SlideShare a Scribd company logo
1 of 14
FANTASTIC KEYNOTES
Gail C. Murphy: “What is Software Development Productivity, Anyway?”
This talk will focus on the way software productivity has been characterized in
software engineering and how mining can support such a characterization.
Gail C. Murphy is a Professor of Computer Science at the University of British Columbia. She is also a Co-founder and
Chief Science Officer at Tasktop Technologies Inc. Her research interests are in improving the productivity of software
developers and knowledge workers by giving them tools to identify, manage and coordinate the information that really
matters for their work.

Brian Doll: “Striking Gold: Building Software Better, Together”
This talk will tell us how, by exploring GitHub, one can answer questions
about the success of software projects and of software development teams.
Bring your pan and pick. We're going to get our hands dirty.
Brian Doll is a technology & business hacker who has been building things on the web for 17 years. Brian works at
GitHub, helping millions of people build a better world with code.
CUTTING-EDGE RESEARCH
Out of over 100 submissions the Program Committee selected the best new
research results to uncover insight from software repositories. Find out about the
latest trends in analytics and data science for software development.
MSR TECHNICAL TRACK
                      Ten technical sessions with 36 presentations on the latest trends in mining, such
                      as mobile apps, unstructured data, classification and prediction of changes/bugs,
                      code review, social mining, search-driven development and software evolution.

Bug Triaging                                          MSR Goes Mobile
Why So Complicated? Simple Term Filtering and         Asking for (and about) Permissions
Weighting for Location-Based Bug Report               Used by Android Apps
Assignment Recommendation                             Ryan Stevens, Jonathan Ganz, Premkumar Devanbu,
Ramin Shokripour, John Anvik, Zarinah Mohd Kasirun,   Hao Chen, and Vladimir Filkov
and Sima Zamani
                                                      Retrieving and Analyzing Mobile Apps Feature
Which Work-Item Updates Need Your Response?           Requests from Online Reviews
Debdoot Mukherjee and Malika Garg                     Claudia Iacob and Rachel Harrison

Bug Report Assignee Recommendation
using Activity Profile
Hoda Naguib, Nitesh Narayan, Bernd Brügge, and
Dina Helal
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Changes and Fixes                                      Software Evolution
                                                       Understanding the Evolution of Type-3 Clones
Will My Patch Make It? And How Fast?
                                                       Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider, and
Case Study on the Linux Kernel
                                                       Dewayne E. Perry
Yujuan Jiang, Bram Adams, and Daniel M. German
                                                       An Empirical Study of the Fault-Proneness of Clone
Linux Variability Anomalies:                           Mutation and Clone Migration
What Causes Them and How Do They Get Fixed?            Shuai Xie, Foutse Khomh, and Ying Zou
Sarah Nadi, Christian Dietrich, Reinhard Tartler,      Intensive Metrics for the Study of the Evolution of Open
Richard C. Holt, and Daniel Lohmann                    Source Projects: Case Studies from Apache Software
                                                       Foundation Projects
The Impact of Tangled Code Changes                     Santiago Gala, Gregorio Robles, Jesús González-Barahona,
Kim Herzig and Andreas Zeller                          and Israel Herraiz

                                                       A Preliminary Investigation of Using Age and Distance
                                                       Measures in the Detection of Evolutionary Couplings
                                                       Abdulkareem Alali, Brian Bartman, Christian Newman, and
                                                       Jonathan Maletic
MSR TECHNICAL TRACK
                        Ten technical sessions with 36 presentations on the latest trends in mining, such
                        as mobile apps, unstructured data, classification and prediction of changes/bugs,
                        code review, social mining, search-driven development and software evolution.

Analysis of Bug Reports                                 Software Ecosystems, Big Data
Search-Based Duplicate Defect Detection:                Mining Source Code Repositories at Massive Scale
An Industrial Experience                                using Language Modeling
Mehdi Amoui, Nilam Kaushik, Abraham Al-Dabbagh,         Miltiadis Allamanis and Charles Sutton
Ladan Tahvildari, Shimin Li, and Weining Liu
                                                        Do Software Categories Impact Coupling Metrics?
A Contextual Approach towards More Accurate             Lucas Batista Leite De Souza and
Duplicate Bug Report Detection                          Marcelo De Almeida Maia
Anahita Alipour, Abram Hindle, and Eleni Stroulia

Bug Resolution Catalysts: Identifying Essential
Non-committers from Bug Repositories
Senthil Mani, Seema Nagar, Debdoot Mukherjee,
Ramasuri Narayanam, Vibha Singhal Sinha, and
Amit A. Nanavati
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Classification and Localization of                       Social Mining
Bugs and Changes
                                                         Fixing the 'Out of Sight Out of Mind' Problem: One Year of
                                                         Mood Based Microblogging in a Distributed Software Team
Discovering, Reporting, and Fixing Performance Bugs
                                                         Kevin Dullemond, Ben Van Gameren,
Adrian Nistor, Tian Jiang, and Lin Tan                   Arie van Deursen, and Margaret-Anne Storey

Improving Bug Localization using Correlations in Crash   Communication in Open Source Software Development
Reports                                                  Mailing Lists
Shaohua Wang, Foutse Khomh, and Ying Zou                 Anja Guzzi, Alberto Bacchelli, Michele Lanza,
                                                         Martin Pinzger, and Arie van Deursen
Testing Principles, Current Practices, and Effects of
Change Localization                                      Tag Recommendation In Software Information Sites
Steven Raemaekers, Gabriela Nane, Arie van Deursen,      Xin Xia, David Lo, Xinyu Wang, and Bo Zhou
and Joost Visser
                                                         Using Developer Interaction Data to Compare Expertise
                                                         Metrics
                                                         Romain Robbes and David Röthlisberger
MSR TECHNICAL TRACK
                      Ten technical sessions with 36 presentations on the latest trends in mining, such
                      as mobile apps, unstructured data, classification and prediction of changes/bugs,
                      code review, social mining, search-driven development and software evolution.

Search-Driven Development                             10 Years of MSR
Assisting Code Search with Automatic Query            The MSR Cookbook: Mining a Decade of Research
Reformulation for Bug Localization                    Hadi Hemmati, Sarah Nadi, Olga Baysal,
Bunyamin Sisman and Avinash C. Kak                    Oleksii Kononenko, Wei Wang, Reid Holmes, and
                                                      Michael W. Godfrey
Mining Succinct and High-Coverage API Usage
Patterns from Source Code                             Happy Birthday! A Trend Analysis on Past MSR Papers
Jue Wang, Yingnong Dang, Hongyu Zhang, Kai Chen,      Kevin Wyckmans, Alessandro Murgia, Ahmed Lamkanfi,
Tao Xie, and Dongmei Zhang                            and Serge Demeyer

Rendezvous: A Search Engine for Binary Code           Replicating Mining Studies with SOFAS
Wei Ming Khoo, Alan Mycroft, and Ross Anderson        Giacomo Ghezzi and Harald C. Gall
MSR TECHNICAL TRACK
                       Ten technical sessions with 36 presentations on the latest trends in mining, such
                       as mobile apps, unstructured data, classification and prediction of changes/bugs,
                       code review, social mining, search-driven development and software evolution.

Mining Unstructured Data                                 Predictor Models
Automatically Mining Software-Based, Semantically-       Better Cross Company Defect Prediction
Similar Words from Comment-Code Mappings                 Fayola Peters, Tim Menzies, and Andrian Marcus
Matthew J. Howard, Lori Pollock, K. Vijay-Shanker, and
Samir Gupta                                              Using Citation Influence to Predict Software Defects
                                                         Wei Hu and Kenny Wong
Strategies for Avoiding Text Fixture Smells during
Software Evolution                                       Revisiting Software Development Effort Estimation
Michaela Greiler, Andy Zaidman, Arie van Deursen,        Based on Early Phase Development Activities
and Margaret-Anne Storey                                 Masateru Tsunoda, Koji Toda, Kyohei Fushida,
                                                         Yasutaka Kamei, Meiyappan Nagappan, and
Contextual Analysis of Program Logs for Understanding    Naoyasu Ubayashi
System Behaviors
Qiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding,
Dongmei Zhang, and Tao Xie
MSR DATA SHOWCASE
                             Out of 27 submissions the Data Committee selected 15 carefully curated datasets
                             ready at your fingertips. You name it, we have it! Android, Apache, Eclipse, Gnome,
                             Maven, Mozilla, and Ruby. Change histories, bug reports, code reviews, and more.
Gerrit Software Code Review Data from Android                        A Network of Rails: A Graph Dataset of Ruby on Rails
Murtuza Mukadam, Christian Bird, and Peter C. Rigby                  and Associated Projects
                                                                     Patrick Wagstrom, Corey Jergensen, and Anita Sarma
Who does what during a Code Review?
Datasets of OSS Peer Review Repositories                             The GHTorent Dataset and Tool Suite
Kazuki Hamasaki, Raula Gaikovina Kula, Norihiro Yoshida, Ana Erika   Georgios Gousios
Camargo Cruz, Kenji Fujiwara, and Hajimu Iida
                                                                     Project Roles in the Apache Software Foundation: A Dataset
A Dataset from Change History to Support Evaluation of               Megan Squire
Software Maintenance Tasks
                                                                     Apache-Affiliated Twitter Screen Names: A Dataset
Bogdan Dit, Andrew Holtzhauer, Denys Poshyvanyk, and Huzefa Kagdi
                                                                     Megan Squire
Apache Commits: Social Network Dataset
                                                                     An Unabridged Source Code Dataset for Research in Software Reuse
Alexander C. MacLean and Charles D. Knutson
                                                                     Werner Janjic, Oliver Hummel, Marcus Schumacher, and Colin Atkinson
The Eclipse and Mozilla Defect Tracking Dataset:
                                                                     A Historical Dataset of Software Engineering Conferences
A Genuine Dataset for Mining Bug Information
                                                                     Bogdan Vasilescu, Alexander Serebrenik, and Tom Mens
Ahmed Lamkanfi, Javier Pérez, and Serge Demeyer
                                                                     A Dataset for Evaluating Identifier Splitters
The Maven Repository Dataset of Metrics, Changes, and Dependencies
                                                                     David Binkley, Dawn Lawrie, Lori Pollock, Emily Hill, and Vijay Shanker
Steven Raemaekers, Arie van Deursen, and Joost Visser
                                                                     INVocD: Identifier Name Vocabulary Dataset
A Historical Dataset for the Gnome Ecosystem
                                                                     Simon Butler, Michel Wermelinger, Yijun Yu, and Helen Sharp
Mathieu Goeminne, Maëlick Claes, and Tom Mens
MSR MINING CHALLENGE
                             The task: Mine Stack Overflow data for the best insight. Out of 29 submissions
                             the Challenge Committee selected the 12 best to compete at the conference.
                             You choose who wins and gets a Microsoft Surface with Windows RT.

Why, When, and What: Analyzing Stack Overflow Questions             Exploring Activeness of Users in Q&A Forums
by Topic, Type, and Code                                            Vibha Singhal Sinha, Senthil Mani, and Monika Gupta
Miltiadis Allamanis and Charles Sutton
                                                                    A Study of Innovation Diffusion through Link Sharing
                                                                    on Stack Overflow
Detecting API Usage Obstacles: A Study of iOS and
                                                                    Carlos Gomez, Brendan Cleary, and Leif Singer
Android Developer Questions
Wei Wang and Michael W. Godfrey
                                                                    Deficient Documentation Detection: A Methodology to
                                                                    Locate Deficient Project Documentation using Topic Analysis
Making Sense of Online Code Snippets
                                                                    Joshua Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle,
Siddharth Subramanian and Reid Holmes
                                                                    and James Miller
Encouraging User Behaviour with Achievements:                       Building Reputation in StackOverflow: An Empirical Investigation
An Empirical Study                                                  Amiangshu Bosu, Christopher S. Corley, Dustin Heaton, Debarshi
Scott Grant and Buddy Betts                                         Chatterji, Jeffrey C. Carver, and Nicholas A. Kraft

Is Programming Knowledge Related to Age?                            An Exploratory Analysis of Mobile Development Issues
An Exploration of Stack Overflow                                    using Stack Overflow
Patrick Morrison and Emerson Murphy-Hill                            Mario Linares-Vásquez, Bogdan Dit, and Denys Poshyvanyk

                                                                    Answering Questions about Unanswered Questions of Stack Overflow
A Discriminative Model Approach for Suggesting Tags Automatically
                                                                    Muhammad Asaduzzaman, Ahmed Mashiyat, Chanchal K. Roy, and
for Stack Overflow Questions                                        Kevin A. Schneider
Avigit K. Saha, Ripon K. Saha, and Kevin A. Schneider
REGISTER NOW!
Early registration discounts until April 14.

More Related Content

What's hot

Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...SeriousGamesAssoc
 
The Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave FarleyThe Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave FarleyBosnia Agile
 
Beyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through RequirementsBeyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through RequirementsGail Murphy
 
Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...Marcel Teixeira
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Interactive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongInteractive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongLiang Gong
 
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESIJNSA Journal
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTijseajournal
 
Applications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creationApplications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creationUltraUploader
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)Tao Xie
 
Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland Panos Fitsilis
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityTyler Shields
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationPorfirio Tramontana
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Kalilur Rahman
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Intelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital WorldIntelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital WorldKalilur Rahman
 

What's hot (20)

Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
Games for Analysis of Technologies in Human-Intensive Systems - Dr. Tim Dasey...
 
The Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave FarleyThe Rationale for Continuous Delivery by Dave Farley
The Rationale for Continuous Delivery by Dave Farley
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
Beyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through RequirementsBeyond DevOps: Finding Value through Requirements
Beyond DevOps: Finding Value through Requirements
 
Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...Testing an Android Implementation of the Social Engineering Protection Traini...
Testing an Android Implementation of the Social Engineering Protection Traini...
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Interactive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongInteractive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang Gong
 
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
 
Applications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creationApplications of genetic algorithms to malware detection and creation
Applications of genetic algorithms to malware detection and creation
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
 
Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Techniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing AutomationTechniques and Tools for Mobile Testing Automation
Techniques and Tools for Mobile Testing Automation
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Intelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital WorldIntelligent Testing Skills Needed in a Digital World
Intelligent Testing Skills Needed in a Digital World
 

Similar to MSR 2013 Preview

Defining the boundary for AI research in Intelligent Systems Dec 2021
Defining the boundary for AI research in Intelligent Systems Dec  2021Defining the boundary for AI research in Intelligent Systems Dec  2021
Defining the boundary for AI research in Intelligent Systems Dec 2021Parasuram Balasubramanian
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Andy Hunter
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
 
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...JAYAPRAKASH JPINFOTECH
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Darshan Gorasiya
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software AnalyticsMargaret-Anne Storey
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
 
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Margaret-Anne Storey
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
Humangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxHumangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxkhajurianavam
 
Introduction to machine learning ppt files
Introduction to machine learning ppt filesIntroduction to machine learning ppt files
Introduction to machine learning ppt filesPagalaVinay
 
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...Kevin Moran
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...aciijournal
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130wNKHAYDEN
 

Similar to MSR 2013 Preview (20)

Defining the boundary for AI research in Intelligent Systems Dec 2021
Defining the boundary for AI research in Intelligent Systems Dec  2021Defining the boundary for AI research in Intelligent Systems Dec  2021
Defining the boundary for AI research in Intelligent Systems Dec 2021
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
CV - DCHATTERJI
CV - DCHATTERJICV - DCHATTERJI
CV - DCHATTERJI
 
Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
 
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Le...
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software Analytics
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
savi technical ppt.pptx
savi technical ppt.pptxsavi technical ppt.pptx
savi technical ppt.pptx
 
Humangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxHumangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptx
 
Introduction to machine learning ppt files
Introduction to machine learning ppt filesIntroduction to machine learning ppt files
Introduction to machine learning ppt files
 
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mob...
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
 
Acg Terr Sand2004 2130w
Acg Terr Sand2004 2130wAcg Terr Sand2004 2130w
Acg Terr Sand2004 2130w
 
Big data_郭惠民
Big data_郭惠民Big data_郭惠民
Big data_郭惠民
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 

More from Thomas Zimmermann

Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsThomas Zimmermann
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 
Data driven games user research
Data driven games user researchData driven games user research
Data driven games user researchThomas Zimmermann
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsThomas Zimmermann
 
Security trend analysis with CVE topic models
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic modelsThomas Zimmermann
 
Characterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedCharacterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedThomas Zimmermann
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesThomas Zimmermann
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect predictionThomas Zimmermann
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesThomas Zimmermann
 
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsThomas Zimmermann
 
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceQuality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceThomas Zimmermann
 
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Thomas Zimmermann
 
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringGot Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringThomas Zimmermann
 
Mining Workspace Updates in CVS
Mining Workspace Updates in CVSMining Workspace Updates in CVS
Mining Workspace Updates in CVSThomas Zimmermann
 
Mining Software Archives to Support Software Development
Mining Software Archives to Support Software DevelopmentMining Software Archives to Support Software Development
Mining Software Archives to Support Software DevelopmentThomas Zimmermann
 
esolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachenesolang: Esoterische Programmiersprachen
esolang: Esoterische ProgrammiersprachenThomas Zimmermann
 
TA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software RepositoriesTA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software RepositoriesThomas Zimmermann
 

More from Thomas Zimmermann (20)

Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode Operations
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 
Klingon Countdown Timer
Klingon Countdown TimerKlingon Countdown Timer
Klingon Countdown Timer
 
Data driven games user research
Data driven games user researchData driven games user research
Data driven games user research
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
 
Security trend analysis with CVE topic models
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic models
 
Characterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedCharacterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixed
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect prediction
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
 
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceQuality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
 
Meet Tom and his Fish
Meet Tom and his FishMeet Tom and his Fish
Meet Tom and his Fish
 
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities
 
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringGot Myth? Myths in Software Engineering
Got Myth? Myths in Software Engineering
 
Mining Workspace Updates in CVS
Mining Workspace Updates in CVSMining Workspace Updates in CVS
Mining Workspace Updates in CVS
 
Mining Software Archives to Support Software Development
Mining Software Archives to Support Software DevelopmentMining Software Archives to Support Software Development
Mining Software Archives to Support Software Development
 
Unit testing with JUnit
Unit testing with JUnitUnit testing with JUnit
Unit testing with JUnit
 
esolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachenesolang: Esoterische Programmiersprachen
esolang: Esoterische Programmiersprachen
 
TA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software RepositoriesTA-RE: An Exchange Language for Mining Software Repositories
TA-RE: An Exchange Language for Mining Software Repositories
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

MSR 2013 Preview

  • 1.
  • 2. FANTASTIC KEYNOTES Gail C. Murphy: “What is Software Development Productivity, Anyway?” This talk will focus on the way software productivity has been characterized in software engineering and how mining can support such a characterization. Gail C. Murphy is a Professor of Computer Science at the University of British Columbia. She is also a Co-founder and Chief Science Officer at Tasktop Technologies Inc. Her research interests are in improving the productivity of software developers and knowledge workers by giving them tools to identify, manage and coordinate the information that really matters for their work. Brian Doll: “Striking Gold: Building Software Better, Together” This talk will tell us how, by exploring GitHub, one can answer questions about the success of software projects and of software development teams. Bring your pan and pick. We're going to get our hands dirty. Brian Doll is a technology & business hacker who has been building things on the web for 17 years. Brian works at GitHub, helping millions of people build a better world with code.
  • 3. CUTTING-EDGE RESEARCH Out of over 100 submissions the Program Committee selected the best new research results to uncover insight from software repositories. Find out about the latest trends in analytics and data science for software development.
  • 4. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Bug Triaging MSR Goes Mobile Why So Complicated? Simple Term Filtering and Asking for (and about) Permissions Weighting for Location-Based Bug Report Used by Android Apps Assignment Recommendation Ryan Stevens, Jonathan Ganz, Premkumar Devanbu, Ramin Shokripour, John Anvik, Zarinah Mohd Kasirun, Hao Chen, and Vladimir Filkov and Sima Zamani Retrieving and Analyzing Mobile Apps Feature Which Work-Item Updates Need Your Response? Requests from Online Reviews Debdoot Mukherjee and Malika Garg Claudia Iacob and Rachel Harrison Bug Report Assignee Recommendation using Activity Profile Hoda Naguib, Nitesh Narayan, Bernd Brügge, and Dina Helal
  • 5. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Changes and Fixes Software Evolution Understanding the Evolution of Type-3 Clones Will My Patch Make It? And How Fast? Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider, and Case Study on the Linux Kernel Dewayne E. Perry Yujuan Jiang, Bram Adams, and Daniel M. German An Empirical Study of the Fault-Proneness of Clone Linux Variability Anomalies: Mutation and Clone Migration What Causes Them and How Do They Get Fixed? Shuai Xie, Foutse Khomh, and Ying Zou Sarah Nadi, Christian Dietrich, Reinhard Tartler, Intensive Metrics for the Study of the Evolution of Open Richard C. Holt, and Daniel Lohmann Source Projects: Case Studies from Apache Software Foundation Projects The Impact of Tangled Code Changes Santiago Gala, Gregorio Robles, Jesús González-Barahona, Kim Herzig and Andreas Zeller and Israel Herraiz A Preliminary Investigation of Using Age and Distance Measures in the Detection of Evolutionary Couplings Abdulkareem Alali, Brian Bartman, Christian Newman, and Jonathan Maletic
  • 6. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Analysis of Bug Reports Software Ecosystems, Big Data Search-Based Duplicate Defect Detection: Mining Source Code Repositories at Massive Scale An Industrial Experience using Language Modeling Mehdi Amoui, Nilam Kaushik, Abraham Al-Dabbagh, Miltiadis Allamanis and Charles Sutton Ladan Tahvildari, Shimin Li, and Weining Liu Do Software Categories Impact Coupling Metrics? A Contextual Approach towards More Accurate Lucas Batista Leite De Souza and Duplicate Bug Report Detection Marcelo De Almeida Maia Anahita Alipour, Abram Hindle, and Eleni Stroulia Bug Resolution Catalysts: Identifying Essential Non-committers from Bug Repositories Senthil Mani, Seema Nagar, Debdoot Mukherjee, Ramasuri Narayanam, Vibha Singhal Sinha, and Amit A. Nanavati
  • 7. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Classification and Localization of Social Mining Bugs and Changes Fixing the 'Out of Sight Out of Mind' Problem: One Year of Mood Based Microblogging in a Distributed Software Team Discovering, Reporting, and Fixing Performance Bugs Kevin Dullemond, Ben Van Gameren, Adrian Nistor, Tian Jiang, and Lin Tan Arie van Deursen, and Margaret-Anne Storey Improving Bug Localization using Correlations in Crash Communication in Open Source Software Development Reports Mailing Lists Shaohua Wang, Foutse Khomh, and Ying Zou Anja Guzzi, Alberto Bacchelli, Michele Lanza, Martin Pinzger, and Arie van Deursen Testing Principles, Current Practices, and Effects of Change Localization Tag Recommendation In Software Information Sites Steven Raemaekers, Gabriela Nane, Arie van Deursen, Xin Xia, David Lo, Xinyu Wang, and Bo Zhou and Joost Visser Using Developer Interaction Data to Compare Expertise Metrics Romain Robbes and David Röthlisberger
  • 8. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Search-Driven Development 10 Years of MSR Assisting Code Search with Automatic Query The MSR Cookbook: Mining a Decade of Research Reformulation for Bug Localization Hadi Hemmati, Sarah Nadi, Olga Baysal, Bunyamin Sisman and Avinash C. Kak Oleksii Kononenko, Wei Wang, Reid Holmes, and Michael W. Godfrey Mining Succinct and High-Coverage API Usage Patterns from Source Code Happy Birthday! A Trend Analysis on Past MSR Papers Jue Wang, Yingnong Dang, Hongyu Zhang, Kai Chen, Kevin Wyckmans, Alessandro Murgia, Ahmed Lamkanfi, Tao Xie, and Dongmei Zhang and Serge Demeyer Rendezvous: A Search Engine for Binary Code Replicating Mining Studies with SOFAS Wei Ming Khoo, Alan Mycroft, and Ross Anderson Giacomo Ghezzi and Harald C. Gall
  • 9. MSR TECHNICAL TRACK Ten technical sessions with 36 presentations on the latest trends in mining, such as mobile apps, unstructured data, classification and prediction of changes/bugs, code review, social mining, search-driven development and software evolution. Mining Unstructured Data Predictor Models Automatically Mining Software-Based, Semantically- Better Cross Company Defect Prediction Similar Words from Comment-Code Mappings Fayola Peters, Tim Menzies, and Andrian Marcus Matthew J. Howard, Lori Pollock, K. Vijay-Shanker, and Samir Gupta Using Citation Influence to Predict Software Defects Wei Hu and Kenny Wong Strategies for Avoiding Text Fixture Smells during Software Evolution Revisiting Software Development Effort Estimation Michaela Greiler, Andy Zaidman, Arie van Deursen, Based on Early Phase Development Activities and Margaret-Anne Storey Masateru Tsunoda, Koji Toda, Kyohei Fushida, Yasutaka Kamei, Meiyappan Nagappan, and Contextual Analysis of Program Logs for Understanding Naoyasu Ubayashi System Behaviors Qiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding, Dongmei Zhang, and Tao Xie
  • 10.
  • 11. MSR DATA SHOWCASE Out of 27 submissions the Data Committee selected 15 carefully curated datasets ready at your fingertips. You name it, we have it! Android, Apache, Eclipse, Gnome, Maven, Mozilla, and Ruby. Change histories, bug reports, code reviews, and more. Gerrit Software Code Review Data from Android A Network of Rails: A Graph Dataset of Ruby on Rails Murtuza Mukadam, Christian Bird, and Peter C. Rigby and Associated Projects Patrick Wagstrom, Corey Jergensen, and Anita Sarma Who does what during a Code Review? Datasets of OSS Peer Review Repositories The GHTorent Dataset and Tool Suite Kazuki Hamasaki, Raula Gaikovina Kula, Norihiro Yoshida, Ana Erika Georgios Gousios Camargo Cruz, Kenji Fujiwara, and Hajimu Iida Project Roles in the Apache Software Foundation: A Dataset A Dataset from Change History to Support Evaluation of Megan Squire Software Maintenance Tasks Apache-Affiliated Twitter Screen Names: A Dataset Bogdan Dit, Andrew Holtzhauer, Denys Poshyvanyk, and Huzefa Kagdi Megan Squire Apache Commits: Social Network Dataset An Unabridged Source Code Dataset for Research in Software Reuse Alexander C. MacLean and Charles D. Knutson Werner Janjic, Oliver Hummel, Marcus Schumacher, and Colin Atkinson The Eclipse and Mozilla Defect Tracking Dataset: A Historical Dataset of Software Engineering Conferences A Genuine Dataset for Mining Bug Information Bogdan Vasilescu, Alexander Serebrenik, and Tom Mens Ahmed Lamkanfi, Javier Pérez, and Serge Demeyer A Dataset for Evaluating Identifier Splitters The Maven Repository Dataset of Metrics, Changes, and Dependencies David Binkley, Dawn Lawrie, Lori Pollock, Emily Hill, and Vijay Shanker Steven Raemaekers, Arie van Deursen, and Joost Visser INVocD: Identifier Name Vocabulary Dataset A Historical Dataset for the Gnome Ecosystem Simon Butler, Michel Wermelinger, Yijun Yu, and Helen Sharp Mathieu Goeminne, Maëlick Claes, and Tom Mens
  • 12.
  • 13. MSR MINING CHALLENGE The task: Mine Stack Overflow data for the best insight. Out of 29 submissions the Challenge Committee selected the 12 best to compete at the conference. You choose who wins and gets a Microsoft Surface with Windows RT. Why, When, and What: Analyzing Stack Overflow Questions Exploring Activeness of Users in Q&A Forums by Topic, Type, and Code Vibha Singhal Sinha, Senthil Mani, and Monika Gupta Miltiadis Allamanis and Charles Sutton A Study of Innovation Diffusion through Link Sharing on Stack Overflow Detecting API Usage Obstacles: A Study of iOS and Carlos Gomez, Brendan Cleary, and Leif Singer Android Developer Questions Wei Wang and Michael W. Godfrey Deficient Documentation Detection: A Methodology to Locate Deficient Project Documentation using Topic Analysis Making Sense of Online Code Snippets Joshua Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle, Siddharth Subramanian and Reid Holmes and James Miller Encouraging User Behaviour with Achievements: Building Reputation in StackOverflow: An Empirical Investigation An Empirical Study Amiangshu Bosu, Christopher S. Corley, Dustin Heaton, Debarshi Scott Grant and Buddy Betts Chatterji, Jeffrey C. Carver, and Nicholas A. Kraft Is Programming Knowledge Related to Age? An Exploratory Analysis of Mobile Development Issues An Exploration of Stack Overflow using Stack Overflow Patrick Morrison and Emerson Murphy-Hill Mario Linares-Vásquez, Bogdan Dit, and Denys Poshyvanyk Answering Questions about Unanswered Questions of Stack Overflow A Discriminative Model Approach for Suggesting Tags Automatically Muhammad Asaduzzaman, Ahmed Mashiyat, Chanchal K. Roy, and for Stack Overflow Questions Kevin A. Schneider Avigit K. Saha, Ripon K. Saha, and Kevin A. Schneider
  • 14. REGISTER NOW! Early registration discounts until April 14.