Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2009 6th IEEE International Working Conference on Mining Software Repositories

16-17 May 2009

Filter Results

Displaying Results 1 - 25 of 44
  • Welcome

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1221 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2009, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2009, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE
  • Release

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Welcome from the chairs

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • MSR 2009 Organizing Committee

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • MSR-09 Program Committee

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Success factors of Business Intelligence

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB)

    Business Intelligence (BI) has proven to be a competitive advantage for organizations, allowing them to better measure, manage, and optimize their operations. It has provided the means to improve data-driven decision making and to harmonize an organization's strategy with its everyday operations. The early success of BI arose in providing a semantic-level access to heterogeneous data sources beyon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A brief history of software — from Bell Labs to Microsoft Research

    Publication Year: 2009, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    In the mid 1990s, I was (tangentially) part of an effort in Bell Labs called the "Code Decay" project. The hypothesis of this project was that over time code becomes fragile (more difficult to change without introducing problems), and that this process of decay could be empirically validated. This effort awakened me to the power of combining statistical expertise with software engineering expertis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The promises and perils of mining git

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (55)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    We are now witnessing the rapid growth of decentralized source code management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collaboration in which work output can flow sideways (and privately) between collaborators, rather than always up and down (and publicly) via a central repository. Decentralization comes with both the promise of new data and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amassing and indexing a large sample of version control systems: Towards the census of public source code history

    Publication Year: 2009, Page(s):11 - 20
    Cited by:  Papers (20)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    The source code and its history represent the output and process of software development activities and are an invaluable resource for study and improvement of software development practice. While individual projects and groups of projects have been extensively analyzed, some fundamental questions, such as the spread of innovation or genealogy of the source code, can be answered only by considerin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MapReduce as a general framework to support research in Mining Software Repositories (MSR)

    Publication Year: 2009, Page(s):21 - 30
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    Researchers continue to demonstrate the benefits of Mining Software Repositories (MSR) for supporting software development and research activities. However, as the mining process is time and resource intensive, they often create their own distributed platforms and use various optimizations to speed up and scale up their analysis. These platforms are project-specific, hard to reuse, and offer minim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A platform for software engineering research

    Publication Year: 2009, Page(s):31 - 40
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    Research in the fields of software quality, maintainability and evolution requires the analysis of large quantities of data, which often originate from open source software projects. Collecting and preprocessing data, calculating metrics, and synthesizing composite results from a large corpus of project artifacts is a tedious and error prone task lacking direct scientific value. The Alitheia Core ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the relation between coding standard violations and faultswithin and across software versions

    Publication Year: 2009, Page(s):41 - 50
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In spite of the widespread use of coding standards and tools enforcing their rules, there is little empirical evidence supporting the intuition that they prevent the introduction of faults in software. In previous work, we performed a pilot study to assess the relation between rule violations and actual faults, using the MISRA C 2004 standard on an industrial case. In this paper, we investigate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking concept drift of software projects using defect prediction quality

    Publication Year: 2009, Page(s):51 - 60
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Defect prediction is an important task in the mining of software repositories, but the quality of predictions varies strongly within and across software projects. In this paper we investigate the reasons why the prediction quality is so fluctuating due to the altering nature of the bug (or defect) fixing process. Therefore, we adopt the notion of a concept drift, which denotes that the defect pred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does calling structure information improve the accuracy of fault prediction?

    Publication Year: 2009, Page(s):61 - 70
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Previous studies have shown that software code attributes, such as lines of source code, and history information, such as the number of code changes and the number of faults in prior releases of software, are useful for predicting where faults will occur. In this study of an industrial software system, we investigate the effectiveness of adding information about calling structure to fault predicti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining source code to automatically split identifiers for software analysis

    Publication Year: 2009, Page(s):71 - 80
    Cited by:  Papers (50)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Automated software engineering tools (e.g., program search, concern location, code reuse, quality assessment, etc.) increasingly rely on natural language information from comments and identifiers in code. The first step in analyzing words from identifiers requires splitting identifiers into their constituent words. Unlike natural languages, where space and punctuation are used to delineate words, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code siblings: Technical and legal implications of copying code between applications

    Publication Year: 2009, Page(s):81 - 90
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolves in a different system than the code from which it originates. Code siblings can only occur when the source code copyright owner allows it and when the conditions imposed by such license are not incompatible with the li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.