Weiyi Shang
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j21]Patanamon Thongtanunam
, Weiyi Shang, Ahmed E. Hassan:
Will this clone be short-lived? Towards a better understanding of the characteristics of short-lived clones. Empirical Software Engineering 24(2): 937-972 (2019) - [j20]Catia Trubiani
, Pooyan Jamshidi, Jürgen Cito, Weiyi Shang, Zhen Ming Jiang, Markus Borg:
Performance Issues? Hey DevOps, Mind the Uncertainty. IEEE Software 36(2): 110-117 (2019) - [c33]Zhenhao Li, Tse-Hsun (Peter) Chen, Jinqiu Yang, Weiyi Shang:
Dlfinder: characterizing and detecting duplicate logging code smells. ICSE 2019: 152-163 - [c32]Armin Najafi, Weiyi Shang, Peter C. Rigby:
Improving test effectiveness using test executions history: an industrial experience report. ICSE (SEIP) 2019: 213-222 - [c31]Armin Najafi, Peter C. Rigby, Weiyi Shang:
Bisecting commits and modeling commit risk during testing. ESEC/SIGSOFT FSE 2019: 279-289 - [c30]Cor-Paul Bezemer, Simon Eismann, Vincenzo Ferme, Johannes Grohmann, Robert Heinrich, Pooyan Jamshidi, Weiyi Shang, André van Hoorn, Mónica Villavicencio, Jürgen Walter, Felix Willnecker:
How is Performance Addressed in DevOps? ICPE 2019: 45-50 - [e1]Marcus Ciolkowski, Dusica Marijan, Matthias Galster, Weiyi Shang, Andreas Jedlitschka, Rakesh Shukla, Kanchana Padmanabhan:
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, CESSER-IP@ICSE 2019, Montreal, QC, Canada, May 27, 2019. IEEE / ACM 2019, ISBN 978-1-7281-2264-9 [contents] - 2018
- [j19]Suhas Kabinna
, Cor-Paul Bezemer, Weiyi Shang, Mark D. Syer, Ahmed E. Hassan:
Examining the stability of logging statements. Empirical Software Engineering 23(1): 290-333 (2018) - [j18]Muhammad Moiz Arif, Weiyi Shang, Emad Shihab:
Empirical study on the discrepancy between performance testing results from virtual and physical environments. Empirical Software Engineering 23(3): 1490-1518 (2018) - [j17]Heng Li, Tse-Hsun (Peter) Chen
, Weiyi Shang, Ahmed E. Hassan:
Studying software logging using topic models. Empirical Software Engineering 23(5): 2655-2694 (2018) - [j16]Mehran Hassani
, Weiyi Shang, Emad Shihab, Nikolaos Tsantalis:
Studying and detecting log-related issues. Empirical Software Engineering 23(6): 3248-3280 (2018) - [j15]Suhaib Mujahid
, Giancarlo Sierra, Rabe Abdalkareem, Emad Shihab, Weiyi Shang:
An empirical study of Android Wear user complaints. Empirical Software Engineering 23(6): 3476-3502 (2018) - [c29]Muhammad Moiz Arif, Weiyi Shang, Emad Shihab:
Empirical study on the discrepancy between performance testing results from virtual and physical environments. ICSE 2018: 822 - [c28]Maxime Lamothe, Weiyi Shang:
Exploring the use of automated API migrating techniques in practice: an experience report on Android. MSR 2018: 503-514 - [c27]Guilherme B. de Pádua, Weiyi Shang:
Studying the relationship between exception handling practices and post-release defects. MSR 2018: 564-575 - [c26]Heng Li, Weiyi Shang, Ying Zou, Ahmed E. Hassan:
Towards just-in-time suggestions for log changes (journal-first abstract). SANER 2018: 467 - [c25]Heng Li, Weiyi Shang, Ahmed E. Hassan:
Which log level should developers choose for a new logging statement? (journal-first abstract). SANER 2018: 468 - [c24]Kundi Yao, Guilherme B. de Pádua, Weiyi Shang, Steve Sporea, Andrei Toma, Sarah Sajedi:
Log4Perf: Suggesting Logging Locations for Web-based Systems' Performance Monitoring. ICPE 2018: 127-138 - [i4]Cor-Paul Bezemer, Simon Eismann, Vincenzo Ferme, Johannes Grohmann, Robert Heinrich, Pooyan Jamshidi, Weiyi Shang, André van Hoorn, Ménica Villavicencio, Jürgen Walter, Felix Willnecker:
How is Performance Addressed in DevOps? A Survey on Industrial Practices. CoRR abs/1808.06915 (2018) - [i3]Maxime Lamothe, Weiyi Shang, Tse-Hsun Chen:
A4: Automatically Assisting Android API Migrations Using Code Examples. CoRR abs/1812.04894 (2018) - 2017
- [j14]Mark D. Syer, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan:
Continuous validation of performance test workloads. Autom. Softw. Eng. 24(1): 189-231 (2017) - [j13]Stuart McIlroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan:
User reviews of top mobile apps in Apple and Google app stores. Commun. ACM 60(11): 62-67 (2017) - [j12]Safwat Hassan, Weiyi Shang, Ahmed E. Hassan:
An empirical study of emergency updates for top android mobile apps. Empirical Software Engineering 22(1): 505-546 (2017) - [j11]Heng Li, Weiyi Shang, Ahmed E. Hassan:
Which log level should developers choose for a new logging statement? Empirical Software Engineering 22(4): 1684-1716 (2017) - [j10]Heng Li, Weiyi Shang, Ying Zou, Ahmed E. Hassan:
Towards just-in-time suggestions for log changes. Empirical Software Engineering 22(4): 1831-1865 (2017) - [j9]Tse-Hsun Chen
, Weiyi Shang, Meiyappan Nagappan, Ahmed E. Hassan, Stephen W. Thomas:
Topic-based software defect explanation. Journal of Systems and Software 129: 79-106 (2017) - [j8]Stuart McIlroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan:
Is It Worth Responding to Reviews? Studying the Top Free Apps in Google Play. IEEE Software 34(3): 64-71 (2017) - [j7]Daniel Alencar da Costa, Shane McIntosh, Weiyi Shang, Uirá Kulesza, Roberta Coelho, Ahmed E. Hassan:
A Framework for Evaluating the Results of the SZZ Approach for Identifying Bug-Introducing Changes. IEEE Trans. Software Eng. 43(7): 641-657 (2017) - [c23]Suhaib Mujahid
, Giancarlo Sierra, Rabe Abdalkareem, Emad Shihab, Weiyi Shang:
Examining User Complaints of Wearable Apps: A Case Study on Android Wear. MOBILESoft@ICSE 2017: 96-99 - [c22]Tse-Hsun Chen
, Mark D. Syer, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Analytics-Driven Load Testing: An Industrial Experience Report on Load Testing of Large-Scale Systems. ICSE-SEIP 2017: 243-252 - [c21]Jinfu Chen, Weiyi Shang:
An Exploratory Study of Performance Regression Introducing Code Changes. ICSME 2017: 341-352 - [c20]Guilherme Bicalho de Pádua, Weiyi Shang:
Studying the prevalence of exception handling anti-patterns. ICPC 2017: 328-331 - [c19]Guilherme B. de Pádua, Weiyi Shang:
Revisiting Exception Handling Practices with Exception Flow Analysis. SCAM 2017: 11-20 - [i2]Guilherme B. de Pádua, Weiyi Shang:
Studying the Prevalence of Exception Handling Anti-Patterns. CoRR abs/1704.00778 (2017) - [i1]Guilherme B. de Pádua, Weiyi Shang:
Revisiting Exception Handling Practices with Exception Flow Analysis. CoRR abs/1708.00817 (2017) - 2016
- [j6]Mohamed Sami Rakha, Weiyi Shang, Ahmed E. Hassan:
Studying the needed effort for identifying duplicate issues. Empirical Software Engineering 21(5): 1960-1989 (2016) - [j5]Tse-Hsun Chen
, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Finding and Evaluating the Performance Impact of Redundant Data Access for Applications that are Developed Using Object-Relational Mapping Frameworks. IEEE Trans. Software Eng. 42(12): 1148-1161 (2016) - [c18]Tse-Hsun Chen
, Weiyi Shang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Detecting problems in the database access code of large scale systems: an industrial experience report. ICSE (Companion Volume) 2016: 71-80 - [c17]Hammam M. Alghmadi, Mark D. Syer, Weiyi Shang, Ahmed E. Hassan:
An Automated Approach for Recommending When to Stop Performance Tests. ICSME 2016: 279-289 - [c16]Tarek M. Ahmed, Cor-Paul Bezemer, Tse-Hsun Chen
, Ahmed E. Hassan, Weiyi Shang:
Studying the effectiveness of application performance management (APM) tools for detecting performance regressions for web applications: an experience report. MSR 2016: 1-12 - [c15]Suhas Kabinna, Cor-Paul Bezemer, Weiyi Shang, Ahmed E. Hassan:
Logging library migrations: a case study for the apache software foundation projects. MSR 2016: 154-164 - [c14]Tse-Hsun Chen
, Weiyi Shang, Jinqiu Yang, Ahmed E. Hassan, Michael W. Godfrey, Mohamed N. Nasser, Parminder Flora:
An empirical study on the practice of maintaining object-relational mapping code in Java systems. MSR 2016: 165-176 - [c13]Tse-Hsun Chen
, Weiyi Shang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
CacheOptimizer: helping developers configure caching frameworks for hibernate-based database-centric web applications. SIGSOFT FSE 2016: 666-677 - [c12]Suhas Kabinna, Weiyi Shang, Cor-Paul Bezemer, Ahmed E. Hassan:
Examining the Stability of Logging Statements. SANER 2016: 326-337 - [c11]Ravjot Singh, Cor-Paul Bezemer, Weiyi Shang, Ahmed E. Hassan:
Optimizing the Performance-Related Configurations of Object-Relational Mapping Frameworks Using a Multi-Objective Genetic Algorithm. ICPE 2016: 309-320 - 2015
- [j4]Weiyi Shang, Meiyappan Nagappan, Ahmed E. Hassan:
Studying the relationship between logging characteristics and the code quality of platform software. Empirical Software Engineering 20(1): 1-27 (2015) - [c10]Tarek M. Ahmed, Weiyi Shang, Ahmed E. Hassan:
An Empirical Study of the Copy and Paste Behavior during Development. MSR 2015: 99-110 - 2014
- [j3]Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed N. Nasser, Parminder Flora:
An exploratory study of the evolution of communicated information about the execution of large software systems. Journal of Software: Evolution and Process 26(1): 3-26 (2014) - [c9]Tse-Hsun Chen
, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Detecting performance anti-patterns for applications developed using object-relational mapping. ICSE 2014: 1001-1012 - [c8]Weiyi Shang, Meiyappan Nagappan, Ahmed E. Hassan, Zhen Ming Jiang:
Understanding Log Lines Using Development Knowledge. ICSME 2014: 21-30 - 2013
- [c7]Weiyi Shang, Zhen Ming Jiang, Hadi Hemmati, Bram Adams, Ahmed E. Hassan, Patrick Martin:
Assisting developers of big data analytics applications when deploying on hadoop clouds. ICSE 2013: 402-411 - 2012
- [j2]Weiyi Shang, Bram Adams, Ahmed E. Hassan:
Using Pig as a data preparation language for large-scale mining software repositories studies: An experience report. Journal of Systems and Software 85(10): 2195-2204 (2012) - [j1]Nicolas Bettenburg, Weiyi Shang, Walid M. Ibrahim, Bram Adams, Ying Zou, Ahmed E. Hassan:
An empirical study on inconsistent changes to code clones at the release level. Sci. Comput. Program. 77(6): 760-776 (2012) - [c6]Weiyi Shang:
Bridging the divide between software developers and operators using logs. ICSE 2012: 1583-1586 - 2011
- [c5]Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed N. Nasser, Parminder Flora:
An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems. WCRE 2011: 335-344 - 2010
- [c4]Weiyi Shang, Bram Adams, Ahmed E. Hassan:
An experience report on scaling tools for mining software repositories using MapReduce. ASE 2010: 275-284 - [c3]Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, Bram Adams, Ahmed E. Hassan, Ying Zou:
Studying the Impact of Clones on Software Defects. WCRE 2010: 13-21
2000 – 2009
- 2009
- [c2]Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan:
MapReduce as a general framework to support research in Mining Software Repositories (MSR). MSR 2009: 21-30 - [c1]Nicolas Bettenburg, Weiyi Shang, Walid M. Ibrahim, Bram Adams, Ying Zou, Ahmed E. Hassan:
An Empirical Study on Inconsistent Changes to Code Clones at Release Level. WCRE 2009: 85-94
Coauthor Index
aka: Tse-Hsun Chen

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-17 23:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint