcia, Jens Krinke, Emilio Arvonio. 125-136 [doi]
- Beyond the Code: Mining Self-Admitted Technical Debt in Issue Tracker SystemsLaerte Xavier, Fábio F. Ferreira, Rodrigo Brito, Marco Tulio Valente. 137-146 [doi]
- Boa Views: Easy Modularization and Sharing of MSR AnalysesChe Shian Hung, Robert Dyer 0001. 147-157 [doi]
- Can We Use SE-specific Sentiment Analysis Tools in a Cross-Platform Setting?Nicole Novielli, Fabio Calefato, Davide Dongiovanni, Daniela Girardi, Filippo Lanubile. 158-168 [doi]
- Capture the Feature Flag: Detecting Feature Flags in Open-SourceJens Meinicke, Juan Hoyos, Bogdan Vasilescu, Christian Kästner. 169-173 [doi]
- Challenges in Chatbot Development: A Study of Stack Overflow PostsAhmad Abdellatif, Diego Costa 0001, Khaled Badran, Rabe Abdalkareem, Emad Shihab. 174-185 [doi]
- Characterizing and Identifying Composite Refactorings: Concepts, Heuristics and PatternsLeonardo da Silva Sousa, Diego Cedrim, Alessandro Garcia, Willian Nalepa Oizumi, Ana Carla Bibiano, Daniel Oliveira, Miryung Kim, Anderson Oliveira. 186-197 [doi]
- Detecting Video Game-Specific Bad Smells in Unity ProjectsAntonio Borrelli, Vittoria Nardone, Giuseppe A. Di Lucca, Gerardo Canfora, Massimiliano Di Penta. 198-208 [doi]
- Detecting and Characterizing Bots that Commit CodeTapajit Dey, Sara Mousavi, Eduardo Ponce, Tanner Fry, Bogdan Vasilescu, Anna Filippova, Audris Mockus. 209-219 [doi]
- Developer-Driven Code Smell PrioritizationFabiano Pecorelli, Fabio Palomba, Foutse Khomh, Andrea De Lucia. 220-231 [doi]
- Did You Remember To Test Your Tokens?Danielle Gonzalez, Michael Rath 0002, Mehdi Mirakhorli. 232-242 [doi]
- Embedding Java Classes with code2vec: Improvements from Variable ObfuscationRhys Compton, Eibe Frank, Panos Patros, Abigail Koay. 243-253 [doi]
- Empirical Study of Restarted and Flaky Builds on Travis CIThomas Durieux, Claire Le Goues, Michael Hilton, Rui Abreu. 254-264 [doi]
- Ethical Mining: A Case Study on MSR Mining ChallengesNicolas E. Gold, Jens Krinke. 265-276 [doi]
- Forking Without Clicking: on How to Identify Software Repository ForksAntoine Pietri, Guillaume Rousseau, Stefano Zacchiroli. 277-287 [doi]
- From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies?Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye, Ting Liu. 288-299 [doi]
- Improved Automatic Summarization of Subroutines via Attention to File ContextSakib Haque, Alexander LeClair, Lingfei Wu, Collin McMillan. 300-310 [doi]
- Investigating Severity Thresholds for Test SmellsDavide Spadini, Martin Schvarcbacher, Ana-Maria Oprescu, Magiel Bruntink, Alberto Bacchelli. 311-321 [doi]
- Need for Tweet: How Open Source Developers Talk About Their GitHub Work on TwitterHongbo Fang, Daniel Klug, Hemank Lamba, James D. Herbsleb, Bogdan Vasilescu. 322-326 [doi]
- On the Prevalence, Impact, and Evolution of SQL Code Smells in Data-Intensive SystemsBiruk Asmare Muse, Mohammad Masudur Rahman 0001, Csaba Nagy 0001, Anthony Cleve, Foutse Khomh, Giuliano Antoniol. 327-338 [doi]
- On the Relationship between User Churn and Software IssuesOmar El Zarif, Daniel Alencar da Costa, Safwat Hassan, Ying Zou 0001. 339-349 [doi]
- PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU LearningTriet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar. 350-361 [doi]
- Painting Flowers: Reasons for Using Single-State State Machines in Model-Driven EngineeringNan Yang 0009, Pieter J. L. Cuijpers, Ramon R. H. Schiffelers, Johan Lukkien, Alexander Serebrenik. 362-373 [doi]
- Polyglot and Distributed Software Repository Mining with CrossflowKonstantinos Barmpis, Patrick Neubauer, Jonathan Co, Dimitris S. Kolovos, Nicholas Matragkas, Richard F. Paige. 374-384 [doi]
- RTPTorrent: An Open-source Dataset for Evaluating Regression Test PrioritizationToni Mattis, Patrick Rein, Falco Dürsch, Robert Hirschfeld. 385-396 [doi]
- SoftMon: A Tool to Compare Similar Open-source Software from a Performance PerspectiveShubhankar Suman Singh, Smruti R. Sarangi. 397-408 [doi]
- The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSLJames Walden. 409-419 [doi]
- The Scent of Deep Learning Code: An Empirical StudyHadhemi Jebnoun, Houssem Ben Braiek, Mohammad Masudur Rahman 0001, Foutse Khomh. 420-430 [doi]
- The State of the ML-universe: 10 Years of Artificial Intelligence & Machine Learning Software Development on GitHubDanielle Gonzalez, Thomas Zimmermann 0001, Nachiappan Nagappan. 431-442 [doi]
- Traceability Support for Multi-Lingual Software ProjectsYalin Liu, Jinfeng Lin, Jane Cleland-Huang. 443-454 [doi]
- Using Large-Scale Anomaly Detection on Code to Improve Kotlin CompilerTimofey Bryksin, Victor Petukhov, Ilya Alexin, Stanislav Prikhodko, Alexey Shpilman, Vladimir Kovalenko, Nikita Povarov. 455-465 [doi]
- Using Others' Tests to Identify Breaking UpdatesSuhaib Mujahid, Rabe Abdalkareem, Emad Shihab, Shane McIntosh. 466-476 [doi]
- Visualization of Methods Changeability Based on VCS DataSergey Svitkov, Timofey Bryksin. 477-480 [doi]
- What constitutes Software?: An Empirical, Descriptive Study of ArtifactsRolf-Helge Pfeiffer. 481-491 [doi]
- What is the Vocabulary of Flaky Tests?Gustavo Pinto 0001, Breno Miranda, Supun Dissanayake, Marcelo d'Amorim, Christoph Treude, Antonia Bertolino. 492-502 [doi]
- 20-MAD: 20 Years of Issues and Commits of Mozilla and Apache DevelopmentMaëlick Claes, Mika V. Mäntylä. 503-507 [doi]
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE SummariesJiahao Fan, Yi Li, Shaohua Wang 0002, Tien N. Nguyen. 508-512 [doi]
- A Complete Set of Related Git Repositories Identified via Community Detection Approaches Based on Shared CommitsAudris Mockus, Diomidis Spinellis, Zoe Kotti, Gabriel John Dusing. 513-517 [doi]
- A Dataset and an Approach for Identity Resolution of 38 Million Author IDs extracted from 2B Git CommitsTanner Fry, Tapajit Dey, Andrey Karnauch, Audris Mockus. 518-522 [doi]
- A Dataset for GitHub Repository DeduplicationDiomidis Spinellis, Zoe Kotti, Audris Mockus. 523-527 [doi]
- A Dataset of DockerfilesJordan Henkel, Christian Bird, Shuvendu K. Lahiri, Thomas W. Reps. 528-532 [doi]
- A Dataset of Enterprise-Driven Open Source SoftwareDiomidis Spinellis, Zoe Kotti, Konstantinos Kravvaritis, Georgios Theodorou, Panos Louridas. 533-537 [doi]
- A Mixed Graph-Relational Dataset of Socio-technical Interactions in Open Source SystemsUsman Ashraf, Christoph Mayr-Dorn, Alexander Egyed, Sebastiano Panichella. 538-542 [doi]
- On the Shoulders of Giants: A New Dataset for Pull-based Development ResearchXunhui Zhang, Ayushi Rastogi, Yue Yu 0001. 543-547 [doi]
- AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research CommunityPei Liu, Li Li 0029, Yanjie Zhao, Xiaoyu Sun, John Grundy 0001. 548-552 [doi]
- Dataset of Video Game Development ProblemsCristiano Politowski, Fábio Petrillo, Gabriel Cavalheiro Ullmann, Josias de Andrade Werly, Yann-Gaël Guéhéneuc. 553-557 [doi]
- Employing Contribution and Quality Metrics for Quantifying the Software Development ProcessThemistoklis Diamantopoulos, Michail D. Papamichail, Thomas Karanikiotis, Kyriakos C. Chatzidimitriou, Andreas L. Symeonidis. 558-562 [doi]
- GitterCom: A Dataset of Open Source Developer Communications in GitterEsteban Parra, Ashley Ellis, Sonia Haiduc. 563-567 [doi]
- Hall-of-Apps: The Top Android Apps Metadata ArchiveLaura Bello-Jiménez, Camilo Escobar-Velásquez, Anamaria Mojica-Hanke, Santiago Cortés-Fernández, Mario Linares Vásquez. 568-572 [doi]
- How Often Do Single-Statement Bugs Occur?: The ManySStuBs4J DatasetRafael-Michael Karampatsis, Charles A. Sutton. 573-577 [doi]
- JTeC: A Large Collection of Java Test Classes for Test Code Analysis and ProcessingFederico Corò, Roberto Verdecchia, Emilio Cruciani, Breno Miranda, Antonia Bertolino. 578-582 [doi]
- LogChunks: A Data Set for Build Log AnalysisCarolin E. Brandt, Annibale Panichella, Andy Zaidman, Moritz Beller. 583-587 [doi]
- Software-related Slack Chats with Disentangled ConversationsPreetha Chatterjee, Kostadin Damevski, Nicholas A. Kraft, Lori L. Pollock. 588-592 [doi]
- TestRoutes: A Manually Curated Method Level Dataset for Test-to-Code TraceabilityAndrás Kicsi, László Vidács, Tibor Gyimóthy. 593-597 [doi]
- An Empirical Study on the Impact of Deimplicitization on Comprehension in Programs Using Application FrameworksJürgen Cito, Jiasi Shen 0001, Martin Rinard. 598-601 [doi]
- Determining the Intrinsic Structure of Public Software Development HistoryAntoine Pietri, Guillaume Rousseau, Stefano Zacchiroli. 602-605 [doi]
- Do Explicit Review Strategies Improve Code Review Performance?Pavlína Wurzel Gonçalves, Enrico Fregnan, Tobias Baum, Kurt Schneider, Alberto Bacchelli. 606-610 [doi]
- Large-Scale Manual Validation of Bugfixing ChangesSteffen Herbold, Alexander Trautsch, Benjamin Ledel. 611-614 [doi]
- Multi-language Design Smells: A Backstage PerspectiveMouna Abidi, Moses Openja, Foutse Khomh. 615-618 [doi]
- The Impact of Dynamics of Collaborative Software Engineering on Introverts: A Study ProtocolIngrid Nunes, Christoph Treude, Fabio Calefato. 619-622 [doi]