Abstract is missing.
- Understanding the Time to First Response in GitHub Pull RequestsKazi Amit Hasan, Marcos Macedo, Yuan Tian, Bram Adams, Steven Ding. 1-11 [doi]
- Dealing with Popularity Bias in Recommender Systems for Third-party Libraries: How far Are We?Phuong T. Nguyen 0001, Riccardo Rubei, Juri Di Rocco, Claudio Di Sipio, Davide Di Ruscio, Massimiliano Di Penta. 12-24 [doi]
- Improving Agile Planning for Reliable Software DeliveryJirat Pasuksmit, Fan Jiang, Kemp Thornton, Arik Friedman, Natalija Fuksmane, Isabelle Kohout, Julian Connor. 25-26 [doi]
- Characterizing and Understanding Software Security Vulnerabilities in Machine Learning LibrariesNima Shiri Harzevili, Jiho Shin, Junjie Wang 0001, Song Wang 0009, Nachiappan Nagappan. 27-38 [doi]
- AutoML from Software Engineering Perspective: Landscapes and ChallengesChao Wang, Zhenpeng Chen, Minghui Zhou 0001. 39-51 [doi]
- DeepScenario: An Open Driving Scenario Dataset for Autonomous Driving System TestingChengjie Lu, Tao Yue 0002, Shaukat Ali 0001. 52-56 [doi]
- PTMTorrent: A Dataset for Mining Open-source Pre-trained Model PackagesWenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, James C. Davis 0001. 57-61 [doi]
- NICHE: A Curated Dataset of Engineered Machine Learning Projects in PythonRatnadira Widyasari, Zhou Yang 0003, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, Qijin Tay, David Lo 0001. 62-66 [doi]
- Evaluating Software Documentation QualityHenry Tang, Sarah Nadi. 67-78 [doi]
- What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub IssuesZhou Yang 0003, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu 0001, Zhenchang Xing, David Lo 0001. 79-91 [doi]
- Picaso: Enhancing API Recommendations with Relevant Stack Overflow PostsIvana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo 0001. 92-103 [doi]
- GIRT-Data: Sampling GitHub Issue Report TemplatesNafiseh Nikeghbal, Amir Hossein Kargaran, Abbas Heydarnoori, Hinrich Schütze. 104-108 [doi]
- TypeScript's Evolution: An Analysis of Feature Adoption Over TimeJoshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko. 109-114 [doi]
- DGMF: Fast Generation of Comparable, Updatable Dependency Graphs for Software RepositoriesTobias Litzenberger, Johannes Düsing, Ben Hermann 0001. 115-119 [doi]
- Enabling Analysis and Reasoning on Software Systems through Knowledge Graph RepresentationSatrio Adi Rukmono, Michel R. V. Chaudron. 120-124 [doi]
- microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice ApplicationsSimon Schneider, Tufan Özen, Michael Chen, Riccardo Scandariato. 125-129 [doi]
- Wasmizer: Curating WebAssembly-driven Projects on GitHubAlexander Nicholson, Quentin Stiévenart, Arash Mazidi, Mohammad Ghafari. 130-141 [doi]
- Feature Toggle Usage Patterns: A Case Study on Google ChromiumMd Tajmilur Rahman. 142-147 [doi]
- On Codex Prompt Engineering for OCL Generation: An Empirical StudySeif Abukhalaf, Mohammad Hamdaqa, Foutse Khomh. 148-157 [doi]
- Cross-Domain Evaluation of a Deep Learning-Based Type Inference SystemBernd Gruner, Tim Sonnekalb, Thomas S. Heinze, Clemens-Alexander Brust. 158-169 [doi]
- Enriching Source Code with Contextual Data for Code Completion Models: An Empirical StudyTim van Dam, Maliheh Izadi, Arie van Deursen. 170-182 [doi]
- Model-Agnostic Syntactical Information for Pre-Trained Programming Language ModelsIman Saberi, Fatemeh H. Fard. 183-193 [doi]
- An Empirical Study of High Performance Computing (HPC) Performance BugsMd. Abul Kalam Azad, Nafees Iqbal, Foyzul Hassan, Probir Roy. 194-206 [doi]
- What Happens When We Fuzz? Investigating OSS-Fuzz Bug HistoryBrandon N. Keller, Benjamin S. Meyers, Andrew Meneely. 207-217 [doi]
- Semantically-enriched Jira Issue Tracking DataThemistoklis Diamantopoulos, Dimitrios-Nikitas Nastos, Andreas L. Symeonidis. 218-222 [doi]
- HasBugs - Handpicked Haskell BugsLeonhard Applis, Annibale Panichella. 223-227 [doi]
- An Empirical Study on the Performance of Individual Issue Label PredictionJueun Heo, Seonah Lee 0001. 228-233 [doi]
- Investigating the Resolution of Vulnerable Dependencies with Dependabot Security UpdatesHamid Mohayeji, Andrei Agaronian, Eleni Constantinou, Nicola Zannone, Alexander Serebrenik. 234-246 [doi]
- Unveiling the Relationship Between Continuous Integration and Code CoverageDiego Saraiva, Daniel Alencar da Costa, Uirá Kulesza, Gustavo Sizílio, José Gameleira Neto, Roberta Coelho, Meiyappan Nagappan. 247-259 [doi]
- EGAD: A moldable tool for GitHub Action analysisPablo Valenzuela-Toledo, Alexandre Bergel, Timo Kehrer, Oscar Nierstrasz. 260-264 [doi]
- The Atlassian Data Lake: consolidating enriched software development data in a single, queryable systemArik Friedman, Rohan Dhupelia, Ben Jackson. 265-266 [doi]
- Are We Speeding Up or Slowing Down? On Temporal Aspects of Code VelocityGunnar Kudrjavets, Nachiappan Nagappan, Ayushi Rastogi. 267-271 [doi]
- Energy Consumption Estimation of API-usage in Smartphone Apps via Static AnalysisAbdul Ali Bangash, Kalvin Eng, Jamal Qasim, Karim Ali 0001, Abram Hindle. 272-283 [doi]
- An Exploratory Study on Energy Consumption of Dataframe Processing LibrariesShriram Shanbhag, Sridhar Chimalakonda. 284-295 [doi]
- Whistleblowing and Tech on TwitterLaura Duits, Isha Kashyap, Joey Bekkink, Kousar Aslam, Emitzá Guzmán. 296-308 [doi]
- UnGoML: Automated Classification of unsafe Usages in GoAnna-Katharina Wickert, Clemens Damke, Lars Baumgärtner, Eyke Hüllermeier, Mira Mezini. 309-321 [doi]
- Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) StepsGerhard Jungwirth, Aakanksha Saha, Michael Schröder 0005, Tobias Fiebig, Martina Lindorfer, Jürgen Cito. 322-333 [doi]
- MANDO-HGT: Heterogeneous Graph Transformers for Smart Contract Vulnerability DetectionHoang H. Nguyen, Nhat-Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang. 334-346 [doi]
- SecretBench: A Dataset of Software SecretsSetu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams. 347-351 [doi]
- An Empirical Study to Investigate Collaboration Among Developers in Open Source Software (OSS)Weijie Sun, Samuel Iwuchukwu, Abdul Ali Bangash, Abram Hindle. 352-356 [doi]
- Insights into Female Contributions in Open-Source ProjectsArifa I. Champa, Md Fazle Rabbi, Minhaz F. Zibran, Md Rakibul Islam 0002. 357-361 [doi]
- The Secret Life of CVEsPiotr Przymus, Mikolaj Fejzer, Jakub Narebski, Krzysztof Stencel. 362-366 [doi]
- Evolution of the Practice of Software Testing in Java ProjectsAnisha Islam, Nipuni Tharushika Hewage, Abdul Ali Bangash, Abram Hindle. 367-371 [doi]
- Keep the Ball Rolling: Analyzing Release Cadence in GitHub ProjectsOz Kilic, Nathaniel Bowness, Olga Baysal. 372-376 [doi]
- Understanding the Role of Images on Stack OverflowDong Wang, Tao Xiao, Christoph Treude, Raula Gaikovina Kula, Hideaki Hata, Yasutaka Kamei. 377-388 [doi]
- Do Subjectivity and Objectivity Always Agreeƒ A Case Study with Stack Overflow QuestionsSaikat Mondal, Mohammad Masudur Rahman 0001, Chanchal K. Roy. 389-401 [doi]
- Defectors: A Large, Diverse Python Dataset for Defect PredictionParvez Mahbub, Ohiduzzaman Shuvo, Mohammad Masudur Rahman 0001. 393-397 [doi]
- GiveMeLabeledIssues: An Open Source Issue Recommendation SystemJoseph Vargovich, Fabio Santos, Jacob Penney, Marco Aurélio Gerosa, Igor Steinmacher. 402-406 [doi]
- DocMine: A Software Documentation-Related Dataset of 950 GitHub RepositoriesAkhila Sri Manasa Venigalla, Sridhar Chimalakonda. 407-411 [doi]
- PENTACET data - 23 Million Contextual Code Comments and 250,000 SATD commentsMurali Sridharan, Leevi Rantala, Mika Mäntylä. 412-416 [doi]
- Don't Forget the Exception! : Considering Robustness Changes to Identify Design ProblemsAnderson Oliveira, João Lucas Correia, Leonardo da Silva Sousa, Wesley K. G. Assunção, Daniel Coutinho, Alessandro F. Garcia 0001, Willian Nalepa Oizumi, Caio Barbosa, Anderson G. Uchôa, Juliana Alves Pereira. 417-429 [doi]
- Pre-trained Model Based Feature Envy DetectionWenhao Ma, Yaoxiang Yu, Xiaoming Ruan, Bo Cai. 430-440 [doi]
- CLEAN++: Code Smells Extraction for C++Tom Mashiach, Bruno Sotto-Mayor, Gal A. Kaminka, Meir Kalech. 441-445 [doi]
- DACOS - A Manually Annotated Dataset of Code SmellsHimesh Nandani, Mootez Saad, Tushar Sharma. 446-450 [doi]
- What Warnings Do Engineers Really Fix? The Compiler That Cried WolfGunnar Kudrjavets, Aditya Kumar, Ayushi Rastogi. 451-452 [doi]
- Automating Arduino Programming: From Hardware Setups to Sample Source Code GenerationImam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang. 453-464 [doi]
- A Dataset of Bot and Human Activities in GitHubNatarajan Chidambaram, Alexandre Decan, Tom Mens. 465-469 [doi]
- Optimizing Duplicate Size Thresholds in IDEsKonstantin Grotov, Sergey Titov, Alexandr Suhinin, Yaroslav Golubev, Timofey Bryksin. 470-471 [doi]
- Boosting Just-in-Time Defect Prediction with Specific Features of C/C++ Programming Languages in Code ChangesChao Ni 0001, Xiaodan Xu, Kaiwen Yang, David Lo 0001. 472-484 [doi]
- A Large Scale Analysis of Semantic Versioning in NPMDonald Pinckney, Federico Cassano, Arjun Guha, Jonathan Bell 0001. 485-497 [doi]
- Phylogenetic Analysis of Reticulate Software EvolutionAkira Mori, Masatomo Hashimoto. 498-510 [doi]
- PyMigBench: A Benchmark for Python Library MigrationMohayeminul Islam, Ajay Kumar Jha, Sarah Nadi, Ildar Akhmetov. 511-515 [doi]
- Determining Open Source Project BoundariesSophia Vargas. 516-517 [doi]
- Intertwining Communities: Exploring Libraries that Cross Software EcosystemsKanchanok Kannee, Raula Gaikovina Kula, Supatsara Wattanakriengkrai, Kenichi Matsumoto. 518-522 [doi]
- Helm Charts for Kubernetes Applications: Evolution, Outdatedness and Security RisksAhmed Zerouali, Ruben Opdebeeck, Coen De Roover. 523-533 [doi]
- Control and Data Flow in Security Smell Detection for Infrastructure as Code: Is It Worth the Effort?Ruben Opdebeeck, Ahmed Zerouali, Coen De Roover. 534-545 [doi]
- Method Chaining Redux: An Empirical Study of Method Chaining in Java, Kotlin, and PythonAli M. Keshk, Robert Dyer 0001. 546-557 [doi]
- Snapshot Testing DatasetEmily Bui, Henrique Rocha. 558-562 [doi]
- Large Language Models and Simple, Stupid BugsKevin Jesse, Toufique Ahmed, Premkumar T. Devanbu, Emily Morgan. 563-575 [doi]
- The ABLoTS Approach for Bug Localization: is it replicable and generalizable?Feifei Niu, Christoph Mayr-Dorn, Wesley K. G. Assunção, LiGuo Huang, JiDong Ge, Bin Luo 0003, Alexander Egyed. 576-587 [doi]
- LLMSecEval: A Dataset of Natural Language Prompts for Security EvaluationsCatherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato. 588-592 [doi]
- A Study of Gender Discussions in Mobile AppsMojtaba Shahin, Mansooreh Zahedi, Hourieh Khalajzadeh, Ali Rezaei Nasab. 598-610 [doi]
- Tell Me Who Are You Talking to and I Will Tell You What Issues Need Your SkillsFabio Santos, Jacob Penney, João Felipe Pimentel, Igor Wiese, Igor Steinmacher, Marco Aurélio Gerosa. 611-623 [doi]
- She Elicits Requirements and He Tests: Software Engineering Gender Bias in Large Language ModelsChristoph Treude, Hideaki Hata. 624-629 [doi]
- GitHub OSS Governance File DatasetYibo Yan, Seth Frey, Amy X. Zhang, Vladimir Filkov, Likang Yin. 630-634 [doi]
- State of Refactoring Adoption: Better Understanding Developer Perception of RefactoringEman Abdullah AlOmar. 635-639 [doi]