Search For:

Displaying 1-16 out of 16 total
A Large-Scale Empirical Study on Software Reuse in Mobile Apps
Found in: IEEE Software
By Israel J. Mojica,Bram Adams,Meiyappan Nagappan,Steffen Dienst,Thorsten Berger,Ahmed E. Hassan
Issue Date:March 2014
pp. 78-86
In less than five years, the number of mobile apps has grown exponentially, with more than 1 million available in the largest mobile app stores. One explanation for this growth could be the adoption of well-proven software engineering practices--in particu...
 
Debugging Revisited: Toward Understanding the Debugging Needs of Contemporary Software Developers
Found in: 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
By Lucas Layman,Madeline Diep,Meiyappan Nagappan,Janice Singer,Robert Deline,Gina Venolia
Issue Date:October 2013
pp. 383-392
We know surprisingly little about how professional developers define debugging and the challenges they face in industrial environments. To begin exploring professional debugging challenges and needs, we conducted and analyzed interviews with 15 professiona...
 
The Impact of Classifier Configuration and Classifier Combination on Bug Localization
Found in: IEEE Transactions on Software Engineering
By Stephen W. Thomas,Meiyappan Nagappan,Dorothea Blostein,Ahmed E. Hassan
Issue Date:October 2013
pp. 1427-1443
Bug localization is the task of determining which source code entities are relevant to a bug report. Manual bug localization is labor intensive since developers must consider thousands of source code entities. Current research builds bug localization class...
 
Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues
Found in: 2013 IEEE International Conference on Software Maintenance (ICSM)
By Mark D. Syer, Zhen Ming Jiang,Meiyappan Nagappan,Ahmed E. Hassan,Mohamed Nasser,Parminder Flora
Issue Date:September 2013
pp. 110-119
Load tests ensure that software systems are able to perform under the expected workloads. The current state of load test analysis requires significant manual review of performance counters and execution logs, and a high degree of system-specific expertise....
 
Predicting Bugs Using Antipatterns
Found in: 2013 IEEE International Conference on Software Maintenance (ICSM)
By Seyyed Ehsan Salamati Taba,Foutse Khomh, Ying Zou,Ahmed E. Hassan,Meiyappan Nagappan
Issue Date:September 2013
pp. 270-279
Bug prediction models are often used to help allocate software quality assurance efforts. Software metrics (e.g., process metrics and product metrics) are at the heart of bug prediction models. However, some of these metrics like churn are not actionable, ...
 
An empirical study of build system migrations in practice: Case studies on KDE and the Linux kernel
Found in: 2012 IEEE International Conference on Software Maintenance (ICSM)
By Roman Suvorov,Meiyappan Nagappan,Ahmed E. Hassan,Ying Zou,Bram Adams
Issue Date:September 2012
pp. 160-169
As the build system, i.e. the infrastructure that constructs executable deliverables out of source code and other resources, tries to catch up with the ever-evolving source code base, its size and already significant complexity keep on growing. Recently, t...
 
Analysis of execution log files
Found in: Software Engineering, International Conference on
By Meiyappan Nagappan
Issue Date:May 2010
pp. 409-412
Log analysis can be used to find problems, define operational profiles, and even pro-actively prevent issues. The goal of my dissertation research is to investigate log management and analysis techniques suited for very large and very complex logs, such as...
 
Efficient Operational Profiling of Systems Using Suffix Arrays on Execution Logs
Found in: Software Reliability Engineering, International Symposium on
By Meiyappan Nagappan, Mladen A. Vouk, Kesheng Wu, Alex Sim, Arie Shoshani
Issue Date:November 2008
pp. 313-314
Operational profiles are an essential part of software reliability engineering. Typically they are created from the software requirements, and through customer reviews. Creation of operational profiles often is laborious and requires human intervention. Ou...
 
Replicating and Re-evaluating the Theory of Relative Defect-Proneness
Found in: IEEE Transactions on Software Engineering
By Mark Syer,Meiyappan Nagappan,Bram Adams,Ahmed Hassan
Issue Date:February 2015
pp. 1
A good understanding of the factors impacting defects in software systems is essential for software practitioners, because it helps them prioritize quality improvement efforts (e.g., testing and code reviews). Defect prediction models are typically built u...
 
On the Relationship between the Number of Ad Libraries in an Android App and its Rating
Found in: IEEE Software
By Israel Mojica Ruiz,Meiyappan Nagappan,Bram Adams,Thorsten Berger,Steffen Dienst,Ahmed Hassan
Issue Date:May 2014
pp. 1
One of the most popular ways to monetize a free app is by including advertisements in the app. There are several advertising (ad) companies that provide these ads to the app developers through ad libraries that need to be integrated in the app. However, th...
 
What Do Mobile App Users Complain About? A Study on Free iOS Apps
Found in: IEEE Software
By Hammad Khalid,Emad Shihab,Meiyappan Nagappan,Ahmed Hassan
Issue Date:March 2014
pp. 1
The quality of mobile apps is becoming an increasingly important issue. These apps are generally delivered through app stores that allow users to post reviews about apps. These user-reviews provide a rich data source that can be leveraged to understand use...
 
A Large Scale Empirical Study on Software Reuse in Mobile Apps
Found in: IEEE Software
By Israel Mojica Ruiz,Bram Adams,Meiyappan Nagappan,Steffen Dienst,Thorsten Berger,Ahmed Hassan
Issue Date:November 2013
pp. 1
Mobile apps are software products developed to run on mobile devices. In less than five years, the number of apps has grown exponentially to more than one million in the largest mobile app stores. One possible explanation for this exponential growth could ...
 
Revisiting software development effort estimation based on early phase development activities
Found in: 2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)
By Masateru Tsunoda,Yasutaka Kamei,Koji Toda,Meiyappan Nagappan,Kyohei Fushida,Naoyasu Ubayashi
Issue Date:May 2013
pp. 429-438
Many research projects on software estimation use software size as a major explanatory variable. However, practitioners sometimes use the ratio of effort for early phase activities such as planning and requirement analysis, to the effort for the whole deve...
   
Creating operational profiles of software systems by transforming their log files to directed cyclic graphs
Found in: Proceeding of the 6th international workshop on Traceability in emerging forms of software engineering (TEFSE '11)
By Brian Robinson, Meiyappan Nagappan
Issue Date:May 2011
pp. 54-57
Most log files are of one format - a flat file with the events of execution recorded one after the other. Each line in the file contains at least a timestamp, a combination of one or more event identifiers, and the actual log message with information of wh...
     
Modeling cloud failure data: a case study of the virtual computing lab
Found in: Proceeding of the 2nd international workshop on Software engineering for cloud computing (SECLOUD '11)
By Aaron Peeler, Meiyappan Nagappan, Mladen Vouk
Issue Date:May 2011
pp. 8-14
Virtual Computing Lab is a higher education cloud computing environment that on demand, allocates a chosen software stack on the required hardware and gives access to the customers, in this case NCSU students, faculty and staff. VCL has been in operation s...
     
Which code construct metrics are symptoms of post release failures
Found in: Proceeding of the 2nd international workshop on Emerging trends in software metrics (WETSoM '11)
By Brendan Murphy, Meiyappan Nagappan, Mladen Vouk
Issue Date:May 2011
pp. 65-68
Software metrics, such as code complexity metrics and code churn metrics, are used to predict failures. In this paper we study a specific set of metrics called code construct metrics and relate them to post release failures. We use the values of the code c...
     
 1