MSR 2013 Preview

Thomas Zimmermann
Thomas ZimmermannResearcher at Microsoft Research
MSR 2013 Preview
FANTASTIC KEYNOTES
Gail C. Murphy: “What is Software Development Productivity, Anyway?”
This talk will focus on the way software productivity has been characterized in
software engineering and how mining can support such a characterization.
Gail C. Murphy is a Professor of Computer Science at the University of British Columbia. She is also a Co-founder and
Chief Science Officer at Tasktop Technologies Inc. Her research interests are in improving the productivity of software
developers and knowledge workers by giving them tools to identify, manage and coordinate the information that really
matters for their work.

Brian Doll: “Striking Gold: Building Software Better, Together”
This talk will tell us how, by exploring GitHub, one can answer questions
about the success of software projects and of software development teams.
Bring your pan and pick. We're going to get our hands dirty.
Brian Doll is a technology & business hacker who has been building things on the web for 17 years. Brian works at
GitHub, helping millions of people build a better world with code.
CUTTING-EDGE RESEARCH
Out of over 100 submissions the Program Committee selected the best new
research results to uncover insight from software repositories. Find out about the
latest trends in analytics and data science for software development.
MSR TECHNICAL TRACK
                      Ten technical sessions with 36 presentations on the latest trends in mining, such
                      as mobile apps, unstructured data, classification and prediction of changes/bugs,
                      code review, social mining, search-driven development and software evolution.

Bug Triaging                                          MSR Goes Mobile
Why So Complicated? Simple Term Filtering and         Asking for (and about) Permissions
Weighting for Location-Based Bug Report               Used by Android Apps
Assignment Recommendation                             Ryan Stevens, Jonathan Ganz, Premkumar Devanbu,
Ramin Shokripour, John Anvik, Zarinah Mohd Kasirun,   Hao Chen, and Vladimir Filkov
and Sima Zamani
                                                      Retrieving and Analyzing Mobile Apps Feature
Which Work-Item Updates Need Your Response?           Requests from Online Reviews
Debdoot Mukherjee and Malika Garg                     Claudia Iacob and Rachel Harrison

Bug Report Assignee Recommendation
using Activity Profile
Hoda Naguib, Nitesh Narayan, Bernd Brügge, and
Dina Helal
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Changes and Fixes                                      Software Evolution
                                                       Understanding the Evolution of Type-3 Clones
Will My Patch Make It? And How Fast?
                                                       Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider, and
Case Study on the Linux Kernel
                                                       Dewayne E. Perry
Yujuan Jiang, Bram Adams, and Daniel M. German
                                                       An Empirical Study of the Fault-Proneness of Clone
Linux Variability Anomalies:                           Mutation and Clone Migration
What Causes Them and How Do They Get Fixed?            Shuai Xie, Foutse Khomh, and Ying Zou
Sarah Nadi, Christian Dietrich, Reinhard Tartler,      Intensive Metrics for the Study of the Evolution of Open
Richard C. Holt, and Daniel Lohmann                    Source Projects: Case Studies from Apache Software
                                                       Foundation Projects
The Impact of Tangled Code Changes                     Santiago Gala, Gregorio Robles, Jesús González-Barahona,
Kim Herzig and Andreas Zeller                          and Israel Herraiz

                                                       A Preliminary Investigation of Using Age and Distance
                                                       Measures in the Detection of Evolutionary Couplings
                                                       Abdulkareem Alali, Brian Bartman, Christian Newman, and
                                                       Jonathan Maletic
MSR TECHNICAL TRACK
                        Ten technical sessions with 36 presentations on the latest trends in mining, such
                        as mobile apps, unstructured data, classification and prediction of changes/bugs,
                        code review, social mining, search-driven development and software evolution.

Analysis of Bug Reports                                 Software Ecosystems, Big Data
Search-Based Duplicate Defect Detection:                Mining Source Code Repositories at Massive Scale
An Industrial Experience                                using Language Modeling
Mehdi Amoui, Nilam Kaushik, Abraham Al-Dabbagh,         Miltiadis Allamanis and Charles Sutton
Ladan Tahvildari, Shimin Li, and Weining Liu
                                                        Do Software Categories Impact Coupling Metrics?
A Contextual Approach towards More Accurate             Lucas Batista Leite De Souza and
Duplicate Bug Report Detection                          Marcelo De Almeida Maia
Anahita Alipour, Abram Hindle, and Eleni Stroulia

Bug Resolution Catalysts: Identifying Essential
Non-committers from Bug Repositories
Senthil Mani, Seema Nagar, Debdoot Mukherjee,
Ramasuri Narayanam, Vibha Singhal Sinha, and
Amit A. Nanavati
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Classification and Localization of                       Social Mining
Bugs and Changes
                                                         Fixing the 'Out of Sight Out of Mind' Problem: One Year of
                                                         Mood Based Microblogging in a Distributed Software Team
Discovering, Reporting, and Fixing Performance Bugs
                                                         Kevin Dullemond, Ben Van Gameren,
Adrian Nistor, Tian Jiang, and Lin Tan                   Arie van Deursen, and Margaret-Anne Storey

Improving Bug Localization using Correlations in Crash   Communication in Open Source Software Development
Reports                                                  Mailing Lists
Shaohua Wang, Foutse Khomh, and Ying Zou                 Anja Guzzi, Alberto Bacchelli, Michele Lanza,
                                                         Martin Pinzger, and Arie van Deursen
Testing Principles, Current Practices, and Effects of
Change Localization                                      Tag Recommendation In Software Information Sites
Steven Raemaekers, Gabriela Nane, Arie van Deursen,      Xin Xia, David Lo, Xinyu Wang, and Bo Zhou
and Joost Visser
                                                         Using Developer Interaction Data to Compare Expertise
                                                         Metrics
                                                         Romain Robbes and David Röthlisberger
MSR TECHNICAL TRACK
                      Ten technical sessions with 36 presentations on the latest trends in mining, such
                      as mobile apps, unstructured data, classification and prediction of changes/bugs,
                      code review, social mining, search-driven development and software evolution.

Search-Driven Development                             10 Years of MSR
Assisting Code Search with Automatic Query            The MSR Cookbook: Mining a Decade of Research
Reformulation for Bug Localization                    Hadi Hemmati, Sarah Nadi, Olga Baysal,
Bunyamin Sisman and Avinash C. Kak                    Oleksii Kononenko, Wei Wang, Reid Holmes, and
                                                      Michael W. Godfrey
Mining Succinct and High-Coverage API Usage
Patterns from Source Code                             Happy Birthday! A Trend Analysis on Past MSR Papers
Jue Wang, Yingnong Dang, Hongyu Zhang, Kai Chen,      Kevin Wyckmans, Alessandro Murgia, Ahmed Lamkanfi,
Tao Xie, and Dongmei Zhang                            and Serge Demeyer

Rendezvous: A Search Engine for Binary Code           Replicating Mining Studies with SOFAS
Wei Ming Khoo, Alan Mycroft, and Ross Anderson        Giacomo Ghezzi and Harald C. Gall
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Mining Unstructured Data                                 Predictor Models
Automatically Mining Software-Based, Semantically-       Better Cross Company Defect Prediction
Similar Words from Comment-Code Mappings                 Fayola Peters, Tim Menzies, and Andrian Marcus
Matthew J. Howard, Lori Pollock, K. Vijay-Shanker, and
Samir Gupta                                              Using Citation Influence to Predict Software Defects
                                                         Wei Hu and Kenny Wong
Strategies for Avoiding Text Fixture Smells during
Software Evolution                                       Revisiting Software Development Effort Estimation
Michaela Greiler, Andy Zaidman, Arie van Deursen,        Based on Early Phase Development Activities
and Margaret-Anne Storey                                 Masateru Tsunoda, Koji Toda, Kyohei Fushida,
                                                         Yasutaka Kamei, Meiyappan Nagappan, and
Contextual Analysis of Program Logs for Understanding    Naoyasu Ubayashi
System Behaviors
Qiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding,
Dongmei Zhang, and Tao Xie
MSR 2013 Preview
MSR DATA SHOWCASE
                             Out of 27 submissions the Data Committee selected 15 carefully curated datasets
                             ready at your fingertips. You name it, we have it! Android, Apache, Eclipse, Gnome,
                             Maven, Mozilla, and Ruby. Change histories, bug reports, code reviews, and more.
Gerrit Software Code Review Data from Android                        A Network of Rails: A Graph Dataset of Ruby on Rails
Murtuza Mukadam, Christian Bird, and Peter C. Rigby                  and Associated Projects
                                                                     Patrick Wagstrom, Corey Jergensen, and Anita Sarma
Who does what during a Code Review?
Datasets of OSS Peer Review Repositories                             The GHTorent Dataset and Tool Suite
Kazuki Hamasaki, Raula Gaikovina Kula, Norihiro Yoshida, Ana Erika   Georgios Gousios
Camargo Cruz, Kenji Fujiwara, and Hajimu Iida
                                                                     Project Roles in the Apache Software Foundation: A Dataset
A Dataset from Change History to Support Evaluation of               Megan Squire
Software Maintenance Tasks
                                                                     Apache-Affiliated Twitter Screen Names: A Dataset
Bogdan Dit, Andrew Holtzhauer, Denys Poshyvanyk, and Huzefa Kagdi
                                                                     Megan Squire
Apache Commits: Social Network Dataset
                                                                     An Unabridged Source Code Dataset for Research in Software Reuse
Alexander C. MacLean and Charles D. Knutson
                                                                     Werner Janjic, Oliver Hummel, Marcus Schumacher, and Colin Atkinson
The Eclipse and Mozilla Defect Tracking Dataset:
                                                                     A Historical Dataset of Software Engineering Conferences
A Genuine Dataset for Mining Bug Information
                                                                     Bogdan Vasilescu, Alexander Serebrenik, and Tom Mens
Ahmed Lamkanfi, Javier Pérez, and Serge Demeyer
                                                                     A Dataset for Evaluating Identifier Splitters
The Maven Repository Dataset of Metrics, Changes, and Dependencies
                                                                     David Binkley, Dawn Lawrie, Lori Pollock, Emily Hill, and Vijay Shanker
Steven Raemaekers, Arie van Deursen, and Joost Visser
                                                                     INVocD: Identifier Name Vocabulary Dataset
A Historical Dataset for the Gnome Ecosystem
                                                                     Simon Butler, Michel Wermelinger, Yijun Yu, and Helen Sharp
Mathieu Goeminne, Maëlick Claes, and Tom Mens
MSR 2013 Preview
MSR MINING CHALLENGE
                             The task: Mine Stack Overflow data for the best insight. Out of 29 submissions
                             the Challenge Committee selected the 12 best to compete at the conference.
                             You choose who wins and gets a Microsoft Surface with Windows RT.

Why, When, and What: Analyzing Stack Overflow Questions             Exploring Activeness of Users in Q&A Forums
by Topic, Type, and Code                                            Vibha Singhal Sinha, Senthil Mani, and Monika Gupta
Miltiadis Allamanis and Charles Sutton
                                                                    A Study of Innovation Diffusion through Link Sharing
                                                                    on Stack Overflow
Detecting API Usage Obstacles: A Study of iOS and
                                                                    Carlos Gomez, Brendan Cleary, and Leif Singer
Android Developer Questions
Wei Wang and Michael W. Godfrey
                                                                    Deficient Documentation Detection: A Methodology to
                                                                    Locate Deficient Project Documentation using Topic Analysis
Making Sense of Online Code Snippets
                                                                    Joshua Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle,
Siddharth Subramanian and Reid Holmes
                                                                    and James Miller
Encouraging User Behaviour with Achievements:                       Building Reputation in StackOverflow: An Empirical Investigation
An Empirical Study                                                  Amiangshu Bosu, Christopher S. Corley, Dustin Heaton, Debarshi
Scott Grant and Buddy Betts                                         Chatterji, Jeffrey C. Carver, and Nicholas A. Kraft

Is Programming Knowledge Related to Age?                            An Exploratory Analysis of Mobile Development Issues
An Exploration of Stack Overflow                                    using Stack Overflow
Patrick Morrison and Emerson Murphy-Hill                            Mario Linares-Vásquez, Bogdan Dit, and Denys Poshyvanyk

                                                                    Answering Questions about Unanswered Questions of Stack Overflow
A Discriminative Model Approach for Suggesting Tags Automatically
                                                                    Muhammad Asaduzzaman, Ahmed Mashiyat, Chanchal K. Roy, and
for Stack Overflow Questions                                        Kevin A. Schneider
Avigit K. Saha, Ripon K. Saha, and Kevin A. Schneider
REGISTER NOW!
Early registration discounts until April 14.
1 of 14

Recommended

Empirical Software Engineering at Microsoft Research by
Empirical Software Engineering at Microsoft ResearchEmpirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft ResearchThomas Zimmermann
4.6K views82 slides
Software Analytics = Sharing Information by
Software Analytics = Sharing InformationSoftware Analytics = Sharing Information
Software Analytics = Sharing InformationThomas Zimmermann
3.3K views74 slides
Analytics for software development by
Analytics for software developmentAnalytics for software development
Analytics for software developmentThomas Zimmermann
4.6K views24 slides
Analytics for smarter software development by
Analytics for smarter software development Analytics for smarter software development
Analytics for smarter software development Thomas Zimmermann
2.6K views68 slides
After the Pandemic: Rethinking Developer Productivity (There’s more to it th... by
After the Pandemic:  Rethinking Developer Productivity (There’s more to it th...After the Pandemic:  Rethinking Developer Productivity (There’s more to it th...
After the Pandemic: Rethinking Developer Productivity (There’s more to it th...Margaret-Anne Storey
1.1K views45 slides
Information Needs for Software Development Analytics by
Information Needs for Software Development AnalyticsInformation Needs for Software Development Analytics
Information Needs for Software Development AnalyticsRay Buse
1.5K views56 slides

More Related Content

What's hot

Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey... by
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...SeriousGamesAssoc
140 views29 slides
The Rationale for Continuous Delivery by Dave Farley by
The Rationale for Continuous Delivery by Dave FarleyThe Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave FarleyBosnia Agile
196 views78 slides
Dtl 2012 q4_home.1 by
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Anatoliy Tkachev
1.1K views19 slides
Beyond DevOps: Finding Value through Requirements by
Beyond DevOps: Finding Value through RequirementsBeyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through RequirementsGail Murphy
689 views72 slides
Testing an Android Implementation of the Social Engineering Protection Traini... by
Testing an Android Implementation of the Social Engineering Protection Traini...Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...Marcel Teixeira
289 views11 slides
2010 GISS EY by
2010 GISS EY2010 GISS EY
2010 GISS EYVladimir Matviychuk
693 views24 slides

What's hot(20)

Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey... by SeriousGamesAssoc
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
SeriousGamesAssoc140 views
The Rationale for Continuous Delivery by Dave Farley by Bosnia Agile
The Rationale for Continuous Delivery by Dave FarleyThe Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave Farley
Bosnia Agile196 views
Beyond DevOps: Finding Value through Requirements by Gail Murphy
Beyond DevOps: Finding Value through RequirementsBeyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through Requirements
Gail Murphy689 views
Testing an Android Implementation of the Social Engineering Protection Traini... by Marcel Teixeira
Testing an Android Implementation of the Social Engineering Protection Traini...Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...
Marcel Teixeira289 views
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net... by IOSR Journals
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
IOSR Journals567 views
Interactive fault localization leveraging simple user feedback - by Liang Gong by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongInteractive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang Gong
Liang Gong539 views
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ... by ACM Chicago
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago124 views
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES by IJNSA Journal
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
IJNSA Journal72 views
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT by ijseajournal
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
ijseajournal144 views
Applications of genetic algorithms to malware detection and creation by UltraUploader
Applications of genetic algorithms to malware detection and creationApplications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creation
UltraUploader642 views
Software Analytics: Towards Software Mining that Matters (2014) by Tao Xie
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
Tao Xie1.7K views
Mindtrek 2015 - Tampere Finland by Panos Fitsilis
Mindtrek 2015 - Tampere Finland Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland
Panos Fitsilis301 views
Intelligence on the Intractable Problem of Software Security by Tyler Shields
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
Tyler Shields407 views
7 Experts on Implementing Microsoft 365 Defender by Mighty Guides, Inc.
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by... by Kalilur Rahman
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Kalilur Rahman771 views
Security Survey 2013 UK by Kim Jensen
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
Kim Jensen637 views
Intelligent Testing Skills Needed in a Digital World by Kalilur Rahman
Intelligent Testing Skills Needed in a Digital WorldIntelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital World
Kalilur Rahman1.4K views

Similar to MSR 2013 Preview

Defining the boundary for AI research in Intelligent Systems Dec 2021 by
Defining the boundary for AI research in Intelligent Systems Dec  2021Defining the boundary for AI research in Intelligent Systems Dec  2021
Defining the boundary for AI research in Intelligent Systems Dec 2021Parasuram Balasubramanian
40 views32 slides
Malware Detection Approaches using Data Mining Techniques.pptx by
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
268 views16 slides
CV - DCHATTERJI by
CV - DCHATTERJICV - DCHATTERJI
CV - DCHATTERJIDebarshi Chatterji
42 views4 slides
Iotx futures research_futures_trends_2011 by
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Andy Hunter
535 views60 slides
Schedule for the 13th Annual Conference of the Midwest AIS by
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
1.1K views6 slides
Transparency in ML and AI (humble views from a concerned academic) by
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
579 views26 slides

Similar to MSR 2013 Preview(20)

Malware Detection Approaches using Data Mining Techniques.pptx by Alamgir Hossain
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain268 views
Iotx futures research_futures_trends_2011 by Andy Hunter
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011
Andy Hunter535 views
Schedule for the 13th Annual Conference of the Midwest AIS by Maurice Dawson
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
Maurice Dawson1.1K views
Transparency in ML and AI (humble views from a concerned academic) by Paolo Missier
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
Paolo Missier579 views
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le... by JAYAPRAKASH JPINFOTECH
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T... by Darshan Gorasiya
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Darshan Gorasiya118 views
Android security a survey of issues, malware penetration, and defenses by LeMeniz Infotech
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
LeMeniz Infotech372 views
Towards the Social Programmer (MSR 2012 Keynote by M. Storey) by Margaret-Anne Storey
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Margaret-Anne Storey20.7K views
A survey on identification of ranking fraud for mobile applications by eSAT Journals
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
eSAT Journals253 views
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob... by Kevin Moran
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Kevin Moran400 views
Top cited articles 2020 - Advanced Computational Intelligence: An Internation... by aciijournal
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
aciijournal36 views
Acg Terr Sand2004 2130w by NKHAYDEN
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130w
NKHAYDEN499 views
Integrate All The Things WS02Con by James Governor
Integrate All The Things WS02ConIntegrate All The Things WS02Con
Integrate All The Things WS02Con
James Governor5.2K views
DevSecOps: Minimizing Risk, Improving Security by Franklin Mosley
DevSecOps: Minimizing Risk, Improving SecurityDevSecOps: Minimizing Risk, Improving Security
DevSecOps: Minimizing Risk, Improving Security
Franklin Mosley754 views

More from Thomas Zimmermann

Predicting Method Crashes with Bytecode Operations by
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsThomas Zimmermann
2.3K views26 slides
Characterizing and Predicting Which Bugs Get Reopened by
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
2K views32 slides
Klingon Countdown Timer by
Klingon Countdown TimerKlingon Countdown Timer
Klingon Countdown TimerThomas Zimmermann
1.3K views28 slides
Data driven games user research by
Data driven games user researchData driven games user research
Data driven games user researchThomas Zimmermann
1.5K views10 slides
Not my bug! Reasons for software bug report reassignments by
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsThomas Zimmermann
1.3K views32 slides
Security trend analysis with CVE topic models by
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic modelsThomas Zimmermann
1.5K views34 slides

More from Thomas Zimmermann(20)

Predicting Method Crashes with Bytecode Operations by Thomas Zimmermann
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode Operations
Thomas Zimmermann2.3K views
Characterizing and Predicting Which Bugs Get Reopened by Thomas Zimmermann
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
Not my bug! Reasons for software bug report reassignments by Thomas Zimmermann
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
Thomas Zimmermann1.3K views
Security trend analysis with CVE topic models by Thomas Zimmermann
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic models
Thomas Zimmermann1.5K views
Characterizing and predicting which bugs get fixed by Thomas Zimmermann
Characterizing and predicting which bugs get fixedCharacterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixed
Thomas Zimmermann809 views
Changes and Bugs: Mining and Predicting Development Activities by Thomas Zimmermann
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Thomas Zimmermann4.6K views
Changes and Bugs: Mining and Predicting Development Activities by Thomas Zimmermann
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
Thomas Zimmermann1.4K views
Predicting Defects using Network Analysis on Dependency Graphs by Thomas Zimmermann
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
Thomas Zimmermann2.2K views
Quality of Bug Reports in Open Source by Thomas Zimmermann
Quality of Bug Reports in Open SourceQuality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
Thomas Zimmermann1.6K views
Predicting Subsystem Defects using Dependency Graph Complexities by Thomas Zimmermann
Predicting Subsystem Defects using Dependency Graph Complexities Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities
Thomas Zimmermann1.4K views
Got Myth? Myths in Software Engineering by Thomas Zimmermann
Got Myth? Myths in Software EngineeringGot Myth? Myths in Software Engineering
Got Myth? Myths in Software Engineering
Thomas Zimmermann5.9K views
Mining Software Archives to Support Software Development by Thomas Zimmermann
Mining Software Archives to Support Software DevelopmentMining Software Archives to Support Software Development
Mining Software Archives to Support Software Development
Thomas Zimmermann854 views
esolang: Esoterische Programmiersprachen by Thomas Zimmermann
esolang: Esoterische Programmiersprachenesolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachen
Thomas Zimmermann1.5K views
TA-RE: An Exchange Language for Mining Software Repositories by Thomas Zimmermann
TA-RE: An Exchange Language for Mining Software RepositoriesTA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software Repositories
Thomas Zimmermann477 views

Recently uploaded

Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
126 views10 slides
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
123 views10 slides
The Power of Heat Decarbonisation Plans in the Built Environment by
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
79 views20 slides
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
218 views20 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
221 views19 slides
"Surviving highload with Node.js", Andrii Shumada by
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
56 views29 slides

Recently uploaded(20)

Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue218 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue147 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue159 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T by ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue152 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker54 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue119 views

MSR 2013 Preview

  • 2. FANTASTIC KEYNOTES Gail C. Murphy: “What is Software Development Productivity, Anyway?” This talk will focus on the way software productivity has been characterized in software engineering and how mining can support such a characterization. Gail C. Murphy is a Professor of Computer Science at the University of British Columbia. She is also a Co-founder and Chief Science Officer at Tasktop Technologies Inc. Her research interests are in improving the productivity of software developers and knowledge workers by giving them tools to identify, manage and coordinate the information that really matters for their work. Brian Doll: “Striking Gold: Building Software Better, Together” This talk will tell us how, by exploring GitHub, one can answer questions about the success of software projects and of software development teams. Bring your pan and pick. We're going to get our hands dirty. Brian Doll is a technology & business hacker who has been building things on the web for 17 years. Brian works at GitHub, helping millions of people build a better world with code.
  • 3. CUTTING-EDGE RESEARCH Out of over 100 submissions the Program Committee selected the best new research results to uncover insight from software repositories. Find out about the latest trends in analytics and data science for software development.
  • 4. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Bug Triaging MSR Goes Mobile Why So Complicated? Simple Term Filtering and Asking for (and about) Permissions Weighting for Location-Based Bug Report Used by Android Apps Assignment Recommendation Ryan Stevens, Jonathan Ganz, Premkumar Devanbu, Ramin Shokripour, John Anvik, Zarinah Mohd Kasirun, Hao Chen, and Vladimir Filkov and Sima Zamani Retrieving and Analyzing Mobile Apps Feature Which Work-Item Updates Need Your Response? Requests from Online Reviews Debdoot Mukherjee and Malika Garg Claudia Iacob and Rachel Harrison Bug Report Assignee Recommendation using Activity Profile Hoda Naguib, Nitesh Narayan, Bernd Brügge, and Dina Helal
  • 5. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Changes and Fixes Software Evolution Understanding the Evolution of Type-3 Clones Will My Patch Make It? And How Fast? Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider, and Case Study on the Linux Kernel Dewayne E. Perry Yujuan Jiang, Bram Adams, and Daniel M. German An Empirical Study of the Fault-Proneness of Clone Linux Variability Anomalies: Mutation and Clone Migration What Causes Them and How Do They Get Fixed? Shuai Xie, Foutse Khomh, and Ying Zou Sarah Nadi, Christian Dietrich, Reinhard Tartler, Intensive Metrics for the Study of the Evolution of Open Richard C. Holt, and Daniel Lohmann Source Projects: Case Studies from Apache Software Foundation Projects The Impact of Tangled Code Changes Santiago Gala, Gregorio Robles, Jesús González-Barahona, Kim Herzig and Andreas Zeller and Israel Herraiz A Preliminary Investigation of Using Age and Distance Measures in the Detection of Evolutionary Couplings Abdulkareem Alali, Brian Bartman, Christian Newman, and Jonathan Maletic
  • 6. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Analysis of Bug Reports Software Ecosystems, Big Data Search-Based Duplicate Defect Detection: Mining Source Code Repositories at Massive Scale An Industrial Experience using Language Modeling Mehdi Amoui, Nilam Kaushik, Abraham Al-Dabbagh, Miltiadis Allamanis and Charles Sutton Ladan Tahvildari, Shimin Li, and Weining Liu Do Software Categories Impact Coupling Metrics? A Contextual Approach towards More Accurate Lucas Batista Leite De Souza and Duplicate Bug Report Detection Marcelo De Almeida Maia Anahita Alipour, Abram Hindle, and Eleni Stroulia Bug Resolution Catalysts: Identifying Essential Non-committers from Bug Repositories Senthil Mani, Seema Nagar, Debdoot Mukherjee, Ramasuri Narayanam, Vibha Singhal Sinha, and Amit A. Nanavati
  • 7. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Classification and Localization of Social Mining Bugs and Changes Fixing the 'Out of Sight Out of Mind' Problem: One Year of Mood Based Microblogging in a Distributed Software Team Discovering, Reporting, and Fixing Performance Bugs Kevin Dullemond, Ben Van Gameren, Adrian Nistor, Tian Jiang, and Lin Tan Arie van Deursen, and Margaret-Anne Storey Improving Bug Localization using Correlations in Crash Communication in Open Source Software Development Reports Mailing Lists Shaohua Wang, Foutse Khomh, and Ying Zou Anja Guzzi, Alberto Bacchelli, Michele Lanza, Martin Pinzger, and Arie van Deursen Testing Principles, Current Practices, and Effects of Change Localization Tag Recommendation In Software Information Sites Steven Raemaekers, Gabriela Nane, Arie van Deursen, Xin Xia, David Lo, Xinyu Wang, and Bo Zhou and Joost Visser Using Developer Interaction Data to Compare Expertise Metrics Romain Robbes and David Röthlisberger
  • 8. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Search-Driven Development 10 Years of MSR Assisting Code Search with Automatic Query The MSR Cookbook: Mining a Decade of Research Reformulation for Bug Localization Hadi Hemmati, Sarah Nadi, Olga Baysal, Bunyamin Sisman and Avinash C. Kak Oleksii Kononenko, Wei Wang, Reid Holmes, and Michael W. Godfrey Mining Succinct and High-Coverage API Usage Patterns from Source Code Happy Birthday! A Trend Analysis on Past MSR Papers Jue Wang, Yingnong Dang, Hongyu Zhang, Kai Chen, Kevin Wyckmans, Alessandro Murgia, Ahmed Lamkanfi, Tao Xie, and Dongmei Zhang and Serge Demeyer Rendezvous: A Search Engine for Binary Code Replicating Mining Studies with SOFAS Wei Ming Khoo, Alan Mycroft, and Ross Anderson Giacomo Ghezzi and Harald C. Gall
  • 9. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Mining Unstructured Data Predictor Models Automatically Mining Software-Based, Semantically- Better Cross Company Defect Prediction Similar Words from Comment-Code Mappings Fayola Peters, Tim Menzies, and Andrian Marcus Matthew J. Howard, Lori Pollock, K. Vijay-Shanker, and Samir Gupta Using Citation Influence to Predict Software Defects Wei Hu and Kenny Wong Strategies for Avoiding Text Fixture Smells during Software Evolution Revisiting Software Development Effort Estimation Michaela Greiler, Andy Zaidman, Arie van Deursen, Based on Early Phase Development Activities and Margaret-Anne Storey Masateru Tsunoda, Koji Toda, Kyohei Fushida, Yasutaka Kamei, Meiyappan Nagappan, and Contextual Analysis of Program Logs for Understanding Naoyasu Ubayashi System Behaviors Qiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding, Dongmei Zhang, and Tao Xie
  • 11. MSR DATA SHOWCASE Out of 27 submissions the Data Committee selected 15 carefully curated datasets ready at your fingertips. You name it, we have it! Android, Apache, Eclipse, Gnome, Maven, Mozilla, and Ruby. Change histories, bug reports, code reviews, and more. Gerrit Software Code Review Data from Android A Network of Rails: A Graph Dataset of Ruby on Rails Murtuza Mukadam, Christian Bird, and Peter C. Rigby and Associated Projects Patrick Wagstrom, Corey Jergensen, and Anita Sarma Who does what during a Code Review? Datasets of OSS Peer Review Repositories The GHTorent Dataset and Tool Suite Kazuki Hamasaki, Raula Gaikovina Kula, Norihiro Yoshida, Ana Erika Georgios Gousios Camargo Cruz, Kenji Fujiwara, and Hajimu Iida Project Roles in the Apache Software Foundation: A Dataset A Dataset from Change History to Support Evaluation of Megan Squire Software Maintenance Tasks Apache-Affiliated Twitter Screen Names: A Dataset Bogdan Dit, Andrew Holtzhauer, Denys Poshyvanyk, and Huzefa Kagdi Megan Squire Apache Commits: Social Network Dataset An Unabridged Source Code Dataset for Research in Software Reuse Alexander C. MacLean and Charles D. Knutson Werner Janjic, Oliver Hummel, Marcus Schumacher, and Colin Atkinson The Eclipse and Mozilla Defect Tracking Dataset: A Historical Dataset of Software Engineering Conferences A Genuine Dataset for Mining Bug Information Bogdan Vasilescu, Alexander Serebrenik, and Tom Mens Ahmed Lamkanfi, Javier Pérez, and Serge Demeyer A Dataset for Evaluating Identifier Splitters The Maven Repository Dataset of Metrics, Changes, and Dependencies David Binkley, Dawn Lawrie, Lori Pollock, Emily Hill, and Vijay Shanker Steven Raemaekers, Arie van Deursen, and Joost Visser INVocD: Identifier Name Vocabulary Dataset A Historical Dataset for the Gnome Ecosystem Simon Butler, Michel Wermelinger, Yijun Yu, and Helen Sharp Mathieu Goeminne, Maëlick Claes, and Tom Mens
  • 13. MSR MINING CHALLENGE The task: Mine Stack Overflow data for the best insight. Out of 29 submissions the Challenge Committee selected the 12 best to compete at the conference. You choose who wins and gets a Microsoft Surface with Windows RT. Why, When, and What: Analyzing Stack Overflow Questions Exploring Activeness of Users in Q&A Forums by Topic, Type, and Code Vibha Singhal Sinha, Senthil Mani, and Monika Gupta Miltiadis Allamanis and Charles Sutton A Study of Innovation Diffusion through Link Sharing on Stack Overflow Detecting API Usage Obstacles: A Study of iOS and Carlos Gomez, Brendan Cleary, and Leif Singer Android Developer Questions Wei Wang and Michael W. Godfrey Deficient Documentation Detection: A Methodology to Locate Deficient Project Documentation using Topic Analysis Making Sense of Online Code Snippets Joshua Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle, Siddharth Subramanian and Reid Holmes and James Miller Encouraging User Behaviour with Achievements: Building Reputation in StackOverflow: An Empirical Investigation An Empirical Study Amiangshu Bosu, Christopher S. Corley, Dustin Heaton, Debarshi Scott Grant and Buddy Betts Chatterji, Jeffrey C. Carver, and Nicholas A. Kraft Is Programming Knowledge Related to Age? An Exploratory Analysis of Mobile Development Issues An Exploration of Stack Overflow using Stack Overflow Patrick Morrison and Emerson Murphy-Hill Mario Linares-Vásquez, Bogdan Dit, and Denys Poshyvanyk Answering Questions about Unanswered Questions of Stack Overflow A Discriminative Model Approach for Suggesting Tags Automatically Muhammad Asaduzzaman, Ahmed Mashiyat, Chanchal K. Roy, and for Stack Overflow Questions Kevin A. Schneider Avigit K. Saha, Ripon K. Saha, and Kevin A. Schneider
  • 14. REGISTER NOW! Early registration discounts until April 14.