Papers

Export 1735 results:
Conference Paper
C. Pfaff and Hasan, H., Can Knowledge Management be Open Source?, in OSS2007: Open Source Development, Adoption and Innovation (IFIP 2.13), 2007, vol. 234/2007, pp. 59 - 70.PDF icon Can Knowledge Management (225.76 KB)
W. Maalej and Happel, H. - J., Can development work describe itself?, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 191 - 200.
A. G. Gonzalez, The calm before the storm? Legal challenges to open source licences, in OSS2005: Open Source Systems , 2005, pp. 215-219.
A. de Groot, Kügler, S., Adams, P., and Gousios, G., Call for Quality: Open Source Software Quality Observation, in OSS2006: Open Source Systems (IFIP 2.13), 2006, pp. 57 - 62.PDF icon Call for Quality (357.94 KB)
C. C. Williams and Hollingsworth, J. K., Bug driven bug finders, in Proceedings of the 2004 international workshop on Mining software repositories - MSR '04, Edinburgh, Scotland, UK, 2004, vol. 2004, pp. 70 - 74.PDF icon 70BugDrivenBug.pdf (74.85 KB)
D. Mitropoulos, Karakoidas, V., Louridas, P., Gousios, G., and Spinellis, D., The Bug Catalog of the Maven Ecosystem, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 372–375.PDF icon mitro.pdf (283.66 KB)
J. Spacco and Williams, C. C., Branching and merging in the repository, in the 2008 international workshopProceedings of the 2008 international workshop on Mining software repositories - MSR '08, New York, New York, USA, 2008, pp. 19-22.PDF icon p19-williams.pdf (280.51 KB)
S. Bayati, Parsons, D., Susnjak, T., and Heidary, M., Big data analytics on large-scale socio-technical software engineering archives, in 2015 3rd International Conference on Information and Communication Technology (ICoICT )2015 3rd International Conference on Information and Communication Technology (ICoICT), Nusa Dua, Bali, Indonesia, 2015, pp. 65 - 69.
J. Lindman, Juutilainen, J. - P., and Rossi, M., Beyond the Business Model: Incentives for Organizations to Publish Software Source Code, in OSS2009: Open Source Ecosystems: Diverse Communities Interacting (IFIP 2.13), 2009, vol. 299/2009, pp. 47 - 56.PDF icon Beyond the Business Model (307.96 KB)
G. Robles and German, D. M., Beyond replication: An example of the potential benefits of replicability in the mining of software repositories community, in 1st Workshop on Replication in Empirical Software Engineering Research, 2010.
M. Conklin, Beyond Low-Hanging Fruit: Seeking the Next Generation in FLOSS Data Mining, in OSS2006: Open Source Systems (IFIP 2.13), 2006, pp. 47 - 56.PDF icon Beyond Low-Hanging Fruit (497.38 KB)
P. Tsiavos and Hosein, I., Beyond good and evil: why open source development for peer-to-peer networks does not necessarily equal to an open society is as imbalanced as copyright law and definitely is not going to make you a better person, in European Conference on Information Systems (ECIS 2003), 2003.PDF icon tsiavosHosein.pdf (40.92 KB)
L. Morgan and Finnegan, P., Benefits and Drawbacks of Open Source Software: An Exploratory Study of Secondary Software Firms, in OSS2007: Open Source Development, Adoption and Innovation (IFIP 2.13), 2007, vol. 234/2007, pp. 307 - 312.PDF icon Benefits and Drawbacks (98.83 KB)
A. Bacchelli, D'Ambros, M., Lanza, M., and Robbes, R., Benchmarking Lightweight Techniques to Link E-Mails and Source Code, in 2009 16th Working Conference on Reverse Engineering, Lille, France, 2009, pp. 205 - 214.PDF icon wcre2009.pdf (720.23 KB)
P. Ludford, Frankowski, D., Reily, K., Wilms, K., and Terveen, L., Because I Carry My Cell Phone Anyway: Functional Location-Based Reminder Applications, in ACM SIGCHI Conference on Human Factors in Computing Systems, Montreal, Quebec, Canada, 2006, pp. 889-898.
D. German and Mockus, A., Automating the measurement of open source projects, in Proceedings of the 3rd Workshop on Open Source Software Engineering, 2003, pp. 63–67.PDF icon germanMockus2003.pdf (214.63 KB)
E. van der Veen, Gousios, G., and Zaidman, A., Automatically Prioritizing Pull Requests, in Proceedings of the 12th International Conference on Mining Software Repositories, 2015.PDF icon prioritizer.pdf (361.22 KB)
A. Kuhn, Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 175 - 178.PDF icon 175AutomaticLabeling.pdf (186.08 KB)
J. Ossher, Bajracharya, S., and Lopes, C., Automated dependency resolution for open source software, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 130 - 140.
J. R. Casebolt, Krein, J. L., MacLean, A. C., Knutson, C. D., and Delorey, D. P., Author entropy vs. file size in the GNOME suite of applications, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 91 - 94.
Q. C. Taylor, Stevenson, J. E., Delorey, D. P., and Knutson, C. D., Author Entropy: A Metric for Characterization of Software Authorship Patterns, in 3rd Workshop on Public Data about Software Development (WoPDaSD 2008), 2008, pp. 42-47.PDF icon entropy2008.pdf (1.12 MB)
Q. V. Dang, Berger, O., Bac, C., and Hamet, B., Authenticating from multiple authentication sources in a collaborative platform, in OSS2007: Open Source Development, Adoption and Innovation (IFIP 2.13), 2007, vol. 234/2007, pp. 229 - 234.PDF icon Authenticating from multiple (76.03 KB)
Q. Li, Heckman, R., Allen, E., Crowston, K., Eseryel, U. Y., Howison, J., and Wiggins, A., Asynchronous Decision-Making in Distributed Teams, in Computer Supported Cooperative Work 2008, 2008, pp. 1–2.PDF icon CSCW2008FLOSSposter_sub.pdf (299.56 KB)PDF icon CSCW2008Poster11x17sub.pdf (202.73 KB)
C. Ardagna, Banzi, M., Damiani, E., El Ioini, N., and Frati, F., Assurance Evaluation for OSS Adoption in a Telco Context, in OSS2009: Open Source Ecosystems: Diverse Communities Interacting (IFIP 2.13), 2009, vol. 299/2009, pp. 363 - 363.PDF icon Assurance Evaluation for OSS (81.58 KB)
D. Matter, Kuhn, A., and Nierstrasz, O., Assigning bug reports using a vocabulary-based expertise model of developers, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 131 - 140.PDF icon 131AssigningBugReports.pdf (265.91 KB)

Pages