Default Cover Image

2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)

May 2 2010 to May 3 2010

Cape Town

Table of Contents

MSR 2010 table of contentsFreely available from IEEE.pp. 1-4
MSR 2010 brief author indexFreely available from IEEE.pp. 1-3
MSR 2010 detailed author indexFreely available from IEEE.pp. 1-26
MSR 2010 Organizing CommitteeFreely available from IEEE.pp. 1-1
MSR 2010 Program CommitteeFreely available from IEEE.pp. 1-1
MSR 2010 challenge CommitteeFreely available from IEEE.pp. 1-1
MSR: Mining for scientific results?Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
The visual terminatorFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Using differences among replications of software engineering experiments to gain knowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Predicting the severity of a reported bugFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Identifying security bug reports via text mining: An industrial case studyFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Assessing UML design metrics for predicting fault-prone classes in a Java systemFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
An extensive comparison of bug prediction approachesFull-text access may be available. Sign in or learn about subscription options.pp. 31-41
The evolution of ANT build systemsFull-text access may be available. Sign in or learn about subscription options.pp. 42-51
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data miningFull-text access may be available. Sign in or learn about subscription options.pp. 52-61
When process data quality affects the number of bugs: Correlations in software engineering datasetsFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Clones: What is that smell?Full-text access may be available. Sign in or learn about subscription options.pp. 72-81
Mining Challenge 2010: FreeBSD, GNOME Desktop and Debian/UbuntuFull-text access may be available. Sign in or learn about subscription options.pp. 82-85
Perspectives on bugs in the Debian bug tracking systemFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Mining security changes in FreeBSDFull-text access may be available. Sign in or learn about subscription options.pp. 90-93
Assessment of issue handling efficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 94-97
Cloning and copying between GNOME projectsFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
Finding file clones in FreeBSD Ports CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 102-105
A comparative exploration of FreeBSD bug lifetimesFull-text access may be available. Sign in or learn about subscription options.pp. 106-109
Assessing the precision of FindBugs by mining Java projects developed at a universityFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Abstracting log lines to log event types for mining software system logsFull-text access may be available. Sign in or learn about subscription options.pp. 114-117
Do stack traces help developers fix bugs?Full-text access may be available. Sign in or learn about subscription options.pp. 118-121
THEX: Mining metapatterns from javaFull-text access may be available. Sign in or learn about subscription options.pp. 122-125
Automated dependency resolution for open source softwareFull-text access may be available. Sign in or learn about subscription options.pp. 130-140
Mining subclassing directives to improve framework reuseFull-text access may be available. Sign in or learn about subscription options.pp. 141-150
Identifying licensing of jar archives using a code-search approachFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Replaying IDE interactions to evaluate and improve change prediction approachesFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Replicating MSR: A study of the potential replicability of papers published in the Mining Software Repositories proceedingsFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Should I contribute to this discussion?Full-text access may be available. Sign in or learn about subscription options.pp. 181-190
Can development work describe itself?Full-text access may be available. Sign in or learn about subscription options.pp. 191-200
Validity of network analyses in Open Source ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 201-209
Showing 38 out of 38