| On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation |
20 |
| Sentiment Polarity Detection for Software Development |
17 |
| Empirical software engineering experts on the use of students and professionals in experiments |
13 |
| Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration |
11 |
| Genetic Algorithm-based Test Generation for Software Product Line with the Integration of Fault Localization Techniques |
9 |
| A comparison of code similarity analysers |
9 |
| The impact of feature reduction techniques on defect prediction models |
8 |
| Exploring software development at the very large-scale: a revelatory case study and research agenda for agile method adaptation |
7 |
| Impact of incorrect and new requirements on waterfall software project outcomes |
7 |
| An experience report on applying software testing academic results in industry: we need usable automated test generation |
7 |
| Understanding semi-structured merge conflict characteristics in open-source Java projects |
7 |
| Privacy by designers: software developers' privacy mindset |
6 |
| EnTagRec(++): An enhanced tag recommendation system for software information sites |
6 |
| A multi-view context-aware approach to Android malware detection and malicious code localization |
6 |
| An empirical comparison of dependency network evolution in seven software packaging ecosystems |
6 |
| Identifying self-admitted technical debt in open source projects using text mining |
5 |
| Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction |
5 |
| Are tweets useful in the bug fixing process? An empirical study on Firefox and Chrome |
5 |
| Studying the consistency of star ratings and reviews of popular free hybrid Android and iOS apps |
5 |
| An empirical study of game reviews on the Steam platform |
5 |
| Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge |
5 |
| Catalog of energy patterns for mobile applications |
5 |
| Large-scale agile transformation at Ericsson: a case study |
5 |
| On the reaction to deprecation of clients of 4+1 popular Java APIs and the JDK |
5 |
| Finding better active learners for faster literature reviews |
5 |
| How the R community creates and curates knowledge: an extended study of stack overflow and mailing lists |
5 |
| Towards understanding and detecting fake reviews in app stores |
5 |
| On the relative value of data resampling approaches for software defect prediction |
5 |
| Open innovation using open source tools: a case study at Sony Mobile |
4 |
| Code smells for Model-View-Controller architectures |
4 |
| How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults |
4 |
| The need for software specific natural language techniques |
4 |
| Classifying code comments in Java software systems |
4 |
| An industrial case study on the use of UML in software maintenance and its perceived benefits and hurdles |
4 |
| Addressing problems with replicability and validity of repository mining studies through a smart data platform |
4 |
| To react, or not to react: Patterns of reaction to API deprecation |
4 |
| Examining the stability of logging statements |
4 |
| An exploratory qualitative and quantitative analysis of emotions in issue report comments of open source systems |
4 |
| ChangeLocator: locate crash-inducing changes based on crash reports |
4 |
| Studying the dialogue between users and developers of free apps in the Google Play Store |
4 |
| Understanding the factors for fast answers in technical Q&A websites An empirical study of four stack exchange websites |
4 |
| On the impact of state-based model-driven development on maintainability: a family of experiments using UniMod |
4 |
| The smell of fear: on the relation between test smells and flaky tests |
3 |
| Improved representation and genetic operators for linear genetic programming for automated program repair |
3 |
| Inference of development activities from interaction with uninstrumented applications |
3 |
| Are vulnerabilities discovered and resolved like other defects? |
3 |
| Data-efficient performance learning for configurable systems |
3 |
| Towards prioritizing user-related issue reports of mobile applications |
3 |
| Shorter identifier names take longer to comprehend |
3 |
| Redundancy-free analysis of multi-revision software artifacts |
3 |