Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MSR
MSR 2010
Generate Citations
2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)
May 2 2010 to May 3 2010
Cape Town
Table of Contents
MSR 2010 table of contents
Freely available from IEEE.
pp. 1-4
MSR 2010 brief author index
Freely available from IEEE.
pp. 1-3
MSR 2010 detailed author index
Freely available from IEEE.
pp. 1-26
Welcome from the chairs
Freely available from IEEE.
pp. 1-2
by
Audris Mockus
,
Jim Whitehead
,
Thomas Zimmermann
,
Abram Hindle
MSR 2010 Organizing Committee
Freely available from IEEE.
pp. 1-1
MSR 2010 Program Committee
Freely available from IEEE.
pp. 1-1
MSR 2010 challenge Committee
Freely available from IEEE.
pp. 1-1
MSR: Mining for scientific results?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
James Herbsleb
The visual terminator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Michele Lanza
Using differences among replications of software engineering experiments to gain knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Natalia Juristo
,
Sira Vegas
Predicting the severity of a reported bug
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ahmed Lamkanfi
,
Serge Demeyer
,
Emanuel Giger
,
Bart Goethals
Identifying security bug reports via text mining: An industrial case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Michael Gegick
,
Pete Rotella
,
Tao Xie
Assessing UML design metrics for predicting fault-prone classes in a Java system
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Ariadi Nugroho
,
Michel R.V. Chaudron
,
Erik Arisholm
An extensive comparison of bug prediction approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-41
by
Marco D'Ambros
,
Michele Lanza
,
Romain Robbes
The evolution of ANT build systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-51
by
Shane McIntosh
,
Bram Adams
,
Ahmed E. Hassan
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-61
by
Lucas Nussbaum
,
Stefano Zacchiroli
When process data quality affects the number of bugs: Correlations in software engineering datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-71
by
Adrian Bachmann
,
Abraham Bernstein
Clones: What is that smell?
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-81
by
Foyzur Rahman
,
Christian Bird
,
Premkumar Devanbu
Mining Challenge 2010: FreeBSD, GNOME Desktop and Debian/Ubuntu
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-85
by
Abram Hindle
,
Israel Herraiz
,
Emad Shihab
,
Zhen Ming Jiang
Perspectives on bugs in the Debian bug tracking system
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Julius Davies
,
Hanyu Zhang
,
Lucas Nussbaum
,
Daniel M. German
Mining security changes in FreeBSD
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-93
by
Andreas Mauczka
,
Christian Schanes
,
Florian Fankhauser
,
Mario Bernhart
,
Thomas Grechenig
Assessment of issue handling efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-97
by
Bart Luijten
,
Joost Visser
,
Andy Zaidman
Cloning and copying between GNOME projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Jens Krinke
,
Nicolas Gold
,
Yue Jia
,
David Binkley
Finding file clones in FreeBSD Ports Collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-105
by
Yusuke Sasaki
,
Tetsuo Yamamoto
,
Yasuhiro Hayase
,
Katsuro Inoue
A comparative exploration of FreeBSD bug lifetimes
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-109
by
Gargi Bougie
,
Christoph Treude
,
Daniel M. German
,
Margaret-Anne Storey
Assessing the precision of FindBugs by mining Java projects developed at a university
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-113
by
Antonio Vetro'
,
Marco Torchiano
,
Maurizio Morisio
Abstracting log lines to log event types for mining software system logs
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-117
by
Meiyappan Nagappan
,
Mladen A. Vouk
Do stack traces help developers fix bugs?
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
Adrian Schroter
,
Adrian Schröter
,
Nicolas Bettenburg
,
Rahul Premraj
THEX: Mining metapatterns from java
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
by
Daryl Posnett
,
Christian Bird
,
Premkumar Devanbu
OSS developers context-specific Preferred Representational systems: A initial Neurolinguistic text analysis of the Apache mailing list
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-129
by
Methanias Colaço Júnior
,
Manoel Mendonça
,
Mario Farias
,
Paulo Henrique
Automated dependency resolution for open source software
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-140
by
Joel Ossher
,
Sushil Bajracharya
,
Cristina Lopes
Mining subclassing directives to improve framework reuse
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-150
by
Marcel Bruch
,
Mira Mezini
,
Martin Monperrus
Identifying licensing of jar archives using a code-search approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-160
by
Massimiliano Di Penta
,
Daniel M. German
,
Giuliano Antoniol
Replaying IDE interactions to evaluate and improve change prediction approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Romain Robbes
,
Damien Pollet
,
Michele Lanza
Replicating MSR: A study of the potential replicability of papers published in the Mining Software Repositories proceedings
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Gregorio Robles
Should I contribute to this discussion?
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Walid M. Ibrahim
,
Nicolas Bettenburg
,
Emad Shihab
,
Bram Adams
,
Ahmed E. Hassan
Can development work describe itself?
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Walid Maalej
,
Hans-Jörg Happel
Validity of network analyses in Open Source Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-209
by
Roozbeh Nia
,
Christian Bird
,
Premkumar Devanbu
,
Vladimir Filkov
Showing 38 out of 38