callback( { "result":{ "query":":facetid:toc:\"db/conf/msr/msr2021.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"214.16" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"77", "@dc":"77", "@oc":"77", "@id":"43312212", "text":":facetid:toc:db/conf/msr/msr2021.bht" } }, "hits":{ "@total":"77", "@computed":"77", "@sent":"77", "@first":"0", "hit":[{ "@score":"1", "@id":"1359226", "info":{"authors":{"author":[{"@pid":"118/5367-1","text":"Sebastian Nielebock 0001"},{"@pid":"271/3808","text":"Paul Blockhaus"},{"@pid":"186/2756","text":"Jacob Krüger"},{"@pid":"64/1579","text":"Frank Ortmeier"}]},"title":"AndroidCompass: A Dataset of Android Compatibility Checks in Code Repositories.","venue":"MSR","pages":"535-539","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/0001BKO21","doi":"10.1109/MSR52588.2021.00069","ee":"https://doi.org/10.1109/MSR52588.2021.00069","url":"https://dblp.org/rec/conf/msr/0001BKO21"}, "url":"URL#1359226" }, { "@score":"1", "@id":"1359227", "info":{"authors":{"author":[{"@pid":"218/7779","text":"Md. Abdullah Al Alamin"},{"@pid":"288/1044","text":"Sanjay Malakar"},{"@pid":"49/4012","text":"Gias Uddin 0001"},{"@pid":"29/7562","text":"Sadia Afroz"},{"@pid":"288/0920","text":"Tameem Bin Haider"},{"@pid":"98/7632","text":"Anindya Iqbal"}]},"title":"An Empirical Study of Developer Discussions on Low-Code Software Development Challenges.","venue":"MSR","pages":"46-57","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/AlaminM0AHI21","doi":"10.1109/MSR52588.2021.00018","ee":"https://doi.org/10.1109/MSR52588.2021.00018","url":"https://dblp.org/rec/conf/msr/AlaminM0AHI21"}, "url":"URL#1359227" }, { "@score":"1", "@id":"1359228", "info":{"authors":{"author":[{"@pid":"119/5096","text":"Michel Albonico"},{"@pid":"35/1083","text":"Ivano Malavolta"},{"@pid":"36/11116-1","text":"Gustavo Pinto 0001"},{"@pid":"77/10481","text":"Emitza Guzman"},{"@pid":"276/9835","text":"Katerina Chinnappan"},{"@pid":"40/5357","text":"Patricia Lago"}]},"title":"Mining Energy-Related Practices in Robotics Software.","venue":"MSR","pages":"483-494","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/AlbonicoM0GCL21","doi":"10.1109/MSR52588.2021.00060","ee":"https://doi.org/10.1109/MSR52588.2021.00060","url":"https://dblp.org/rec/conf/msr/AlbonicoM0GCL21"}, "url":"URL#1359228" }, { "@score":"1", "@id":"1359229", "info":{"authors":{"author":[{"@pid":"272/9685","text":"Mahmoud Alfadel"},{"@pid":"01/11078-1","text":"Diego Elias Costa"},{"@pid":"05/5996","text":"Emad Shihab"},{"@pid":"296/1105","text":"Mouafak Mkhallalati"}]},"title":"On the Use of Dependabot Security Pull Requests.","venue":"MSR","pages":"254-265","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/AlfadelCSM21","doi":"10.1109/MSR52588.2021.00037","ee":"https://doi.org/10.1109/MSR52588.2021.00037","url":"https://dblp.org/rec/conf/msr/AlfadelCSM21"}, "url":"URL#1359229" }, { "@score":"1", "@id":"1359230", "info":{"authors":{"author":[{"@pid":"193/5204","text":"Mahfouth Alghamdi"},{"@pid":"73/5681","text":"Shinpei Hayashi"},{"@pid":"k/TakashiKobayashi","text":"Takashi Kobayashi 0001"},{"@pid":"29/1074","text":"Christoph Treude"}]},"title":"Characterising the Knowledge about Primitive Variables in Java Code Comments.","venue":"MSR","pages":"460-470","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/AlghamdiHKT21","doi":"10.1109/MSR52588.2021.00058","ee":"https://doi.org/10.1109/MSR52588.2021.00058","url":"https://dblp.org/rec/conf/msr/AlghamdiHKT21"}, "url":"URL#1359230" }, { "@score":"1", "@id":"1359231", "info":{"authors":{"author":[{"@pid":"192/2005","text":"Sahar Badihi"},{"@pid":"59/871-8","text":"Yi Li 0008"},{"@pid":"26/4417","text":"Julia Rubin"}]},"title":"EqBench: A Dataset of Equivalent and Non-equivalent Program Pairs.","venue":"MSR","pages":"610-614","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Badihi0R21","doi":"10.1109/MSR52588.2021.00084","ee":"https://doi.org/10.1109/MSR52588.2021.00084","url":"https://dblp.org/rec/conf/msr/Badihi0R21"}, "url":"URL#1359231" }, { "@score":"1", "@id":"1359232", "info":{"authors":{"author":[{"@pid":"207/7152","text":"Jeanderson Cândido"},{"@pid":"286/8217","text":"Jan Haesen"},{"@pid":"61/9679","text":"Maurício Aniche"},{"@pid":"d/ArievanDeursen","text":"Arie van Deursen"}]},"title":"An Exploratory Study of Log Placement Recommendation in an Enterprise System.","venue":"MSR","pages":"143-154","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/CandidoHAD21","doi":"10.1109/MSR52588.2021.00027","ee":"https://doi.org/10.1109/MSR52588.2021.00027","url":"https://dblp.org/rec/conf/msr/CandidoHAD21"}, "url":"URL#1359232" }, { "@score":"1", "@id":"1359233", "info":{"authors":{"author":[{"@pid":"296/1274","text":"Alexandra-Maria Chaniotaki"},{"@pid":"75/8719-1","text":"Tushar Sharma 0001"}]},"title":"Architecture Smells and Pareto Principle: A Preliminary Empirical Exploration.","venue":"MSR","pages":"190-194","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ChaniotakiS21","doi":"10.1109/MSR52588.2021.00031","ee":"https://doi.org/10.1109/MSR52588.2021.00031","url":"https://dblp.org/rec/conf/msr/ChaniotakiS21"}, "url":"URL#1359233" }, { "@score":"1", "@id":"1359234", "info":{"authors":{"author":[{"@pid":"288/0264","text":"Matteo Ciniselli"},{"@pid":"210/7846","text":"Nathan Cooper"},{"@pid":"202/1470","text":"Luca Pascarella"},{"@pid":"02/320","text":"Denys Poshyvanyk"},{"@pid":"d/MassimilianoDiPenta","text":"Massimiliano Di Penta"},{"@pid":"09/8523","text":"Gabriele Bavota"}]},"title":"An Empirical Study on the Usage of BERT Models for Code Completion.","venue":"MSR","pages":"108-119","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/CiniselliCPPPB21","doi":"10.1109/MSR52588.2021.00024","ee":"https://doi.org/10.1109/MSR52588.2021.00024","url":"https://dblp.org/rec/conf/msr/CiniselliCPPPB21"}, "url":"URL#1359234" }, { "@score":"1", "@id":"1359235", "info":{"authors":{"author":[{"@pid":"150/3264","text":"Zadia Codabux"},{"@pid":"171/6647","text":"Melina C. Vidoni"},{"@pid":"119/0200","text":"Fatemeh H. Fard"}]},"title":"Technical Debt in the Peer-Review Documentation of R Packages: a rOpenSci Case Study.","venue":"MSR","pages":"195-206","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/CodabuxVF21","doi":"10.1109/MSR52588.2021.00032","ee":"https://doi.org/10.1109/MSR52588.2021.00032","url":"https://dblp.org/rec/conf/msr/CodabuxVF21"}, "url":"URL#1359235" }, { "@score":"1", "@id":"1359236", "info":{"authors":{"author":[{"@pid":"287/4352","text":"Ozren Dabic"},{"@pid":"200/9157","text":"Emad Aghajani"},{"@pid":"09/8523","text":"Gabriele Bavota"}]},"title":"Sampling Projects in GitHub for MSR Studies.","venue":"MSR","pages":"560-564","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/DabicAB21","doi":"10.1109/MSR52588.2021.00074","ee":"https://doi.org/10.1109/MSR52588.2021.00074","url":"https://dblp.org/rec/conf/msr/DabicAB21"}, "url":"URL#1359236" }, { "@score":"1", "@id":"1359237", "info":{"authors":{"author":[{"@pid":"242/9594","text":"Zhen Yu Ding"},{"@pid":"93/4573","text":"Claire Le Goues"}]},"title":"An Empirical Study of OSS-Fuzz Bugs.","venue":"MSR","pages":"131-142","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/DingG21","doi":"10.1109/MSR52588.2021.00026","ee":"https://doi.org/10.1109/MSR52588.2021.00026","url":"https://dblp.org/rec/conf/msr/DingG21"}, "url":"URL#1359237" }, { "@score":"1", "@id":"1359238", "info":{"authors":{"author":[{"@pid":"163/2121","text":"Thomas Durieux"},{"@pid":"192/3923","text":"César Soto-Valero"},{"@pid":"57/3320","text":"Benoit Baudry"}]},"title":"Duets: A Dataset of Reproducible Pairs of Java Library-Clients.","venue":"MSR","pages":"545-549","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/DurieuxSB21","doi":"10.1109/MSR52588.2021.00071","ee":"https://doi.org/10.1109/MSR52588.2021.00071","url":"https://dblp.org/rec/conf/msr/DurieuxSB21"}, "url":"URL#1359238" }, { "@score":"1", "@id":"1359239", "info":{"authors":{"author":[{"@pid":"235/7809","text":"Kalvin Eng"},{"@pid":"76/2009","text":"Abram Hindle"}]},"title":"Revisiting Dockerfiles in Open Source Software Over Time.","venue":"MSR","pages":"449-459","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/EngH21","doi":"10.1109/MSR52588.2021.00057","ee":"https://doi.org/10.1109/MSR52588.2021.00057","url":"https://dblp.org/rec/conf/msr/EngH21"}, "url":"URL#1359239" }, { "@score":"1", "@id":"1359240", "info":{"authors":{"author":[{"@pid":"251/2070","text":"Nafise Eskandani"},{"@pid":"14/7915","text":"Guido Salvaneschi"}]},"title":"The Wonderless Dataset for Serverless Computing.","venue":"MSR","pages":"565-569","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/EskandaniS21","doi":"10.1109/MSR52588.2021.00075","ee":"https://doi.org/10.1109/MSR52588.2021.00075","url":"https://dblp.org/rec/conf/msr/EskandaniS21"}, "url":"URL#1359240" }, { "@score":"1", "@id":"1359241", "info":{"authors":{"author":[{"@pid":"288/2426","text":"Samuel W. Flint"},{"@pid":"288/1256","text":"Jigyasa Chauhan"},{"@pid":"12/5469-1","text":"Robert Dyer 0001"}]},"title":"Escaping the Time Pit: Pitfalls and Guidelines for Using Time-Based Git Data.","venue":"MSR","pages":"85-96","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/FlintC021","doi":"10.1109/MSR52588.2021.00022","ee":"https://doi.org/10.1109/MSR52588.2021.00022","url":"https://dblp.org/rec/conf/msr/FlintC021"}, "url":"URL#1359241" }, { "@score":"1", "@id":"1359242", "info":{"authors":{"author":[{"@pid":"246/8623","text":"Quentin Fournier"},{"@pid":"29/6167","text":"Daniel Aloise"},{"@pid":"42/2821","text":"Seyed Vahid Azhari"},{"@pid":"288/0256","text":"François Tetreault"}]},"title":"On Improving Deep Learning Trace Analysis with System Call Arguments.","venue":"MSR","pages":"120-130","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/FournierAAT21","doi":"10.1109/MSR52588.2021.00025","ee":"https://doi.org/10.1109/MSR52588.2021.00025","url":"https://dblp.org/rec/conf/msr/FournierAAT21"}, "url":"URL#1359242" }, { "@score":"1", "@id":"1359243", "info":{"authors":{"author":[{"@pid":"234/2775","text":"Gianmarco Fucci"},{"@pid":"211/7643","text":"Nathan Cassee"},{"@pid":"193/4226","text":"Fiorella Zampetti"},{"@pid":"09/1798","text":"Nicole Novielli"},{"@pid":"s/AlexanderSerebrenik","text":"Alexander Serebrenik"},{"@pid":"d/MassimilianoDiPenta","text":"Massimiliano Di Penta"}]},"title":"Waiting around or job half-done? Sentiment in self-admitted technical debt.","venue":"MSR","pages":"403-414","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/FucciCZNSP21","doi":"10.1109/MSR52588.2021.00052","ee":"https://doi.org/10.1109/MSR52588.2021.00052","url":"https://dblp.org/rec/conf/msr/FucciCZNSP21"}, "url":"URL#1359243" }, { "@score":"1", "@id":"1359244", "info":{"authors":{"author":[{"@pid":"224/1619","text":"Golnaz Gharachorlu"},{"@pid":"25/6992","text":"Nick Sumner"}]},"title":"Leveraging Models to Reduce Test Cases in Software Repositories.","venue":"MSR","pages":"230-241","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/GharachorluS21","doi":"10.1109/MSR52588.2021.00035","ee":"https://doi.org/10.1109/MSR52588.2021.00035","url":"https://dblp.org/rec/conf/msr/GharachorluS21"}, "url":"URL#1359244" }, { "@score":"1", "@id":"1359245", "info":{"authors":{"author":[{"@pid":"131/0424","text":"Sina Gholamian"},{"@pid":"24/4770","text":"Paul A. S. Ward"}]},"title":"On the Naturalness and Localness of Software Logs.","venue":"MSR","pages":"155-166","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/GholamianW21","doi":"10.1109/MSR52588.2021.00028","ee":"https://doi.org/10.1109/MSR52588.2021.00028","url":"https://dblp.org/rec/conf/msr/GholamianW21"}, "url":"URL#1359245" }, { "@score":"1", "@id":"1359246", "info":{"authors":{"author":[{"@pid":"155/4639","text":"Christoph Gote"},{"@pid":"241/6975","text":"Christian Zingg"}]},"title":"gambit - An Open Source Name Disambiguation Tool for Version Control Systems.","venue":"MSR","pages":"80-84","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/GoteZ21","doi":"10.1109/MSR52588.2021.00021","ee":"https://doi.org/10.1109/MSR52588.2021.00021","url":"https://dblp.org/rec/conf/msr/GoteZ21"}, "url":"URL#1359246" }, { "@score":"1", "@id":"1359247", "info":{"authors":{"author":[{"@pid":"296/1216","text":"Guillaume Haben"},{"@pid":"202/9996","text":"Sarra Habchi"},{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"73/10839","text":"Maxime Cordy"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests.","venue":"MSR","pages":"219-229","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/HabenHPCT21","doi":"10.1109/MSR52588.2021.00034","ee":"https://doi.org/10.1109/MSR52588.2021.00034","url":"https://dblp.org/rec/conf/msr/HabenHPCT21"}, "url":"URL#1359247" }, { "@score":"1", "@id":"1359248", "info":{"authors":{"author":[{"@pid":"167/7854","text":"Mouna Hammoudi"},{"@pid":"68/7033","text":"Christoph Mayr-Dorn"},{"@pid":"27/5485","text":"Atif Mashkoor"},{"@pid":"20/5529","text":"Alexander Egyed"}]},"title":"A Traceability Dataset for Open Source Systems.","venue":"MSR","pages":"555-559","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/HammoudiMME21","doi":"10.1109/MSR52588.2021.00073","ee":"https://doi.org/10.1109/MSR52588.2021.00073","url":"https://dblp.org/rec/conf/msr/HammoudiMME21"}, "url":"URL#1359248" }, { "@score":"1", "@id":"1359249", "info":{"authors":{"author":{"@pid":"54/7440","text":"André C. Hora"}},"title":"Googling for Software Development: What Developers Search For and What They Find.","venue":"MSR","pages":"317-328","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Hora21","doi":"10.1109/MSR52588.2021.00044","ee":"https://doi.org/10.1109/MSR52588.2021.00044","url":"https://dblp.org/rec/conf/msr/Hora21"}, "url":"URL#1359249" }, { "@score":"1", "@id":"1359250", "info":{"authors":{"author":{"@pid":"54/7440","text":"André C. Hora"}},"title":"What Code Is Deliberately Excluded from Test Coverage and Why?","venue":"MSR","pages":"392-402","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Hora21a","doi":"10.1109/MSR52588.2021.00051","ee":"https://doi.org/10.1109/MSR52588.2021.00051","url":"https://dblp.org/rec/conf/msr/Hora21a"}, "url":"URL#1359250" }, { "@score":"1", "@id":"1359251", "info":{"authors":{"author":[{"@pid":"251/9425","text":"Jiayi Hua"},{"@pid":"50/8499-1","text":"Haoyu Wang 0001"}]},"title":"On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection.","venue":"MSR","pages":"530-534","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Hua021","doi":"10.1109/MSR52588.2021.00068","ee":"https://doi.org/10.1109/MSR52588.2021.00068","url":"https://dblp.org/rec/conf/msr/Hua021"}, "url":"URL#1359251" }, { "@score":"1", "@id":"1359252", "info":{"authors":{"author":[{"@pid":"286/8627","text":"Ahmed Imam"},{"@pid":"189/6251","text":"Tapajit Dey"}]},"title":"Tracking Hackathon Code Creation and Reuse.","venue":"MSR","pages":"615-617","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ImamD21","doi":"10.1109/MSR52588.2021.00085","ee":"https://doi.org/10.1109/MSR52588.2021.00085","url":"https://dblp.org/rec/conf/msr/ImamD21"}, "url":"URL#1359252" }, { "@score":"1", "@id":"1359253", "info":{"authors":{"author":[{"@pid":"286/8627","text":"Ahmed Imam"},{"@pid":"189/6251","text":"Tapajit Dey"},{"@pid":"21/5490","text":"Alexander Nolte"},{"@pid":"79/6124","text":"Audris Mockus"},{"@pid":"h/JamesDHerbsleb","text":"James D. Herbsleb"}]},"title":"The Secret Life of Hackathon Code Where does it come from and where does it go?","venue":"MSR","pages":"68-79","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ImamDNMH21","doi":"10.1109/MSR52588.2021.00020","ee":"https://doi.org/10.1109/MSR52588.2021.00020","url":"https://dblp.org/rec/conf/msr/ImamDNMH21"}, "url":"URL#1359253" }, { "@score":"1", "@id":"1359254", "info":{"authors":{"author":[{"@pid":"296/0907","text":"Mia Mohammad Imran"},{"@pid":"223/4519","text":"Agnieszka Ciborowska"},{"@pid":"d/KostadinDamevski","text":"Kostadin Damevski"}]},"title":"Automatically Selecting Follow-up Questions for Deficient Bug Reports.","venue":"MSR","pages":"167-178","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ImranCD21","doi":"10.1109/MSR52588.2021.00029","ee":"https://doi.org/10.1109/MSR52588.2021.00029","url":"https://dblp.org/rec/conf/msr/ImranCD21"}, "url":"URL#1359254" }, { "@score":"1", "@id":"1359255", "info":{"authors":{"author":[{"@pid":"147/6998","text":"Jirayus Jiarpakdee"},{"@pid":"140/7129","text":"Chakkrit Tantithamthavorn"},{"@pid":"g/JohnCGrundy","text":"John C. Grundy"}]},"title":"Practitioners' Perceptions of the Goals and Visual Explanations of Defect Prediction Models.","venue":"MSR","pages":"432-443","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/JiarpakdeeTG21","doi":"10.1109/MSR52588.2021.00055","ee":"https://doi.org/10.1109/MSR52588.2021.00055","url":"https://dblp.org/rec/conf/msr/JiarpakdeeTG21"}, "url":"URL#1359255" }, { "@score":"1", "@id":"1359256", "info":{"authors":{"author":[{"@pid":"296/1131","text":"Arthur V. Kamienski"},{"@pid":"296/0953","text":"Luisa Palechor"},{"@pid":"95/7251","text":"Cor-Paul Bezemer"},{"@pid":"76/2009","text":"Abram Hindle"}]},"title":"PySStuBs: Characterizing Single-Statement Bugs in Popular Open-Source Python Projects.","venue":"MSR","pages":"520-524","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/KamienskiPBH21","doi":"10.1109/MSR52588.2021.00066","ee":"https://doi.org/10.1109/MSR52588.2021.00066","url":"https://dblp.org/rec/conf/msr/KamienskiPBH21"}, "url":"URL#1359256" }, { "@score":"1", "@id":"1359257", "info":{"authors":{"author":[{"@pid":"228/2518","text":"Aleksandr Khvorov"},{"@pid":"275/3347","text":"Roman Vasiliev"},{"@pid":"64/2756","text":"George A. Chernishev"},{"@pid":"156/3719","text":"Irving Muller Rodrigues"},{"@pid":"04/6787","text":"Dmitrij V. Koznov"},{"@pid":"147/9131","text":"Nikita Povarov"}]},"title":"S3M: Siamese Stack (Trace) Similarity Measure.","venue":"MSR","pages":"266-270","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/KhvorovVCRKP21","doi":"10.1109/MSR52588.2021.00038","ee":"https://doi.org/10.1109/MSR52588.2021.00038","url":"https://dblp.org/rec/conf/msr/KhvorovVCRKP21"}, "url":"URL#1359257" }, { "@score":"1", "@id":"1359258", "info":{"authors":{"author":[{"@pid":"221/1657","text":"Misoo Kim"},{"@pid":"219/4400","text":"Youngkyoung Kim"},{"@pid":"16/3590-1","text":"Eunseok Lee 0001"}]},"title":"Denchmark: A Bug Benchmark of Deep Learning-related Software.","venue":"MSR","pages":"540-544","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/KimKL21","doi":"10.1109/MSR52588.2021.00070","ee":"https://doi.org/10.1109/MSR52588.2021.00070","url":"https://dblp.org/rec/conf/msr/KimKL21"}, "url":"URL#1359258" }, { "@score":"1", "@id":"1359259", "info":{"authors":{"author":[{"@pid":"289/0070","text":"Timothy Kinsman"},{"@pid":"205/9369","text":"Mairieli Santos Wessel"},{"@pid":"68/5072","text":"Marco Aurélio Gerosa"},{"@pid":"29/1074","text":"Christoph Treude"}]},"title":"How Do Software Developers Use GitHub Actions to Automate Their Workflows?","venue":"MSR","pages":"420-431","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/KinsmanWGT21","doi":"10.1109/MSR52588.2021.00054","ee":"https://doi.org/10.1109/MSR52588.2021.00054","url":"https://dblp.org/rec/conf/msr/KinsmanWGT21"}, "url":"URL#1359259" }, { "@score":"1", "@id":"1359260", "info":{"authors":{"author":[{"@pid":"296/1295","text":"Jasmine Latendresse"},{"@pid":"149/2653","text":"Rabe Abdalkareem"},{"@pid":"01/11078-1","text":"Diego Elias Costa"},{"@pid":"05/5996","text":"Emad Shihab"}]},"title":"How Effective is Continuous Integration in Indicating Single-Statement Bugs?","venue":"MSR","pages":"500-504","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/LatendresseACS21","doi":"10.1109/MSR52588.2021.00062","ee":"https://doi.org/10.1109/MSR52588.2021.00062","url":"https://dblp.org/rec/conf/msr/LatendresseACS21"}, "url":"URL#1359260" }, { "@score":"1", "@id":"1359261", "info":{"authors":{"author":[{"@pid":"06/721","text":"Wen Li"},{"@pid":"169/1723","text":"Xiaoqin Fu"},{"@pid":"117/7062","text":"Haipeng Cai"}]},"title":"AndroCT: Ten Years of App Call Traces in Android.","venue":"MSR","pages":"570-574","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/LiFC21","doi":"10.1109/MSR52588.2021.00076","ee":"https://doi.org/10.1109/MSR52588.2021.00076","url":"https://dblp.org/rec/conf/msr/LiFC21"}, "url":"URL#1359261" }, { "@score":"1", "@id":"1359262", "info":{"authors":{"author":[{"@pid":"281/6769","text":"Elena Lyulina"},{"@pid":"289/0035","text":"Mahmoud Jahanshahi"}]},"title":"Building the Collaboration Graph of Open-Source Software Ecosystem.","venue":"MSR","pages":"618-620","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/LyulinaJ21","doi":"10.1109/MSR52588.2021.00086","ee":"https://doi.org/10.1109/MSR52588.2021.00086","url":"https://dblp.org/rec/conf/msr/LyulinaJ21"}, "url":"URL#1359262" }, { "@score":"1", "@id":"1359263", "info":{"authors":{"author":[{"@pid":"156/1916","text":"Fernanda Madeiral"},{"@pid":"163/2121","text":"Thomas Durieux"}]},"title":"A large-scale study on human-cloned changes for automated program repair.","venue":"MSR","pages":"510-514","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MadeiralD21","doi":"10.1109/MSR52588.2021.00064","ee":"https://doi.org/10.1109/MSR52588.2021.00064","url":"https://dblp.org/rec/conf/msr/MadeiralD21"}, "url":"URL#1359263" }, { "@score":"1", "@id":"1359264", "info":{"authors":{"author":[{"@pid":"35/1083","text":"Ivano Malavolta"},{"@pid":"276/9835","text":"Katerina Chinnappan"},{"@pid":"285/1619","text":"Stan Swanborn"},{"@pid":"51/1171","text":"Grace A. Lewis"},{"@pid":"40/5357","text":"Patricia Lago"}]},"title":"Mining the ROS ecosystem for Green Architectural Tactics in Robotics and an Empirical Evaluation.","venue":"MSR","pages":"300-311","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MalavoltaCSLL21","doi":"10.1109/MSR52588.2021.00042","ee":"https://doi.org/10.1109/MSR52588.2021.00042","url":"https://dblp.org/rec/conf/msr/MalavoltaCSLL21"}, "url":"URL#1359264" }, { "@score":"1", "@id":"1359265", "info":{"authors":{"author":[{"@pid":"09/4201","text":"Ruchika Malhotra"},{"@pid":"296/0827","text":"Ritvik Kapoor"},{"@pid":"53/11368","text":"Deepti Aggarwal"},{"@pid":"261/1169","text":"Priya Garg"}]},"title":"Comparative Study of Feature Reduction Techniques in Software Change Prediction.","venue":"MSR","pages":"18-28","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MalhotraKAG21","doi":"10.1109/MSR52588.2021.00015","ee":"https://doi.org/10.1109/MSR52588.2021.00015","url":"https://dblp.org/rec/conf/msr/MalhotraKAG21"}, "url":"URL#1359265" }, { "@score":"1", "@id":"1359266", "info":{"authors":{"author":[{"@pid":"243/2582","text":"Saraj Singh Manes"},{"@pid":"25/6566","text":"Olga Baysal"}]},"title":"Studying the Change Histories of Stack Overflow and GitHub Snippets.","venue":"MSR","pages":"283-294","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ManesB21","doi":"10.1109/MSR52588.2021.00040","ee":"https://doi.org/10.1109/MSR52588.2021.00040","url":"https://dblp.org/rec/conf/msr/ManesB21"}, "url":"URL#1359266" }, { "@score":"1", "@id":"1359267", "info":{"authors":{"author":[{"@pid":"217/3732","text":"Diego Marcilio"},{"@pid":"78/6422","text":"Carlo A. Furia"}]},"title":"How Java Programmers Test Exceptional Behavior.","venue":"MSR","pages":"207-218","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MarcilioF21","doi":"10.1109/MSR52588.2021.00033","ee":"https://doi.org/10.1109/MSR52588.2021.00033","url":"https://dblp.org/rec/conf/msr/MarcilioF21"}, "url":"URL#1359267" }, { "@score":"1", "@id":"1359268", "info":{"authors":{"author":[{"@pid":"288/2233","text":"Ehsan Mashhadi"},{"@pid":"92/4860","text":"Hadi Hemmati"}]},"title":"Applying CodeBERT for Automated Program Repair of Java Simple Bugs.","venue":"MSR","pages":"505-509","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MashhadiH21","doi":"10.1109/MSR52588.2021.00063","ee":"https://doi.org/10.1109/MSR52588.2021.00063","url":"https://dblp.org/rec/conf/msr/MashhadiH21"}, "url":"URL#1359268" }, { "@score":"1", "@id":"1359269", "info":{"authors":{"author":[{"@pid":"243/7645","text":"Amir M. Mir"},{"@pid":"283/5369","text":"Evaldas Latoskinas"},{"@pid":"73/311","text":"Georgios Gousios"}]},"title":"ManyTypes4Py: A Benchmark Python Dataset for Machine Learning-based Type Inference.","venue":"MSR","pages":"585-589","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MirLG21","doi":"10.1109/MSR52588.2021.00079","ee":"https://doi.org/10.1109/MSR52588.2021.00079","url":"https://dblp.org/rec/conf/msr/MirLG21"}, "url":"URL#1359269" }, { "@score":"1", "@id":"1359270", "info":{"authors":{"author":[{"@pid":"192/3920","text":"Saikat Mondal"},{"@pid":"49/4012","text":"Gias Uddin 0001"},{"@pid":"03/5761","text":"Chanchal K. Roy"}]},"title":"Rollback Edit Inconsistencies in Developer Forum.","venue":"MSR","pages":"380-391","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Mondal0R21","doi":"10.1109/MSR52588.2021.00050","ee":"https://doi.org/10.1109/MSR52588.2021.00050","url":"https://dblp.org/rec/conf/msr/Mondal0R21"}, "url":"URL#1359270" }, { "@score":"1", "@id":"1359271", "info":{"authors":{"author":[{"@pid":"275/2776","text":"Balázs Mosolygó"},{"@pid":"275/2769","text":"Norbert Vándor"},{"@pid":"156/6366","text":"Gábor Antal"},{"@pid":"33/1061","text":"Péter Hegedüs"}]},"title":"On the Rise and Fall of Simple Stupid Bugs: a Life-Cycle Analysis of SStuBs.","venue":"MSR","pages":"495-499","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/MosolygoVAH21","doi":"10.1109/MSR52588.2021.00061","ee":"https://doi.org/10.1109/MSR52588.2021.00061","url":"https://dblp.org/rec/conf/msr/MosolygoVAH21"}, "url":"URL#1359271" }, { "@score":"1", "@id":"1359272", "info":{"authors":{"author":[{"@pid":"278/9906","text":"Ruben Opdebeeck"},{"@pid":"197/4271","text":"Ahmed Zerouali"},{"@pid":"73/5666","text":"Coen De Roover"}]},"title":"Andromeda: A Dataset of Ansible Galaxy Roles and Their Evolution.","venue":"MSR","pages":"580-584","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/OpdebeeckZR21","doi":"10.1109/MSR52588.2021.00078","ee":"https://doi.org/10.1109/MSR52588.2021.00078","url":"https://dblp.org/rec/conf/msr/OpdebeeckZR21"}, "url":"URL#1359272" }, { "@score":"1", "@id":"1359273", "info":{"authors":{"author":[{"@pid":"207/1552","text":"Maria Papoutsoglou 0001"},{"@pid":"200/0157","text":"Johannes Wachs"},{"@pid":"84/5025","text":"Georgia M. Kapitsaki"}]},"title":"Mining DEV for social and technical insights about software development.","venue":"MSR","pages":"415-419","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/PapoutsoglouWK21","doi":"10.1109/MSR52588.2021.00053","ee":"https://doi.org/10.1109/MSR52588.2021.00053","url":"https://dblp.org/rec/conf/msr/PapoutsoglouWK21"}, "url":"URL#1359273" }, { "@score":"1", "@id":"1359274", "info":{"authors":{"author":[{"@pid":"288/1273","text":"Jiayan Pei"},{"@pid":"60/710","text":"Yimin Wu"},{"@pid":"125/2053","text":"Zishan Qin"},{"@pid":"288/1234","text":"Yao Cong"},{"@pid":"195/8967","text":"Jingtao Guan"}]},"title":"Attention-based model for predicting question relatedness on Stack Overflow.","venue":"MSR","pages":"97-107","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/PeiWQCG21","doi":"10.1109/MSR52588.2021.00023","ee":"https://doi.org/10.1109/MSR52588.2021.00023","url":"https://dblp.org/rec/conf/msr/PeiWQCG21"}, "url":"URL#1359274" }, { "@score":"1", "@id":"1359275", "info":{"authors":{"author":[{"@pid":"200/2545","text":"Anthony Peruma"},{"@pid":"38/10404","text":"Christian D. Newman"}]},"title":"On the Distribution of "Simple Stupid Bugs" in Unit Test Files: An Exploratory Study.","venue":"MSR","pages":"525-529","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/PerumaN21","doi":"10.1109/MSR52588.2021.00067","ee":"https://doi.org/10.1109/MSR52588.2021.00067","url":"https://dblp.org/rec/conf/msr/PerumaN21"}, "url":"URL#1359275" }, { "@score":"1", "@id":"1359276", "info":{"authors":{"author":{"@pid":"40/9729","text":"Rolf-Helge Pfeiffer"}},"title":"Identifying Critical Projects via PageRank and Truck Factor.","venue":"MSR","pages":"41-45","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Pfeiffer21","doi":"10.1109/MSR52588.2021.00017","ee":"https://doi.org/10.1109/MSR52588.2021.00017","url":"https://dblp.org/rec/conf/msr/Pfeiffer21"}, "url":"URL#1359276" }, { "@score":"1", "@id":"1359277", "info":{"authors":{"author":[{"@pid":"271/4426","text":"Chanathip Pornprasit"},{"@pid":"140/7129","text":"Chakkrit Tantithamthavorn"}]},"title":"JITLine: A Simpler, Better, Faster, Finer-grained Just-In-Time Defect Prediction.","venue":"MSR","pages":"369-379","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/PornprasitT21","doi":"10.1109/MSR52588.2021.00049","ee":"https://doi.org/10.1109/MSR52588.2021.00049","url":"https://dblp.org/rec/conf/msr/PornprasitT21"}, "url":"URL#1359277" }, { "@score":"1", "@id":"1359278", "info":{"authors":{"author":[{"@pid":"238/0016","text":"Luigi Quaranta"},{"@pid":"48/5662","text":"Fabio Calefato"},{"@pid":"29/4646","text":"Filippo Lanubile"}]},"title":"KGTorrent: A Dataset of Python Jupyter Notebooks from Kaggle.","venue":"MSR","pages":"550-554","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/QuarantaCL21","doi":"10.1109/MSR52588.2021.00072","ee":"https://doi.org/10.1109/MSR52588.2021.00072","url":"https://dblp.org/rec/conf/msr/QuarantaCL21"}, "url":"URL#1359278" }, { "@score":"1", "@id":"1359279", "info":{"authors":{"author":[{"@pid":"264/5210","text":"Nikitha Rao"},{"@pid":"47/9801","text":"Chetan Bansal"},{"@pid":"279/4026","text":"Joe Guan"}]},"title":"Search4Code: Code Search Intent Classification Using Weak Supervision.","venue":"MSR","pages":"575-579","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/RaoBG21","doi":"10.1109/MSR52588.2021.00077","ee":"https://doi.org/10.1109/MSR52588.2021.00077","url":"https://dblp.org/rec/conf/msr/RaoBG21"}, "url":"URL#1359279" }, { "@score":"1", "@id":"1359280", "info":{"authors":{"author":[{"@pid":"23/3140","text":"David Reid"},{"@pid":"235/7809","text":"Kalvin Eng"},{"@pid":"83/4898","text":"Chris Bogart"},{"@pid":"272/4327","text":"Adam Tutko"}]},"title":"Tracing Vulnerable Code Lineage.","venue":"MSR","pages":"621-623","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ReidEBT21","doi":"10.1109/MSR52588.2021.00087","ee":"https://doi.org/10.1109/MSR52588.2021.00087","url":"https://dblp.org/rec/conf/msr/ReidEBT21"}, "url":"URL#1359280" }, { "@score":"1", "@id":"1359281", "info":{"authors":{"author":[{"@pid":"289/0005","text":"Fabio Santos"},{"@pid":"06/10439","text":"Igor Wiese"},{"@pid":"166/2138","text":"Bianca Trinkenreich"},{"@pid":"70/3474","text":"Igor Steinmacher"},{"@pid":"26/6565","text":"Anita Sarma"},{"@pid":"68/5072","text":"Marco Aurélio Gerosa"}]},"title":"Can I Solve It? Identifying APIs Required to Complete OSS Tasks.","venue":"MSR","pages":"346-257","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SantosWTSSG21","doi":"10.1109/MSR52588.2021.00047","ee":"https://doi.org/10.1109/MSR52588.2021.00047","url":"https://dblp.org/rec/conf/msr/SantosWTSSG21"}, "url":"URL#1359281" }, { "@score":"1", "@id":"1359282", "info":{"authors":{"author":[{"@pid":"03/2022","text":"Andreas Schuler"},{"@pid":"158/7753","text":"Gabriele Kotsis"}]},"title":"Mining API Interactions to Analyze Software Revisions for the Evolution of Energy Consumption.","venue":"MSR","pages":"312-316","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SchulerK21","doi":"10.1109/MSR52588.2021.00043","ee":"https://doi.org/10.1109/MSR52588.2021.00043","url":"https://dblp.org/rec/conf/msr/SchulerK21"}, "url":"URL#1359282" }, { "@score":"1", "@id":"1359283", "info":{"authors":{"author":[{"@pid":"168/2456","text":"Gian Luca Scoccia"},{"@pid":"246/8557","text":"Patrizio Migliarini"},{"@pid":"21/1998","text":"Marco Autili"}]},"title":"Challenges in Developing Desktop Web Apps: a Study of Stack Overflow and GitHub.","venue":"MSR","pages":"271-282","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ScocciaMA21","doi":"10.1109/MSR52588.2021.00039","ee":"https://doi.org/10.1109/MSR52588.2021.00039","url":"https://dblp.org/rec/conf/msr/ScocciaMA21"}, "url":"URL#1359283" }, { "@score":"1", "@id":"1359284", "info":{"authors":{"author":[{"@pid":"255/9058","text":"Hendrig Sellik"},{"@pid":"286/5245","text":"Onno van Paridon"},{"@pid":"73/311","text":"Georgios Gousios"},{"@pid":"61/9679","text":"Maurício Aniche"}]},"title":"Learning Off-By-One Mistakes: An Empirical Study.","venue":"MSR","pages":"58-67","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SellikPGA21","doi":"10.1109/MSR52588.2021.00019","ee":"https://doi.org/10.1109/MSR52588.2021.00019","url":"https://dblp.org/rec/conf/msr/SellikPGA21"}, "url":"URL#1359284" }, { "@score":"1", "@id":"1359285", "info":{"authors":{"author":[{"@pid":"75/8719-1","text":"Tushar Sharma 0001"},{"@pid":"90/382","text":"Marouane Kessentini"}]},"title":"QScored: A Large Dataset of Code Smells and Quality Metrics.","venue":"MSR","pages":"590-594","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SharmaK21","doi":"10.1109/MSR52588.2021.00080","ee":"https://doi.org/10.1109/MSR52588.2021.00080","url":"https://dblp.org/rec/conf/msr/SharmaK21"}, "url":"URL#1359285" }, { "@score":"1", "@id":"1359286", "info":{"authors":{"author":[{"@pid":"243/9511","text":"Egor Spirin"},{"@pid":"243/2565","text":"Egor Bogomolov"},{"@pid":"223/2599","text":"Vladimir Kovalenko"},{"@pid":"136/0260","text":"Timofey Bryksin"}]},"title":"PSIMiner: A Tool for Mining Rich Abstract Syntax Trees from Code.","venue":"MSR","pages":"13-17","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SpirinBKB21","doi":"10.1109/MSR52588.2021.00014","ee":"https://doi.org/10.1109/MSR52588.2021.00014","url":"https://dblp.org/rec/conf/msr/SpirinBKB21"}, "url":"URL#1359286" }, { "@score":"1", "@id":"1359287", "info":{"authors":{"author":[{"@pid":"287/7890","text":"Panyawut Sri-Iesaranusorn"},{"@pid":"64/7675","text":"Raula Gaikovina Kula"},{"@pid":"66/39","text":"Takashi Ishio"}]},"title":"Does Code Review Promote Conformance? A Study of OpenStack Patches.","venue":"MSR","pages":"444-448","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Sri-Iesaranusorn21","doi":"10.1109/MSR52588.2021.00056","ee":"https://doi.org/10.1109/MSR52588.2021.00056","url":"https://dblp.org/rec/conf/msr/Sri-Iesaranusorn21"}, "url":"URL#1359287" }, { "@score":"1", "@id":"1359288", "info":{"authors":{"author":[{"@pid":"242/4778","text":"Murali Sridharan"},{"@pid":"m/MikaMantyla","text":"Mika Mäntylä"},{"@pid":"272/5215","text":"Leevi Rantala"},{"@pid":"129/8950","text":"Maëlick Claes"}]},"title":"Data Balancing Improves Self-Admitted Technical Debt Detection.","venue":"MSR","pages":"358-368","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SridharanMRC21","doi":"10.1109/MSR52588.2021.00048","ee":"https://doi.org/10.1109/MSR52588.2021.00048","url":"https://dblp.org/rec/conf/msr/SridharanMRC21"}, "url":"URL#1359288" }, { "@score":"1", "@id":"1359289", "info":{"authors":{"author":[{"@pid":"288/0613","text":"Nikolai Sviridov"},{"@pid":"288/0388","text":"Mikhail Evtikhiev"},{"@pid":"223/2599","text":"Vladimir Kovalenko"}]},"title":"TNM: A Tool for Mining of Socio-Technical Data from Git Repositories.","venue":"MSR","pages":"295-299","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SviridovEK21","doi":"10.1109/MSR52588.2021.00041","ee":"https://doi.org/10.1109/MSR52588.2021.00041","url":"https://dblp.org/rec/conf/msr/SviridovEK21"}, "url":"URL#1359289" }, { "@score":"1", "@id":"1359290", "info":{"authors":{"author":[{"@pid":"198/0454","text":"Alexey Svyatkovskiy"},{"@pid":"244/4401","text":"Sebastian Lee"},{"@pid":"263/9867","text":"Anna Hadjitofi"},{"@pid":"182/1351","text":"Maik Riechert"},{"@pid":"142/5718","text":"Juliana Vicente Franco"},{"@pid":"121/4943","text":"Miltiadis Allamanis"}]},"title":"Fast and Memory-Efficient Neural Code Completion.","venue":"MSR","pages":"329-340","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/SvyatkovskiyLHR21","doi":"10.1109/MSR52588.2021.00045","ee":"https://doi.org/10.1109/MSR52588.2021.00045","url":"https://dblp.org/rec/conf/msr/SvyatkovskiyLHR21"}, "url":"URL#1359290" }, { "@score":"1", "@id":"1359291", "info":{"authors":{"author":[{"@pid":"218/5702","text":"Huy Tu"},{"@pid":"54/2215-2","text":"George Papadimitriou 0002"},{"@pid":"86/578","text":"Mariam Kiran"},{"@pid":"18/2771-14","text":"Cong Wang 0014"},{"@pid":"31/6757","text":"Anirban Mandal"},{"@pid":"d/EwaDeelman","text":"Ewa Deelman"},{"@pid":"m/TimMenzies","text":"Tim Menzies"}]},"title":"Mining Workflows for Anomalous Data Transfers.","venue":"MSR","pages":"1-12","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/Tu0KWMDM21","doi":"10.1109/MSR52588.2021.00013","ee":"https://doi.org/10.1109/MSR52588.2021.00013","url":"https://dblp.org/rec/conf/msr/Tu0KWMDM21"}, "url":"URL#1359291" }, { "@score":"1", "@id":"1359292", "info":{"authors":{"author":[{"@pid":"199/5439","text":"Anderson G. Uchôa"},{"@pid":"221/1638","text":"Caio Barbosa"},{"@pid":"87/1273","text":"Daniel Coutinho"},{"@pid":"121/2856","text":"Willian Nalepa Oizumi"},{"@pid":"90/9459","text":"Wesley K. G. Assunção"},{"@pid":"99/4290","text":"Silvia Regina Vergilio"},{"@pid":"139/6642","text":"Juliana Alves Pereira"},{"@pid":"206/5735","text":"Anderson Oliveira"},{"@pid":"g/AlessandroFGarcia","text":"Alessandro F. Garcia 0001"}]},"title":"Predicting Design Impactful Changes in Modern Code Review: A Large-Scale Empirical Study.","venue":"MSR","pages":"471-482","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/UchoaBCOAVPOG21","doi":"10.1109/MSR52588.2021.00059","ee":"https://doi.org/10.1109/MSR52588.2021.00059","url":"https://dblp.org/rec/conf/msr/UchoaBCOAVPOG21"}, "url":"URL#1359292" }, { "@score":"1", "@id":"1359293", "info":{"authors":{"author":[{"@pid":"263/6769","text":"Dheeraj Vagavolu"},{"@pid":"241/6275","text":"Vartika Agrahari"},{"@pid":"76/1783","text":"Sridhar Chimalakonda"},{"@pid":"246/8309","text":"Akhila Sri Manasa Venigalla"}]},"title":"GE526: A Dataset of Open-Source Game Engines.","venue":"MSR","pages":"605-609","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/VagavoluACV21","doi":"10.1109/MSR52588.2021.00083","ee":"https://doi.org/10.1109/MSR52588.2021.00083","url":"https://dblp.org/rec/conf/msr/VagavoluACV21"}, "url":"URL#1359293" }, { "@score":"1", "@id":"1359294", "info":{"authors":{"author":[{"@pid":"21/5259","text":"James Walden"},{"@pid":"288/2571","text":"Noah Burgin"},{"@pid":"288/2267","text":"Kuljit Kaur"}]},"title":"An Exploratory Study of Project Activity Changepoints in Open Source Software Evolution.","venue":"MSR","pages":"624-626","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/WaldenBK21","doi":"10.1109/MSR52588.2021.00088","ee":"https://doi.org/10.1109/MSR52588.2021.00088","url":"https://dblp.org/rec/conf/msr/WaldenBK21"}, "url":"URL#1359294" }, { "@score":"1", "@id":"1359295", "info":{"authors":{"author":[{"@pid":"295/8825","text":"Tyler Wendland"},{"@pid":"217/7354","text":"Jingyang Sun"},{"@pid":"246/7250","text":"Junayed Mahmud"},{"@pid":"295/8531","text":"S. M. Hasan Mansur 0001"},{"@pid":"52/4556","text":"Steven Huang"},{"@pid":"151/7453","text":"Kevin Moran"},{"@pid":"26/4417","text":"Julia Rubin"},{"@pid":"118/3935","text":"Mattia Fazzini"}]},"title":"Andror2: A Dataset of Manually-Reproduced Bug Reports for Android apps.","venue":"MSR","pages":"600-604","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/WendlandSMMHMRF21","doi":"10.1109/MSR52588.2021.00082","ee":"https://doi.org/10.1109/MSR52588.2021.00082","url":"https://dblp.org/rec/conf/msr/WendlandSMMHMRF21"}, "url":"URL#1359295" }, { "@score":"1", "@id":"1359296", "info":{"authors":{"author":[{"@pid":"220/8136","text":"Likang Yin"},{"@pid":"72/1760","text":"Zhiyuan Zhang"},{"@pid":"37/8888","text":"Qi Xuan"},{"@pid":"f/VladimirFilkov","text":"Vladimir Filkov"}]},"title":"Apache Software Foundation Incubator Project Sustainability Dataset.","venue":"MSR","pages":"595-599","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/YinZXF21","doi":"10.1109/MSR52588.2021.00081","ee":"https://doi.org/10.1109/MSR52588.2021.00081","url":"https://dblp.org/rec/conf/msr/YinZXF21"}, "url":"URL#1359296" }, { "@score":"1", "@id":"1359297", "info":{"authors":{"author":[{"@pid":"219/2227","text":"Sofonias Yitagesu"},{"@pid":"54/1153","text":"Xiaowang Zhang"},{"@pid":"48/195-2","text":"Zhiyong Feng 0002"},{"@pid":"08/2489-1","text":"Xiaohong Li 0001"},{"@pid":"52/6482","text":"Zhenchang Xing"}]},"title":"Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions.","venue":"MSR","pages":"29-40","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/YitagesuZ00X21","doi":"10.1109/MSR52588.2021.00016","ee":"https://doi.org/10.1109/MSR52588.2021.00016","url":"https://dblp.org/rec/conf/msr/YitagesuZ00X21"}, "url":"URL#1359297" }, { "@score":"1", "@id":"1359298", "info":{"authors":{"author":[{"@pid":"278/7853","text":"Mengchen Sam Yong"},{"@pid":"273/5309","text":"Lavinia Paganini"},{"@pid":"242/3941","text":"Huilian Sophie Qiu"},{"@pid":"296/1052","text":"José Bayoán Santiago Calderón"}]},"title":"The Diversity-Innovation Paradox in Open-Source Software.","venue":"MSR","pages":"627-629","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/YongPQC21","doi":"10.1109/MSR52588.2021.00089","ee":"https://doi.org/10.1109/MSR52588.2021.00089","url":"https://dblp.org/rec/conf/msr/YongPQC21"}, "url":"URL#1359298" }, { "@score":"1", "@id":"1359299", "info":{"authors":{"author":[{"@pid":"122/3137","text":"Jean-Gabriel Young"},{"@pid":"288/1266","text":"Amanda Casari"},{"@pid":"288/2140","text":"Katie McLaughlin"},{"@pid":"288/2247","text":"Milo Z. Trujillo"},{"@pid":"57/9222","text":"Laurent Hébert-Dufresne"},{"@pid":"28/7564","text":"James P. Bagrow"}]},"title":"Which contributions count? Analysis of attribution in open source.","venue":"MSR","pages":"242-253","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/YoungCMTHB21","doi":"10.1109/MSR52588.2021.00036","ee":"https://doi.org/10.1109/MSR52588.2021.00036","url":"https://dblp.org/rec/conf/msr/YoungCMTHB21"}, "url":"URL#1359299" }, { "@score":"1", "@id":"1359300", "info":{"authors":{"author":[{"@pid":"197/4271","text":"Ahmed Zerouali"},{"@pid":"163/4341","text":"Camilo Velázquez-Rodríguez"},{"@pid":"73/5666","text":"Coen De Roover"}]},"title":"Identifying Versions of Libraries used in Stack Overflow Code Snippets.","venue":"MSR","pages":"341-345","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ZeroualiVR21","doi":"10.1109/MSR52588.2021.00046","ee":"https://doi.org/10.1109/MSR52588.2021.00046","url":"https://dblp.org/rec/conf/msr/ZeroualiVR21"}, "url":"URL#1359300" }, { "@score":"1", "@id":"1359301", "info":{"authors":{"author":[{"@pid":"57/7648","text":"Wenhan Zhu"},{"@pid":"g/MichaelWGodfrey","text":"Michael W. Godfrey"}]},"title":"Mea culpa: How developers fix their own simple bugs differently from other developers.","venue":"MSR","pages":"515-519","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/msr/ZhuG21","doi":"10.1109/MSR52588.2021.00065","ee":"https://doi.org/10.1109/MSR52588.2021.00065","url":"https://dblp.org/rec/conf/msr/ZhuG21"}, "url":"URL#1359301" }, { "@score":"1", "@id":"1399310", "info":{"title":"18th IEEE/ACM International Conference on Mining Software Repositories, MSR 2021, Madrid, Spain, May 17-19, 2021","venue":"MSR","publisher":"IEEE","year":"2021","type":"Editorship","key":"conf/msr/2021","doi":"10.1109/MSR52588.2021","ee":"https://doi.org/10.1109/MSR52588.2021","url":"https://dblp.org/rec/conf/msr/2021"}, "url":"URL#1399310" } ] } } } )