paper_id
stringclasses 32
values | title
stringclasses 32
values | year
int64 2.02k
2.03k
| citation_count
int64 1
54
| authors
listlengths 2
10
| cited_paper_id
stringlengths 40
40
| contexts
listlengths 0
26
| intents
listlengths 0
3
| is_influential
bool 2
classes |
|---|---|---|---|---|---|---|---|---|
25a268f772046fcff223c19fdf6ba23ccd6c8e58
|
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
| 2,025
| 4
|
[
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
612a8e523feb735289a2d7b7ec7bbbd440c8731a
|
[
"Many of previous studies of project “deprecation” or “failure” defined unmaintenance based on the activity features, they often assume a project is abandoned after a fixed threshold of inactivity [12, 33, 35, 52].",
"…or “failure”, but often with vague meaning and inconsistent operationalization: some studies rely solely on indicators of prolonged inactivity (e.g., the absence of commits within a fixed period) [12, 33, 35, 52], while others require declarations from main-tainers in documentation or metadata."
] |
[] | false
|
25a268f772046fcff223c19fdf6ba23ccd6c8e58
|
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
| 2,025
| 4
|
[
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f20d9078f5bf6c3a0748021e4f1494e257b257e3
|
[
"3,17 In other words, the more people are involved, the harder it will be for the bear to catch them all."
] |
[] | false
|
25a268f772046fcff223c19fdf6ba23ccd6c8e58
|
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
| 2,025
| 4
|
[
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
494acf3f7b473245db2be41586978c61480326fc
|
[
"They found that infrastructure role, downstream dependencies, publication mentions, and government involvement enhance sustainability, while academic origin and project recency reduce it [18]."
] |
[] | false
|
25a268f772046fcff223c19fdf6ba23ccd6c8e58
|
Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software
| 2,025
| 4
|
[
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
7b75fda8200b108c4466f0567bdd2bd940b392fc
|
[
"Historically, open-source research software has been longer-lived than other kinds of open-source software and government involvement has been associated with longer lifespan [9]."
] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
b37fee73d648e0e4d4822dd795194232ab4cc4be
|
[
"Our criteria are inspired by Miller et al. [28]’s criteria of abandoned packages since we want to exclude the abandoned packages from our analysis."
] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
d26331a5dae50614dc8580c4f057bea7a8c3177a
|
[] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
e71c11a1f34d54fcffaa9b86ea4404b6d6d10a6b
|
[] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
25a268f772046fcff223c19fdf6ba23ccd6c8e58
|
[
"In conventional OSS SECOs, packages can become obsolete or inactive [22, 70], breaking changes can cause cascading effects on projects [9], communities around software projects can rise and fall [107], projects can die due to lack of financial viability [111], and poor governance can cause an…"
] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
ced75d2582807c3edad4a5148186d32a2dd693a5
|
[] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
04f66deb0ae8dea6be752604e33e23bf83fb65af
|
[
"Miller et al. [11] analyzed dependency abandonment in the NPM ecosystem.",
"To the best of our knowledge, the recent study by Miller et al. [11] is the only one that proposes strategies to mitigate the risk brought by abandonment.",
"Most existing studies on OSS project abandonment focus on analyzing the impact and risk associated with project abandonment [5]–[11]."
] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
461e00ecb0bb5b24b4cb65078a96d0677919f5f3
|
[
"Research has worked on understanding and detecting abandoned dependencies [138, 143]."
] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
e2382850dc382098a357fd00e654d5b05826f53b
|
[] |
[] | false
|
5a9ce9cb804d124e0f8b06eae2222851c28acf17
|
Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem
| 2,025
| 9
|
[
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "Christian Kästner"
}
] |
99c7392512bde34010632eefb630b74ed6bad069
|
[
"Miller et al. observe that 15 % of the most downloaded npm packages are abandoned within six years and that 82 % of the affected projects never respond to the issue at all [21]."
] |
[] | false
|
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets
| 2,025
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
e9c0ab581e21b727d406317e2ba06e565a8fa640
|
[
"The primary challenge of license management lies in the complexity and variety of licenses governing autonomous driving datasets [40, 130].",
"…and methods have been proposed to explore how to properly manage the training data, encompassing data deduplication [56], training data selection [59, 89, 112], sampling high-quality data [84, 121], and dataset license compliance [40, 50], there is still a lack of a unified framework and criteria."
] |
[] | false
|
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets
| 2,025
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
d64229d0c72c9b7950ebc1e5440ffdee168047b3
|
[
"Because LLMs are trained on large-scale code repositories, they may inadvertently memorize and regenerate sensitive or proprietary fragments, raising issues of data handling, licensing compliance, and potential leakage of conidential information [19, 55, 62]."
] |
[] | false
|
1488416ff0b3caec77e252756256a009f696c1cc
|
OSS License Identification at Scale: A Comprehensive Dataset Using World of Code
| 2,024
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2320311508",
"name": "Adam McDaniel"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
206413519378034892e72b5f86db8bdd2aced90f
|
[
"Followingprevious work [34], for each license file we compute a matching score as the ratio of shared Winnowing signatures to the total signatures between the file and a standard SPDX license, as defined in Equation 1: where 𝑆 is the matching score, 𝐴 represents the set of signatures in the…",
"The situation becomes even more complicated with the widespread use of license variants [34], which are licenses that do not strictly match standard license texts listed by SPDX in either formatting or wording, or are entirely custom licenses crafted by developers or organizations.",
"We utilize the Winnowing algorithm [34, 53] to compare license files from 5,990 top PyPI packages against standard SPDX license texts."
] |
[] | false
|
1488416ff0b3caec77e252756256a009f696c1cc
|
OSS License Identification at Scale: A Comprehensive Dataset Using World of Code
| 2,024
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2320311508",
"name": "Adam McDaniel"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
[
"Using WoC’s license map [21], we compare this information with the Stack’s license data to identify potential instances of license noncompliance."
] |
[] | false
|
85d150958a873668a3b9f17f924ee55b84ede79b
|
The Role of Data Filtering in Open Source Software Ranking and Selection
| 2,024
| 2
|
[
{
"authorId": "2162186197",
"name": "Addi Malviya-Thakur"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
d18423ab1b74c4be52d84d4ece989d59994514f6
|
[
"Remove projects demonstrating poor performance in key metrics (e.g., pull request activity) [8–24] Select projects ranking highly in significant dimensions (e.g., star count) [15,20,25–33] Employ decision tree classification to determine CCP status (using project statistics and description keywords…"
] |
[] | false
|
85d150958a873668a3b9f17f924ee55b84ede79b
|
The Role of Data Filtering in Open Source Software Ranking and Selection
| 2,024
| 2
|
[
{
"authorId": "2162186197",
"name": "Addi Malviya-Thakur"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
6d380ef939655fe854605ea0fe5789727edc38b6
|
[
"Addi et al. filtered higher-confidence data based on data attributes (such as the number of stars on open-source projects)[10], which limits applicability and may not accurately reflect true data quality."
] |
[] | false
|
95cecc4bba4243cd66d059de164a6aa56f3f47ee
|
Moving Faster and Reducing Risk: Using LLMs in Release Deployment
| 2,024
| 2
|
[
{
"authorId": "2311876371",
"name": "Rui Abreu"
},
{
"authorId": "32269195",
"name": "V. Murali"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2311877796",
"name": "Chandra Maddila"
},
{
"authorId": "2325285821",
"name": "Weiyan Sun"
},
{
"authorId": "2325026616",
"name": "Jun Ge"
},
{
"authorId": "2325098618",
"name": "Kaavya Chinniah"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2325025351",
"name": "Megh Mehta"
},
{
"authorId": "1693689",
"name": "Nachiappan Nagappan"
}
] |
2520a844ff53ddc3d5be6563ddef8406626848a6
|
[
"The work around code review and AI is moving at a fast rate, we are excited to see other advances by researchers and in industry."
] |
[] | false
|
95cecc4bba4243cd66d059de164a6aa56f3f47ee
|
Moving Faster and Reducing Risk: Using LLMs in Release Deployment
| 2,024
| 2
|
[
{
"authorId": "2311876371",
"name": "Rui Abreu"
},
{
"authorId": "32269195",
"name": "V. Murali"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2311877796",
"name": "Chandra Maddila"
},
{
"authorId": "2325285821",
"name": "Weiyan Sun"
},
{
"authorId": "2325026616",
"name": "Jun Ge"
},
{
"authorId": "2325098618",
"name": "Kaavya Chinniah"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2325025351",
"name": "Megh Mehta"
},
{
"authorId": "1693689",
"name": "Nachiappan Nagappan"
}
] |
e813d85ccd9e1a86dca4aa6e0dcf9486f0fdd01a
|
[
"Promising recent work on genAI and deployment provides a wonderful roadmap for what could be ahead [53]."
] |
[] | false
|
d739b611185f134de83d152710367c02d79a5412
|
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
| 2,024
| 4
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
60e38d4fc675718b412d0d93d3b95df3a8f4a5eb
|
[
"A module in repository A is considered a reuse of a module from repository B if it is detected as a clone and appears later in time, following the timestamp-based inference standard in prior studies [44], [45]."
] |
[] | false
|
d739b611185f134de83d152710367c02d79a5412
|
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
| 2,024
| 4
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
6f8730653938898730fb6aa2747a295650fb8e5e
|
[
"Dependencies are necessary since modern software is built on the foundation of existing code, libraries, and frameworks [71]."
] |
[] | false
|
d739b611185f134de83d152710367c02d79a5412
|
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
| 2,024
| 4
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
[
"Type II SSC involves copied code, a common practice in open-source software where code is shared publicly [14], allowing anyone to copy or fork it (within licensing requirements).",
"The sampling was based on SHA-1 hashes of the blobs and commits, which ensures that the selection process is effectively random.",
"This evaluation establishes the applicability and scalability of our contributions to real-world, large-scale code datasets, reinforcing the value of our work in supporting the development of secure, high-integrity LLM training corpora."
] |
[] | true
|
d739b611185f134de83d152710367c02d79a5412
|
Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development
| 2,024
| 4
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
36a8c342adeb891857b4dacacdc14c399196d0d9
|
[] |
[] | false
|
17212368a171bb7f7600d8a05155e0414525acbc
|
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
| 2,023
| 3
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
84483e7b1bb9b7c6951fd7d271cb7dae4b638ff9
|
[
"Another complex area involves the legal interpretation of terms used in software licenses, which are often steeped in domain-specific jargon that does not easily lend itself to quan-tifiable metrics.",
"These agreements are intended to ensure that contributors retain copyright over their code and agree to transfer these rights to the project maintainers.",
"…et al. [166] 2010 Wu et al. [18] 2015 Vendome et al. [167] 2015 Mlouki et al. [133] 2016 Wu et al. [19] 2017 Vendome et al. [168] 2017 Reid et al. [169] 2023 2) License Compliance: Besides license incompatibility among licenses, detecting the overall compliance of all licenses before officially…",
"Reid et al. [169] further confirmed the prevalence of license omission significantly introduced license violations at a large scale by tracking the license altering history logged in World of Code, suggesting the necessity of regulations of license traceability for open-source reuse."
] |
[] | true
|
17212368a171bb7f7600d8a05155e0414525acbc
|
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
| 2,023
| 3
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
[
"This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].",
"In order for this approach to work, we have to go across repository boundaries and consider versions (and their history) in all public repositories, i.e., Universal Version History (UVH) [8].",
"As was shown in [7, 8], rampant code copying enabled and encouraged by OSS results in massive orphan vulnerabilities and licensing violations that cannot be detected by existing approaches."
] |
[] | false
|
17212368a171bb7f7600d8a05155e0414525acbc
|
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
| 2,023
| 3
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
1488416ff0b3caec77e252756256a009f696c1cc
|
[
"Many licenses impose specific requirements on code usage, such as the obligation to publish derived works under GPL licenses."
] |
[] | false
|
66d8a00fe55582c86495715da256708fc70360e6
|
Dataset: Copy-based Reuse in Open Source Software
| 2,023
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
6e2d0265a6f362d97d2d437ea0f0633b1080ca9e
|
[
"This propagation of code has also been found in the general open source ecosystem [73]–[75], and led our participants to pick and choose API designs based on which projects were generally considered successful and which they personally liked."
] |
[] | false
|
66d8a00fe55582c86495715da256708fc70360e6
|
Dataset: Copy-based Reuse in Open Source Software
| 2,023
| 2
|
[
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
[
"As detailed in Section III-B, we analyzed blobs within the dataset that were reused across multiple OSS projects, as identified through WoC [20].",
"WoC addresses this by offering a map [20] that, for blobs found in multiple projects, sorts them by the commit time of each blob’s creation, allowing us to identify its first occurrence and the repository where it was initially committed."
] |
[] | false
|
839db1a6529346759bb03446a231b60bcc5ea10e
|
Modeling the Centrality of Developer Output with Software Supply Chains
| 2,023
| 2
|
[
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2268781295",
"name": "Rui Abreu"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2268796822",
"name": "Yifen Chen"
},
{
"authorId": "1693689",
"name": "Nachiappan Nagappan"
}
] |
9cd90be1bb3ebe6f7390ddbc391cc26355fe9f2f
|
[] |
[] | false
|
839db1a6529346759bb03446a231b60bcc5ea10e
|
Modeling the Centrality of Developer Output with Software Supply Chains
| 2,023
| 2
|
[
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2268781295",
"name": "Rui Abreu"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2268796822",
"name": "Yifen Chen"
},
{
"authorId": "1693689",
"name": "Nachiappan Nagappan"
}
] |
8aaa57c19c00728d386c4419be6024e1a8b2f9a4
|
[
"Previous work found that engineers perceive several distinct dimensions of code centrality [33] and several measures of code centrality were shown to be important predictors of engineer productivity [31].",
"One novel indicator we also employ is the software supply chain (SSC) centrality [31] as it appears to be strongly related to quality, lead-time, and productivity."
] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
4870c492760b2827c6cef1998ee511c008202f87
|
[
"Demand-side management (DSM) programs [2]—such as incentivizing energy-efficient practices [3] or optimizing HVAC system operations [4]—have been introduced to encourage reductions in building energy use."
] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
735c057575708ed1211de448b80d6f5f3dd42e5d
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
bb7e51b088b12dc63b839257b7d4c998ed1df5a3
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
a4cd1e2cce7ccd3da15b7773f3ea7370af919d0a
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
f29c5536f2b6c1bf25c806537f41ce8907fa48e7
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
053a595081b4bc87190eb05aa11a49338a02a198
|
[
"In this regard, agent-based modelling provides insights into the complex behavioural dynamics of young people and may provide opportunities for researchers when developing interventions, therefore it should be considered when designing interventions to ensure lasting impact."
] |
[
"background"
] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
82c092f549452973158a571b6bfe0e0e8171228e
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
31088870d990e1bcd210c7e9de1d2398ca62f37d
|
[] |
[] | false
|
8816b8772f44e16ac50c572bce171bdf84580fac
|
Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior
| 2,023
| 9
|
[
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] |
97f4d4bc6c94e757fb37687914711d964d716811
|
[] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
58f13c9f343fd37634a0ea28ae15ec9f83765b28
|
[
"Most developer questions focus on data preparation and model setup necessary to correctly create a ML pipeline [30], with particular challenges around API misuse, hyperparameter selection, GPU computation, and limited support for debugging and profiling [81]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
77c23353acff77bfa7f8f4d82078a978e183d42b
|
[
"Among the frameworks, PyTorch and TensorFlow are the two representative ones that are developed and maintained by open source software (OSS) communities [37].",
"…shifts in software engineering practices [5, 96], testing methodology tailed for these systems [17, 73], misuse and updates of libraries [30, 94], refactoring practice [86], collaboration in building these systems [67], and engineering challenges gleaned from Stack Overflow posts [21, 37, 95, 100]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
869a39ab556cf5552c0a82d2cb772380aff9881d
|
[
"This process of identifying important keywords in text aligns with the latent Dirichlet allocation (LDA) topic modeling approach [47], which has been used in the [48, 49]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
a54726c0d628473c897d1afefaebb6a074ebd21f
|
[
"As technology advances, the architecture and characteristics of cloud computing will continue to evolve, further promoting digital transformation and intelligent applications [ 8 ] ."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
6d39ba8b6b58c98afa6deb3078c237bfbd83a213
|
[
"WoC provides several key-value databases that enable efficient querying of relationships between different entities [78], [79]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
6c8327a53fb85a491504694e93431f95197df7ce
|
[
"Besides, the several-month update [Gao et al. 2023] delay of WoC means that the Source Code-based Retriever can only be run periodically to retrieve repository information for releases uploaded to PyPI during the update interval."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
b2cc2a6b4455bf2ad499b227cc721fce7a46b889
|
[
"Since there were no pre-defined categories, the first and second co-authors of this paper performed the categorization task using an open card sorting approach in two phases [18].",
"Therefore, similar to previous work [18, 42, 51], we use the SnowballStemmer module of NLTK to reduce each English word to its root form (aka. stem), thereby eliminating morphologically varied words.",
"These two stopword lists are widely used in previous work [1, 10, 18, 22]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
fbb8150895315bc45fedc9b6f5d2214d0b4e8391
|
[
"A surge of recent work has focused on SE for DL [21] based on the data collected from GitHub, Stack Overflow, interviews, and surveys."
] |
[
"methodology"
] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
59f2f761f2c96bd7466aef45dbbfc376e2196411
|
[
"TensorFlow and PyTorch are the two most widely adopted DL frameworks [37] and PyPI is the official third-party package registry [9] for Python, the mainstream programming language in the DL field [28] and the main language for which TensorFlow and PyTorch provide APIs [15, 20].",
"Due to the prevalence of reusing third-party packages in software development [41], package SCs in various packaging ecosystems have been a popular topic in the SE community.",
"First, packages in the SC provide a variety of off-the-shelf specialized functionalities for developers to use, which can help DL frameworks better meet developers’ diverse needs [37].",
"Research has revealed that developers have different needs when using DL frameworks to perform different tasks [37].",
"They also found growing packages and dependency relationships among packages in these SCs, and that transitive dependencies lead to the fragility of these SCs. Substantial work is conducted to identify and mitigate risks in package SCs. Valiev et al. [68] found that PyPI packages’ relative position…"
] |
[
"background",
"methodology"
] | true
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
0aff904e8f7cd0ee8ececa89e3900db50994c4ef
|
[
"These models have to be evaluated to determine if they are effective by utilizing one of the evaluation methods [5, 6]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
d6190f4a6cdcc4ba7d12ade28e52e7073e957374
|
[
"Thus, following previous work [55], [56], [57], we target users involved in AutoML-related SO questions, which can reflect the amount of AutoML users."
] |
[
"background"
] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
b2de43bf9b9cb2958271b6d0cfba22ff8cb765bc
|
[
"To make manual effort affordable, we further randomly select 274 projects from these projects based on a 95% confidence level and a 5% confidence interval, followed by previous work [26], [27], [28], [29]."
] |
[
"methodology"
] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
dcff2ba37fd2c005bce33295938555f0ba86ea45
|
[
"To evaluate the efectiveness of our heuristics, we randomly sample 400 comment changes from all 24M+ collected comment changes, ensuring a conidence level of 95% and a conidence interval of 5%, following prior work [43, 51, 84, 105, 117]."
] |
[
"methodology"
] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
bc6681e58c29a5a764e4a1bf850ca3088d9894f8
|
[
"quantify the structure of the supply chain, can we locate and predict the risky in the chain? Our preliminary investigation presents interesting findings [10, 11]."
] |
[] | false
|
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf
|
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
| 2,023
| 15
|
[
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] |
04c1a1112a427f7aa03ef2def3b7340f93c434e1
|
[
"Currently, LDA has been widely used in various studies, including mining and extracting topics from Stack Overflow posts [51, 63], identifying topics from the README files of GitHub projects [20], and discovering topics from issue texts of GitHub projects [24, 29]."
] |
[
"methodology"
] | false
|
ded2b5d9ae135cc1144c12314ad766e00bca3633
|
Improving Code Reviewer Recommendation: Accuracy, Latency, Workload, and Bystanders
| 2,023
| 1
|
[
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2276608581",
"name": "Seth Rogers"
},
{
"authorId": "2276607837",
"name": "Sadruddin Saleem"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2276608194",
"name": "Daniel Suskin"
},
{
"authorId": "2268787251",
"name": "Patrick Riggs"
},
{
"authorId": "22192720",
"name": "C. Maddila"
},
{
"authorId": "1693689",
"name": "Nachiappan Nagappan"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
b474a312403e6c9d8b5312b4868489535427f4e7
|
[
"Aside from WhoDo at Microsoft [28], two works have used workload balancing in industry: Ericsson [61] and Meta [62].",
"We have begun to implement and A/B test variants of SofiaWL with an industrial partner [62]."
] |
[
"methodology"
] | false
|
538d154416024742f0835d1b3045052935f7aa14
|
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
| 2,022
| 4
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
e1d322738bbd62530a679cc3cbc95dd0c0a3a70c
|
[
"The methodology was based on the studies of [Lima et al. 2018, Tutko et al. 2022]."
] |
[] | false
|
538d154416024742f0835d1b3045052935f7aa14
|
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
| 2,022
| 4
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
68ac101e1df52d9b0ef41f8a674919f90901fa4f
|
[
"Although GitHub is widely adopted by the repository mining research community (Kalliamvakou et al, 2016) and is a comprehensive source of open source repositories, other platforms such as GitLab (Tutko et al, 2022) and Bitbucket (Kalliamvakou et al, 2016) could host additional CE projects that may yield different insights.",
"…adopted by the repository mining research community (Kalliamvakou et al, 2016) and is a comprehensive source of open source repositories, other platforms such as GitLab (Tutko et al, 2022) and Bitbucket (Kalliamvakou et al, 2016) could host additional CE projects that may yield different insights."
] |
[] | false
|
538d154416024742f0835d1b3045052935f7aa14
|
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
| 2,022
| 4
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
6260b02f8d9d60b43b015b33087ee405e6690909
|
[
"Together popularity and a programming language are also the most popular choices for sampling packages [59]."
] |
[
"background"
] | false
|
538d154416024742f0835d1b3045052935f7aa14
|
How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools
| 2,022
| 4
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
8928f580221918a7ed47fd2ba5460a1dbd5b8e9f
|
[
"GitHub is the platform with the most repositories and users [21], and numerous tools are available to help practitioners mine GitHub data [9, 12], which makes it the main data source for 67% of MSR papers [23].",
"[21] presents a systematic literature review about how software repositories are mined in MSR-based studies.",
"Several works highlighted the necessity of providing timestamps to ensure dataset reproducibility [15, 21, 22], because they help identify which state of the repositorywas retrieved at the time of the selection."
] |
[
"background",
"methodology"
] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
77ec8d332cdbb245e3ac1a9592a496a601f2c0aa
|
[
"Consequently, program analysis methodologies [9], [10], [11], [12], [13], [14], [15] may be invalid for addressing this bug at the code level."
] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
b3bdc8736c86c1fd51aa112b96006b1a2a40f5c4
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7
|
[
"This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].",
"As was shown in [7, 8], rampant code copying enabled and encouraged by OSS results in massive orphan vulnerabilities and licensing violations that cannot be detected by existing approaches.",
"This historical perspective provides insight into code stability and usage trends, allowing us to differentiate actively maintained, reliable code from outdated, less robust sections."
] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
926b4d4e6e2cb75d9f56c5c1901a5e4f0f86cbdf
|
[
"The code-clone-detection-based (clone-based) approaches are commonly used to detect similar vulnerabilities [4], [10]– [13].",
"For example, more than 60,000 open-source software projects are exposed to the vulnerability CVE-2017-12652 [2] for the reuse of unsafe code snippets in the popular graphic library Libpng [3], [4].",
"Due to poor software maintenance, these cloned similar vulnerabilities introduced from the reuse process are difficult to detect [4]–[8]."
] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
aa442456db6d6089e0c1e07f35446e7b07012dd7
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
d739b611185f134de83d152710367c02d79a5412
|
[
"Beyond Dependencies: The Role of Copy-Based Reuse in OSS Development",
"In the context of copy-based reuse, extensive code copying can lead to the widespread dissemination of potentially vulnerable code.",
"For example, security vulnerabilities may continue to spread even after the main project has fixed the issue [78].",
"(5) About 62% of creators intended their resources for reuse."
] |
[] | true
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
43fe264961baa1bc789a80cc2838ebabf4d5778c
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
6c8327a53fb85a491504694e93431f95197df7ce
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
ad903fa8960422be312466185cc7a26360613b2e
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
66d8a00fe55582c86495715da256708fc70360e6
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
61c783fdc0eaa52ed884211c71c7cbef33dd3a6c
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
17212368a171bb7f7600d8a05155e0414525acbc
|
[
"Reid et al. [13] coined the term “Orphan Vulnerability” to refer to these kinds vulnerabilities that exist in copied code even after they are fixed in another project.",
"Previous research [13] [14] [24] has identified this as a real problem in popular real-world projects."
] |
[
"background"
] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
013ef3d70f65a9765b55afab8f45dcf811b98af9
|
[
"In this way, we do not need to handle the black-box reuse following prior works [47, 48].",
"ac), and licenses, since such meta information can potentially include the hints to infer the dependency in C/C++ projects [13, 16, 45, 48]."
] |
[
"background"
] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
a990fefe7fe9a06c941d63800e9fe9454821d969
|
[] |
[] | false
|
db5c5f69cbf840a1b70087a17ea1f2d89c481a38
|
The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software
| 2,022
| 15
|
[
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
1010c0e8b07b4cad55b4c24b36bc724b5132287d
|
[
"DROWN attack: the first exploits previously undiscovered flaws in SSLv2 to create an enhanced version of the Bleichenbacher RSA padding-oracle attack [6], and the second capitalizes on recently identified vulnerabilities in OpenSSL [7], [8]."
] |
[
"background"
] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
d3cf5190e5b2bfe024d873fb04a115aaefe50593
|
[] |
[] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
63b8c4900990fdc7a28c06a9fdf066b727833a98
|
[] |
[] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
8c39c73fcefe669a85832e092d672282958ed092
|
[
"Quantitative data collection approaches, such as surveys and archival analysis of communication and collaboration traces (code repositories, document histories, and chats) [19, 21, 33], also do not allow for on-the-fly analysis and only provide narrow insight into what happens between team members."
] |
[] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
489f4616fdf4178115ab7a4f5f3dde29add7282c
|
[
"Prior work has also shown that event design is not only important for participant satisfaction but can also influence hackathon outcomes, particularly in the long term [9, 13]."
] |
[] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
c6d2b3f531da91c0ec124db549ae57691d0671c1
|
[] |
[] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
56e7aa4ca25abdc55de6daf98819a3327f14c1f3
|
[
"…discussed as a valuable concept for studying the relationship between hackathon format and outcome [17]; one example in this context is the work presented in [14] Some studies utilize quantitative methods—for example, those that have investigated the usage of software repositories [60], [61], [83].",
"The findings from these studies indicate that approximately one-third of such code is reused in other open-source projects and that the number of hackathon team members increases reuse probability [61].",
"There are tools that are commonly used to facilitate live (Zoom, Teams, etc.) [57] and asynchronous interaction (Slack, Discord, etc.) [58], [59] as well as sharing artifacts (Github, GDrive, etc.) [60], [61]."
] |
[
"methodology",
"background"
] | false
|
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
One-off events? An empirical study of hackathon code creation and reuse
| 2,022
| 7
|
[
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
0a51bb06ca312cb8f6cd8ff15a788cd426981b63
|
[] |
[] | false
|
2d6202ad3424f1595b3a262b539fa1d9c42a1d02
|
Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software
| 2,021
| 2
|
[
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
c723b9dbbbd8f4747e04b8e1051083bd44f06949
|
[
"The artifact associated with paper is made available at [13] under the CC-BY-4."
] |
[
"background"
] | false
|
2d6202ad3424f1595b3a262b539fa1d9c42a1d02
|
Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software
| 2,021
| 2
|
[
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
d558e0171d1cb60071ec5d55c222823005141067
|
[] |
[] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
d3cf5190e5b2bfe024d873fb04a115aaefe50593
|
[] |
[] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
63b8c4900990fdc7a28c06a9fdf066b727833a98
|
[] |
[] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
924b9b57a084326614f365e1f7e2671fb176bd5d
|
[
"…foster learning, drive community engagement, increase networking and relationship-building, and are effective for addressing civic, environmental, and public health issues, leading to increased adoption across various fields from higher education to healthcare to business services [8] [24]."
] |
[
"background"
] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
c3d42dc2cb772e03b7ccb82b6fa024b2543d9ac6
|
[
"Empirical studies almost exclusively study participants’ experiences and what participants do in hackathons, with the exceptions of an empirical study on hackathon project code [50, 77].",
"Some methods like network analysis for literature reviews [99] and archival analysis for coding projects [50] are more recent developments in hackathon literature that demonstrate the potential for more quantitative anal-",
"dataset contribution [50], which is telling based on the difculty to fnd statistics of hackathons, their growth, and projects.",
"Among methodological contributions, most are quantitative methods published in 2020 and 2021 [50, 77, 99] like web scraping, metadata, and data mining tools which provide a starting ground for dataset contributions in hackathon literature.",
"They have recently become a sample type due to the increased interest in the continuation[50, 77] or perceived efcacy of hackathon projects [106]."
] |
[
"methodology",
"background"
] | true
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
56e7aa4ca25abdc55de6daf98819a3327f14c1f3
|
[] |
[] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
0ba52e2c83be4d7c9a91d5cdd615b078f85f488c
|
[
", 2019) and foster continuation activity after an event has ended (Nolte et al., 2020a; Imam et al., 2021), as well as how participants approach a project (Olesen et al."
] |
[
"background"
] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
dc8a53a9117bb7a97519ad9ccbb657236da96e79
|
[
", when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a “template code” blob or not, is available at [42].",
"…attributes of the blobs we identified, viz., when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a “template code” blob or not, is available at https://doi.org/10.5281/zenodo.6578707 (Mahmoud et al. 2022)."
] |
[
"background"
] | true
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
0bb74248ad8464a5027c777abaf18506f19a9864
|
[
"used, developed and reused [35], running events for diverse audiences [18, 32, 55] and identifying means to foster specific hackathon outcomes [39, 49, 58, 69]."
] |
[
"methodology"
] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
909551e58e558ab648f95944d6f3b746aacddead
|
[] |
[] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
56f1ce9f5d440fc7fcdca4517422aa31a4e226bf
|
[
"Complete results of an extension of this hackathon project is available at [5], and the replication package for our study is available at [6]."
] |
[
"background"
] | false
|
c5a850f50a95a56cf7000425c8bb59e87f80d6ee
|
The Secret Life of Hackathon Code Where does it come from and where does it go?
| 2,021
| 11
|
[
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] |
0a51bb06ca312cb8f6cd8ff15a788cd426981b63
|
[
"For participants to develop technology that could be reused by themselves or others after an event has ended, organizers should encourage participants to form larger teams, add documentation and – if feasible – data to the code they develop [39], and add an open-source license [45]."
] |
[] | false
|
c723b9dbbbd8f4747e04b8e1051083bd44f06949
|
Replication Package for Representation of Developer Expertise in Open Source Software
| 2,021
| 1
|
[
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
8963e7aec92235d3c02df463f40341a35f64ff4f
|
[
"[14] who analyzed developer familiarity specific to using third-party libraries in source code."
] |
[
"background"
] | false
|
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1
|
More Effective Software Repository Mining
| 2,020
| 2
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
85d150958a873668a3b9f17f924ee55b84ede79b
|
[
"In fact, in more than half of the cases of such analysis obtained from leading conferences, the projects were selected based on some measure of popularity."
] |
[
"background"
] | false
|
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1
|
More Effective Software Repository Mining
| 2,020
| 2
|
[
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
1e6f74cf862f69907009c198a98d596c837be920
|
[
"Past work [14, 43] has attempted to disambiguate authors based on a combination of their commit names and commit email addresses, but we considered this out of scope for our work."
] |
[
"background"
] | false
|
12404a5147b39e9a34849606bf2c056f84903c8d
|
World of code: enabling a research workflow for mining and analyzing the universe of open source VCS data
| 2,020
| 54
|
[
{
"authorId": "7777374",
"name": "Yuxing Ma"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "2065313146",
"name": "Chris Bogart"
},
{
"authorId": "3110752",
"name": "Sadika Amreen"
},
{
"authorId": "2091537692",
"name": "Marat Valiev"
},
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "2081943297",
"name": "David Kennard"
},
{
"authorId": "2858102",
"name": "R. Zaretzki"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] |
352fb60a0440f56474c384eeb51955bf1894fd4f
|
[
"Previous works in this line [8, 12, 29, 38] have used the code as the context on several datasets [4, 8, 22, 23]."
] |
[] | false
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4