Dataset Viewer
Auto-converted to Parquet Duplicate
paper_id
stringclasses
32 values
title
stringclasses
32 values
year
int64
2.02k
2.03k
citation_count
int64
1
54
authors
listlengths
2
10
cited_paper_id
stringlengths
40
40
contexts
listlengths
0
26
intents
listlengths
0
3
is_influential
bool
2 classes
25a268f772046fcff223c19fdf6ba23ccd6c8e58
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
2,025
4
[ { "authorId": "2184471599", "name": "Addi Malviya Thakur" }, { "authorId": "1731000", "name": "Reed Milewicz" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2273563352", "name": "Lavínia Paganini" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "1702551", "name": "A. Mockus" } ]
612a8e523feb735289a2d7b7ec7bbbd440c8731a
[ "Many of previous studies of project “deprecation” or “failure” defined unmaintenance based on the activity features, they often assume a project is abandoned after a fixed threshold of inactivity [12, 33, 35, 52].", "…or “failure”, but often with vague meaning and inconsistent operationalization: some studies rely solely on indicators of prolonged inactivity (e.g., the absence of commits within a fixed period) [12, 33, 35, 52], while others require declarations from main-tainers in documentation or metadata." ]
[]
false
25a268f772046fcff223c19fdf6ba23ccd6c8e58
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
2,025
4
[ { "authorId": "2184471599", "name": "Addi Malviya Thakur" }, { "authorId": "1731000", "name": "Reed Milewicz" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2273563352", "name": "Lavínia Paganini" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f20d9078f5bf6c3a0748021e4f1494e257b257e3
[ "3,17 In other words, the more people are involved, the harder it will be for the bear to catch them all." ]
[]
false
25a268f772046fcff223c19fdf6ba23ccd6c8e58
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
2,025
4
[ { "authorId": "2184471599", "name": "Addi Malviya Thakur" }, { "authorId": "1731000", "name": "Reed Milewicz" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2273563352", "name": "Lavínia Paganini" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "1702551", "name": "A. Mockus" } ]
494acf3f7b473245db2be41586978c61480326fc
[ "They found that infrastructure role, downstream dependencies, publication mentions, and government involvement enhance sustainability, while academic origin and project recency reduce it [18]." ]
[]
false
25a268f772046fcff223c19fdf6ba23ccd6c8e58
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
2,025
4
[ { "authorId": "2184471599", "name": "Addi Malviya Thakur" }, { "authorId": "1731000", "name": "Reed Milewicz" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2273563352", "name": "Lavínia Paganini" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "1702551", "name": "A. Mockus" } ]
7b75fda8200b108c4466f0567bdd2bd940b392fc
[ "Historically, open-source research software has been longer-lived than other kinds of open-source software and government involvement has been associated with longer lifespan [9]." ]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
b37fee73d648e0e4d4822dd795194232ab4cc4be
[ "Our criteria are inspired by Miller et al. [28]’s criteria of abandoned packages since we want to exclude the abandoned packages from our analysis." ]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
d26331a5dae50614dc8580c4f057bea7a8c3177a
[]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
e71c11a1f34d54fcffaa9b86ea4404b6d6d10a6b
[]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
25a268f772046fcff223c19fdf6ba23ccd6c8e58
[ "In conventional OSS SECOs, packages can become obsolete or inactive [22, 70], breaking changes can cause cascading effects on projects [9], communities around software projects can rise and fall [107], projects can die due to lack of financial viability [111], and poor governance can cause an…" ]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
ced75d2582807c3edad4a5148186d32a2dd693a5
[]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
04f66deb0ae8dea6be752604e33e23bf83fb65af
[ "Miller et al. [11] analyzed dependency abandonment in the NPM ecosystem.", "To the best of our knowledge, the recent study by Miller et al. [11] is the only one that proposes strategies to mitigate the risk brought by abandonment.", "Most existing studies on OSS project abandonment focus on analyzing the impact and risk associated with project abandonment [5]–[11]." ]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
461e00ecb0bb5b24b4cb65078a96d0677919f5f3
[ "Research has worked on understanding and detecting abandoned dependencies [138, 143]." ]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
e2382850dc382098a357fd00e654d5b05826f53b
[]
[]
false
5a9ce9cb804d124e0f8b06eae2222851c28acf17
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
2,025
9
[ { "authorId": "2303165466", "name": "Courtney Miller" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2335865441", "name": "Bogdan Vasilescu" }, { "authorId": "2289028231", "name": "Christian Kästner" } ]
99c7392512bde34010632eefb630b74ed6bad069
[ "Miller et al. observe that 15 % of the most downloaded npm packages are abandoned within six years and that 82 % of the affected projects never respond to the issue at all [21]." ]
[]
false
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets
2,025
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
e9c0ab581e21b727d406317e2ba06e565a8fa640
[ "The primary challenge of license management lies in the complexity and variety of licenses governing autonomous driving datasets [40, 130].", "…and methods have been proposed to explore how to properly manage the training data, encompassing data deduplication [56], training data selection [59, 89, 112], sampling high-quality data [84, 121], and dataset license compliance [40, 50], there is still a lack of a unified framework and criteria." ]
[]
false
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets
2,025
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
d64229d0c72c9b7950ebc1e5440ffdee168047b3
[ "Because LLMs are trained on large-scale code repositories, they may inadvertently memorize and regenerate sensitive or proprietary fragments, raising issues of data handling, licensing compliance, and potential leakage of conidential information [19, 55, 62]." ]
[]
false
1488416ff0b3caec77e252756256a009f696c1cc
OSS License Identification at Scale: A Comprehensive Dataset Using World of Code
2,024
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2320311508", "name": "Adam McDaniel" }, { "authorId": "1702551", "name": "A. Mockus" } ]
206413519378034892e72b5f86db8bdd2aced90f
[ "Followingprevious work [34], for each license file we compute a matching score as the ratio of shared Winnowing signatures to the total signatures between the file and a standard SPDX license, as defined in Equation 1: where 𝑆 is the matching score, 𝐴 represents the set of signatures in the…", "The situation becomes even more complicated with the widespread use of license variants [34], which are licenses that do not strictly match standard license texts listed by SPDX in either formatting or wording, or are entirely custom licenses crafted by developers or organizations.", "We utilize the Winnowing algorithm [34, 53] to compare license files from 5,990 top PyPI packages against standard SPDX license texts." ]
[]
false
1488416ff0b3caec77e252756256a009f696c1cc
OSS License Identification at Scale: A Comprehensive Dataset Using World of Code
2,024
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2320311508", "name": "Adam McDaniel" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
[ "Using WoC’s license map [21], we compare this information with the Stack’s license data to identify potential instances of license noncompliance." ]
[]
false
85d150958a873668a3b9f17f924ee55b84ede79b
The Role of Data Filtering in Open Source Software Ranking and Selection
2,024
2
[ { "authorId": "2162186197", "name": "Addi Malviya-Thakur" }, { "authorId": "1702551", "name": "A. Mockus" } ]
d18423ab1b74c4be52d84d4ece989d59994514f6
[ "Remove projects demonstrating poor performance in key metrics (e.g., pull request activity) [8–24] Select projects ranking highly in significant dimensions (e.g., star count) [15,20,25–33] Employ decision tree classification to determine CCP status (using project statistics and description keywords…" ]
[]
false
85d150958a873668a3b9f17f924ee55b84ede79b
The Role of Data Filtering in Open Source Software Ranking and Selection
2,024
2
[ { "authorId": "2162186197", "name": "Addi Malviya-Thakur" }, { "authorId": "1702551", "name": "A. Mockus" } ]
6d380ef939655fe854605ea0fe5789727edc38b6
[ "Addi et al. filtered higher-confidence data based on data attributes (such as the number of stars on open-source projects)[10], which limits applicability and may not accurately reflect true data quality." ]
[]
false
95cecc4bba4243cd66d059de164a6aa56f3f47ee
Moving Faster and Reducing Risk: Using LLMs in Release Deployment
2,024
2
[ { "authorId": "2311876371", "name": "Rui Abreu" }, { "authorId": "32269195", "name": "V. Murali" }, { "authorId": "2265391422", "name": "Peter C. Rigby" }, { "authorId": "2311877796", "name": "Chandra Maddila" }, { "authorId": "2325285821", "name": "Weiyan Sun" }, { "authorId": "2325026616", "name": "Jun Ge" }, { "authorId": "2325098618", "name": "Kaavya Chinniah" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2325025351", "name": "Megh Mehta" }, { "authorId": "1693689", "name": "Nachiappan Nagappan" } ]
2520a844ff53ddc3d5be6563ddef8406626848a6
[ "The work around code review and AI is moving at a fast rate, we are excited to see other advances by researchers and in industry." ]
[]
false
95cecc4bba4243cd66d059de164a6aa56f3f47ee
Moving Faster and Reducing Risk: Using LLMs in Release Deployment
2,024
2
[ { "authorId": "2311876371", "name": "Rui Abreu" }, { "authorId": "32269195", "name": "V. Murali" }, { "authorId": "2265391422", "name": "Peter C. Rigby" }, { "authorId": "2311877796", "name": "Chandra Maddila" }, { "authorId": "2325285821", "name": "Weiyan Sun" }, { "authorId": "2325026616", "name": "Jun Ge" }, { "authorId": "2325098618", "name": "Kaavya Chinniah" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2325025351", "name": "Megh Mehta" }, { "authorId": "1693689", "name": "Nachiappan Nagappan" } ]
e813d85ccd9e1a86dca4aa6e0dcf9486f0fdd01a
[ "Promising recent work on genAI and deployment provides a wonderful roadmap for what could be ahead [53]." ]
[]
false
d739b611185f134de83d152710367c02d79a5412
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
2,024
4
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
60e38d4fc675718b412d0d93d3b95df3a8f4a5eb
[ "A module in repository A is considered a reuse of a module from repository B if it is detected as a clone and appears later in time, following the timestamp-based inference standard in prior studies [44], [45]." ]
[]
false
d739b611185f134de83d152710367c02d79a5412
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
2,024
4
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
6f8730653938898730fb6aa2747a295650fb8e5e
[ "Dependencies are necessary since modern software is built on the foundation of existing code, libraries, and frameworks [71]." ]
[]
false
d739b611185f134de83d152710367c02d79a5412
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
2,024
4
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
[ "Type II SSC involves copied code, a common practice in open-source software where code is shared publicly [14], allowing anyone to copy or fork it (within licensing requirements).", "The sampling was based on SHA-1 hashes of the blobs and commits, which ensures that the selection process is effectively random.", "This evaluation establishes the applicability and scalability of our contributions to real-world, large-scale code datasets, reinforcing the value of our work in supporting the development of secure, high-integrity LLM training corpora." ]
[]
true
d739b611185f134de83d152710367c02d79a5412
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
2,024
4
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
36a8c342adeb891857b4dacacdc14c399196d0d9
[]
[]
false
17212368a171bb7f7600d8a05155e0414525acbc
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
2,023
3
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
84483e7b1bb9b7c6951fd7d271cb7dae4b638ff9
[ "Another complex area involves the legal interpretation of terms used in software licenses, which are often steeped in domain-specific jargon that does not easily lend itself to quan-tifiable metrics.", "These agreements are intended to ensure that contributors retain copyright over their code and agree to transfer these rights to the project maintainers.", "…et al. [166] 2010 Wu et al. [18] 2015 Vendome et al. [167] 2015 Mlouki et al. [133] 2016 Wu et al. [19] 2017 Vendome et al. [168] 2017 Reid et al. [169] 2023 2) License Compliance: Besides license incompatibility among licenses, detecting the overall compliance of all licenses before officially…", "Reid et al. [169] further confirmed the prevalence of license omission significantly introduced license violations at a large scale by tracking the license altering history logged in World of Code, suggesting the necessity of regulations of license traceability for open-source reuse." ]
[]
true
17212368a171bb7f7600d8a05155e0414525acbc
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
2,023
3
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
[ "This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].", "In order for this approach to work, we have to go across repository boundaries and consider versions (and their history) in all public repositories, i.e., Universal Version History (UVH) [8].", "As was shown in [7, 8], rampant code copying enabled and encouraged by OSS results in massive orphan vulnerabilities and licensing violations that cannot be detected by existing approaches." ]
[]
false
17212368a171bb7f7600d8a05155e0414525acbc
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
2,023
3
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "1702551", "name": "A. Mockus" } ]
1488416ff0b3caec77e252756256a009f696c1cc
[ "Many licenses impose specific requirements on code usage, such as the obligation to publish derived works under GPL licenses." ]
[]
false
66d8a00fe55582c86495715da256708fc70360e6
Dataset: Copy-based Reuse in Open Source Software
2,023
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
6e2d0265a6f362d97d2d437ea0f0633b1080ca9e
[ "This propagation of code has also been found in the general open source ecosystem [73]–[75], and led our participants to pick and choose API designs based on which projects were generally considered successful and which they personally liked." ]
[]
false
66d8a00fe55582c86495715da256708fc70360e6
Dataset: Copy-based Reuse in Open Source Software
2,023
2
[ { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
[ "As detailed in Section III-B, we analyzed blobs within the dataset that were reused across multiple OSS projects, as identified through WoC [20].", "WoC addresses this by offering a map [20] that, for blobs found in multiple projects, sorts them by the commit time of each blob’s creation, allowing us to identify its first occurrence and the repository where it was initially committed." ]
[]
false
839db1a6529346759bb03446a231b60bcc5ea10e
Modeling the Centrality of Developer Output with Software Supply Chains
2,023
2
[ { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2265391422", "name": "Peter C. Rigby" }, { "authorId": "2268781295", "name": "Rui Abreu" }, { "authorId": "2268781105", "name": "Parth Suresh" }, { "authorId": "2268796822", "name": "Yifen Chen" }, { "authorId": "1693689", "name": "Nachiappan Nagappan" } ]
9cd90be1bb3ebe6f7390ddbc391cc26355fe9f2f
[]
[]
false
839db1a6529346759bb03446a231b60bcc5ea10e
Modeling the Centrality of Developer Output with Software Supply Chains
2,023
2
[ { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "2265391422", "name": "Peter C. Rigby" }, { "authorId": "2268781295", "name": "Rui Abreu" }, { "authorId": "2268781105", "name": "Parth Suresh" }, { "authorId": "2268796822", "name": "Yifen Chen" }, { "authorId": "1693689", "name": "Nachiappan Nagappan" } ]
8aaa57c19c00728d386c4419be6024e1a8b2f9a4
[ "Previous work found that engineers perceive several distinct dimensions of code centrality [33] and several measures of code centrality were shown to be important predictors of engineer productivity [31].", "One novel indicator we also employ is the software supply chain (SSC) centrality [31] as it appears to be strongly related to quality, lead-time, and productivity." ]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
4870c492760b2827c6cef1998ee511c008202f87
[ "Demand-side management (DSM) programs [2]—such as incentivizing energy-efficient practices [3] or optimizing HVAC system operations [4]—have been introduced to encourage reductions in building energy use." ]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
735c057575708ed1211de448b80d6f5f3dd42e5d
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
bb7e51b088b12dc63b839257b7d4c998ed1df5a3
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
a4cd1e2cce7ccd3da15b7773f3ea7370af919d0a
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
f29c5536f2b6c1bf25c806537f41ce8907fa48e7
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
053a595081b4bc87190eb05aa11a49338a02a198
[ "In this regard, agent-based modelling provides insights into the complex behavioural dynamics of young people and may provide opportunities for researchers when developing interventions, therefore it should be considered when designing interventions to ensure lasting impact." ]
[ "background" ]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
82c092f549452973158a571b6bfe0e0e8171228e
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
31088870d990e1bcd210c7e9de1d2398ca62f37d
[]
[]
false
8816b8772f44e16ac50c572bce171bdf84580fac
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
2,023
9
[ { "authorId": "46729496", "name": "Chien-fei Chen" }, { "authorId": "48670518", "name": "Xiaojing Xu" }, { "authorId": "1484046010", "name": "Zhuolin Cao" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "50550965", "name": "Qingxin Shi" } ]
97f4d4bc6c94e757fb37687914711d964d716811
[]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
58f13c9f343fd37634a0ea28ae15ec9f83765b28
[ "Most developer questions focus on data preparation and model setup necessary to correctly create a ML pipeline [30], with particular challenges around API misuse, hyperparameter selection, GPU computation, and limited support for debugging and profiling [81]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
77c23353acff77bfa7f8f4d82078a978e183d42b
[ "Among the frameworks, PyTorch and TensorFlow are the two representative ones that are developed and maintained by open source software (OSS) communities [37].", "…shifts in software engineering practices [5, 96], testing methodology tailed for these systems [17, 73], misuse and updates of libraries [30, 94], refactoring practice [86], collaboration in building these systems [67], and engineering challenges gleaned from Stack Overflow posts [21, 37, 95, 100]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
869a39ab556cf5552c0a82d2cb772380aff9881d
[ "This process of identifying important keywords in text aligns with the latent Dirichlet allocation (LDA) topic modeling approach [47], which has been used in the [48, 49]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
a54726c0d628473c897d1afefaebb6a074ebd21f
[ "As technology advances, the architecture and characteristics of cloud computing will continue to evolve, further promoting digital transformation and intelligent applications [ 8 ] ." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
6d39ba8b6b58c98afa6deb3078c237bfbd83a213
[ "WoC provides several key-value databases that enable efficient querying of relationships between different entities [78], [79]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
6c8327a53fb85a491504694e93431f95197df7ce
[ "Besides, the several-month update [Gao et al. 2023] delay of WoC means that the Source Code-based Retriever can only be run periodically to retrieve repository information for releases uploaded to PyPI during the update interval." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
b2cc2a6b4455bf2ad499b227cc721fce7a46b889
[ "Since there were no pre-defined categories, the first and second co-authors of this paper performed the categorization task using an open card sorting approach in two phases [18].", "Therefore, similar to previous work [18, 42, 51], we use the SnowballStemmer module of NLTK to reduce each English word to its root form (aka. stem), thereby eliminating morphologically varied words.", "These two stopword lists are widely used in previous work [1, 10, 18, 22]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
fbb8150895315bc45fedc9b6f5d2214d0b4e8391
[ "A surge of recent work has focused on SE for DL [21] based on the data collected from GitHub, Stack Overflow, interviews, and surveys." ]
[ "methodology" ]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
59f2f761f2c96bd7466aef45dbbfc376e2196411
[ "TensorFlow and PyTorch are the two most widely adopted DL frameworks [37] and PyPI is the official third-party package registry [9] for Python, the mainstream programming language in the DL field [28] and the main language for which TensorFlow and PyTorch provide APIs [15, 20].", "Due to the prevalence of reusing third-party packages in software development [41], package SCs in various packaging ecosystems have been a popular topic in the SE community.", "First, packages in the SC provide a variety of off-the-shelf specialized functionalities for developers to use, which can help DL frameworks better meet developers’ diverse needs [37].", "Research has revealed that developers have different needs when using DL frameworks to perform different tasks [37].", "They also found growing packages and dependency relationships among packages in these SCs, and that transitive dependencies lead to the fragility of these SCs. Substantial work is conducted to identify and mitigate risks in package SCs. Valiev et al. [68] found that PyPI packages’ relative position…" ]
[ "background", "methodology" ]
true
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
0aff904e8f7cd0ee8ececa89e3900db50994c4ef
[ "These models have to be evaluated to determine if they are effective by utilizing one of the evaluation methods [5, 6]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
d6190f4a6cdcc4ba7d12ade28e52e7073e957374
[ "Thus, following previous work [55], [56], [57], we target users involved in AutoML-related SO questions, which can reflect the amount of AutoML users." ]
[ "background" ]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
b2de43bf9b9cb2958271b6d0cfba22ff8cb765bc
[ "To make manual effort affordable, we further randomly select 274 projects from these projects based on a 95% confidence level and a 5% confidence interval, followed by previous work [26], [27], [28], [29]." ]
[ "methodology" ]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
dcff2ba37fd2c005bce33295938555f0ba86ea45
[ "To evaluate the efectiveness of our heuristics, we randomly sample 400 comment changes from all 24M+ collected comment changes, ensuring a conidence level of 95% and a conidence interval of 5%, following prior work [43, 51, 84, 105, 117]." ]
[ "methodology" ]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
bc6681e58c29a5a764e4a1bf850ca3088d9894f8
[ "quantify the structure of the supply chain, can we locate and predict the risky in the chain? Our preliminary investigation presents interesting findings [10, 11]." ]
[]
false
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
2,023
15
[ { "authorId": "2054043055", "name": "Kai Gao" }, { "authorId": "2156975970", "name": "Zhixing Wang" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "40318014", "name": "Minghui Zhou" } ]
04c1a1112a427f7aa03ef2def3b7340f93c434e1
[ "Currently, LDA has been widely used in various studies, including mining and extracting topics from Stack Overflow posts [51, 63], identifying topics from the README files of GitHub projects [20], and discovering topics from issue texts of GitHub projects [24, 29]." ]
[ "methodology" ]
false
ded2b5d9ae135cc1144c12314ad766e00bca3633
Improving Code Reviewer Recommendation: Accuracy, Latency, Workload, and Bystanders
2,023
1
[ { "authorId": "2265391422", "name": "Peter C. Rigby" }, { "authorId": "2276608581", "name": "Seth Rogers" }, { "authorId": "2276607837", "name": "Sadruddin Saleem" }, { "authorId": "2268781105", "name": "Parth Suresh" }, { "authorId": "2276608194", "name": "Daniel Suskin" }, { "authorId": "2268787251", "name": "Patrick Riggs" }, { "authorId": "22192720", "name": "C. Maddila" }, { "authorId": "1693689", "name": "Nachiappan Nagappan" }, { "authorId": "1702551", "name": "A. Mockus" } ]
b474a312403e6c9d8b5312b4868489535427f4e7
[ "Aside from WhoDo at Microsoft [28], two works have used workload balancing in industry: Ericsson [61] and Meta [62].", "We have begun to implement and A/B test variants of SofiaWL with an industrial partner [62]." ]
[ "methodology" ]
false
538d154416024742f0835d1b3045052935f7aa14
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
2,022
4
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
e1d322738bbd62530a679cc3cbc95dd0c0a3a70c
[ "The methodology was based on the studies of [Lima et al. 2018, Tutko et al. 2022]." ]
[]
false
538d154416024742f0835d1b3045052935f7aa14
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
2,022
4
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
68ac101e1df52d9b0ef41f8a674919f90901fa4f
[ "Although GitHub is widely adopted by the repository mining research community (Kalliamvakou et al, 2016) and is a comprehensive source of open source repositories, other platforms such as GitLab (Tutko et al, 2022) and Bitbucket (Kalliamvakou et al, 2016) could host additional CE projects that may yield different insights.", "…adopted by the repository mining research community (Kalliamvakou et al, 2016) and is a comprehensive source of open source repositories, other platforms such as GitLab (Tutko et al, 2022) and Bitbucket (Kalliamvakou et al, 2016) could host additional CE projects that may yield different insights." ]
[]
false
538d154416024742f0835d1b3045052935f7aa14
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
2,022
4
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
6260b02f8d9d60b43b015b33087ee405e6690909
[ "Together popularity and a programming language are also the most popular choices for sampling packages [59]." ]
[ "background" ]
false
538d154416024742f0835d1b3045052935f7aa14
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
2,022
4
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
8928f580221918a7ed47fd2ba5460a1dbd5b8e9f
[ "GitHub is the platform with the most repositories and users [21], and numerous tools are available to help practitioners mine GitHub data [9, 12], which makes it the main data source for 67% of MSR papers [23].", "[21] presents a systematic literature review about how software repositories are mined in MSR-based studies.", "Several works highlighted the necessity of providing timestamps to ensure dataset reproducibility [15, 21, 22], because they help identify which state of the repositorywas retrieved at the time of the selection." ]
[ "background", "methodology" ]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
77ec8d332cdbb245e3ac1a9592a496a601f2c0aa
[ "Consequently, program analysis methodologies [9], [10], [11], [12], [13], [14], [15] may be invalid for addressing this bug at the code level." ]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
b3bdc8736c86c1fd51aa112b96006b1a2a40f5c4
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
[ "This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].", "As was shown in [7, 8], rampant code copying enabled and encouraged by OSS results in massive orphan vulnerabilities and licensing violations that cannot be detected by existing approaches.", "This historical perspective provides insight into code stability and usage trends, allowing us to differentiate actively maintained, reliable code from outdated, less robust sections." ]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
926b4d4e6e2cb75d9f56c5c1901a5e4f0f86cbdf
[ "The code-clone-detection-based (clone-based) approaches are commonly used to detect similar vulnerabilities [4], [10]– [13].", "For example, more than 60,000 open-source software projects are exposed to the vulnerability CVE-2017-12652 [2] for the reuse of unsafe code snippets in the popular graphic library Libpng [3], [4].", "Due to poor software maintenance, these cloned similar vulnerabilities introduced from the reuse process are difficult to detect [4]–[8]." ]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
aa442456db6d6089e0c1e07f35446e7b07012dd7
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
d739b611185f134de83d152710367c02d79a5412
[ "Beyond Dependencies: The Role of Copy-Based Reuse in OSS Development", "In the context of copy-based reuse, extensive code copying can lead to the widespread dissemination of potentially vulnerable code.", "For example, security vulnerabilities may continue to spread even after the main project has fixed the issue [78].", "(5) About 62% of creators intended their resources for reuse." ]
[]
true
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
43fe264961baa1bc789a80cc2838ebabf4d5778c
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
6c8327a53fb85a491504694e93431f95197df7ce
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
ad903fa8960422be312466185cc7a26360613b2e
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
66d8a00fe55582c86495715da256708fc70360e6
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
61c783fdc0eaa52ed884211c71c7cbef33dd3a6c
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
17212368a171bb7f7600d8a05155e0414525acbc
[ "Reid et al. [13] coined the term “Orphan Vulnerability” to refer to these kinds vulnerabilities that exist in copied code even after they are fixed in another project.", "Previous research [13] [14] [24] has identified this as a real problem in popular real-world projects." ]
[ "background" ]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
013ef3d70f65a9765b55afab8f45dcf811b98af9
[ "In this way, we do not need to handle the black-box reuse following prior works [47, 48].", "ac), and licenses, since such meta information can potentially include the hints to infer the dependency in C/C++ projects [13, 16, 45, 48]." ]
[ "background" ]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
a990fefe7fe9a06c941d63800e9fe9454821d969
[]
[]
false
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
2,022
15
[ { "authorId": "2058644472", "name": "David Reid" }, { "authorId": "2057485166", "name": "Mahmoud Jahanshahi" }, { "authorId": "1702551", "name": "A. Mockus" } ]
1010c0e8b07b4cad55b4c24b36bc724b5132287d
[ "DROWN attack: the first exploits previously undiscovered flaws in SSLv2 to create an enhanced version of the Bleichenbacher RSA padding-oracle attack [6], and the second capitalizes on recently identified vulnerabilities in OpenSSL [7], [8]." ]
[ "background" ]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
d3cf5190e5b2bfe024d873fb04a115aaefe50593
[]
[]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
63b8c4900990fdc7a28c06a9fdf066b727833a98
[]
[]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
8c39c73fcefe669a85832e092d672282958ed092
[ "Quantitative data collection approaches, such as surveys and archival analysis of communication and collaboration traces (code repositories, document histories, and chats) [19, 21, 33], also do not allow for on-the-fly analysis and only provide narrow insight into what happens between team members." ]
[]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
489f4616fdf4178115ab7a4f5f3dde29add7282c
[ "Prior work has also shown that event design is not only important for participant satisfaction but can also influence hackathon outcomes, particularly in the long term [9, 13]." ]
[]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
c6d2b3f531da91c0ec124db549ae57691d0671c1
[]
[]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
56e7aa4ca25abdc55de6daf98819a3327f14c1f3
[ "…discussed as a valuable concept for studying the relationship between hackathon format and outcome [17]; one example in this context is the work presented in [14] Some studies utilize quantitative methods—for example, those that have investigated the usage of software repositories [60], [61], [83].", "The findings from these studies indicate that approximately one-third of such code is reused in other open-source projects and that the number of hackathon team members increases reuse probability [61].", "There are tools that are commonly used to facilitate live (Zoom, Teams, etc.) [57] and asynchronous interaction (Slack, Discord, etc.) [58], [59] as well as sharing artifacts (Github, GDrive, etc.) [60], [61]." ]
[ "methodology", "background" ]
false
dc8a53a9117bb7a97519ad9ccbb657236da96e79
One-off events? An empirical study of hackathon code creation and reuse
2,022
7
[ { "authorId": "2174738095", "name": "Ahmed Samir Imam Mahmoud" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
0a51bb06ca312cb8f6cd8ff15a788cd426981b63
[]
[]
false
2d6202ad3424f1595b3a262b539fa1d9c42a1d02
Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software
2,021
2
[ { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "98524776", "name": "Andrey Karnauch" }, { "authorId": "1702551", "name": "A. Mockus" } ]
c723b9dbbbd8f4747e04b8e1051083bd44f06949
[ "The artifact associated with paper is made available at [13] under the CC-BY-4." ]
[ "background" ]
false
2d6202ad3424f1595b3a262b539fa1d9c42a1d02
Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software
2,021
2
[ { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "98524776", "name": "Andrey Karnauch" }, { "authorId": "1702551", "name": "A. Mockus" } ]
d558e0171d1cb60071ec5d55c222823005141067
[]
[]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
d3cf5190e5b2bfe024d873fb04a115aaefe50593
[]
[]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
63b8c4900990fdc7a28c06a9fdf066b727833a98
[]
[]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
924b9b57a084326614f365e1f7e2671fb176bd5d
[ "…foster learning, drive community engagement, increase networking and relationship-building, and are effective for addressing civic, environmental, and public health issues, leading to increased adoption across various fields from higher education to healthcare to business services [8] [24]." ]
[ "background" ]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
c3d42dc2cb772e03b7ccb82b6fa024b2543d9ac6
[ "Empirical studies almost exclusively study participants’ experiences and what participants do in hackathons, with the exceptions of an empirical study on hackathon project code [50, 77].", "Some methods like network analysis for literature reviews [99] and archival analysis for coding projects [50] are more recent developments in hackathon literature that demonstrate the potential for more quantitative anal-", "dataset contribution [50], which is telling based on the difculty to fnd statistics of hackathons, their growth, and projects.", "Among methodological contributions, most are quantitative methods published in 2020 and 2021 [50, 77, 99] like web scraping, metadata, and data mining tools which provide a starting ground for dataset contributions in hackathon literature.", "They have recently become a sample type due to the increased interest in the continuation[50, 77] or perceived efcacy of hackathon projects [106]." ]
[ "methodology", "background" ]
true
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
56e7aa4ca25abdc55de6daf98819a3327f14c1f3
[]
[]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
0ba52e2c83be4d7c9a91d5cdd615b078f85f488c
[ ", 2019) and foster continuation activity after an event has ended (Nolte et al., 2020a; Imam et al., 2021), as well as how participants approach a project (Olesen et al." ]
[ "background" ]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
dc8a53a9117bb7a97519ad9ccbb657236da96e79
[ ", when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a “template code” blob or not, is available at [42].", "…attributes of the blobs we identified, viz., when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a “template code” blob or not, is available at https://doi.org/10.5281/zenodo.6578707 (Mahmoud et al. 2022)." ]
[ "background" ]
true
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
0bb74248ad8464a5027c777abaf18506f19a9864
[ "used, developed and reused [35], running events for diverse audiences [18, 32, 55] and identifying means to foster specific hackathon outcomes [39, 49, 58, 69]." ]
[ "methodology" ]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
909551e58e558ab648f95944d6f3b746aacddead
[]
[]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
56f1ce9f5d440fc7fcdca4517422aa31a4e226bf
[ "Complete results of an extension of this hackathon project is available at [5], and the replication package for our study is available at [6]." ]
[ "background" ]
false
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
The Secret Life of Hackathon Code Where does it come from and where does it go?
2,021
11
[ { "authorId": "1643783463", "name": "Ahmed Imam" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "1727000", "name": "Alexander Nolte" }, { "authorId": "1702551", "name": "A. Mockus" }, { "authorId": "1705550", "name": "J. Herbsleb" } ]
0a51bb06ca312cb8f6cd8ff15a788cd426981b63
[ "For participants to develop technology that could be reused by themselves or others after an event has ended, organizers should encourage participants to form larger teams, add documentation and – if feasible – data to the code they develop [39], and add an open-source license [45]." ]
[]
false
c723b9dbbbd8f4747e04b8e1051083bd44f06949
Replication Package for Representation of Developer Expertise in Open Source Software
2,021
1
[ { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "98524776", "name": "Andrey Karnauch" }, { "authorId": "1702551", "name": "A. Mockus" } ]
8963e7aec92235d3c02df463f40341a35f64ff4f
[ "[14] who analyzed developer familiarity specific to using third-party libraries in source code." ]
[ "background" ]
false
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1
More Effective Software Repository Mining
2,020
2
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
85d150958a873668a3b9f17f924ee55b84ede79b
[ "In fact, in more than half of the cases of such analysis obtained from leading conferences, the projects were selected based on some measure of popularity." ]
[ "background" ]
false
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1
More Effective Software Repository Mining
2,020
2
[ { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "34968683", "name": "Austin Z. Henley" }, { "authorId": "1702551", "name": "A. Mockus" } ]
1e6f74cf862f69907009c198a98d596c837be920
[ "Past work [14, 43] has attempted to disambiguate authors based on a combination of their commit names and commit email addresses, but we considered this out of scope for our work." ]
[ "background" ]
false
12404a5147b39e9a34849606bf2c056f84903c8d
World of code: enabling a research workflow for mining and analyzing the universe of open source VCS data
2,020
54
[ { "authorId": "7777374", "name": "Yuxing Ma" }, { "authorId": "8041820", "name": "Tapajit Dey" }, { "authorId": "2065313146", "name": "Chris Bogart" }, { "authorId": "3110752", "name": "Sadika Amreen" }, { "authorId": "2091537692", "name": "Marat Valiev" }, { "authorId": "1866565388", "name": "Adam Tutko" }, { "authorId": "2081943297", "name": "David Kennard" }, { "authorId": "2858102", "name": "R. Zaretzki" }, { "authorId": "1702551", "name": "A. Mockus" } ]
352fb60a0440f56474c384eeb51955bf1894fd4f
[ "Previous works in this line [8, 12, 29, 38] have used the code as the context on several datasets [4, 8, 22, 23]." ]
[]
false
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
4