Papers

Export 4452 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
scm
B. Massey and Packard, K., Regurgitate: Using GIT For F/LOSS Data Collection, in 1st Workshop on Public Data about Software Development (WoPDaSD 2006), 2006.PDF icon massey.pdf (93.51 KB)
G. Robles, González-Barahona, J. M., Izquierdo-Cortazar, D., and Herraiz, I., Tools for the Study of the Usual Data Sources found in Libre Software Projects, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 24 - 45, 2009.PDF icon robles.pdf (990.6 KB)
P. J. Adams and Capiluppi, A., Bridging the Gap between Agile and Free Software Approaches, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 58 - 71, 2009.
S. Theußl and Zeileis, A., Collaborative Software Development Using R-Forge, The R Journal, vol. 1, pp. 9-14, 2009.PDF icon rjournal.pdf (767.88 KB)
M. van Antwerp and Madey, G., Warehousing and Studying Open Source Versioning Metadata, vol. 319. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 413 - 418.
A. C. MacLean, Pratt, L. J., Knutson, C. D., and Ringger, E. K., Knowledge Homogeneity and Specialization in the Apache HTTP Server Project, Open Source Systems: Grounding Research (OSS 2011). Springer, pp. 106-122, 2011.PDF icon MacLean2011a.pdf (1.31 MB)
L. J. Pratt, MacLean, A. C., Knutson, C. D., and Ringger, E. K., Cliff Walls: An Analysis of Monolithic Commits Using Latent Dirichlet Allocation, Open Source Systems: Grounding Research (OSS 2011). Springer, pp. 282-298, 2011.
D. Izquierdo-Cortazar, Capiluppi, A., and Gonzalez-Barahona, J. M., Are Developers Fixing Their Own Bugs?, International Journal of Open Source Software and Processes, vol. 3, no. 2, pp. 23 - 42, 2011.
S. McIntosh, Adams, B., and Hassan, A. E., The evolution of Java build systems, Empirical Software Engineering, vol. 17, no. 4-5, pp. 578 - 608, 2012.
D. Izquierdo-Cortázar, Robles, G., and González-Barahona, J. M., Do More Experienced Developers Introduce Fewer Bugs?, IFIP Advances in Information and Communication Technology 378 (OSS 2012), vol. 378. IFIP AICT, Springer, pp. 268-273, 2012.
scrum
P. J. Adams and Capiluppi, A., Bridging the Gap between Agile and Free Software Approaches, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 58 - 71, 2009.
M. E. Febles Parker and Monte, Y. F., The Agile Management of Development Projects of Software Combining Scrum, Kanban and Expert Consultation, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 176-180.
search
S. Bajracharya and Lopes, C., Mining search topics from a code search engine usage log, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 111 - 120.
S. K. Bajracharya and Lopes, C. V., Analyzing and mining a code search engine usage log, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
search engine
T. Xie and Pei, J., MAPO: mining API usages from open source repositories, in Proceedings of the 2006 international workshop on Mining software repositories, New York, NY, USA, 2006, pp. 54–57.PDF icon 54MAPO.pdf (154.04 KB)
S. K. Bajracharya and Lopes, C. V., Analyzing and mining a code search engine usage log, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
security
N. Good, Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J., Stopping spyware at the gate: a user study of privacy, notice and spyware, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.
A. Mauczka, Schanes, C., Fankhauser, F., Bernhart, M., and Grechenig, T., Mining security changes in FreeBSD, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 90 - 93.
J. Reinke and Saiedian, H., The availability of source code in relation to timely response to security vulnerabilities, Computers & Security, vol. 22, pp. 707 - 724, 2003.
A. Bosu, Carver, J. C., Hafiz, M., Hilley, P., and Janni, D., When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 234-236.
W. Scacchi and Alspaugh, T. A., Processes in Securing Open Architecture Software Systems, in Proceedings of the 2013 International Conference on Software and System Process, New York, NY, USA, 2013, pp. 126–135.PDF icon Scacchi-Alspaugh-ICSSP13.pdf (1.27 MB)
D. Pletea, Vasilescu, B., and Serebrenik, A., Security and Emotion: Sentiment Analysis of Security Discussions on GitHub, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351.PDF icon pletea.pdf (250.26 KB)
J. - H. Hoepman and Jacobs, B., Increased security through open source, Communications of the ACM, vol. 50, pp. 79–83, 2007.PDF icon 0801.3924.pdf (95.95 KB)

Pages