Issue 5/2016
Content (10 Articles)
A survey on the use of topic models when mining software repositories
Tse-Hsun Chen, Stephen W. Thomas, Ahmed E. Hassan
Game of detections: how are security vulnerabilities discovered in the wild?
Munawar Hafiz, Ming Fang
Studying the needed effort for identifying duplicate issues
Mohamed Sami Rakha, Weiyi Shang, Ahmed E. Hassan
Change-based test selection: an empirical evaluation
Quinten David Soetens, Serge Demeyer, Andy Zaidman, Javier Pérez
An in-depth study of the promises and perils of mining GitHub
Eirini Kalliamvakou, Georgios Gousios, Kelly Blincoe, Leif Singer, Daniel M. German, Daniela Damian
Studying just-in-time defect prediction using cross-project models
Yasutaka Kamei, Takafumi Fukushima, Shane McIntosh, Kazuhiro Yamashita, Naoyasu Ubayashi, Ahmed E. Hassan
Towards building a universal defect prediction model with rank transformed predictors
Feng Zhang, Audris Mockus, Iman Keivanloo, Ying Zou
An empirical study of the impact of modern code review practices on software quality
Shane McIntosh, Yasutaka Kamei, Bram Adams, Ahmed E. Hassan