Abstract is missing.
- Addressing scalability in API method call analyticsErvina Çergani, Sebastian Proksch, Sarah Nadi, Mira Mezini. 1-7 [doi]
- Vulnerability severity scoring and bounties: why the disconnect?Nuthan Munaiah, Andrew Meneely. 8-14 [doi]
- A replication study: mining a proprietary temporal defect datasetTamer Abdou, Atakan Erdem, Ayse Bener, Adam Neal. 15-21 [doi]
- A hybrid model for task completion effort estimationAli Dehghan 0003, Kelly Blincoe, Daniela E. Damian. 22-28 [doi]
- Analyzing on-boarding time in context of crowdsourcingKumar Abhinav, Alpana Dubey, Gurdeep Virdi, Alex Kass. 29-35 [doi]
- Software crowdsourcing reliability: an empirical study on developers behaviorTurki Alelyani, Ye Yang. 36-42 [doi]
- FourD: do developers discuss design? revisitedAbbas Shakiba, Robert Green, Robert Dyer 0001. 43-46 [doi]
- Sampling code clones from program dependence graphs with GRAPLETim A. D. Henderson, Andy Podgurski. 47-53 [doi]