Search For:

Displaying 1-22 out of 22 total
Who's who in Gnome: Using LSA to merge software repository identities
Found in: 2012 IEEE International Conference on Software Maintenance (ICSM)
By Erik Kouters,Bogdan Vasilescu,Alexander Serebrenik,Mark G. J. van den Brand
Issue Date:September 2012
pp. 592-595
Understanding an individual's contribution to an ecosystem often necessitates integrating information from multiple repositories corresponding to different projects within the ecosystem or different kinds of repositories (e.g., mail archives and version co...
 
StackOverflow and GitHub: Associations between Software Development and Crowdsourced Knowledge
Found in: 2013 International Conference on Social Computing (SocialCom)
By Bogdan Vasilescu,Vladimir Filkov,Alexander Serebrenik
Issue Date:September 2013
pp. 188-195
Stack Overflow is a popular on-line programming question and answer community providing its participants with rapid access to knowledge and expertise of their peers, especially benefitting coders. Despite the popularity of Stack Overflow, its role in the w...
 
Analyzing the Eclipse API Usage: Putting the Developer in the Loop
Found in: 2013 17th European Conference on Software Maintenance and Reengineering (CSMR)
By John Businge,Alexander Serebrenik,Mark van den Brand
Issue Date:March 2013
pp. 37-46
Eclipse guidelines distinguish between two types of interfaces provided to third-party developers, i.e., APIs and non-APIs. APIs are stable and supported, while non-APIs are unstable, unsupported and discouraged as they are subject to arbitrary change or r...
 
Assessing Technical Candidates on the Social Web
Found in: IEEE Software
By Andrea Capiluppi,Alexander Serebrenik,Leif Singer
Issue Date:January 2013
pp. 45-51
The Social Web provides comprehensive and publicly available information about software developers, identifying them as contributors to open source projects, experts at maintaining ties on social network sites, or active participants on knowledge-sharing s...
 
Gender, Representation and Online Participation: A Quantitative Study of StackOverflow
Found in: 2012 International Conference on Social Informatics (SocialInformatics)
By Bogdan Vasilescu,Andrea Capiluppi,Alexander Serebrenik
Issue Date:December 2012
pp. 332-338
Online communities are flourishing as social meeting web-spaces for users and peer community members. Different online communities require different levels of competence for participants to join, and scattered evidence suggests that women can be overly und...
 
Survival of Eclipse third-party plug-ins
Found in: 2012 IEEE International Conference on Software Maintenance (ICSM)
By John Businge,Alexander Serebrenik,Mark van den Brand
Issue Date:September 2012
pp. 368-377
Today numerous software systems are being developed on top of frameworks. In this study, we analyzed the survival of 467 Eclipse third-party plug-ins altogether having 1,447 versions. We classify these plug-ins into two categories: those that depend on onl...
 
Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases
Found in: 2012 12th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM)
By John Businge,Alexander Serebrenik,Mark van den Brand
Issue Date:September 2012
pp. 164-173
Incompatibility between applications developed on top of frameworks with new versions of the frameworks is a big nightmare to both developers and users of the applications. Understanding the factors that cause incompatibilities is a step to solving them. O...
 
I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors
Found in: Source Code Analysis and Manipulation, IEEE International Workshop on
By Serguei Roubtsov,Alexander Serebrenik,Aurélien Mazoyer,Mark van den Brand
Issue Date:September 2011
pp. 155-164
An Enterprise Java Beans (EJB) interceptor is a software mechanism that provides for introducing behavior implemented as separate code into the execution of a Java application. In this way EJB interceptors provide a clear separation of the core functionali...
 
You can't control the unfamiliar: A study on the relations between aggregation techniques for software metrics
Found in: Software Maintenance, IEEE International Conference on
By Bogdan Vasilescu,Alexander Serebrenik,Mark van den Brand
Issue Date:September 2011
pp. 313-322
A popular approach to assessing software maintainability and predicting its evolution involves collecting and analyzing software metrics. However, metrics are usually defined on a micro-level (method, class, package), and should therefore be aggregated in ...
 
Requirements Certification for Offshoring Using LSPCM
Found in: Quality of Information and Communications Technology, International Conference on the
By Alexander Serebrenik, Amrita Mishra, Thomas Delissen, Martijn Klabbers
Issue Date:October 2010
pp. 177-182
Requirements hand-over is a common practice in software development off shoring. Cultural and geographical distance between the outsourcer and supplier, and the differences in development practices hinder the communication and lead to the misinterpretation...
 
Theil index for aggregation of software metrics values
Found in: Software Maintenance, IEEE International Conference on
By Alexander Serebrenik, Mark van den Brand
Issue Date:September 2010
pp. 1-9
We propose a new approach to aggregating software metrics from the micro-level of individual artifacts (e.g., methods, classes and packages) to the macro-level of the entire software system. The approach, Theil index, is a well-known econometric measure of...
 
Detecting Modularity
Found in: Software Maintenance and Reengineering, European Conference on
By Serguei Roubtsov, Alexander Serebrenik, Mark van den Brand
Issue Date:March 2010
pp. 244-247
Dependency injection is a recent programming mechanism reducing dependencies among components by delegating them to an external entity, called a dependency injection framework. An increasingly popular approach to dependency injection implementation relies ...
 
Reverse Engineering Sequence Diagrams for Enterprise JavaBeans with Business Method Interceptors
Found in: Reverse Engineering, Working Conference on
By Alexander Serebrenik, Serguei Roubtsov, Ella Roubtsova, Mark van den Brand
Issue Date:October 2009
pp. 269-273
Enterprise JavaBeans (EJB) is a component technology commonly used for enterprise application development. Recent EJB 3.0 specification involves interceptors, a mechanism providing means to dynamically introduce additional behavior into the execution of a ...
 
SQuAVisiT: A Flexible Tool for Visual Software Analytics
Found in: Software Maintenance and Reengineering, European Conference on
By Mark van den Brand, Serguei Roubtsov, Alexander Serebrenik
Issue Date:March 2009
pp. 331-332
We present the Software Quality Assessment and Visualization Toolset (SQuAVisiT), a flexible tool for visual software analytics. Visual software analytics supports analytical reasoning about software systems facilitated by interactive visual interfaces. In...
 
Assessing the complexity of upgrading software modules
Found in: 2013 20th Working Conference on Reverse Engineering (WCRE)
By Bram Schoenmakers,Niels van den Broek,Istvan Nagy,Bogdan Vasilescu,Alexander Serebrenik
Issue Date:October 2013
pp. 433-440
Modern software development frequently involves developing multiple codelines simultaneously. Improvements to one codeline should often be applied to other codelines as well, which is typically a time consuming and error-prone process. In order to reduce t...
   
Detecting dependencies in Enterprise JavaBeans with SQuAVisiT
Found in: 2013 20th Working Conference on Reverse Engineering (WCRE)
By Alexandru Sutii,Serguei Roubtsov,Alexander Serebrenik
Issue Date:October 2013
pp. 485-486
We present recent extensions to SQuAVisiT, Software Quality Assessment and Visualization Toolset. While SQuAVisiT has been designed with traditional software and traditional caller-callee dependencies in mind, recent popularity of Enterprise JavaBeans (EJB...
   
A historical dataset of software engineering conferences
Found in: 2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)
By Bogdan Vasilescu,Alexander Serebrenik,Tom Mens
Issue Date:May 2013
pp. 373-376
The Mining Software Repositories community typically focuses on data from software configuration management tools, mailing lists, and bug tracking repositories to uncover interesting and actionable information about the evolution of software systems. Howev...
   
How social Q&A sites are changing knowledge sharing in open source software communities
Found in: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14)
By Alexander Serebrenik, Bogdan Vasilescu, Prem Devanbu, Vladimir Filkov
Issue Date:February 2014
pp. 342-354
Historically, mailing lists have been the preferred means for coordinating development and user support activities. With the emergence and popularity growth of social Q&A sites such as the StackExchange network (e.g., StackOverflow), this is beginning ...
     
By no means: a study on aggregating software metrics
Found in: Proceeding of the 2nd international workshop on Emerging trends in software metrics (WETSoM '11)
By Alexander Serebrenik, Bogdan Vasilescu, Mark van den Brand
Issue Date:May 2011
pp. 23-26
Fault prediction models usually employ software metrics which were previously shown to be a strong predictor for defects, e.g., SLOC. However, metrics are usually defined on a microlevel (method, class, package), and should therefore be aggregated in order...
     
An empirical study of the evolution of Eclipse third-party plug-ins
Found in: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE) (IWPSE-EVOL '10)
By Alexander Serebrenik, John Businge, Mark van den Brand
Issue Date:September 2010
pp. 63-72
Since the inception of Lehman's software evolution laws in the early 1970s, they have attracted significant attention from the research community. However, to our knowledge, no study of applicability of these laws on the software systems that exhibit const...
     
Automated termination proofs for logic programs by term rewriting
Found in: ACM Transactions on Computational Logic (TOCL)
By Alexander Serebrenik, Jurgen Giesl, Peter Schneider-Kamp, Rene Thiemann
Issue Date:October 2009
pp. 1-52
There are two kinds of approaches for termination analysis of logic programs: “transformational” and “direct” ones. Direct approaches prove termination directly on the basis of the logic program. Transformational approaches transfor...
     
Rewriting aggregate queries using views
Found in: Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '99)
By Alexander Serebrenik, Sara Cohen, Werner Nutt
Issue Date:May 1999
pp. 155-166
DTL's DataSpot is an advanced, programming-free tool that lets Web designers and database developers automatically publish their databases for Web browser access. DataSpot enables non-technical end users to explore a database using free-form plain language...
     
 1