Papers
Export 150 results:
Filters: First Letter Of Last Name is P [Clear All Filters]
“What is the Gist? Understanding the Use of Public Gists on GitHub”, 12th Working Conference on Mining Software Repositories (MSR 2015). IEEE, 2015.
, “Who Added that Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps”, 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). pp. 165-169, 2017.
, “Dimensions of information systems success”, Communications of the Association for Information Systems, vol. 20, p. 61, 1999.
, “An empirical study of open-source and closed-source software products”, Ieee Transactions on Software Engineering, vol. 30, pp. 246-256, 2004.
, “From planning to mature: On the success of open source projects”, Research Policy, vol. 36, pp. 1575-1586, 2007.
, “How do open source communities blog?”, Empirical Software Engineering, 2012.
, “Innovation, Imitation and Open Source”, International Journal of Open Source Software and Processes, vol. 1, no. 2, pp. 28 - 42, 2009.
, “JADE: A software framework for developing multi-agent applications. Lessons learned”, Information and Software Technology, vol. 50, pp. 10-21, 2008.
, “License usage and changes: a large-scale study on gitHub”, Empirical Software Engineering, 2016.
, “Managing knowledge sharing in distributed innovation from the perspective of developers: empirical study of open source software projects in China”, Technology Analysis & Strategic Management, vol. 2929143029, no. 11721, pp. 1 - 22, 2017.
, “MODELING DISTRIBUTED COLLABORATION ON GITHUB”, Advances in Complex Systems, 2014.
, “Network Formation via Contests: The Production Process of Open Source Software”, 2004. prufer.pdf (234.8 KB)
, “Open Source and the Network Society”, 2002. pedersen.pdf (231.55 KB)
, “Open Source and the software industry. How firms do business out of an open innovation paradigm”, 2007. paper_euram_2007.pdf (185.12 KB)
, “The Open Source approach—opportunities and limitations with respect to security and privacy”, Computers & Security, vol. 21, pp. 461–471, 2002. HaKP_02OpenSource_0214.doc (2.5 MB)
, “The search for a research method for studying OSS process innovation”, Empirical Software Engineering, vol. 16, no. 4, pp. 514 - 537, 2011.
, “On the security of open source software”, Information systems journal, vol. 12, pp. 61–78, 2002. Payne2002_ISJ12_SecurityOSS.pdf (111.53 KB)
, “Skills, Division of Labor and Performance in Collective Inventions. Evidence from the Open Source Software”, 2006. giuriplonerrullanitorrisi.pdf (452.63 KB)
, “Trust and vulnerability in open source software”, Software, {IEE} Proceedings -, vol. 149, no. 1, pp. 47–51, 2002.
, “User Choices and Regret: Understanding Users' Decision Process bout Consensually Acquired Spyware”, I/S: A Journal of Law and Policy for the Information Society, vol. 2, 2006.
, “What Makes a Good Bug Report?”, IEEE Transactions on Software Engineering, vol. 36, pp. 618-643, 2010. bettenburg-fse-2008.pdf (2.75 MB)
, ,
,
“Linux Adoption by Firms”. 2004. peng.pdf (527.59 KB)
, ,