Papers

Export 503 results:
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
XBee
B. J. P. Quezada and Fernández, J., Automation of Agricultural Irrigation System with Open Source, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 232-233.
wireshark
A. Meneely and Williams, L., Socio-technical developer networks: should we trust our measurements?, in Proceedings of the 33rd International Conference on Software Engineering, New York, NY, USA, 2011, pp. 281–290.
Wireless Mesh Networks
I. Armuelles Voinov, Cedeño, A. C., Chung, J., and González, G., A Performance Analysis of Wireless Mesh Networks Implementations Based on Open Source Software, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 107-110.
wine
C. C. Williams and Hollingsworth, J. K., Recovering system specific rules from software repositories, in Proceedings of the 2005 international workshop on Mining software repositories, New York, NY, USA, 2005, pp. 7-11.PDF icon 7Recovering.pdf (354.07 KB)
vulnerability
S. A. Hissam, Plakosh, D., and Weinstock, C., Trust and vulnerability in open source software, Software, {IEE} Proceedings -, vol. 149, no. 1, pp. 47–51, 2002.
A. Bosu, Carver, J. C., Hafiz, M., Hilley, P., and Janni, D., When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study, in Open Source Software: Mobile Open Source Technologies, vol. 427, L. Corral, Sillitti, A., Succi, G., Vlasenko, J., and Wasserman, A. I., Eds. Springer Berlin Heidelberg, 2014, pp. 234-236.
visualization
P. Weissgerber, Pohl, M., and Burch, M., Visual Data Mining in Software Archives to Detect How Developers Work Together, in Fourth International Workshop on Mining Software RepositoriesFourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007), Minneapolis, MN, USA, 2007, pp. 9 - 9.PDF icon 28300009.pdf (856.23 KB)
VHDL
S. Sudakrishnan, Madhavan, J., Whitehead, Jr., J. E., and Renau, J., Understanding bug fix patterns in verilog, in Proceedings of the 2008 international working conference on Mining software repositories, New York, NY, USA, 2008, pp. 39–42.PDF icon p39-sudakrishnan.pdf (131.86 KB)
version history
E. Baik, Devanbu, P., and Wang, X. (O. ), System compatibility analysis of Eclipse and Netbeans based on bug data, in Proceedings of the 8th working conference on Mining software repositories - MSR '11, Waikiki, Honolulu, HI, USANew York, New York, USA, 2011, pp. 230-233.
version control
J. Spacco and Williams, C. C., Branching and merging in the repository, in the 2008 international workshopProceedings of the 2008 international workshop on Mining software repositories - MSR '08, New York, New York, USA, 2008, pp. 19-22.PDF icon p19-williams.pdf (280.51 KB)
P. Weißgerber and Diehl, S., Are refactorings less error-prone than other changes?, in Proceedings of the 2006 international workshop on Mining software repositories, New York, NY, USA, 2006, pp. 112–118.PDF icon 112AreRefactorings.pdf (1.26 MB)
M. C. Chu-Carroll, Sheilds, D., and Wright, J., Version Control: A Case Study in the Challenges and Opportunities for Open Source Software Development, in Proceedings of the 2nd ICSE Workshop on Open Source, 2002.PDF icon ChuCarrollShieldsWright.pdf (179.92 KB)
verilog
S. Sudakrishnan, Madhavan, J., Whitehead, Jr., J. E., and Renau, J., Understanding bug fix patterns in verilog, in Proceedings of the 2008 international working conference on Mining software repositories, New York, NY, USA, 2008, pp. 39–42.PDF icon p39-sudakrishnan.pdf (131.86 KB)
users
S. A. Hissam, Plakosh, D., and Weinstock, C., Trust and vulnerability in open source software, Software, {IEE} Proceedings -, vol. 149, no. 1, pp. 47–51, 2002.
Usability
M. Rajanen and Iivari, N., Examining Usability Work and Culture in OSS, in Open Source Systems: Adoption and Impact, vol. 451, E. Damiani, Frati, F., Riehle, D., and Wasserman, A. I., Eds. Springer International Publishing, 2015, pp. 58-67.
trust management
G. Wolf and Quiroga, V. G., Progression and Forecast of a Curated Web-of-Trust: A Study on the Debian Project’s Cryptographic Keyring, Open Source Systems: Towards Robust Practices 13th International Conference on Open Source Systems, vol. 496. Springer, pp. 117-127, 2017.
trust
S. A. Hissam, Plakosh, D., and Weinstock, C., Trust and vulnerability in open source software, Software, {IEE} Proceedings -, vol. 149, no. 1, pp. 47–51, 2002.
tomcat
P. Weissgerber, Pohl, M., and Burch, M., Visual Data Mining in Software Archives to Detect How Developers Work Together, in Fourth International Workshop on Mining Software RepositoriesFourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007), Minneapolis, MN, USA, 2007, pp. 9 - 9.PDF icon 28300009.pdf (856.23 KB)
C. Görg and Weißgerber, P., Error detection by refactoring reconstruction, in Proceedings of the 2005 international workshop on Mining software repositories, New York, NY, USA, 2005, pp. 29-33.PDF icon 29ErrorDetection.pdf (6.69 MB)

Pages