paper_id stringclasses 32 values | title stringclasses 32 values | year int64 2.02k 2.03k | citation_count int64 1 54 | authors listlengths 2 10 | cited_paper_id stringlengths 40 40 | contexts listlengths 0 26 | intents listlengths 0 3 | is_influential bool 2 classes |
|---|---|---|---|---|---|---|---|---|
25a268f772046fcff223c19fdf6ba23ccd6c8e58 | Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software | 2,025 | 4 | [
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"... | 612a8e523feb735289a2d7b7ec7bbbd440c8731a | [
"Many of previous studies of project “deprecation” or “failure” defined unmaintenance based on the activity features, they often assume a project is abandoned after a fixed threshold of inactivity [12, 33, 35, 52].",
"…or “failure”, but often with vague meaning and inconsistent operationalization: some studies re... | [] | false |
25a268f772046fcff223c19fdf6ba23ccd6c8e58 | Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software | 2,025 | 4 | [
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"... | f20d9078f5bf6c3a0748021e4f1494e257b257e3 | [
"3,17 In other words, the more people are involved, the harder it will be for the bear to catch them all."
] | [] | false |
25a268f772046fcff223c19fdf6ba23ccd6c8e58 | Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software | 2,025 | 4 | [
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"... | 494acf3f7b473245db2be41586978c61480326fc | [
"They found that infrastructure role, downstream dependencies, publication mentions, and government involvement enhance sustainability, while academic origin and project recency reduce it [18]."
] | [] | false |
25a268f772046fcff223c19fdf6ba23ccd6c8e58 | Scientific Open-Source Software Is Less Likely to Become Abandoned Than One Might Think! Lessons from Curating a Catalog of Maintained Scientific Software | 2,025 | 4 | [
{
"authorId": "2184471599",
"name": "Addi Malviya Thakur"
},
{
"authorId": "1731000",
"name": "Reed Milewicz"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2273563352",
"name": "Lavínia Paganini"
},
{
"authorId": "2335865441",
"... | 7b75fda8200b108c4466f0567bdd2bd940b392fc | [
"Historically, open-source research software has been longer-lived than other kinds of open-source software and government involvement has been associated with longer lifespan [9]."
] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | b37fee73d648e0e4d4822dd795194232ab4cc4be | [
"Our criteria are inspired by Miller et al. [28]’s criteria of abandoned packages since we want to exclude the abandoned packages from our analysis."
] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | d26331a5dae50614dc8580c4f057bea7a8c3177a | [] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | e71c11a1f34d54fcffaa9b86ea4404b6d6d10a6b | [] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | 25a268f772046fcff223c19fdf6ba23ccd6c8e58 | [
"In conventional OSS SECOs, packages can become obsolete or inactive [22, 70], breaking changes can cause cascading effects on projects [9], communities around software projects can rise and fall [107], projects can die due to lack of financial viability [111], and poor governance can cause an…"
] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | ced75d2582807c3edad4a5148186d32a2dd693a5 | [] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | 04f66deb0ae8dea6be752604e33e23bf83fb65af | [
"Miller et al. [11] analyzed dependency abandonment in the NPM ecosystem.",
"To the best of our knowledge, the recent study by Miller et al. [11] is the only one that proposes strategies to mitigate the risk brought by abandonment.",
"Most existing studies on OSS project abandonment focus on analyzing the impac... | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | 461e00ecb0bb5b24b4cb65078a96d0677919f5f3 | [
"Research has worked on understanding and detecting abandoned dependencies [138, 143]."
] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | e2382850dc382098a357fd00e654d5b05826f53b | [] | [] | false |
5a9ce9cb804d124e0f8b06eae2222851c28acf17 | Understanding the Response to Open-Source Dependency Abandonment in the npm Ecosystem | 2,025 | 9 | [
{
"authorId": "2303165466",
"name": "Courtney Miller"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2335865441",
"name": "Bogdan Vasilescu"
},
{
"authorId": "2289028231",
"name": "... | 99c7392512bde34010632eefb630b74ed6bad069 | [
"Miller et al. observe that 15 % of the most downloaded npm packages are abandoned within six years and that 82 % of the affected projects never respond to the issue at all [21]."
] | [] | false |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets | 2,025 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | e9c0ab581e21b727d406317e2ba06e565a8fa640 | [
"The primary challenge of license management lies in the complexity and variety of licenses governing autonomous driving datasets [40, 130].",
"…and methods have been proposed to explore how to properly manage the training data, encompassing data deduplication [56], training data selection [59, 89, 112], sampling... | [] | false |
f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | Cracks in The Stack: Hidden Vulnerabilities and Licensing Risks in LLM Pre-Training Datasets | 2,025 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | d64229d0c72c9b7950ebc1e5440ffdee168047b3 | [
"Because LLMs are trained on large-scale code repositories, they may inadvertently memorize and regenerate sensitive or proprietary fragments, raising issues of data handling, licensing compliance, and potential leakage of conidential information [19, 55, 62]."
] | [] | false |
1488416ff0b3caec77e252756256a009f696c1cc | OSS License Identification at Scale: A Comprehensive Dataset Using World of Code | 2,024 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2320311508",
"name": "Adam McDaniel"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 206413519378034892e72b5f86db8bdd2aced90f | [
"Followingprevious work [34], for each license file we compute a matching score as the ratio of shared Winnowing signatures to the total signatures between the file and a standard SPDX license, as defined in Equation 1: where 𝑆 is the matching score, 𝐴 represents the set of signatures in the…",
"The situation b... | [] | false |
1488416ff0b3caec77e252756256a009f696c1cc | OSS License Identification at Scale: A Comprehensive Dataset Using World of Code | 2,024 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2320311508",
"name": "Adam McDaniel"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | [
"Using WoC’s license map [21], we compare this information with the Stack’s license data to identify potential instances of license noncompliance."
] | [] | false |
85d150958a873668a3b9f17f924ee55b84ede79b | The Role of Data Filtering in Open Source Software Ranking and Selection | 2,024 | 2 | [
{
"authorId": "2162186197",
"name": "Addi Malviya-Thakur"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | d18423ab1b74c4be52d84d4ece989d59994514f6 | [
"Remove projects demonstrating poor performance in key metrics (e.g., pull request activity) [8–24] Select projects ranking highly in significant dimensions (e.g., star count) [15,20,25–33] Employ decision tree classification to determine CCP status (using project statistics and description keywords…"
] | [] | false |
85d150958a873668a3b9f17f924ee55b84ede79b | The Role of Data Filtering in Open Source Software Ranking and Selection | 2,024 | 2 | [
{
"authorId": "2162186197",
"name": "Addi Malviya-Thakur"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 6d380ef939655fe854605ea0fe5789727edc38b6 | [
"Addi et al. filtered higher-confidence data based on data attributes (such as the number of stars on open-source projects)[10], which limits applicability and may not accurately reflect true data quality."
] | [] | false |
95cecc4bba4243cd66d059de164a6aa56f3f47ee | Moving Faster and Reducing Risk: Using LLMs in Release Deployment | 2,024 | 2 | [
{
"authorId": "2311876371",
"name": "Rui Abreu"
},
{
"authorId": "32269195",
"name": "V. Murali"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2311877796",
"name": "Chandra Maddila"
},
{
"authorId": "2325285821",
"name": "Weiyan Sun... | 2520a844ff53ddc3d5be6563ddef8406626848a6 | [
"The work around code review and AI is moving at a fast rate, we are excited to see other advances by researchers and in industry."
] | [] | false |
95cecc4bba4243cd66d059de164a6aa56f3f47ee | Moving Faster and Reducing Risk: Using LLMs in Release Deployment | 2,024 | 2 | [
{
"authorId": "2311876371",
"name": "Rui Abreu"
},
{
"authorId": "32269195",
"name": "V. Murali"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2311877796",
"name": "Chandra Maddila"
},
{
"authorId": "2325285821",
"name": "Weiyan Sun... | e813d85ccd9e1a86dca4aa6e0dcf9486f0fdd01a | [
"Promising recent work on genAI and deployment provides a wonderful roadmap for what could be ahead [53]."
] | [] | false |
d739b611185f134de83d152710367c02d79a5412 | Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development | 2,024 | 4 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 60e38d4fc675718b412d0d93d3b95df3a8f4a5eb | [
"A module in repository A is considered a reuse of a module from repository B if it is detected as a clone and appears later in time, following the timestamp-based inference standard in prior studies [44], [45]."
] | [] | false |
d739b611185f134de83d152710367c02d79a5412 | Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development | 2,024 | 4 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 6f8730653938898730fb6aa2747a295650fb8e5e | [
"Dependencies are necessary since modern software is built on the foundation of existing code, libraries, and frameworks [71]."
] | [] | false |
d739b611185f134de83d152710367c02d79a5412 | Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development | 2,024 | 4 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | [
"Type II SSC involves copied code, a common practice in open-source software where code is shared publicly [14], allowing anyone to copy or fork it (within licensing requirements).",
"The sampling was based on SHA-1 hashes of the blobs and commits, which ensures that the selection process is effectively random.",... | [] | true |
d739b611185f134de83d152710367c02d79a5412 | Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development | 2,024 | 4 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 36a8c342adeb891857b4dacacdc14c399196d0d9 | [] | [] | false |
17212368a171bb7f7600d8a05155e0414525acbc | Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse | 2,023 | 3 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 84483e7b1bb9b7c6951fd7d271cb7dae4b638ff9 | [
"Another complex area involves the legal interpretation of terms used in software licenses, which are often steeped in domain-specific jargon that does not easily lend itself to quan-tifiable metrics.",
"These agreements are intended to ensure that contributors retain copyright over their code and agree to transfer... | [] | true |
17212368a171bb7f7600d8a05155e0414525acbc | Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse | 2,023 | 3 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | [
"This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].",
"In order for this approach to work, we have to go across repository boundaries and consider versions (and their history) in all... | [] | false |
17212368a171bb7f7600d8a05155e0414525acbc | Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse | 2,023 | 3 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 1488416ff0b3caec77e252756256a009f696c1cc | [
"Many licenses impose specific requirements on code usage, such as the obligation to publish derived works under GPL licenses."
] | [] | false |
66d8a00fe55582c86495715da256708fc70360e6 | Dataset: Copy-based Reuse in Open Source Software | 2,023 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 6e2d0265a6f362d97d2d437ea0f0633b1080ca9e | [
"This propagation of code has also been found in the general open source ecosystem [73]–[75], and led our participants to pick and choose API designs based on which projects were generally considered successful and which they personally liked."
] | [] | false |
66d8a00fe55582c86495715da256708fc70360e6 | Dataset: Copy-based Reuse in Open Source Software | 2,023 | 2 | [
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | [
"As detailed in Section III-B, we analyzed blobs within the dataset that were reused across multiple OSS projects, as identified through WoC [20].",
"WoC addresses this by offering a map [20] that, for blobs found in multiple projects, sorts them by the commit time of each blob’s creation, allowing us to identify... | [] | false |
839db1a6529346759bb03446a231b60bcc5ea10e | Modeling the Centrality of Developer Output with Software Supply Chains | 2,023 | 2 | [
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2268781295",
"name": "Rui Abreu"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2268796822",
"name": "Yifen Chen"
... | 9cd90be1bb3ebe6f7390ddbc391cc26355fe9f2f | [] | [] | false |
839db1a6529346759bb03446a231b60bcc5ea10e | Modeling the Centrality of Developer Output with Software Supply Chains | 2,023 | 2 | [
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2268781295",
"name": "Rui Abreu"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2268796822",
"name": "Yifen Chen"
... | 8aaa57c19c00728d386c4419be6024e1a8b2f9a4 | [
"Previous work found that engineers perceive several distinct dimensions of code centrality [33] and several measures of code centrality were shown to be important predictors of engineer productivity [31].",
"One novel indicator we also employ is the software supply chain (SSC) centrality [31] as it appears to be... | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 4870c492760b2827c6cef1998ee511c008202f87 | [
"Demand-side management (DSM) programs [2]—such as incentivizing energy-efficient practices [3] or optimizing HVAC system operations [4]—have been introduced to encourage reductions in building energy use."
] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 735c057575708ed1211de448b80d6f5f3dd42e5d | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | bb7e51b088b12dc63b839257b7d4c998ed1df5a3 | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | a4cd1e2cce7ccd3da15b7773f3ea7370af919d0a | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | f29c5536f2b6c1bf25c806537f41ce8907fa48e7 | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 053a595081b4bc87190eb05aa11a49338a02a198 | [
"In this regard, agent-based modelling provides insights into the complex behavioural dynamics of young people and may provide opportunities for researchers when developing interventions, therefore it should be considered when designing interventions to ensure lasting impact."
] | [
"background"
] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 82c092f549452973158a571b6bfe0e0e8171228e | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 31088870d990e1bcd210c7e9de1d2398ca62f37d | [] | [] | false |
8816b8772f44e16ac50c572bce171bdf84580fac | Analysis of social–Psychological factors and financial incentives in demand response and residential energy behavior | 2,023 | 9 | [
{
"authorId": "46729496",
"name": "Chien-fei Chen"
},
{
"authorId": "48670518",
"name": "Xiaojing Xu"
},
{
"authorId": "1484046010",
"name": "Zhuolin Cao"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "50550965",
"name": "Qingxin Shi"
}
] | 97f4d4bc6c94e757fb37687914711d964d716811 | [] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 58f13c9f343fd37634a0ea28ae15ec9f83765b28 | [
"Most developer questions focus on data preparation and model setup necessary to correctly create a ML pipeline [30], with particular challenges around API misuse, hyperparameter selection, GPU computation, and limited support for debugging and profiling [81]."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 77c23353acff77bfa7f8f4d82078a978e183d42b | [
"Among the frameworks, PyTorch and TensorFlow are the two representative ones that are developed and maintained by open source software (OSS) communities [37].",
"…shifts in software engineering practices [5, 96], testing methodology tailed for these systems [17, 73], misuse and updates of libraries [30, 94], ref... | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 869a39ab556cf5552c0a82d2cb772380aff9881d | [
"This process of identifying important keywords in text aligns with the latent Dirichlet allocation (LDA) topic modeling approach [47], which has been used in the [48, 49]."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | a54726c0d628473c897d1afefaebb6a074ebd21f | [
"As technology advances, the architecture and characteristics of cloud computing will continue to evolve, further promoting digital transformation and intelligent applications [ 8 ] ."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 6d39ba8b6b58c98afa6deb3078c237bfbd83a213 | [
"WoC provides several key-value databases that enable efficient querying of relationships between different entities [78], [79]."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 6c8327a53fb85a491504694e93431f95197df7ce | [
"Besides, the several-month update [Gao et al. 2023] delay of WoC means that the Source Code-based Retriever can only be run periodically to retrieve repository information for releases uploaded to PyPI during the update interval."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | b2cc2a6b4455bf2ad499b227cc721fce7a46b889 | [
"Since there were no pre-defined categories, the first and second co-authors of this paper performed the categorization task using an open card sorting approach in two phases [18].",
"Therefore, similar to previous work [18, 42, 51], we use the SnowballStemmer module of NLTK to reduce each English word to its roo... | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | fbb8150895315bc45fedc9b6f5d2214d0b4e8391 | [
"A surge of recent work has focused on SE for DL [21] based on the data collected from GitHub, Stack Overflow, interviews, and surveys."
] | [
"methodology"
] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 59f2f761f2c96bd7466aef45dbbfc376e2196411 | [
"TensorFlow and PyTorch are the two most widely adopted DL frameworks [37] and PyPI is the official third-party package registry [9] for Python, the mainstream programming language in the DL field [28] and the main language for which TensorFlow and PyTorch provide APIs [15, 20].",
"Due to the prevalence of reusin... | [
"background",
"methodology"
] | true |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 0aff904e8f7cd0ee8ececa89e3900db50994c4ef | [
"These models have to be evaluated to determine if they are effective by utilizing one of the evaluation methods [5, 6]."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | d6190f4a6cdcc4ba7d12ade28e52e7073e957374 | [
"Thus, following previous work [55], [56], [57], we target users involved in AutoML-related SO questions, which can reflect the amount of AutoML users."
] | [
"background"
] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | b2de43bf9b9cb2958271b6d0cfba22ff8cb765bc | [
"To make manual effort affordable, we further randomly select 274 projects from these projects based on a 95% confidence level and a 5% confidence interval, followed by previous work [26], [27], [28], [29]."
] | [
"methodology"
] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | dcff2ba37fd2c005bce33295938555f0ba86ea45 | [
"To evaluate the efectiveness of our heuristics, we randomly sample 400 comment changes from all 24M+ collected comment changes, ensuring a conidence level of 95% and a conidence interval of 5%, following prior work [43, 51, 84, 105, 117]."
] | [
"methodology"
] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | bc6681e58c29a5a764e4a1bf850ca3088d9894f8 | [
"quantify the structure of the supply chain, can we locate and predict the risky in the chain? Our preliminary investigation presents interesting findings [10, 11]."
] | [] | false |
a0c5efa6053e201631de4f4cf7a9c91fff2f2baf | On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types | 2,023 | 15 | [
{
"authorId": "2054043055",
"name": "Kai Gao"
},
{
"authorId": "2156975970",
"name": "Zhixing Wang"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "40318014",
"name": "Minghui Zhou"
}
] | 04c1a1112a427f7aa03ef2def3b7340f93c434e1 | [
"Currently, LDA has been widely used in various studies, including mining and extracting topics from Stack Overflow posts [51, 63], identifying topics from the README files of GitHub projects [20], and discovering topics from issue texts of GitHub projects [24, 29]."
] | [
"methodology"
] | false |
ded2b5d9ae135cc1144c12314ad766e00bca3633 | Improving Code Reviewer Recommendation: Accuracy, Latency, Workload, and Bystanders | 2,023 | 1 | [
{
"authorId": "2265391422",
"name": "Peter C. Rigby"
},
{
"authorId": "2276608581",
"name": "Seth Rogers"
},
{
"authorId": "2276607837",
"name": "Sadruddin Saleem"
},
{
"authorId": "2268781105",
"name": "Parth Suresh"
},
{
"authorId": "2276608194",
"name": "Da... | b474a312403e6c9d8b5312b4868489535427f4e7 | [
"Aside from WhoDo at Microsoft [28], two works have used workload balancing in industry: Ericsson [61] and Meta [62].",
"We have begun to implement and A/B test variants of SofiaWL with an industrial partner [62]."
] | [
"methodology"
] | false |
538d154416024742f0835d1b3045052935f7aa14 | How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools | 2,022 | 4 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | e1d322738bbd62530a679cc3cbc95dd0c0a3a70c | [
"The methodology was based on the studies of [Lima et al. 2018, Tutko et al. 2022]."
] | [] | false |
538d154416024742f0835d1b3045052935f7aa14 | How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools | 2,022 | 4 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 68ac101e1df52d9b0ef41f8a674919f90901fa4f | [
"Although GitHub is widely adopted by the repository mining research community (Kalliamvakou et al, 2016) and is a comprehensive source of open source repositories, other platforms such as GitLab (Tutko et al, 2022) and Bitbucket (Kalliamvakou et al, 2016) could host additional CE projects that may yield different ... | [] | false |
538d154416024742f0835d1b3045052935f7aa14 | How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools | 2,022 | 4 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 6260b02f8d9d60b43b015b33087ee405e6690909 | [
"Together popularity and a programming language are also the most popular choices for sampling packages [59]."
] | [
"background"
] | false |
538d154416024742f0835d1b3045052935f7aa14 | How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools | 2,022 | 4 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 8928f580221918a7ed47fd2ba5460a1dbd5b8e9f | [
"GitHub is the platform with the most repositories and users [21], and numerous tools are available to help practitioners mine GitHub data [9, 12], which makes it the main data source for 67% of MSR papers [23].",
"[21] presents a systematic literature review about how software repositories are mined in MSR-based... | [
"background",
"methodology"
] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 77ec8d332cdbb245e3ac1a9592a496a601f2c0aa | [
"Consequently, program analysis methodologies [9], [10], [11], [12], [13], [14], [15] may be invalid for addressing this bug at the code level."
] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | b3bdc8736c86c1fd51aa112b96006b1a2a40f5c4 | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | f3f88a4e887433ba4a1b4f3af8c7959f588e2fd7 | [
"This shows that by taking information from version control systems, it is feasible to identify vulnerable, buggy, or license-violating code and replace it with fixed versions [7, 8].",
"As was shown in [7, 8], rampant code copying enabled and encouraged by OSS results in massive orphan vulnerabilities and licens... | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 926b4d4e6e2cb75d9f56c5c1901a5e4f0f86cbdf | [
"The code-clone-detection-based (clone-based) approaches are commonly used to detect similar vulnerabilities [4], [10]– [13].",
"For example, more than 60,000 open-source software projects are exposed to the vulnerability CVE-2017-12652 [2] for the reuse of unsafe code snippets in the popular graphic library Libp... | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | aa442456db6d6089e0c1e07f35446e7b07012dd7 | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | d739b611185f134de83d152710367c02d79a5412 | [
"Beyond Dependencies: The Role of Copy-Based Reuse in OSS Development",
"In the context of copy-based reuse, extensive code copying can lead to the widespread dissemination of potentially vulnerable code.",
"For example, security vulnerabilities may continue to spread even after the main project has fixed the i... | [] | true |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 43fe264961baa1bc789a80cc2838ebabf4d5778c | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 6c8327a53fb85a491504694e93431f95197df7ce | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | ad903fa8960422be312466185cc7a26360613b2e | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 66d8a00fe55582c86495715da256708fc70360e6 | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 61c783fdc0eaa52ed884211c71c7cbef33dd3a6c | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 17212368a171bb7f7600d8a05155e0414525acbc | [
"Reid et al. [13] coined the term “Orphan Vulnerability” to refer to these kinds vulnerabilities that exist in copied code even after they are fixed in another project.",
"Previous research [13] [14] [24] has identified this as a real problem in popular real-world projects."
] | [
"background"
] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 013ef3d70f65a9765b55afab8f45dcf811b98af9 | [
"In this way, we do not need to handle the black-box reuse following prior works [47, 48].",
"ac), and licenses, since such meta information can potentially include the hints to infer the dependency in C/C++ projects [13, 16, 45, 48]."
] | [
"background"
] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | a990fefe7fe9a06c941d63800e9fe9454821d969 | [] | [] | false |
db5c5f69cbf840a1b70087a17ea1f2d89c481a38 | The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software | 2,022 | 15 | [
{
"authorId": "2058644472",
"name": "David Reid"
},
{
"authorId": "2057485166",
"name": "Mahmoud Jahanshahi"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 1010c0e8b07b4cad55b4c24b36bc724b5132287d | [
"DROWN attack: the first exploits previously undiscovered flaws in SSLv2 to create an enhanced version of the Bleichenbacher RSA padding-oracle attack [6], and the second capitalizes on recently identified vulnerabilities in OpenSSL [7], [8]."
] | [
"background"
] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | d3cf5190e5b2bfe024d873fb04a115aaefe50593 | [] | [] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | 63b8c4900990fdc7a28c06a9fdf066b727833a98 | [] | [] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | 8c39c73fcefe669a85832e092d672282958ed092 | [
"Quantitative data collection approaches, such as surveys and archival analysis of communication and collaboration traces (code repositories, document histories, and chats) [19, 21, 33], also do not allow for on-the-fly analysis and only provide narrow insight into what happens between team members."
] | [] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | 489f4616fdf4178115ab7a4f5f3dde29add7282c | [
"Prior work has also shown that event design is not only important for participant satisfaction but can also influence hackathon outcomes, particularly in the long term [9, 13]."
] | [] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | c6d2b3f531da91c0ec124db549ae57691d0671c1 | [] | [] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | 56e7aa4ca25abdc55de6daf98819a3327f14c1f3 | [
"…discussed as a valuable concept for studying the relationship between hackathon format and outcome [17]; one example in this context is the work presented in [14] Some studies utilize quantitative methods—for example, those that have investigated the usage of software repositories [60], [61], [83].",
"The findi... | [
"methodology",
"background"
] | false |
dc8a53a9117bb7a97519ad9ccbb657236da96e79 | One-off events? An empirical study of hackathon code creation and reuse | 2,022 | 7 | [
{
"authorId": "2174738095",
"name": "Ahmed Samir Imam Mahmoud"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbs... | 0a51bb06ca312cb8f6cd8ff15a788cd426981b63 | [] | [] | false |
2d6202ad3424f1595b3a262b539fa1d9c42a1d02 | Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software | 2,021 | 2 | [
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | c723b9dbbbd8f4747e04b8e1051083bd44f06949 | [
"The artifact associated with paper is made available at [13] under the CC-BY-4."
] | [
"background"
] | false |
2d6202ad3424f1595b3a262b539fa1d9c42a1d02 | Replication Package for ICSE'21 paper - Representation of Developer Expertise in Open Source Software | 2,021 | 2 | [
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | d558e0171d1cb60071ec5d55c222823005141067 | [] | [] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | d3cf5190e5b2bfe024d873fb04a115aaefe50593 | [] | [] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 63b8c4900990fdc7a28c06a9fdf066b727833a98 | [] | [] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 924b9b57a084326614f365e1f7e2671fb176bd5d | [
"…foster learning, drive community engagement, increase networking and relationship-building, and are effective for addressing civic, environmental, and public health issues, leading to increased adoption across various fields from higher education to healthcare to business services [8] [24]."
] | [
"background"
] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | c3d42dc2cb772e03b7ccb82b6fa024b2543d9ac6 | [
"Empirical studies almost exclusively study participants’ experiences and what participants do in hackathons, with the exceptions of an empirical study on hackathon project code [50, 77].",
"Some methods like network analysis for literature reviews [99] and archival analysis for coding projects [50] are more rece... | [
"methodology",
"background"
] | true |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 56e7aa4ca25abdc55de6daf98819a3327f14c1f3 | [] | [] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 0ba52e2c83be4d7c9a91d5cdd615b078f85f488c | [
", 2019) and foster continuation activity after an event has ended (Nolte et al., 2020a; Imam et al., 2021), as well as how participants approach a project (Olesen et al."
] | [
"background"
] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | dc8a53a9117bb7a97519ad9ccbb657236da96e79 | [
", when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a “template code” blob or not, is available at [42].",
"…attributes of the blobs we identified, viz., when the blob was first created and by whom, whether the blob was reu... | [
"background"
] | true |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 0bb74248ad8464a5027c777abaf18506f19a9864 | [
"used, developed and reused [35], running events for diverse audiences [18, 32, 55] and identifying means to foster specific hackathon outcomes [39, 49, 58, 69]."
] | [
"methodology"
] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 909551e58e558ab648f95944d6f3b746aacddead | [] | [] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 56f1ce9f5d440fc7fcdca4517422aa31a4e226bf | [
"Complete results of an extension of this hackathon project is available at [5], and the replication package for our study is available at [6]."
] | [
"background"
] | false |
c5a850f50a95a56cf7000425c8bb59e87f80d6ee | The Secret Life of Hackathon Code Where does it come from and where does it go? | 2,021 | 11 | [
{
"authorId": "1643783463",
"name": "Ahmed Imam"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "1727000",
"name": "Alexander Nolte"
},
{
"authorId": "1702551",
"name": "A. Mockus"
},
{
"authorId": "1705550",
"name": "J. Herbsleb"
}
] | 0a51bb06ca312cb8f6cd8ff15a788cd426981b63 | [
"For participants to develop technology that could be reused by themselves or others after an event has ended, organizers should encourage participants to form larger teams, add documentation and – if feasible – data to the code they develop [39], and add an open-source license [45]."
] | [] | false |
c723b9dbbbd8f4747e04b8e1051083bd44f06949 | Replication Package for Representation of Developer Expertise in Open Source Software | 2,021 | 1 | [
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "98524776",
"name": "Andrey Karnauch"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 8963e7aec92235d3c02df463f40341a35f64ff4f | [
"[14] who analyzed developer familiarity specific to using third-party libraries in source code."
] | [
"background"
] | false |
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1 | More Effective Software Repository Mining | 2,020 | 2 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 85d150958a873668a3b9f17f924ee55b84ede79b | [
"In fact, in more than half of the cases of such analysis obtained from leading conferences, the projects were selected based on some measure of popularity."
] | [
"background"
] | false |
0f5ec9fd111c5ca54d27ae316944024a3b0bcea1 | More Effective Software Repository Mining | 2,020 | 2 | [
{
"authorId": "1866565388",
"name": "Adam Tutko"
},
{
"authorId": "34968683",
"name": "Austin Z. Henley"
},
{
"authorId": "1702551",
"name": "A. Mockus"
}
] | 1e6f74cf862f69907009c198a98d596c837be920 | [
"Past work [14, 43] has attempted to disambiguate authors based on a combination of their commit names and commit email addresses, but we considered this out of scope for our work."
] | [
"background"
] | false |
12404a5147b39e9a34849606bf2c056f84903c8d | World of code: enabling a research workflow for mining and analyzing the universe of open source VCS data | 2,020 | 54 | [
{
"authorId": "7777374",
"name": "Yuxing Ma"
},
{
"authorId": "8041820",
"name": "Tapajit Dey"
},
{
"authorId": "2065313146",
"name": "Chris Bogart"
},
{
"authorId": "3110752",
"name": "Sadika Amreen"
},
{
"authorId": "2091537692",
"name": "Marat Valiev"
},
... | 352fb60a0440f56474c384eeb51955bf1894fd4f | [
"Previous works in this line [8, 12, 29, 38] have used the code as the context on several datasets [4, 8, 22, 23]."
] | [] | false |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 12