By Topic

2016 7th International Workshop on Empirical Software Engineering in Practice (IWESEP)

13-13 March 2016

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1549 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2016, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Keynote abstract

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB)

    Source code is a highly structured object but so far it has mostly been analyzed deductively. What if we view source code from a probabilistic lens? This question has recently opened a new interdisciplinary field combining machine learning, natural language processing, programming language research and software engineering. By probabilistically modeling elements of source code, we can extract the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Navigation Efficiency in the IDE

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1111 KB) | HTML iconHTML

    While coding, developers construct and maintain mental models of software systems to support the task at hand. Although source code is the main product of software development, the process involves navigating and inspecting entities beyond the ones that are edited by the end of a task. Developers use various user interfaces (UI) offered by the Integrated Development Environment (IDE) to navigate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How do GitHub Users Feel with Pull-Based Development?

    Publication Year: 2016, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    Modern OSS projects have adopted Git to manage versions of their source code and GitHub for hosting their Git repositories. GitHub provides a characteristic feature notably pull request, and many projects adopt pull-based development model by using it. This development model offers an opportunity to review the source code before merging it into the mainstream. Getting acceptance of the pull reques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Provide Developers Only with Relevant Information?

    Publication Year: 2016, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    After the release of a new software version it is difficult for individual developers to keep track of all newly submitted bug reports complicating their decision making, e.g., which bug to resolve next? This problem is emphasized by the presence of further information sources, such as social media, which offer valuable user feedback to developers regarding the software. However, due to an abundan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Auto-Generated Code by Using Machine Learning Techniques

    Publication Year: 2016, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Recently, many researchers have conducted mining source code repositories to retrieve useful information about software development. Source code repositories often include auto-generated code, and auto-generated code is usually removed in a preprocessing phase because the presence of auto-generated code is harmful to source code analysis. A usual way to remove auto-generated code is searching part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Moving Window Policies with CART

    Publication Year: 2016, Page(s):24 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    CONTEXT: Recent studies have shown that estimation accuracy can be affected by only using a window of recent projects (instead of all past projects) as training data for building an effort estimation model. The effect and its extent can be affected by the effort estimation methods used, and the windowing policy used (fixed size or fixed duration). The generality of the windowing approach remains u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering OSS License Statements toward Automatic Generation of License Rules

    Publication Year: 2016, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Reusing open source software (OSS) components for own software products has become common in the modarn software development. Automated license identification tools has been proposed to help developers identify OSS licenses, since a large number of licenses sometimes must be checked to be reused. Of the existing tools, Ninka can most correctly identify licenses of each source file by using regular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Preliminary Study of Size Optimization for Text-Based Web-Resource

    Publication Year: 2016, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    This paper discusses about file size optimization of text-based Web resources with the aim of network traffic reduction. From the perspective of network traffic reduction, wasteful representations written in text-based resources(e.g., indent, line break and comment) should be eliminated by applying any optimization techniques before the deployment. However, there are no common-sense of size optimi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating an Architecture Conformance Monitoring Solution

    Publication Year: 2016, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Architectural rules are often defined but rarely tested. Current tools offer limited functionality and often require significant effort to be configured, automated and integrated within existing platforms. We propose a platform that is aimed at reducing the overall cost of setting up and maintaining an architectural conformance monitoring environment by decoupling the conceptual representation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Capable Crossover Technique on Automatic Program Repair

    Publication Year: 2016, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In software development, debugging is indispensable to guarantee the reliability. However, debugging is becoming more difficult because software is becoming larger and more complex. Thus, techniques for supporting debugging, especially automatic program repair techniques based on genetic programming distinguish themselves due to their capability. Genetic programming produces many modified programs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying the Exact Bug Fixing Actions

    Publication Year: 2016, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    In-spite of the principle of good programming practice which stipulates that a commit should include only modifications belonging to one task, programmers submit tangled commits consisting of modifications related to two or several distinct tasks. Some researches show that between 11 and 39% of bug fix commits are tangled and at least 16.6% of all the commits are incorrectly associated to bug repo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Source Resume (OSR): A Visualization Tool for Presenting OSS Biographies of Developers

    Publication Year: 2016, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    In order to recruit appropriate developers for software projects, it is important to have a clarifie dunderstanding on the practical experience and expertise of each candidate. However, traditional resume only shows experiences claimed by developers, and very few evidence or information regarding their actual development activities can be obtained. In this paper, we propose an approach to extract ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2016, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2016, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE