Search For:

Displaying 1-25 out of 25 total
Roundtable: What's Next in Software Analytics
Found in: IEEE Software
By Ahmed E. Hassan,Abram Hindle,Per Runeson,Martin Shepperd,Prem Devanbu,Sunghun Kim
Issue Date:July 2013
pp. 53-56
For this special issue, the guest editors asked a panel of six established experts in software analytics to highlight what they thought were the most important, or overlooked, aspect of this field. They all pleaded for a much broader view of analytics than...
 
On the Personality Traits of StackOverflow Users
Found in: 2013 IEEE International Conference on Software Maintenance (ICSM)
By Blerina Bazelli,Abram Hindle,Eleni Stroulia
Issue Date:September 2013
pp. 460-463
In the last decade, developers have been increasingly sharing their questions with each other through Question and Answer (Q&A) websites. As a result, these websites have become valuable knowledge repositories, covering a wealth of topics related to pa...
 
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs
Found in: 2012 19th Working Conference on Reverse Engineering (WCRE)
By Dan Han,Chenlei Zhang,Xiaochao Fan,Abram Hindle,Kenny Wong,Eleni Stroulia
Issue Date:October 2012
pp. 83-92
The fragmentation of the Android ecosystem causes portability and compatibility issues within the entire Android platform, which increases developer workload, delays application deployment, and ultimately disappoints users. This subject is discussed in the...
 
Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers?
Found in: 2012 IEEE International Conference on Software Maintenance (ICSM)
By Abram Hindle,Christian Bird,Thomas Zimmermann,Nachiappan Nagappan
Issue Date:September 2012
pp. 243-252
Large organizations like Microsoft tend to rely on formal requirements documentation in order to specify and design the software products that they develop. These documents are meant to be tightly coupled with the actual implementation of the features they...
 
On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems
Found in: Reverse Engineering, Working Conference on
By Md. Sharif Uddin,Chanchal K. Roy,Kevin A. Schneider,Abram Hindle
Issue Date:October 2011
pp. 13-22
Clone detection techniques essentially cluster textually, syntactically and/or semantically similar code fragments in or across software systems. For large datasets, similarity identification is costly both in terms of time and memory, and especially so wh...
 
Got Issues? Do New Features and Code Improvements Affect Defects?
Found in: Reverse Engineering, Working Conference on
By Daryl Posnett,Abram Hindle,Prem Devanbu
Issue Date:October 2011
pp. 211-215
There is a perception that when new features are added to a system that those added and modified parts of the source-code are more fault prone. Many have argued that new code and new features are defect prone due to immaturity, lack of testing, as well uns...
 
Evidence-based software process recovery: A post-doctoral view
Found in: Software Maintenance, IEEE International Conference on
By Abram Hindle
Issue Date:September 2011
pp. 562-567
Software development processes are often viewed as a panacea for software quality: prescribe a process and a quality project will emerge. Unfortunately this has not been the case, as practitioners are prone to push against processes that they do not percei...
 
Software Process Recovery: Recovering Process from Artifacts
Found in: Reverse Engineering, Working Conference on
By Abram Hindle
Issue Date:October 2010
pp. 305-308
Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons include: CMM and ISO 9000 compliance, process validation, management, acquisitions...
 
Software process recovery using Recovered Unified Process Views
Found in: Software Maintenance, IEEE International Conference on
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:September 2010
pp. 1-10
The development process for a given software system is a combination of an idealized, prescribed model and a messy set of ad hoc practices. To some degree, process compliance can be enforced by supporting tools that require various steps be followed in ord...
 
Reverse Engineering CAPTCHAs
Found in: Reverse Engineering, Working Conference on
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:October 2008
pp. 59-68
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear as bitmaps of text characters, in order to gain access to a low-cost resourc...
 
From Indentation Shapes to Code Structures
Found in: Source Code Analysis and Manipulation, IEEE International Workshop on
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:September 2008
pp. 111-120
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with metrics such as McCabe Cyclomatic complexity. Building on that work the current...
 
Reading Beside the Lines: Indentation as a Proxy for Complexity Metric
Found in: International Conference on Program Comprehension
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:June 2008
pp. 133-142
Maintainers face the daunting task of wading through a collection of both new and old revisions, trying to ferret out revisions which warrant personal inspection. One can rank revisions by size/lines of code (LOC), but often, due to the distribution of the...
 
YARN: Animating Software Evolution
Found in: Visualizing Software for Understanding and Analysis, International Workshop on
By Abram Hindle, Zhen Ming Jiang, Walid Koleilat, Michael W. Godfrey, Richard C. Holt
Issue Date:June 2007
pp. 129-136
A problem that faces the study of software evolution is how to explore the aggregated and cumulative effects of changes that occur within a software system over time. In this paper we describe an approach to modeling, extracting, and animating the architec...
 
Release Pattern Discovery via Partitioning: Methodology and Case Study
Found in: Mining Software Repositories, International Workshop on
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:May 2007
pp. 19
The development of Open Source systems produces a variety of software artifacts such as source code, version control records, bug reports, and email discussions. Since the development is distributed across different tool environments and developer practice...
 
Measuring Fine-Grained Change in Software: Towards Modification-Aware Change Metrics
Found in: Software Metrics, IEEE International Symposium on
By Daniel M. German, Abram Hindle
Issue Date:September 2005
pp. 28
In this paper we propose the notion of change metrics, those that measure change in a project or its entities. In particular we are interested in measuring fine-grained changes, such as those stored by version control systems (such as CVS). A framework for...
 
The Impact of User Choice on Energy Consumption
Found in: IEEE Software
By Chenlei Zhang,Abram Hindle,Daniel German
Issue Date:March 2014
pp. 1
Hardware and software engineers are instrumental in developing energy efficient mobile systems. Unfortunately the last mile of energy efficiency comes from the choices and requirements of end-users. Imagine an end-user who has no power outlet access and mu...
 
A contextual approach towards more accurate duplicate bug report detection
Found in: 2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)
By Anahita Alipour,Abram Hindle,Eleni Stroulia
Issue Date:May 2013
pp. 183-192
Bug-tracking and issue-tracking systems tend to be populated with bugs, issues, or tickets written by a wide variety of bug reporters, with different levels of training and knowledge about the system being discussed. Many bug reporters lack the skills, voc...
   
Deficient documentation detection a methodology to locate deficient project documentation using topic analysis
Found in: 2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)
By Joshua Charles Campbell,Chenlei Zhang,Zhen Xu,Abram Hindle,James Miller
Issue Date:May 2013
pp. 57-60
A project's documentation is the primary source of information for developers using that project. With hundreds of thousands of programming-related questions posted on programming Q&A websites, such as Stack Overflow, we question whether the developer-...
   
Multifractal aspects of software development: NIER track
Found in: Proceeding of the 33rd international conference on Software engineering (ICSE '11)
By Abram Hindle, Michael W. Godfrey, Richard C. Holt
Issue Date:May 2011
pp. 968-971
Software development is difficult to model, particularly the noisy, non-stationary signals of changes per time unit, extracted from version control systems (VCSs). Currently researchers are utilizing timeseries analysis tools such as ARIMA to model these s...
     
Software bertillonage: finding the provenance of an entity
Found in: Proceeding of the 8th working conference on Mining software repositories (MSR '11)
By Abram Hindle, Daniel M. German, Julius Davies, Michael W. Godfrey
Issue Date:May 2011
pp. 183-192
Deployed software systems are typically composed of many pieces, not all of which may have been created by the main development team. Often, the provenance of included components -- such as external libraries or cloned source code -- is not clearly stated,...
     
Automated topic naming to support cross-project analysis of software maintenance activities
Found in: Proceeding of the 8th working conference on Mining software repositories (MSR '11)
By Abram Hindle, John Mylopoulos, Michael W. Godfrey, Neil A. Ernst
Issue Date:May 2011
pp. 163-172
Researchers have employed a variety of techniques to extract underlying topics that relate to software development artifacts. Typically, these techniques use semi-unsupervised machine-learning algorithms to suggest candidate word-lists. However, word-lists...
     
A simpler model of software readability
Found in: Proceeding of the 8th working conference on Mining software repositories (MSR '11)
By Abram Hindle, Daryl Posnett, Premkumar Devanbu
Issue Date:May 2011
pp. 73-82
Software readability is a property that influences how easily a given piece of code can be read and understood. Since readability can affect maintainability, quality, etc., programmers are very concerned about the readability of code. If automatic readabil...
     
Determining the provenance of software artifacts
Found in: Proceeding of the 5th international workshop on Software clones (IWSC '11)
By Abram Hindle, Daniel M. German, Julius Davies, Michael W. Godfrey
Issue Date:May 2011
pp. 65-66
Software clone detection has made substantial progress in the last 15 years, and software clone analysis is starting to provide real insight into how and why code clones are born, evolve, and sometimes die. In this position paper, we make the case that the...
     
What do large commits tell us?: a taxonomical study of large commits
Found in: Proceedings of the 2008 international workshop on Mining software repositories (MSR '08)
By Abram Hindle, Daniel M. German, Ric Holt
Issue Date:May 2008
pp. 69-72
Research in the mining of software repositories has frequently ignored commits that include a large number of files (we call these large commits). The main goal of this paper is to understand the rationale behind large commits, and if there is anything we ...
     
SCQL: a formal model and a query language for source control repositories
Found in: Proceedings of the 2005 workshop on Mining software repositories (MSR '05)
By Abram Hindle, Daniel M. German
Issue Date:May 2005
pp. 105-110
Source Control Repositories are used in most software projects to store revisions to source code files. These repositories operate at the file level and support multiple users. A generalized formal model of source control repositories is described herein. ...
     
 1