Papers
Export 4452 results:
Filters: Filter is [Clear All Filters]
“Regurgitate: Using GIT For F/LOSS Data Collection”, in 1st Workshop on Public Data about Software Development (WoPDaSD 2006), 2006. massey.pdf (93.51 KB)
, “Tools for the Study of the Usual Data Sources found in Libre Software Projects”, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 24 - 45, 2009. robles.pdf (990.6 KB)
, “Bridging the Gap between Agile and Free Software Approaches”, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 58 - 71, 2009.
, “Collaborative Software Development Using R-Forge”, The R Journal, vol. 1, pp. 9-14, 2009. rjournal.pdf (767.88 KB)
, Warehousing and Studying Open Source Versioning Metadata, vol. 319. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 413 - 418.
, “Knowledge Homogeneity and Specialization in the Apache HTTP Server Project”, Open Source Systems: Grounding Research (OSS 2011). Springer, pp. 106-122, 2011. MacLean2011a.pdf (1.31 MB)
, “Cliff Walls: An Analysis of Monolithic Commits Using Latent Dirichlet Allocation”, Open Source Systems: Grounding Research (OSS 2011). Springer, pp. 282-298, 2011.
, “Are Developers Fixing Their Own Bugs?”, International Journal of Open Source Software and Processes, vol. 3, no. 2, pp. 23 - 42, 2011.
, “The evolution of Java build systems”, Empirical Software Engineering, vol. 17, no. 4-5, pp. 578 - 608, 2012.
, “Do More Experienced Developers Introduce Fewer Bugs?”, IFIP Advances in Information and Communication Technology 378 (OSS 2012), vol. 378. IFIP AICT, Springer, pp. 268-273, 2012.
, “Bridging the Gap between Agile and Free Software Approaches”, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 58 - 71, 2009.
, “The Agile Management of Development Projects of Software Combining Scrum, Kanban and Expert Consultation”, in Open Source Software: Mobile Open Source Technologies, vol. 427, Springer Berlin Heidelberg, 2014, pp. 176-180.
, “Mining search topics from a code search engine usage log”, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 111 - 120.
, “Analyzing and mining a code search engine usage log”, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
, “MAPO: mining API usages from open source repositories”, in Proceedings of the 2006 international workshop on Mining software repositories, New York, NY, USA, 2006, pp. 54–57. 54MAPO.pdf (154.04 KB)
, “Analyzing and mining a code search engine usage log”, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
, “How Do Firms Make Use of Open Source Communities?”, Long Range Planning, vol. 41. pp. 629-649, 2008. dahlandermagnusson2008.pdf (49.96 KB)
, “The Material and Social Dynamics of Motivation: Contributions to Open Source Language Technology Development”, Science Studies, 2008. Freeman.pdf (147.13 KB)
, “Stopping spyware at the gate: a user study of privacy, notice and spyware”, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.
, “Mining security changes in FreeBSD”, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 90 - 93.
, “The availability of source code in relation to timely response to security vulnerabilities”, Computers & Security, vol. 22, pp. 707 - 724, 2003.
, “When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study”, in Open Source Software: Mobile Open Source Technologies, vol. 427, Springer Berlin Heidelberg, 2014, pp. 234-236.
, “Processes in Securing Open Architecture Software Systems”, in Proceedings of the 2013 International Conference on Software and System Process, New York, NY, USA, 2013, pp. 126–135. Scacchi-Alspaugh-ICSSP13.pdf (1.27 MB)
, “Security and Emotion: Sentiment Analysis of Security Discussions on GitHub”, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351. pletea.pdf (250.26 KB)
, “Increased security through open source”, Communications of the ACM, vol. 50, pp. 79–83, 2007. 0801.3924.pdf (95.95 KB)
,