Sciweavers

160 search results - page 15 / 32
» Two case studies of open source software development: Apache...
Sort
View
ICSM
2003
IEEE
14 years 24 days ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
ISSRE
2005
IEEE
14 years 1 months ago
Providing Test Quality Feedback Using Static Source Code and Automatic Test Suite Metrics
A classic question in software development is “H ow much testing is enough?” Aside from dynamic coverage-based metrics, there are few measures that can be used to provide guid...
Nachiappan Nagappan, Laurie A. Williams, Jason Osb...
CSMR
2005
IEEE
14 years 1 months ago
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process
Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are e...
Andy Zaidman, Toon Calders, Serge Demeyer, Jan Par...
CSMR
2007
IEEE
14 years 1 months ago
How Clones are Maintained: An Empirical Study
Despite the conventional wisdom concerning the risks related to the use of source code cloning as a software development strategy, several studies appeared in literature indicated...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
MSR
2011
ACM
12 years 10 months ago
Do time of day and developer experience affect commit bugginess
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Jon Eyolfson, Lin Tan, Patrick Lam