Papers

Export 493 results:
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
social network analysis
A. Meneely and Williams, L., Socio-technical developer networks: should we trust our measurements?, in Proceedings of the 33rd International Conference on Software Engineering, New York, NY, USA, 2011, pp. 281–290.
Smart-city-routing
V. Nallur, Elgammal, A., and Clarke, S., Smart Route Planning Using Open Data and Participatory Sensing, in Open Source Systems: Adoption and Impact, vol. 451, E. Damiani, Frati, F., Riehle, D., and Wasserman, A. I., Eds. Springer International Publishing, 2015, pp. 91-100.PDF icon nallur15.pdf (756.82 KB)
sentiment analysis
D. Pletea, Vasilescu, B., and Serebrenik, A., Security and Emotion: Sentiment Analysis of Security Discussions on GitHub, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351.PDF icon pletea.pdf (250.26 KB)
E. Guzman, Azócar, D., and Li, Y., Sentiment Analysis of Commit Comments in GitHub: An Empirical Study, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 352–355.
A. - I. Rousinopoulos, Robles, G., and González-Barahona, J. M., SENTIMENT ANALYSIS OF FREE/OPEN SOURCE DEVELOPERS: PRELIMINARY FINDINGS FROM A CASE STUDY, Revista Eletrônica de Sistemas de Informação, vol. 13, no. 2, 2014.PDF icon 1677-6732-1-PB.pdf (577.59 KB)
Self-organization
L. Yu, Self-organization process in open-source software: An empirical study, Information and Software Technology, vol. 50, no. 5, pp. 361 - 374, 2008.
security
N. Good, Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J., Stopping spyware at the gate: a user study of privacy, notice and spyware, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.
D. Pletea, Vasilescu, B., and Serebrenik, A., Security and Emotion: Sentiment Analysis of Security Discussions on GitHub, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351.PDF icon pletea.pdf (250.26 KB)
C. Cowan, Software security for open-source systems, IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 38 - 45, 2003.
C. Payne, On the security of open source software, Information systems journal, vol. 12, pp. 61–78, 2002.PDF icon Payne2002_ISJ12_SecurityOSS.pdf (111.53 KB)
R. Anderson, Security in open versus closed systems—the dance of Boltzmann, Coase and Moore. Technical report, Cambridge University, England, 2002.PDF icon toulouse.pdf (119.58 KB)
G. Schryen, Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities, AMCIS 2009 Proceedings, p. 387, 2009.PDF icon Schryen_-_AMCIS_09_-_Security_of_open_source_and_closed_source_software_-_Web_version.pdf (442.07 KB)
scm
P. Weißgerber, Neu, D., and Diehl, S., Small patches get in!, in Proceedings of the 2008 international working conference on Mining software repositories, New York, NY, USA, 2008, pp. 67–76.PDF icon p67-weissgerber.pdf (379.92 KB)
O. Mizuno, Ikami, S., Nakaichi, S., and Kikuno, T., Spam Filter Based Approach for Finding Fault-Prone Software Modules, in Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007), Minneapolis, MN, USA, 2007, pp. 4 - 4.PDF icon 28300004.pdf (182.44 KB)
A. Hindle and German, D. M., SCQL: a formal model and a query language for source control repositories, in Proceedings of the 2005 international workshop on Mining software repositories, New York, NY, USA, 2005, pp. 100-104.PDF icon 100scql.pdf (194.34 KB)
N. I. C. O. L. A. S. DUCHENEAUT, Socialization in an Open Source Software Community: A Socio-Technical Analysis, Computer Supported Cooperative Work (CSCW), vol. 14, pp. 323-368, 2005.

Pages