Papers
Export 110 results:
Filters: First Letter Of Last Name is G [Clear All Filters]
“Empirical validation of object-oriented metrics on open source software for fault prediction”, IEEE Transactions on Software Engineering, vol. 31, pp. 897-910, 2005.
Gyimothy.pdf (1.59 MB)
, 
“Communication in Open Source Software Development Mailing Lists”, 10th Working Conference on Mining Software Repositories. pp. 277-286, 2013.
Guzzi2013msr.pdf (580.06 KB)
, 
“Sentiment Analysis of Commit Comments in GitHub: An Empirical Study”, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 352–355.
, “Competition between Open Source and Proprietary Software, and the Scope for Public Policy”, in OSS2005: Open Source Systems , 2005, pp. 196-199.
, “A case study of a corporate open source development model”, in Proceedings of the 28th international conference on Software engineering, New York, NY, USA, 2006, pp. 472–481.
, “Oops! Where Did That Code Snippet Come from?”, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 52–61.
guo.pdf (485.69 KB)
, 
“Effect of Coupling on Defect Proneness in Evolutionary Open-Source Software Development”, in OSS2007: Open Source Development, Adoption and Innovation (IFIP 2.13), 2007, vol. 234/2007, pp. 271 - 276.
Effect of Coupling on Defect (102.33 KB)
, 
“Comparing High-Change Modules and Modules with the Highest Measurement Values in Two Large-Scale Open-Source Products”, IEEE Transactions on Software Engineering, vol. 31, pp. 625-642, 2005.
, “Viral Contracts or Unenforceable Documents? Contractual Validity of Copyleft Licenses”, 2004.
guadamuz.pdf (245.91 KB)
, 
“New ventures based on open innovation - an empirical analysis of start-up firms in embedded Linux”, 2004.
gruberhenkel.pdf (236.3 KB)
, 
“NESSI OSS Workshop”, in OSS2009: Open Source Ecosystems: Diverse Communities Interacting (IFIP 2.13), 2009, vol. 299/2009, pp. 359 - 360.
NESSI OSS Workshop (86.29 KB)

“Call for Quality: Open Source Software Quality Observation”, in OSS2006: Open Source Systems (IFIP 2.13), 2006, pp. 57 - 62.
Call for Quality (357.94 KB)
, 
“Open Source and IMS Learning Design: Building the Infrastructure for eLearning”, in OSS2005: Open Source Systems , 2005, pp. 329-333.
, “Location, Location, Location: How Network Embeddedness Affects Project Success in Open Source Systems”, Management Science, vol. 52, pp. 1043–1056, 2006.
, “Open Source Software Development”. 2003.
greenberg.pdf (521.41 KB)
, 
“Free and open source software hackers in Turkey”. n/a, 2006.
WP.pdf (211.13 KB)
, 
“The GHTorrent dataset and tool suite”, in MSR ’13: Proceedings of the 9th Working Conference on Mining Software Repositories, 2013.
ghtorrent-dataset-toolsuite.pdf (618.52 KB)
, 
“A platform for software engineering research”, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 31 - 40.
31gousios.pdf (209.56 KB)
, 
“Lean GHTorrent: GitHub Data on Demand”, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 384–387.
lean-ghtorrent.pdf (766.66 KB)
, 
“A Dataset for Pull-based Development Research”, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 368–371.
pullreqs-dataset.pdf (616.89 KB)
, 
“A critical approach to Open Source Software”. 2003.
gorling.pdf (392.44 KB)
, 
“Error detection by refactoring reconstruction”, in Proceedings of the 2005 international workshop on Mining software repositories, New York, NY, USA, 2005, pp. 29-33.
29ErrorDetection.pdf (6.69 MB)
, 
“Noticing Notice: A large-scale experiment on the timing of software license agreements.”, in ACM SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, 2007, pp. 607-616.
, “Stopping spyware at the gate: a user study of privacy, notice and spyware”, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.
, “User Choices and Regret: Understanding Users' Decision Process bout Consensually Acquired Spyware”, I/S: A Journal of Law and Policy for the Information Society, vol. 2, 2006.
,