Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Çalikli, Gül"'
Autor:
Petrulio, Fernando, Ackermann, David, Fregnan, Enrico, Calikli, Gül, Castelluccio, Marco, Ledru, Sylvestre, Denizet, Calixte, Humphries, Emma, Bacchelli, Alberto
In the multi-commit development model, programmers complete tasks (e.g., implementing a feature) by organizing their work in several commits and packaging them into a commit-set. Analyzing data from developers using this model can be useful to tackle
Externí odkaz:
http://arxiv.org/abs/2209.03311
The most popular code review tools (e.g., Gerrit and GitHub) present the files to review sorted in alphabetical order. Could this choice or, more generally, the relative position in which a file is presented bias the outcome of code reviews? We inves
Externí odkaz:
http://arxiv.org/abs/2208.04259
Autor:
Bershadskyy, Dmitri, Krüger, Jacob, Çalıklı, Gül, Otto, Siegmar, Zabel, Sarah, Greif, Jannik, Heyer, Robert
In software-engineering research, many empirical studies are conducted with open-source or industry developers. However, in contrast to other research communities like economics or psychology, only few experiments use financial incentives (i.e., payi
Externí odkaz:
http://arxiv.org/abs/2202.10985
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previous research has shown that developers often miss even popular and easy-to-detect vulnerabilities during code review. Initial evidence suggests that a s
Externí odkaz:
http://arxiv.org/abs/2202.04586
Code review consists of manual inspection, discussion, and judgment of source code by developers other than the code's author. Due to discussions around competing ideas and group decision-making processes, interpersonal conflicts during code reviews
Externí odkaz:
http://arxiv.org/abs/2201.05425
Improper Input Validation (IIV) is a software vulnerability that occurs when a system does not safely handle input data. Even though IIV is easy to detect and fix, it still commonly happens in practice. In this paper, we study to what extent develope
Externí odkaz:
http://arxiv.org/abs/2102.06251
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the ACM on Human-Computer Interaction. 6:1-33
Code review consists of manual inspection, discussion, and judgment of source code by developers other than the code���s author. Due to discussions around competing ideas and group decision-making processes, interpersonal conflicts during code
Artifacts Package of the accepted FSE22paper: "First come first served: the impact of file position on code review". The mined Pull Request data (contained in the PR_data.zip file) have a size (approximately 5GB) significantly larger than the rest of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::554f352cb50553f700240207e3af3614
Code review consists of manual inspection, discussion, and judgment of source code by developers other than the code's author. Due to discussions around competing ideas and group decision-making processes, interpersonal conflicts during code reviews
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fc12766468b74b3ebda310c1d5f3d6ce
http://arxiv.org/abs/2201.05425
http://arxiv.org/abs/2201.05425