-
Notifications
You must be signed in to change notification settings - Fork 0
/
woc.citations.papers
103 lines (103 loc) · 107 KB
/
woc.citations.papers
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
{"corpusid":261142508,"externalids":{"ACL":null,"DBLP":"journals/infsof/GonzalezBarahonaR23","ArXiv":null,"MAG":null,"CorpusId":"261142508","PubMed":null,"DOI":"10.1016/j.infsof.2023.107318","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/963c7f09acb9335a3f44b75cf6f81e3dd44bc9e2","title":"Revisiting the reproducibility of empirical software engineering studies based on data retrieved from development repositories","authors":[{"authorId":"1397826059","name":"Jesus M. Gonzalez-Barahona"},{"authorId":"143684601","name":"G. Robles"}],"venue":"Information and Software Technology","publicationvenueid":"64ae7767-9467-4e70-9e31-e4185f9f16ff","year":2023,"referencecount":23,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-08-01","journal":{"name":"Inf. Softw. Technol.","pages":"107318","volume":"164"}}
{"corpusid":268290848,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"268290848","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/6c62ca5017960c3821b8083a3ce2c5c58d76059f","title":"Novelty Begets Long-Term Popularity, But Curbs Participation A Macroscopic View of the Python Open-Source Ecosystem","authors":[{"authorId":"2262933523","name":"James D. Herbsleb"},{"authorId":"2268786501","name":"Bogdan Vasilescu"}],"venue":"","publicationvenueid":null,"year":null,"referencecount":49,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":252188150,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"252188150","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2f84dad2756bfed0c482418148362ccda12caa09","title":"Measuring the Cost of Open Source Software Innovation on GitHub","authors":[{"authorId":"1395103871","name":"José Bayoán"},{"authorId":"2286771654","name":"Santiago Calderón"},{"authorId":"105059471","name":"Ledia Guci"},{"authorId":"2286777559","name":"Brandon L. Kramer"}],"venue":"","publicationvenueid":null,"year":2022,"referencecount":49,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":249928616,"externalids":{"ACL":null,"DBLP":"conf/icse/TanGZZ22","ArXiv":null,"MAG":null,"CorpusId":"249928616","PubMed":null,"DOI":"10.1145/3510003.3510199","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1e51a37d3c917455641d9078398335d26045db84","title":"An Exploratory Study of Deep learning Supply Chain","authors":[{"authorId":"2112780861","name":"Xin Tan"},{"authorId":null,"name":"Kai Gao"},{"authorId":"40318014","name":"Minghui Zhou"},{"authorId":"2172168008","name":"Li Zhang"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2022,"referencecount":47,"citationcount":21,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Business","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-05-01","journal":{"name":"2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)","pages":"86-98","volume":null}}
{"corpusid":261100949,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2308-12545","ArXiv":"2308.12545","MAG":null,"CorpusId":"261100949","PubMed":null,"DOI":"10.1145/3611643.3613094","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/be5d25b8be30e2de14eec35d9e68bd04832e0760","title":"npm-follower: A Complete Dataset Tracking the NPM Ecosystem","authors":[{"authorId":"2197066999","name":"Donald Pinckney"},{"authorId":"2197063831","name":"Federico Cassano"},{"authorId":"2100712","name":"Arjun Guha"},{"authorId":"2115025755","name":"Jonathan Bell"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2023,"referencecount":42,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2023-08-24","journal":{"name":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":237271594,"externalids":{"ACL":null,"DBLP":"journals/peerj-cs/BonifroGLZ21","ArXiv":null,"MAG":null,"CorpusId":"237271594","PubMed":"34825053","DOI":"10.7717/peerj-cs.631","PubMedCentral":"8592246"},"url":"https://www.semanticscholar.org/paper/7253aed9df965d85595308805a602ec19731cace","title":"Image-based many-language programming language identification","authors":[{"authorId":"1800501369","name":"Francesca Del Bonifro"},{"authorId":"1716204","name":"M. Gabbrielli"},{"authorId":"12289629","name":"Antonio Lategano"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"PeerJ Computer Science","publicationvenueid":"138e58fc-8643-41c2-a92c-068ea4f4c607","year":2021,"referencecount":41,"citationcount":4,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Medicine","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2021-07-23","journal":{"name":"PeerJ Computer Science","pages":null,"volume":"7"}}
{"corpusid":221094207,"externalids":{"ACL":null,"DBLP":"conf/msr/PietriRZ20a","ArXiv":"2011.07914","MAG":"3100926178","CorpusId":"221094207","PubMed":null,"DOI":"10.1145/3379597.3387506","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/6a73bb1dbf27c9a52a366dd910ee846bb803bb78","title":"Determining the Intrinsic Structure of Public Software Development History","authors":[{"authorId":"114748393","name":"Antoine Pietri"},{"authorId":"2056082988","name":"Guillaume Rousseau"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":17,"citationcount":2,"influentialcitationcount":1,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-05-01","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"602-605","volume":null}}
{"corpusid":265456297,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2311-15204","ArXiv":"2311.15204","MAG":null,"CorpusId":"265456297","PubMed":null,"DOI":"10.48550/arXiv.2311.15204","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/53cd38484260d6f74e81190d352458e0c9bfa8d7","title":"OpenDigger: Data Mining and Information Service System for Open Collaboration Digital Ecosystem","authors":[{"authorId":"2206513193","name":"Xiaoya Xia"},{"authorId":"2268432483","name":"Shengyu Zhao"},{"authorId":"2268401319","name":"Fanyu Han"},{"authorId":"150996341","name":"Fenglin Bi"},{"authorId":"2268455841","name":"Wei Wang"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2023,"referencecount":35,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2023-11-26","journal":{"name":"ArXiv","pages":null,"volume":"abs/2311.15204"}}
{"corpusid":214396666,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":"3006401371","CorpusId":"214396666","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/8f082d87b454096deaaa21464ed13c8c1d48963b","title":"Methods of Disambiguating and De-anonymizing Authorship in Large Scale Operational Data","authors":[{"authorId":"3110752","name":"Sadika Amreen"}],"venue":"","publicationvenueid":null,"year":2019,"referencecount":83,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":null,"publicationdate":null,"journal":{"name":"","pages":null,"volume":""}}
{"corpusid":215747660,"externalids":{"ACL":null,"DBLP":"conf/msr/Hung020","ArXiv":null,"MAG":"3091499655","CorpusId":"215747660","PubMed":null,"DOI":"10.1145/3379597.3387480","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/f19c85d8821877ea56c182ff9fbf753cac79d0a5","title":"Boa Views: Easy Modularization and Sharing of MSR Analyses","authors":[{"authorId":"1950163930","name":"Che Shian Hung"},{"authorId":"145310968","name":"Robert Dyer"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":30,"citationcount":4,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-05-01","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"147-157","volume":null}}
{"corpusid":237205965,"externalids":{"ACL":null,"DBLP":"conf/sigsoft/HeHGZ21","ArXiv":null,"MAG":null,"CorpusId":"237205965","PubMed":null,"DOI":"10.1145/3468264.3468571","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2010f41b13e9de42835fd0a7b36d4ed6e05c435b","title":"A large-scale empirical study on Java library migrations: prevalence, trends, and rationales","authors":[{"authorId":"2110435561","name":"Hao He"},{"authorId":"2127664123","name":"Runzhi He"},{"authorId":"2150471724","name":"Haiqiao Gu"},{"authorId":"40318014","name":"Minghui Zhou"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2021,"referencecount":83,"citationcount":23,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle"],"publicationdate":"2021-08-18","journal":{"name":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":247922555,"externalids":{"ACL":null,"DBLP":"conf/msr/Zacchiroli22","ArXiv":"2204.00256","MAG":null,"CorpusId":"247922555","PubMed":null,"DOI":"10.1145/3524842.3528491","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/924317e542cf8613b1fa9f4f8920fcc647d591e2","title":"A Large-scale Dataset of (Open Source) License Text Variants","authors":[{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2022,"referencecount":33,"citationcount":7,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Law","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-04-01","journal":{"name":"2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)","pages":"757-761","volume":null}}
{"corpusid":232320718,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2103-12168","ArXiv":"2103.12168","MAG":null,"CorpusId":"232320718","PubMed":null,"DOI":"10.1109/MSR52588.2021.00086","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/6e1c2ed0d4c3ea5780e9c295a60b1814791336e0","title":"Building the Collaboration Graph of Open-Source Software Ecosystem","authors":[{"authorId":"21780991","name":"Elena Lyulina"},{"authorId":"2057485166","name":"Mahmoud Jahanshahi"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":10,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-22","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"618-620","volume":null}}
{"corpusid":216482793,"externalids":{"ACL":null,"DBLP":"conf/msr/PietriRZ20","ArXiv":"2011.07821","MAG":"3099949978","CorpusId":"216482793","PubMed":null,"DOI":"10.1145/3379597.3387450","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/ff442d82b84a2d664382a6299abc56b793907102","title":"Forking Without Clicking: on How to Identify Software Repository Forks","authors":[{"authorId":"114748393","name":"Antoine Pietri"},{"authorId":"2056082988","name":"Guillaume Rousseau"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":36,"citationcount":6,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-05-01","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"277-287","volume":null}}
{"corpusid":266937458,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"266937458","PubMed":null,"DOI":"10.47941/jts.1610","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1b4593be1c991bc458692f2e5933669bd1c172bb","title":"An In-Depth Analysis of the Historical Progression and Future Trends in Source Control Management within Software Development","authors":[{"authorId":"2269079933","name":"Sridhar Mooghala"}],"venue":"Journal of Technology and Systems","publicationvenueid":"a489eed3-8bc8-4665-a12c-9b35fc50e99c","year":2024,"referencecount":16,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":["JournalArticle","Review"],"publicationdate":"2024-01-10","journal":{"name":"Journal of Technology and Systems","pages":null,"volume":null}}
{"corpusid":265509896,"externalids":{"ACL":null,"DBLP":"conf/sigsoft/FangHV23","ArXiv":null,"MAG":null,"CorpusId":"265509896","PubMed":null,"DOI":"10.1145/3611643.3616282","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/f441d9af2c23d2864e9cbfbd6a69e9cdb4d07747","title":"Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors","authors":[{"authorId":"2113485693","name":"Hongbo Fang"},{"authorId":"2262933523","name":"James D. Herbsleb"},{"authorId":"2268786501","name":"Bogdan Vasilescu"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2023,"referencecount":82,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Business","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle"],"publicationdate":"2023-11-30","journal":{"name":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":245877445,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2201-04588","ArXiv":"2201.04588","MAG":null,"CorpusId":"245877445","PubMed":null,"DOI":"10.1145/3510003.3510619","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/39ea856a2c5fa12ffebeddb5d1f7257319b5200a","title":"Big Data = Big Insights? Operationalising Brooks' Law in a Massive GitHub Data Set","authors":[{"authorId":"3327783","name":"Christoph Gote"},{"authorId":"2618549","name":"Pavlin Mavrodiev"},{"authorId":"1733303","name":"F. Schweitzer"},{"authorId":"50790523","name":"Ingo Scholtes"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2022,"referencecount":63,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Physics","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2022-01-12","journal":{"name":"2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)","pages":"262-273","volume":null}}
{"corpusid":257771413,"externalids":{"ACL":null,"DBLP":"conf/ispw/RosaMSBO23","ArXiv":"2303.15990","MAG":null,"CorpusId":"257771413","PubMed":null,"DOI":"10.1109/ICSSP59042.2023.00011","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/91027b1708f8a7b0f6a23f83220d7b468de4fab1","title":"Automatically Generating Dockerfiles via Deep Learning: Challenges and Promises","authors":[{"authorId":"118283839","name":"Giovanni Rosa"},{"authorId":"2079107343","name":"A. Mastropaolo"},{"authorId":"3439470","name":"Simone Scalabrino"},{"authorId":"1801330","name":"G. Bavota"},{"authorId":"143764471","name":"Rocco Oliveto"}],"venue":"International Conference on Software and Systems Process","publicationvenueid":"6954ba22-4baa-4a90-a231-8d972e643938","year":2023,"referencecount":49,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-03-28","journal":{"name":"2023 IEEE/ACM International Conference on Software and System Processes (ICSSP)","pages":"1-12","volume":null}}
{"corpusid":259836026,"externalids":{"ACL":null,"DBLP":"conf/msr/ChidambaramDM23","ArXiv":null,"MAG":null,"CorpusId":"259836026","PubMed":null,"DOI":"10.1109/MSR59073.2023.00070","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/e30f471aa4235fd2afc262e47b5649e615cd0283","title":"A Dataset of Bot and Human Activities in GitHub","authors":[{"authorId":"52286934","name":"Natarajan Chidambaram"},{"authorId":"2794053","name":"Alexandre Decan"},{"authorId":"1794675","name":"T. Mens"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":15,"citationcount":3,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-05-01","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"465-469","volume":null}}
{"corpusid":199501640,"externalids":{"ACL":null,"DBLP":"conf/sigsoft/He19","ArXiv":null,"MAG":"2968771148","CorpusId":"199501640","PubMed":null,"DOI":"10.1145/3338906.3342494","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/52fea35417f05e5140537a4135045453f54255de","title":"Understanding source code comments at large-scale","authors":[{"authorId":"2110435520","name":"Hao He"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2019,"referencecount":22,"citationcount":15,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2019-08-12","journal":{"name":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":208201967,"externalids":{"ACL":null,"DBLP":"journals/ese/GoteSS21","ArXiv":"1911.09484","MAG":"2990705367","CorpusId":"208201967","PubMed":"34720670","DOI":"10.1007/s10664-020-09928-2","PubMedCentral":"8550015"},"url":"https://www.semanticscholar.org/paper/1b83444148a5b1052a1ed9aeb7ed1b70bfbe52b3","title":"Analysing Time-Stamped Co-Editing Networks in Software Development Teams using git2net","authors":[{"authorId":"3327783","name":"Christoph Gote"},{"authorId":"1796314","name":"Ingo Scholtes"},{"authorId":"1733303","name":"F. Schweitzer"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2019,"referencecount":87,"citationcount":9,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Physics","source":"external"},{"category":"Medicine","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2019-11-21","journal":{"name":"Empirical Software Engineering","pages":null,"volume":"26"}}
{"corpusid":196621469,"externalids":{"ACL":null,"DBLP":"conf/promise/DeyMM19","ArXiv":"1907.06538","MAG":"2972027409","CorpusId":"196621469","PubMed":null,"DOI":"10.1145/3345629.3345634","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/43c8db3f20667f90d3ef5151d7b518456b7ece4e","title":"Patterns of Effort Contribution and Demand and User Classification based on Participation Patterns in NPM Ecosystem","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"7777374","name":"Yuxing Ma"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Conference on Predictive Models in Software Engineering","publicationvenueid":"dee2646c-57cc-4b8b-92c8-98d0d78d35cf","year":2019,"referencecount":40,"citationcount":23,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Business","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2019-07-15","journal":{"name":"Proceedings of the Fifteenth International Conference on Predictive Models and Data Analytics in Software Engineering","pages":null,"volume":null}}
{"corpusid":231662100,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2101-08508","ArXiv":"2101.08508","MAG":null,"CorpusId":"231662100","PubMed":null,"DOI":"10.1145/3457682.3457756","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/4f55f477fe2b432394ac63f74f350c70c1cbafd5","title":"Content-Based Textual File Type Detection at Scale","authors":[{"authorId":"1800501369","name":"Francesca Del Bonifro"},{"authorId":"1716204","name":"M. Gabbrielli"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"International Conference on Machine Learning and Computing","publicationvenueid":"d79c0d2a-37de-4287-87e7-1e57576dcae7","year":2021,"referencecount":41,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2021-01-21","journal":{"name":"2021 13th International Conference on Machine Learning and Computing","pages":null,"volume":null}}
{"corpusid":232258039,"externalids":{"ACL":null,"DBLP":"conf/botse-ws/SaadatCS21","ArXiv":"2103.09319","MAG":null,"CorpusId":"232258039","PubMed":null,"DOI":"10.1109/BotSE52550.2021.00008","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1a0985635a32421b5e522aae352d86c40891523b","title":"Do Bots Modify the Workflow of GitHub Teams?","authors":[{"authorId":"50592937","name":"Samaneh Saadat"},{"authorId":"2054580452","name":"Natalia Colmenares"},{"authorId":"1727071","name":"G. Sukthankar"}],"venue":"International Workshop on Bots in Software Engineering","publicationvenueid":"3eb84d2d-0c93-496f-ae48-0e83e848b328","year":2021,"referencecount":27,"citationcount":9,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2021-03-16","journal":{"name":"2021 IEEE/ACM Third International Workshop on Bots in Software Engineering (BotSE)","pages":"1-5","volume":null}}
{"corpusid":220424499,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2007-04816","ArXiv":"2007.04816","MAG":"3041596111","CorpusId":"220424499","PubMed":null,"DOI":"10.1145/3382494.3410685","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/abe78288366f7b38149ca0853daa65a4d1b71214","title":"Effect of Technical and Social Factors on Pull Request Quality for the NPM Ecosystem","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Symposium on Empirical Software Engineering and Measurement","publicationvenueid":"9d988347-1c3c-4cf9-9b6f-d15117510bf4","year":2020,"referencecount":49,"citationcount":12,"influentialcitationcount":2,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Review"],"publicationdate":"2020-07-08","journal":{"name":"Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","pages":null,"volume":null}}
{"corpusid":212747823,"externalids":{"ACL":null,"DBLP":"conf/icse/DeyVM20","ArXiv":"2003.07961","MAG":"3087838626","CorpusId":"212747823","PubMed":null,"DOI":"10.1145/3387940.3391502","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/c6e1e2b00feca97b662fe67af434f090df3fc339","title":"An Exploratory Study of Bot Commits","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"2434621","name":"Bogdan Vasilescu"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2020,"referencecount":20,"citationcount":16,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2020-03-17","journal":{"name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","pages":null,"volume":null}}
{"corpusid":239016824,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2110-08403","ArXiv":null,"MAG":null,"CorpusId":"239016824","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/7ff691d7621b16c4846fcbcb64ca47e86f135620","title":"Nalanda: A Socio-Technical Graph for Building Software Analytics Tools at Enterprise Scale","authors":[{"authorId":"22192720","name":"C. Maddila"},{"authorId":"2075308541","name":"Apoorva Agrawal"},{"authorId":"143609903","name":"Thomas Zimmermann"},{"authorId":"3047212","name":"Nicole Forsgren"},{"authorId":"39496137","name":"Kim Herzig"},{"authorId":"1737202","name":"A. Deursen"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2021,"referencecount":46,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Sociology","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":null,"journal":{"name":"ArXiv","pages":null,"volume":"abs/2110.08403"}}
{"corpusid":263841236,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"263841236","PubMed":null,"DOI":"10.56830/ijams09202304","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/09f7cfa390e3f6ecbeec4a249de49071969352ac","title":"The Impact of Talent Management Practices on Employee Engagement in Federal Authority For Identity And Citizenship In Dubai","authors":[{"authorId":"2257073619","name":"Khalid Ayoob Ahmad"}],"venue":"International Journal of Accounting and Management Sciences","publicationvenueid":null,"year":2023,"referencecount":23,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":["JournalArticle","Review"],"publicationdate":"2023-09-01","journal":{"name":"International Journal of Accounting and Management Sciences","pages":null,"volume":null}}
{"corpusid":221090468,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2008-03439","ArXiv":"2008.03439","MAG":"3048259495","CorpusId":"221090468","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/0f5ec9fd111c5ca54d27ae316944024a3b0bcea1","title":"More Effective Software Repository Mining","authors":[{"authorId":"1866565388","name":"Adam Tutko"},{"authorId":"34968683","name":"Austin Z. Henley"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2020,"referencecount":8,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2020-08-08","journal":{"name":"ArXiv","pages":null,"volume":"abs/2008.03439"}}
{"corpusid":209451701,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2005-01000","ArXiv":"2005.01000","MAG":"3022741815","CorpusId":"209451701","PubMed":null,"DOI":"10.1145/3377811.3380435","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/d80b47352c173ad506d2f1f161a614d955655cfd","title":"BCFA: Bespoke Control Flow Analysis for CFA at Scale","authors":[{"authorId":"50822234","name":"Ramanathan Ramu"},{"authorId":"145926658","name":"Ganesha Upadhyaya"},{"authorId":"2909676","name":"H. Nguyen"},{"authorId":"144212535","name":"Hridesh Rajan"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2020,"referencecount":41,"citationcount":2,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2020-05-03","journal":{"name":"2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)","pages":"1037-1048","volume":null}}
{"corpusid":269362979,"externalids":{"ACL":null,"DBLP":null,"ArXiv":"2404.16565","MAG":null,"CorpusId":"269362979","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/6c8327a53fb85a491504694e93431f95197df7ce","title":"PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages","authors":[{"authorId":"2217369223","name":"Kai Gao"},{"authorId":"2143842504","name":"Weiwei Xu"},{"authorId":"2298284845","name":"Wenhao Yang"},{"authorId":"2298604626","name":"Minghui Zhou"}],"venue":"","publicationvenueid":null,"year":2024,"referencecount":65,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":null,"publicationdate":"2024-04-25","journal":null}
{"corpusid":265056134,"externalids":{"ACL":null,"DBLP":"conf/esem/MalviyaThakurMZBB23","ArXiv":null,"MAG":null,"CorpusId":"265056134","PubMed":null,"DOI":"10.1109/ESEM56168.2023.10304869","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/719374721187ce641e53ca2bac34734fb986d8c2","title":"How R Developers explain their Package Choice: A Survey","authors":[{"authorId":"2162186197","name":"Addi Malviya-Thakur"},{"authorId":"1702551","name":"A. Mockus"},{"authorId":"2265679140","name":"Russell Zaretzki"},{"authorId":"2416088","name":"B. Bichescu"},{"authorId":"2265714165","name":"Randy V. Bradley"}],"venue":"International Symposium on Empirical Software Engineering and Measurement","publicationvenueid":"9d988347-1c3c-4cf9-9b6f-d15117510bf4","year":2023,"referencecount":53,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2023-10-26","journal":{"name":"2023 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","pages":"1-12","volume":null}}
{"corpusid":266162809,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2312-06382","ArXiv":"2312.06382","MAG":null,"CorpusId":"266162809","PubMed":null,"DOI":"10.48550/arXiv.2312.06382","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/6eac0aac9995e1a47b48b6cc2ea7ac751a50d792","title":"SciCat: A Curated Dataset of Scientific Software Repositories","authors":[{"authorId":"2162186197","name":"Addi Malviya-Thakur"},{"authorId":"1731000","name":"Reed Milewicz"},{"authorId":"2273563352","name":"Lavinia Paganini"},{"authorId":"2174738095","name":"Ahmed Samir Imam Mahmoud"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2023,"referencecount":12,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-12-11","journal":{"name":"ArXiv","pages":null,"volume":"abs/2312.06382"}}
{"corpusid":269791149,"externalids":{"ACL":null,"DBLP":null,"ArXiv":"2405.10243","MAG":null,"CorpusId":"269791149","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1f3eab170499177e7d2852a563197f386d8fbde1","title":"DocuMint: Docstring Generation for Python using Small Language Models","authors":[{"authorId":"2264267542","name":"Bibek Poudel"},{"authorId":"2301455788","name":"Adam Cook"},{"authorId":"2301454695","name":"Sekou Traore"},{"authorId":"2234299665","name":"Shelah Ameli"}],"venue":"","publicationvenueid":null,"year":2024,"referencecount":34,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":null,"publicationdate":"2024-05-16","journal":null}
{"corpusid":232320354,"externalids":{"ACL":null,"DBLP":"conf/msr/ReidEBT21","ArXiv":"2103.12304","MAG":null,"CorpusId":"232320354","PubMed":null,"DOI":"10.1109/MSR52588.2021.00087","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/8c073e15788b5bbf2fb398b2b2adbcd04443e727","title":"Tracing Vulnerable Code Lineage","authors":[{"authorId":"2058644472","name":"David Reid"},{"authorId":"71278583","name":"Kalvin Eng"},{"authorId":"2065313146","name":"Chris Bogart"},{"authorId":"1866565388","name":"Adam Tutko"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":9,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-23","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"621-623","volume":null}}
{"corpusid":248572474,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2205-03597","ArXiv":"2205.03597","MAG":null,"CorpusId":"248572474","PubMed":"36385238","DOI":"10.1038/s41597-022-01819-z","PubMedCentral":"9668998"},"url":"https://www.semanticscholar.org/paper/e230ded658393b34ea2d844d60d385f50ee14632","title":"Evolving collaboration, dependencies, and use in the Rust Open Source Software ecosystem","authors":[{"authorId":"48175883","name":"William Schueller"},{"authorId":"39963117","name":"Johannes Wachs"},{"authorId":"2776193","name":"V. Servedio"},{"authorId":"1723195","name":"S. Thurner"},{"authorId":"148301756","name":"V. Loreto"}],"venue":"Scientific Data","publicationvenueid":"62924b2a-8fb8-4b93-92c6-735516b49af0","year":2022,"referencecount":54,"citationcount":8,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Sociology","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Medicine","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-05-07","journal":{"name":"Scientific Data","pages":null,"volume":"9"}}
{"corpusid":201698398,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-1908-11431","ArXiv":"1908.11431","MAG":"3024062390","CorpusId":"201698398","PubMed":null,"DOI":"10.1109/tse.2020.2993758","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/bae0e0fc3cf29df75cd12013a6e979d3f0069691","title":"A Methodology for Analyzing Uptake of Software Technologies Among Developers","authors":[{"authorId":"7777374","name":"Yuxing Ma"},{"authorId":"1702551","name":"A. Mockus"},{"authorId":"2858102","name":"R. Zaretzki"},{"authorId":"2093806","name":"Randy V. Bradley"},{"authorId":"2416088","name":"B. Bichescu"}],"venue":"IEEE Transactions on Software Engineering","publicationvenueid":"c99cfe66-b71c-4ca4-bedd-26267b9cb068","year":2019,"referencecount":70,"citationcount":6,"influentialcitationcount":1,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2019-08-29","journal":{"name":"IEEE Transactions on Software Engineering","pages":"485-501","volume":"48"}}
{"corpusid":253421701,"externalids":{"ACL":null,"DBLP":"conf/sigsoft/MaddilaSA0BFAHD22","ArXiv":"2110.08403","MAG":null,"CorpusId":"253421701","PubMed":null,"DOI":"10.1145/3540250.3558949","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/f4bdd981d5b0e8e8e52f7bc03398df657bcaf33b","title":"Nalanda: a socio-technical graph platform for building software analytics tools at enterprise scale","authors":[{"authorId":"22192720","name":"C. Maddila"},{"authorId":"2138898584","name":"Suhas Shanbhogue"},{"authorId":"2075308541","name":"Apoorva Agrawal"},{"authorId":"143609903","name":"Thomas Zimmermann"},{"authorId":"40097378","name":"Chetan Bansal"},{"authorId":"3047212","name":"Nicole Forsgren"},{"authorId":"2190291447","name":"D. Agrawal"},{"authorId":"39496137","name":"Kim Herzig"},{"authorId":"1737202","name":"A. Deursen"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2021,"referencecount":67,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Sociology","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle"],"publicationdate":"2021-10-15","journal":{"name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":263767257,"externalids":{"ACL":null,"DBLP":"conf/icsm/BuiLS23","ArXiv":null,"MAG":null,"CorpusId":"263767257","PubMed":null,"DOI":"10.1109/ICSME58846.2023.00026","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/c389b63370a6045280a28ecacf13e849dd4cb802","title":"DockerCleaner: Automatic Repair of Security Smells in Dockerfiles","authors":[{"authorId":"2051539980","name":"Quang-Cuong Bui"},{"authorId":"2273975645","name":"Malte Laukötter"},{"authorId":"2256394676","name":"Riccardo Scandariato"}],"venue":"IEEE International Conference on Software Maintenance and Evolution","publicationvenueid":"b02cf974-33be-46bd-9cbc-022db6cb7151","year":2023,"referencecount":31,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-10-01","journal":{"name":"2023 IEEE International Conference on Software Maintenance and Evolution (ICSME)","pages":"160-170","volume":null}}
{"corpusid":211066240,"externalids":{"ACL":null,"DBLP":"conf/msr/MockusSKD20","ArXiv":"2002.02707","MAG":"3004952902","CorpusId":"211066240","PubMed":null,"DOI":"10.1145/3379597.3387499","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/4f346ee669c7fe7c952cc01dfcc7fbbe7d6cc794","title":"A Complete Set of Related Git Repositories Identified via Community Detection Approaches Based on Shared Commits","authors":[{"authorId":"1702551","name":"A. Mockus"},{"authorId":"1740799","name":"D. Spinellis"},{"authorId":"148430293","name":"Zoe Kotti"},{"authorId":"1491707489","name":"G. J. Dusing"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":17,"citationcount":18,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-02-07","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"513-517","volume":null}}
{"corpusid":232307756,"externalids":{"ACL":null,"DBLP":"conf/benevol/GolzadehDM20","ArXiv":"2103.11779","MAG":"3186900584","CorpusId":"232307756","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/9a513fda33acaff543e5e5bd470167c6c91a4e49","title":"Evaluating a Bot Detection Model on Git Commit Messages","authors":[{"authorId":"13546149","name":"M. Golzadeh"},{"authorId":"2794053","name":"Alexandre Decan"},{"authorId":"1794675","name":"T. Mens"}],"venue":"BElgian-NEtherlands software eVOLution symposium","publicationvenueid":"8c58e1ac-51b8-4ca7-b9ac-2de8f6535fd3","year":2021,"referencecount":17,"citationcount":8,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2021-03-22","journal":{"name":"ArXiv","pages":null,"volume":"abs/2103.11779"}}
{"corpusid":250627613,"externalids":{"ACL":null,"DBLP":"conf/esem/KhalilZ22","ArXiv":"2207.08436","MAG":null,"CorpusId":"250627613","PubMed":null,"DOI":"10.1145/3544902.3546239","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2937a015547b9fa16b26bb216938408bce2152ad","title":"Software Artifact Mining in Software Engineering Conferences: A Meta-Analysis","authors":[{"authorId":"151409813","name":"Zeinab Abou Khalil"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"International Symposium on Empirical Software Engineering and Measurement","publicationvenueid":"9d988347-1c3c-4cf9-9b6f-d15117510bf4","year":2022,"referencecount":36,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle"],"publicationdate":"2022-07-18","journal":{"name":"Proceedings of the 16th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement","pages":null,"volume":null}}
{"corpusid":231922094,"externalids":{"ACL":null,"DBLP":"conf/icse/HeXCLZ21","ArXiv":null,"MAG":null,"CorpusId":"231922094","PubMed":null,"DOI":"10.1109/ICSE-Companion52605.2021.00023","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/dbd14e40ba34d5029310010f04a4259e65ad7dbc","title":"MigrationAdvisor: Recommending Library Migrations from Large-Scale Open-Source Data","authors":[{"authorId":"2110435561","name":"Hao He"},{"authorId":"2110180441","name":"Yulin Xu"},{"authorId":"2222987049","name":"Xiaoyan Cheng"},{"authorId":"2084524","name":"Guangtai Liang"},{"authorId":"40318014","name":"Minghui Zhou"}],"venue":"2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","publicationvenueid":null,"year":2021,"referencecount":12,"citationcount":5,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2021-05-01","journal":{"name":"2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","pages":"9-12","volume":null}}
{"corpusid":212747889,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2003-08349","ArXiv":"2003.08349","MAG":"3099736442","CorpusId":"212747889","PubMed":null,"DOI":"10.1145/3379597.3387500","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/c8d40343dfc0654154e42717209e1d6ab70ebc01","title":"A Dataset and an Approach for Identity Resolution of 38 Million Author IDs extracted from 2B Git Commits","authors":[{"authorId":"1557361743","name":"Tanner Fry"},{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"98524776","name":"Andrey Karnauch"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":21,"citationcount":28,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2020-03-18","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"518-522","volume":null}}
{"corpusid":243766778,"externalids":{"ACL":null,"DBLP":"conf/tapp/0001BK21","ArXiv":null,"MAG":null,"CorpusId":"243766778","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/282d96d9e3d2865841c3e0d7561d4a139a9e56ea","title":"GitLab2PROV - Provenance of Software Projects hosted on GitLab","authors":[{"authorId":"49125910","name":"A. Schreiber"},{"authorId":"1998032862","name":"C. D. Boer"},{"authorId":"147328669","name":"L. Kurnatowski"}],"venue":"Workshop on the Theory and Practice of Provenance","publicationvenueid":"ab43544e-0815-4d8b-8874-b2b11e365890","year":2021,"referencecount":22,"citationcount":4,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":null,"journal":null}
{"corpusid":235718459,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2103-01145","ArXiv":"2103.01145","MAG":null,"CorpusId":"235718459","PubMed":null,"DOI":"10.1109/MSR52588.2021.00020","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/c5a850f50a95a56cf7000425c8bb59e87f80d6ee","title":"The Secret Life of Hackathon Code Where does it come from and where does it go?","authors":[{"authorId":"1643783463","name":"Ahmed Imam"},{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"1727000","name":"Alexander Nolte"},{"authorId":"1702551","name":"A. Mockus"},{"authorId":"1705550","name":"J. Herbsleb"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":56,"citationcount":8,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-01","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"68-79","volume":null}}
{"corpusid":251137429,"externalids":{"ACL":null,"DBLP":"conf/iccsa/JobstACSTD22","ArXiv":null,"MAG":null,"CorpusId":"251137429","PubMed":null,"DOI":"10.1007/978-3-031-10548-7_48","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/4a40181054ad0ef5de5d7ac4b8093d101ff7bc5e","title":"Efficient GitHub Crawling Using the GraphQL API","authors":[{"authorId":"2154503339","name":"Adrian Jobst"},{"authorId":"2038524133","name":"Daniel Atzberger"},{"authorId":"2051810602","name":"Tim Cech"},{"authorId":"3431595","name":"Willy Scheibel"},{"authorId":"3008227","name":"Matthias Trapp"},{"authorId":"1774471","name":"J. Döllner"}],"venue":"Communication Systems and Applications","publicationvenueid":"a210e09f-0ea1-4863-bc9c-75ddc51197ac","year":2022,"referencecount":34,"citationcount":4,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":null,"journal":{"name":null,"pages":"662-677","volume":null}}
{"corpusid":226274183,"externalids":{"ACL":null,"DBLP":"conf/sigsoft/LambaTAKMV20","ArXiv":null,"MAG":"3099026746","CorpusId":"226274183","PubMed":null,"DOI":"10.1145/3368089.3409705","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/b422f47f401630b818b625446e7680a2ac025879","title":"Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem","authors":[{"authorId":"2069936","name":"Hemank Lamba"},{"authorId":"50820040","name":"Asher Trockman"},{"authorId":"51517722","name":"D. Armanios"},{"authorId":"145832795","name":"Christian Kästner"},{"authorId":"145547217","name":"Heather Miller"},{"authorId":"2434621","name":"Bogdan Vasilescu"}],"venue":"ESEC/SIGSOFT FSE","publicationvenueid":null,"year":2020,"referencecount":91,"citationcount":11,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Geography","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2020-11-07","journal":{"name":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","pages":null,"volume":null}}
{"corpusid":265456234,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2311-15212","ArXiv":"2311.15212","MAG":null,"CorpusId":"265456234","PubMed":null,"DOI":"10.48550/arXiv.2311.15212","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/f72181fb9ad0a7eaed7b82f8c985d53ff7a0c0a5","title":"OpenPerf: A Benchmarking Framework for the Sustainable Development of the Open-Source Ecosystem","authors":[{"authorId":"150996341","name":"Fenglin Bi"},{"authorId":"2268401319","name":"Fanyu Han"},{"authorId":"2268432483","name":"Shengyu Zhao"},{"authorId":"2268419073","name":"Jinlu Li"},{"authorId":"2268417948","name":"Yanbin Zhang"},{"authorId":"2268455841","name":"Wei Wang"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2023,"referencecount":42,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Environmental Science","source":"s2-fos-model"},{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-11-26","journal":{"name":"ArXiv","pages":null,"volume":"abs/2311.15212"}}
{"corpusid":256808494,"externalids":{"ACL":null,"DBLP":"journals/pacmhci/BoumaSimsA23","ArXiv":"2302.05351","MAG":null,"CorpusId":"256808494","PubMed":null,"DOI":"10.1145/3579461","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/a36705bf5881c58eb15b871d2d4ec38102022623","title":"Beyond the Boolean: How Programmers Ask About, Use, and Discuss Gender","authors":[{"authorId":"1887618805","name":"Elijah Bouma-Sims"},{"authorId":"3224778","name":"Y. Acar"}],"venue":"Proc. ACM Hum. Comput. Interact.","publicationvenueid":null,"year":2023,"referencecount":109,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Sociology","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-02-10","journal":{"name":"Proceedings of the ACM on Human-Computer Interaction","pages":"1 - 31","volume":"7"}}
{"corpusid":235718257,"externalids":{"ACL":null,"DBLP":"conf/msr/YongPQC21","ArXiv":null,"MAG":null,"CorpusId":"235718257","PubMed":null,"DOI":"10.1109/MSR52588.2021.00089","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/188c743819672fcacde7104d95ad94f532d7694a","title":"The Diversity-Innovation Paradox in Open-Source Software","authors":[{"authorId":"123767983","name":"Meng Yong"},{"authorId":"1900414153","name":"Lavínia Paganini"},{"authorId":"49660281","name":"Huilian Sophie Qiu"},{"authorId":"2068518170","name":"José Bayoán Santiago Calderón"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":11,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-05-01","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"627-629","volume":null}}
{"corpusid":212628547,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2003-03172","ArXiv":"2003.03172","MAG":"3009640336","CorpusId":"212628547","PubMed":null,"DOI":"10.1145/3379597.3387478","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/a743e4b5cafbe988a02be3f981e2724963ee4ef2","title":"Detecting and Characterizing Bots that Commit Code","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"2053564239","name":"Sara Mousavi"},{"authorId":"144167059","name":"Eduardo Ponce"},{"authorId":"1557361743","name":"Tanner Fry"},{"authorId":"2434621","name":"Bogdan Vasilescu"},{"authorId":"145853127","name":"Anna Filippova"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2020,"referencecount":51,"citationcount":67,"influentialcitationcount":7,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Mathematics","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-03-02","journal":{"name":"2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR)","pages":"209-219","volume":null}}
{"corpusid":251660327,"externalids":{"ACL":null,"DBLP":"journals/scp/LiuZJW22","ArXiv":null,"MAG":null,"CorpusId":"251660327","PubMed":null,"DOI":"10.1016/j.scico.2022.102858","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/acc031dc57eed5ba9e8cc2e06b9b40b34854724e","title":"A method for identifying references between projects in GitHub","authors":[{"authorId":"2116441690","name":"Bao Liu"},{"authorId":"2152830814","name":"Li Zhang"},{"authorId":"144924150","name":"Jing Jiang"},{"authorId":"2144697806","name":"Liang Wang"}],"venue":"Science of Computer Programming","publicationvenueid":"08d68650-8568-4b4f-8c14-1b61ccf55b17","year":2022,"referencecount":18,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-08-01","journal":{"name":"Sci. Comput. Program.","pages":"102858","volume":"222"}}
{"corpusid":250264679,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2207-01015","ArXiv":"2207.01015","MAG":null,"CorpusId":"250264679","PubMed":"36159898","DOI":"10.1007/s10664-022-10201-x","PubMedCentral":"9489595"},"url":"https://www.semanticscholar.org/paper/dc8a53a9117bb7a97519ad9ccbb657236da96e79","title":"One-off events? An empirical study of hackathon code creation and reuse","authors":[{"authorId":"2174738095","name":"Ahmed Samir Imam Mahmoud"},{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"1727000","name":"Alexander Nolte"},{"authorId":"1702551","name":"A. Mockus"},{"authorId":"1705550","name":"J. Herbsleb"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2022,"referencecount":72,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Medicine","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2022-07-03","journal":{"name":"Empirical Software Engineering","pages":null,"volume":"27"}}
{"corpusid":235718317,"externalids":{"ACL":null,"DBLP":"conf/msr/KamienskiPBH21","ArXiv":null,"MAG":null,"CorpusId":"235718317","PubMed":null,"DOI":"10.1109/MSR52588.2021.00066","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/ab8a355a687fda863114dc713c7a6781bd632a07","title":"PySStuBs: Characterizing Single-Statement Bugs in Popular Open-Source Python Projects","authors":[{"authorId":"2117511620","name":"Arthur V. Kamienski"},{"authorId":"2117534349","name":"Luisa Palechor"},{"authorId":"1755660","name":"C. Bezemer"},{"authorId":"145369636","name":"Abram Hindle"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":22,"citationcount":13,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-05-01","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"520-524","volume":null}}
{"corpusid":232221467,"externalids":{"ACL":null,"DBLP":"phd/us/Valiev21","ArXiv":null,"MAG":null,"CorpusId":"232221467","PubMed":null,"DOI":"10.1184/r1/14512605.v1","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/b49b05fe038b8cb31203f0dbe1c774031a53b6d2","title":"External Factors in Sustainability of Open Source Software","authors":[{"authorId":"2091537692","name":"Marat Valiev"}],"venue":"","publicationvenueid":null,"year":2021,"referencecount":168,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Environmental Science","source":"s2-fos-model"},{"category":"Business","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":232270079,"externalids":{"ACL":null,"DBLP":"conf/msr/ImamD21","ArXiv":"2103.10167","MAG":null,"CorpusId":"232270079","PubMed":null,"DOI":"10.1109/MSR52588.2021.00085","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/56f1ce9f5d440fc7fcdca4517422aa31a4e226bf","title":"Tracking Hackathon Code Creation and Reuse","authors":[{"authorId":"1643783463","name":"Ahmed Imam"},{"authorId":"8041820","name":"Tapajit Dey"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":19,"citationcount":3,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-18","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"615-617","volume":null}}
{"corpusid":221589904,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"221589904","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1ae6b766e72a74dafb1f3b8fba0f62b6bbd0096a","title":"ENABLING EFFICIENT STORAGE OF GIT REPOSITORIES IN PACLAB","authors":[{"authorId":"39717293","name":"R. Brunner"}],"venue":"","publicationvenueid":null,"year":2020,"referencecount":42,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":259836500,"externalids":{"ACL":null,"DBLP":"conf/msr/PrzymusFNS23","ArXiv":null,"MAG":null,"CorpusId":"259836500","PubMed":null,"DOI":"10.1109/MSR59073.2023.00056","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/25c6390471d34ab9834478f3b4a2b07b765ec800","title":"The Secret Life of CVEs","authors":[{"authorId":"2612841","name":"Piotr Przymus"},{"authorId":"3126979","name":"Mikołaj Fejzer"},{"authorId":"102402045","name":"Jakub Narębski"},{"authorId":"1741679","name":"K. Stencel"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":21,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-05-01","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"362-366","volume":null}}
{"corpusid":248506107,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2205-01351","ArXiv":"2205.01351","MAG":null,"CorpusId":"248506107","PubMed":null,"DOI":"10.1145/3524842.3528503","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/07a0b03e12e1dcd3066342228a96cb6d30938e5c","title":"Tooling for Time- and Space-efficient git Repository Mining","authors":[{"authorId":"2114863886","name":"Fabian Heseding"},{"authorId":"3431595","name":"Willy Scheibel"},{"authorId":"1774471","name":"J. Döllner"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2022,"referencecount":15,"citationcount":3,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-05-01","journal":{"name":"2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)","pages":"413-417","volume":null}}
{"corpusid":235670134,"externalids":{"ACL":null,"DBLP":"journals/epjds/TrujilloHB22","ArXiv":"2106.15611","MAG":"3177221076","CorpusId":"235670134","PubMed":null,"DOI":"10.1140/epjds/s13688-022-00345-7","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/1e6f74cf862f69907009c198a98d596c837be920","title":"The penumbra of open source: projects outside of centralized platforms are longer maintained, more academic and more collaborative","authors":[{"authorId":"1612340138","name":"Milo Z. Trujillo"},{"authorId":"2023694909","name":"Laurent H'ebert-Dufresne"},{"authorId":"2229958","name":"James P. Bagrow"}],"venue":"EPJ Data Science","publicationvenueid":"aa12af37-66cf-4a5d-9368-18b04d86d37f","year":2021,"referencecount":45,"citationcount":8,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2021-06-29","journal":{"name":"EPJ Data Science","pages":null,"volume":"11"}}
{"corpusid":247748549,"externalids":{"ACL":null,"DBLP":"journals/tosem/CatakYA22","ArXiv":null,"MAG":null,"CorpusId":"247748549","PubMed":null,"DOI":"10.1145/3527451","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/7f36cf7b7ed9bd80e3843d860b7044a5988b2742","title":"Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data","authors":[{"authorId":"1821027","name":"Ferhat Ozgur Catak"},{"authorId":"145456500","name":"T. Yue"},{"authorId":"47495965","name":"Sajid Ali"}],"venue":"ACM Transactions on Software Engineering and Methodology","publicationvenueid":"0730105a-4941-449f-9450-28cba8ae056b","year":2022,"referencecount":69,"citationcount":13,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-03-28","journal":{"name":"ACM Transactions on Software Engineering and Methodology (TOSEM)","pages":"1 - 31","volume":"31"}}
{"corpusid":267292497,"externalids":{"ACL":null,"DBLP":"journals/computers/ScheibelBLAD24","ArXiv":null,"MAG":null,"CorpusId":"267292497","PubMed":null,"DOI":"10.3390/computers13020033","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/80ab9c24f40bcf75edbe1b629b29031eff957cd5","title":"Integrated Visual Software Analytics on the GitHub Platform","authors":[{"authorId":"3431595","name":"Willy Scheibel"},{"authorId":"2223534785","name":"Jasper Blum"},{"authorId":"2281573384","name":"Franziska Lauterbach"},{"authorId":"2038524133","name":"Daniel Atzberger"},{"authorId":"2256512307","name":"Jürgen Döllner"}],"venue":"De Computis","publicationvenueid":"38e26272-f1d7-470a-a99f-0b5884c9df6e","year":2024,"referencecount":63,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2024-01-25","journal":{"name":"Comput.","pages":"33","volume":"13"}}
{"corpusid":218718456,"externalids":{"ACL":null,"DBLP":"conf/icse/DeyKM21","ArXiv":"2005.10176","MAG":"3026105653","CorpusId":"218718456","PubMed":null,"DOI":"10.1109/ICSE43902.2021.00094","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/d558e0171d1cb60071ec5d55c222823005141067","title":"Representation of Developer Expertise in Open Source Software","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"98524776","name":"Andrey Karnauch"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2020,"referencecount":62,"citationcount":22,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2020-05-20","journal":{"name":"2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)","pages":"995-1007","volume":null}}
{"corpusid":263790976,"externalids":{"ACL":null,"DBLP":"journals/ese/FlintC022","ArXiv":"2209.04511","MAG":null,"CorpusId":"263790976","PubMed":null,"DOI":"10.1007/s10664-022-10200-y","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/d1988265d634962b4682dc2b1ff8200cbf0eb9eb","title":"Pitfalls and guidelines for using time-based Git data","authors":[{"authorId":"2056767397","name":"Samuel W. Flint"},{"authorId":"2056766928","name":"Jigyasa Chauhan"},{"authorId":"2256709693","name":"Robert Dyer"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2022,"referencecount":310,"citationcount":4,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2022-09-09","journal":{"name":"Empirical Software Engineering","pages":"1-55","volume":"27"}}
{"corpusid":267034907,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2401-10136","ArXiv":"2401.10136","MAG":null,"CorpusId":"267034907","PubMed":null,"DOI":"10.48550/arXiv.2401.10136","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/85d150958a873668a3b9f17f924ee55b84ede79b","title":"The Role of Data Filtering in Open Source Software Ranking and Selection","authors":[{"authorId":"2162186197","name":"Addi Malviya-Thakur"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2024,"referencecount":25,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2024-01-18","journal":{"name":"ArXiv","pages":null,"volume":"abs/2401.10136"}}
{"corpusid":248082107,"externalids":{"ACL":null,"DBLP":"conf/icse/ReidJM22","ArXiv":null,"MAG":null,"CorpusId":"248082107","PubMed":null,"DOI":"10.1145/3510003.3510216","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/db5c5f69cbf840a1b70087a17ea1f2d89c481a38","title":"The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software","authors":[{"authorId":"2058644472","name":"David Reid"},{"authorId":"2057485166","name":"Mahmoud Jahanshahi"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2022,"referencecount":43,"citationcount":6,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-05-01","journal":{"name":"2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)","pages":"2104-2115","volume":null}}
{"corpusid":257557686,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2303-08934","ArXiv":"2303.08934","MAG":null,"CorpusId":"257557686","PubMed":null,"DOI":"10.1109/MSR59073.2023.00021","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/517a4c10716f5f329e33abed7407b40ca67a8917","title":"PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages","authors":[{"authorId":"2155573042","name":"Wenxin Jiang"},{"authorId":"2022972891","name":"Nicholas Synovic"},{"authorId":"1723431934","name":"Purvish Jajal"},{"authorId":"2190180622","name":"Taylor R. Schorlemmer"},{"authorId":"2211732677","name":"Arav Tewari"},{"authorId":"2211733038","name":"Bhavesh Pareek"},{"authorId":"145078593","name":"G. Thiruvathukal"},{"authorId":"2111092425","name":"James C. Davis"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":49,"citationcount":10,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-03-15","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"57-61","volume":null}}
{"corpusid":211144094,"externalids":{"ACL":null,"DBLP":"conf/wcre/BoldiPVZ20","ArXiv":null,"MAG":"3041312709","CorpusId":"211144094","PubMed":null,"DOI":"10.1109/SANER48275.2020.9054827","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/dc58afb0f08fafca65033146fb35eef9a445ba4c","title":"Ultra-Large-Scale Repository Analysis via Graph Compression","authors":[{"authorId":"1733343","name":"P. Boldi"},{"authorId":"114748393","name":"Antoine Pietri"},{"authorId":"1737624","name":"S. Vigna"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"IEEE International Conference on Software Analysis, Evolution, and Reengineering","publicationvenueid":"d8655d54-1311-417a-91f7-c5c6daf8fba2","year":2020,"referencecount":32,"citationcount":13,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2020-02-01","journal":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","pages":"184-194","volume":null}}
{"corpusid":258291579,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2304-10983","ArXiv":"2304.10983","MAG":null,"CorpusId":"258291579","PubMed":null,"DOI":"10.1109/SANER56733.2023.00067","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/d9ef2311bfcc8028f96da426a5cf78cf5e0c1a84","title":"Constructing Temporal Networks of OSS Programming Language Ecosystems","authors":[{"authorId":"91023155","name":"A. Agroskin"},{"authorId":"21780991","name":"Elena Lyulina"},{"authorId":"2071866864","name":"Sergey Titov"},{"authorId":"145218314","name":"V. Kovalenko"}],"venue":"IEEE International Conference on Software Analysis, Evolution, and Reengineering","publicationvenueid":"d8655d54-1311-417a-91f7-c5c6daf8fba2","year":2023,"referencecount":32,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-03-01","journal":{"name":"2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","pages":"663-667","volume":null}}
{"corpusid":267270976,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"267270976","PubMed":null,"DOI":"10.1016/j.respol.2024.104954","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/68a2a251789426a36a7527e35d0cdc158376f579","title":"From GitHub to GDP: A framework for measuring open source software innovation","authors":[{"authorId":"2281467572","name":"Gizem Korkmaz"},{"authorId":"2281466518","name":"J. B. Santiago Calderón"},{"authorId":"2173340310","name":"Brandon L. Kramer"},{"authorId":"105059471","name":"Ledia Guci"},{"authorId":"2281465110","name":"Carol A. Robbins"}],"venue":"Research Policy","publicationvenueid":"cedcfda0-2243-49dc-995f-a9f060144607","year":2024,"referencecount":30,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":["JournalArticle"],"publicationdate":"2024-04-01","journal":{"name":"Research Policy","pages":null,"volume":null}}
{"corpusid":259835843,"externalids":{"ACL":null,"DBLP":"conf/msr/IslamHBH23","ArXiv":null,"MAG":null,"CorpusId":"259835843","PubMed":null,"DOI":"10.1109/MSR59073.2023.00057","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/0684185c59f2d868e3f8c9d0a281be4b97664658","title":"Evolution of the Practice of Software Testing in Java Projects","authors":[{"authorId":"2223110142","name":"Anisha Islam"},{"authorId":"2155488908","name":"N. Hewage"},{"authorId":"50777874","name":"A. A. Bangash"},{"authorId":"145369636","name":"Abram Hindle"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":21,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-05-01","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"367-371","volume":null}}
{"corpusid":251710515,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2208-09097","ArXiv":"2208.09097","MAG":null,"CorpusId":"251710515","PubMed":null,"DOI":"10.48550/arXiv.2208.09097","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/336ff07908a978a42f80fe7c108e6da6e30a315b","title":"Fixing Dockerfile Smells: An Empirical Study","authors":[{"authorId":"118283839","name":"Giovanni Rosa"},{"authorId":"3439470","name":"Simone Scalabrino"},{"authorId":"143764471","name":"Rocco Oliveto"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2022,"referencecount":22,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-08-19","journal":{"name":"ArXiv","pages":null,"volume":"abs/2208.09097"}}
{"corpusid":252629463,"externalids":{"ACL":null,"DBLP":"journals/infsof/MedeirosMDF23","ArXiv":null,"MAG":null,"CorpusId":"252629463","PubMed":null,"DOI":"10.1016/j.infsof.2022.107084","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/31bd48438e5174bf09ba908a3fdac105df40994b","title":"Visualizations for the evolution of Variant-Rich Systems: A systematic mapping study","authors":[{"authorId":"152534651","name":"Raul Medeiros"},{"authorId":"145546830","name":"Jabier Martinez"},{"authorId":"2144821149","name":"O. Díaz"},{"authorId":"3191798","name":"Jean-Rémy Falleri"}],"venue":"Information and Software Technology","publicationvenueid":"64ae7767-9467-4e70-9e31-e4185f9f16ff","year":2022,"referencecount":80,"citationcount":7,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-09-01","journal":{"name":"Inf. Softw. Technol.","pages":"107084","volume":"154"}}
{"corpusid":269132178,"externalids":{"ACL":null,"DBLP":"conf/icse/AlfadelM24","ArXiv":null,"MAG":null,"CorpusId":"269132178","PubMed":null,"DOI":"10.1145/3597503.3639169","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/9dd3fa9e0493ed4763922b3d34b937b1c941534c","title":"The Classics Never Go Out of Style: An Empirical Study of Downgrades from the Bazel Build Technology","authors":[{"authorId":"2260798250","name":"Mahmoud Alfadel"},{"authorId":"2265770177","name":"Shane McIntosh"}],"venue":"International Conference on Software Engineering","publicationvenueid":"a36dc29e-4ea1-4567-b0fe-1c06daf8bee8","year":2024,"referencecount":15,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Engineering","source":"s2-fos-model"},{"category":"Business","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2024-04-12","journal":{"name":null,"pages":"233:1-233:12","volume":null}}
{"corpusid":259835991,"externalids":{"ACL":null,"DBLP":"conf/msr/SunIBH23","ArXiv":null,"MAG":null,"CorpusId":"259835991","PubMed":null,"DOI":"10.1109/MSR59073.2023.00054","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/071804c1be6e618fd8877dfdd1e0e27331b5f364","title":"An Empirical Study to Investigate Collaboration Among Developers in Open Source Software (OSS)","authors":[{"authorId":"2153199006","name":"Weijie Sun"},{"authorId":"2223130794","name":"Samuel Iwuchukwu"},{"authorId":"50777874","name":"A. A. Bangash"},{"authorId":"145369636","name":"Abram Hindle"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":18,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-05-01","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"352-356","volume":null}}
{"corpusid":261582399,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2309-03414","ArXiv":"2309.03414","MAG":null,"CorpusId":"261582399","PubMed":null,"DOI":"10.1109/ICSME58846.2023.00062","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/bb1867bc2695b05f22d5b47660b567faa96ec61a","title":"Predicting Defective Visual Code Changes in a Multi-Language AAA Video Game Project","authors":[{"authorId":"71278583","name":"Kalvin Eng"},{"authorId":"145369636","name":"Abram Hindle"},{"authorId":"2238206143","name":"Alexander Senchenko"}],"venue":"IEEE International Conference on Software Maintenance and Evolution","publicationvenueid":"b02cf974-33be-46bd-9cbc-022db6cb7151","year":2023,"referencecount":60,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-09-07","journal":{"name":"2023 IEEE International Conference on Software Maintenance and Evolution (ICSME)","pages":"485-494","volume":null}}
{"corpusid":254853700,"externalids":{"ACL":null,"DBLP":"journals/ese/KarmakarAR23","ArXiv":"2212.09132","MAG":null,"CorpusId":"254853700","PubMed":null,"DOI":"10.1007/s10664-022-10275-7","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/42630c03d3817b1153d245f20742ad4b30a80b75","title":"JEMMA: An extensible Java dataset for ML4Code applications","authors":[{"authorId":"100721942","name":"Anjan Karmakar"},{"authorId":"3216345","name":"Miltiadis Allamanis"},{"authorId":"1853058","name":"R. Robbes"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2022,"referencecount":108,"citationcount":3,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2022-12-18","journal":{"name":"Empirical Software Engineering","pages":"1-45","volume":"28"}}
{"corpusid":266438533,"externalids":{"ACL":null,"DBLP":"conf/scam/ReidM23","ArXiv":null,"MAG":null,"CorpusId":"266438533","PubMed":null,"DOI":"10.1109/SCAM59687.2023.00012","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/17212368a171bb7f7600d8a05155e0414525acbc","title":"Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse","authors":[{"authorId":"2058644472","name":"David Reid"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"IEEE Working Conference on Source Code Analysis and Manipulation","publicationvenueid":"2ca819c7-b5af-4cc5-af81-267836fbccaa","year":2023,"referencecount":43,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-10-02","journal":{"name":"2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM)","pages":"1-12","volume":null}}
{"corpusid":240628974,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"240628974","PubMed":null,"DOI":"10.1109/msr45733.2019","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/de20e3a4dbd7d0d30eb4a5b46d6222ba827cf208","title":"2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)","authors":[],"venue":"","publicationvenueid":null,"year":2019,"referencecount":77,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":"2019-05-01","journal":null}
{"corpusid":236087844,"externalids":{"ACL":null,"DBLP":"conf/promise/BhandariNM21","ArXiv":"2107.08760","MAG":null,"CorpusId":"236087844","PubMed":null,"DOI":"10.1145/3475960.3475985","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/f1d7a4ed38192f156e77cde0785093cc0b66259e","title":"CVEfixes: automated collection of vulnerabilities and their fixes from open-source software","authors":[{"authorId":"11670279","name":"G. Bhandari"},{"authorId":"2040705478","name":"Amara Naseer"},{"authorId":"1762006","name":"L. Moonen"}],"venue":"International Conference on Predictive Models in Software Engineering","publicationvenueid":"dee2646c-57cc-4b8b-92c8-98d0d78d35cf","year":2021,"referencecount":52,"citationcount":66,"influentialcitationcount":9,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2021-07-19","journal":{"name":"Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering","pages":null,"volume":null}}
{"corpusid":218843302,"externalids":{"ACL":null,"DBLP":"journals/ese/RousseauCZ20","ArXiv":null,"MAG":"3016632594","CorpusId":"218843302","PubMed":null,"DOI":"10.1007/s10664-020-09828-5","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/7e5f90d5a977ecb530d5f0247be7bbf165c7490e","title":"Software provenance tracking at the scale of public source code","authors":[{"authorId":"2056082988","name":"Guillaume Rousseau"},{"authorId":"9381770","name":"R. D. Cosmo"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2020,"referencecount":70,"citationcount":22,"influentialcitationcount":0,"isopenaccess":true,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2020-03-27","journal":{"name":"Empirical Software Engineering","pages":"2930 - 2959","volume":"25"}}
{"corpusid":260316280,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2307-15709","ArXiv":"2307.15709","MAG":null,"CorpusId":"260316280","PubMed":null,"DOI":"10.1007/978-3-031-36060-2","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/af55c3c1816a536d4b55df01caeb6684b92230df","title":"Software Ecosystems: Tooling and Analytics","authors":[{"authorId":"2267410084","name":"Tom Mens"},{"authorId":"2502279","name":"Coen De Roover"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2023,"referencecount":197,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2023-07-28","journal":{"name":"Software Ecosystems","pages":null,"volume":null}}
{"corpusid":248067910,"externalids":{"ACL":null,"DBLP":"conf/msr/AbdellatifWSGS22","ArXiv":null,"MAG":null,"CorpusId":"248067910","PubMed":null,"DOI":"10.1145/3524842.3527959","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/349011c795d5a7e10ae8215a74ad3730ad35fb0a","title":"BotHunter: An Approach to Detect Software Bots in GitHub","authors":[{"authorId":"145141548","name":"Ahmad Abdellatif"},{"authorId":"2156237","name":"M. Wessel"},{"authorId":"2091414","name":"Igor Steinmacher"},{"authorId":"143911967","name":"M. Gerosa"},{"authorId":"3318024","name":"Emad Shihab"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2022,"referencecount":54,"citationcount":12,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-05-01","journal":{"name":"2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)","pages":"6-17","volume":null}}
{"corpusid":248228041,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2204-08108","ArXiv":"2204.08108","MAG":null,"CorpusId":"248228041","PubMed":null,"DOI":"10.48550/arXiv.2204.08108","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/538d154416024742f0835d1b3045052935f7aa14","title":"How are Software Repositories Mined? A Systematic Literature Review of Workflows, Methodologies, Reproducibility, and Tools","authors":[{"authorId":"1866565388","name":"Adam Tutko"},{"authorId":"34968683","name":"Austin Z. Henley"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2022,"referencecount":26,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Review"],"publicationdate":"2022-04-17","journal":{"name":"ArXiv","pages":null,"volume":"abs/2204.08108"}}
{"corpusid":259922107,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"259922107","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/762a7662810b59e3c70d437d9ccaa901ff4c8145","title":"Embedding Visual Software Analytics on the GitHub Platform on the Example of Static Source Code Metrics and Software Maps","authors":[{"authorId":"3431595","name":"Willy Scheibel"},{"authorId":"2223534785","name":"Jasper Blum"},{"authorId":"2223527493","name":"Fransziska Lauterbach"},{"authorId":"2038524133","name":"Daniel Atzberger"},{"authorId":"2286314592","name":"J¨urgen D¨ollner"}],"venue":"","publicationvenueid":null,"year":2023,"referencecount":48,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":265509690,"externalids":{"ACL":null,"DBLP":"conf/promise/ReidRW23","ArXiv":null,"MAG":null,"CorpusId":"265509690","PubMed":null,"DOI":"10.1145/3617555.3617872","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2405d513616c47bf60a64e5c3827924f048ab380","title":"Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain","authors":[{"authorId":"2058644472","name":"David Reid"},{"authorId":"102449994","name":"Kristiina Rahkema"},{"authorId":"2268787082","name":"James Walden"}],"venue":"International Conference on Predictive Models in Software Engineering","publicationvenueid":"dee2646c-57cc-4b8b-92c8-98d0d78d35cf","year":2023,"referencecount":20,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book"],"publicationdate":"2023-12-08","journal":{"name":"Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering","pages":null,"volume":null}}
{"corpusid":268401867,"externalids":{"ACL":null,"DBLP":"journals/jss/KesselA24","ArXiv":null,"MAG":null,"CorpusId":"268401867","PubMed":null,"DOI":"10.1016/j.jss.2024.111971","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/af785fbd94f37d5ca3bcd75a1817c599804f0aee","title":"Promoting open science in test-driven software experiments","authors":[{"authorId":"21522407","name":"Marcus Kessel"},{"authorId":"2277756649","name":"Colin Atkinson"}],"venue":"Journal of Systems and Software","publicationvenueid":"10a4a695-8417-42c7-983d-742df48b3905","year":2024,"referencecount":47,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2024-06-01","journal":{"name":"J. Syst. Softw.","pages":"111971","volume":"212"}}
{"corpusid":268291039,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"268291039","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/435b85d0a953d8c7e147536e426ac72f9a39b782","title":"The Classics Never Go Out of Style An Empirical Study of Downgrades from the Bazel Build Technology","authors":[{"authorId":"2260798250","name":"Mahmoud Alfadel"},{"authorId":"2265770177","name":"Shane McIntosh"}],"venue":"","publicationvenueid":null,"year":null,"referencecount":47,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":null,"publicationdate":null,"journal":null}
{"corpusid":249929498,"externalids":{"ACL":null,"DBLP":"conf/msr/SousaBFF22","ArXiv":null,"MAG":null,"CorpusId":"249929498","PubMed":null,"DOI":"10.1145/3524842.3528492","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2ed94610b1261b704860cad6e3d0b9b288361f45","title":"A Time Series-Based Dataset of Open-Source Software Evolution","authors":[{"authorId":"145244797","name":"B. L. Sousa"},{"authorId":"8575857","name":"Mariza Bigonha"},{"authorId":"2066477104","name":"K. Ferreira"},{"authorId":"11231094","name":"G. Franco"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2022,"referencecount":39,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2022-05-01","journal":{"name":"2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)","pages":"702-706","volume":null}}
{"corpusid":236196766,"externalids":{"ACL":null,"DBLP":"journals/peerj-cs/DuenasCGFICG21","ArXiv":null,"MAG":null,"CorpusId":"236196766","PubMed":"34307858","DOI":"10.7717/peerj-cs.601","PubMedCentral":"8279145"},"url":"https://www.semanticscholar.org/paper/7e383ddd9aaecc4c700f47ad824f4dfb711e5c14","title":"GrimoireLab: A toolset for software development analytics","authors":[{"authorId":"144125116","name":"Santiago Dueñas"},{"authorId":"34820138","name":"Valerio Cosentino"},{"authorId":"1397826059","name":"Jesus M. Gonzalez-Barahona"},{"authorId":"2120374921","name":"Alvaro del Castillo San Felix"},{"authorId":"1384382015","name":"Daniel Izquierdo-Cortazar"},{"authorId":"2120340149","name":"Luis Cañas-Díaz"},{"authorId":"2120359686","name":"Alberto Pérez García-Plaza"}],"venue":"PeerJ Computer Science","publicationvenueid":"138e58fc-8643-41c2-a92c-068ea4f4c607","year":2021,"referencecount":75,"citationcount":23,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"},{"category":"Medicine","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2021-07-09","journal":{"name":"PeerJ Computer Science","pages":null,"volume":"7"}}
{"corpusid":210696910,"externalids":{"ACL":null,"DBLP":"conf/kbse/AmreenKM19","ArXiv":null,"MAG":"2999786499","CorpusId":"210696910","PubMed":null,"DOI":"10.1109/ASE.2019.00107","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/078b7993b74ad3ed6d3dc6cf7d416b88e8e75026","title":"Developer Reputation Estimator (DRE)","authors":[{"authorId":"3110752","name":"Sadika Amreen"},{"authorId":"98524776","name":"Andrey Karnauch"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"International Conference on Automated Software Engineering","publicationvenueid":"1c2ab05c-7d69-465e-929d-0920857aedce","year":2019,"referencecount":7,"citationcount":9,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["Book","JournalArticle","Conference"],"publicationdate":"2019-11-01","journal":{"name":"2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)","pages":"1082-1085","volume":null}}
{"corpusid":235637605,"externalids":{"ACL":null,"DBLP":"conf/icse/DeyKM21a","ArXiv":null,"MAG":null,"CorpusId":"235637605","PubMed":null,"DOI":"10.1109/ICSE-Companion52605.2021.00109","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/c723b9dbbbd8f4747e04b8e1051083bd44f06949","title":"Replication Package for Representation of Developer Expertise in Open Source Software","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"98524776","name":"Andrey Karnauch"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","publicationvenueid":null,"year":2021,"referencecount":16,"citationcount":1,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Book","Conference"],"publicationdate":"2021-05-01","journal":{"name":"2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","pages":"236-237","volume":null}}
{"corpusid":261064663,"externalids":{"ACL":null,"DBLP":"journals/ese/GonzalezBarahonaLRZ23","ArXiv":"2308.11258","MAG":null,"CorpusId":"261064663","PubMed":null,"DOI":"10.1007/s10664-023-10377-w","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/9e957d6b79a607544f29e10767898d52cca29271","title":"The software heritage license dataset (2022 edition)","authors":[{"authorId":"1397826059","name":"Jesus M. Gonzalez-Barahona"},{"authorId":"2066034130","name":"Sergio Raúl Montes León"},{"authorId":"143684601","name":"G. Robles"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2023,"referencecount":54,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-08-22","journal":{"name":"Empirical Software Engineering","pages":"1-43","volume":"28"}}
{"corpusid":234478483,"externalids":{"ACL":null,"DBLP":"conf/wcre/HeXMXLZ21","ArXiv":null,"MAG":null,"CorpusId":"234478483","PubMed":null,"DOI":"10.1109/SANER50967.2021.00016","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/9f574f6bb4e94fec52d44966b12d485e9267c554","title":"A Multi-Metric Ranking Approach for Library Migration Recommendations","authors":[{"authorId":"2110435561","name":"Hao He"},{"authorId":"2110180441","name":"Yulin Xu"},{"authorId":"95952564","name":"Yixiao Ma"},{"authorId":"2206767395","name":"Yifei Xu"},{"authorId":"2084524","name":"Guangtai Liang"},{"authorId":"40318014","name":"Minghui Zhou"}],"venue":"IEEE International Conference on Software Analysis, Evolution, and Reengineering","publicationvenueid":"d8655d54-1311-417a-91f7-c5c6daf8fba2","year":2021,"referencecount":69,"citationcount":16,"influentialcitationcount":2,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-01","journal":{"name":"2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","pages":"72-83","volume":null}}
{"corpusid":259835557,"externalids":{"ACL":null,"DBLP":"conf/msr/WangCZ23","ArXiv":null,"MAG":null,"CorpusId":"259835557","PubMed":null,"DOI":"10.1109/MSR59073.2023.00019","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/d6190f4a6cdcc4ba7d12ade28e52e7073e957374","title":"AutoML from Software Engineering Perspective: Landscapes and Challenges","authors":[{"authorId":"2175653648","name":"Chao Wang"},{"authorId":"115023982","name":"Zhenpeng Chen"},{"authorId":"40318014","name":"Minghui Zhou"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2023,"referencecount":66,"citationcount":5,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2023-05-01","journal":{"name":"2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)","pages":"39-51","volume":null}}
{"corpusid":232307186,"externalids":{"ACL":null,"DBLP":"conf/msr/WaldenBK21","ArXiv":"2103.11013","MAG":null,"CorpusId":"232307186","PubMed":null,"DOI":"10.1109/MSR52588.2021.00088","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/3bbaa27fd3afa6a8b69d8e60cc257cd4ba323d51","title":"An Exploratory Study of Project Activity Changepoints in Open Source Software Evolution","authors":[{"authorId":"145131709","name":"J. Walden"},{"authorId":"2056770247","name":"Noah Burgin"},{"authorId":"2111708352","name":"K. Kaur"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":7,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-19","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"624-626","volume":null}}
{"corpusid":211818278,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2003-01153","ArXiv":"2003.01153","MAG":"3010232553","CorpusId":"211818278","PubMed":null,"DOI":null,"PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/e9fff6449a13f2c9ce548cab4cc0701f7466c77a","title":"Which Pull Requests Get Accepted and Why? A study of popular NPM Packages","authors":[{"authorId":"8041820","name":"Tapajit Dey"},{"authorId":"1702551","name":"A. Mockus"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2020,"referencecount":31,"citationcount":12,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2020-03-02","journal":{"name":"ArXiv","pages":null,"volume":"abs/2003.01153"}}
{"corpusid":269188322,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2404-11467","ArXiv":"2404.11467","MAG":null,"CorpusId":"269188322","PubMed":null,"DOI":"10.48550/arXiv.2404.11467","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/8d812112261ee0e8bacffec75da25d747c06960a","title":"A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems","authors":[{"authorId":"2295846651","name":"Xiaoyan Zhou"},{"authorId":"2297014865","name":"Feiran Liang"},{"authorId":"2297142544","name":"Zhaojie Xie"},{"authorId":"2297123909","name":"Yang Lan"},{"authorId":"2264962764","name":"Wenjia Niu"},{"authorId":"2294928107","name":"Jiqiang Liu"},{"authorId":"2145333268","name":"Haining Wang"},{"authorId":"2295845506","name":"Qiang Li"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2024,"referencecount":55,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2024-04-17","journal":{"name":"ArXiv","pages":null,"volume":"abs/2404.11467"}}
{"corpusid":269309441,"externalids":{"ACL":null,"DBLP":null,"ArXiv":null,"MAG":null,"CorpusId":"269309441","PubMed":null,"DOI":"10.31436/jisdt.v3i2.209","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/2605ddbf5cda6fa6e9ef08fba807728dbbf261b6","title":"PROMOTING OPEN SCIENCE WITH INSTITUTIONAL REPOSITORIES IN THE MALAYSIAN COMPREHENSIVE PUBLIC UNIVERSITIES","authors":[{"authorId":"2258300271","name":"Mahfooz Ahmed"},{"authorId":"2260901953","name":"R. Othman"}],"venue":"Journal of Information Systems and Digital Technologies","publicationvenueid":null,"year":2021,"referencecount":46,"citationcount":2,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":null,"publicationtypes":["JournalArticle"],"publicationdate":"2021-09-30","journal":{"name":"Journal of Information Systems and Digital Technologies","pages":null,"volume":null}}
{"corpusid":264147062,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2310-10295","ArXiv":"2310.10295","MAG":null,"CorpusId":"264147062","PubMed":null,"DOI":"10.1007/978-3-031-36060-2_2","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/a5c4a50e7749ff6d4eb151773f1a5c1a5db62e94","title":"The Software Heritage Open Science Ecosystem","authors":[{"authorId":"9381770","name":"R. D. Cosmo"},{"authorId":"1682225","name":"Stefano Zacchiroli"}],"venue":"arXiv.org","publicationvenueid":"1901e811-ee72-4b20-8f7e-de08cd395a10","year":2023,"referencecount":53,"citationcount":0,"influentialcitationcount":0,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2023-10-16","journal":{"name":"ArXiv","pages":null,"volume":"abs/2310.10295"}}
{"corpusid":232320839,"externalids":{"ACL":null,"DBLP":"journals/corr/abs-2103-12298","ArXiv":"2103.12298","MAG":null,"CorpusId":"232320839","PubMed":null,"DOI":"10.1109/MSR52588.2021.00057","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/8efb3789566ec93ee185699e0341c0ba34ac33e9","title":"Revisiting Dockerfiles in Open Source Software Over Time","authors":[{"authorId":"71278583","name":"Kalvin Eng"},{"authorId":"145369636","name":"Abram Hindle"}],"venue":"IEEE Working Conference on Mining Software Repositories","publicationvenueid":"d7907408-25bc-4816-a81d-4e0f2f6482c8","year":2021,"referencecount":39,"citationcount":11,"influentialcitationcount":2,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle","Conference"],"publicationdate":"2021-03-23","journal":{"name":"2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)","pages":"449-459","volume":null}}
{"corpusid":57825696,"externalids":{"ACL":null,"DBLP":"journals/ese/AmreenMZBZ20","ArXiv":null,"MAG":"2997845087","CorpusId":"57825696","PubMed":null,"DOI":"10.1007/s10664-019-09786-7","PubMedCentral":null},"url":"https://www.semanticscholar.org/paper/8385e8ccc91f621936989eab69499b10414a5cd8","title":"ALFAA: Active Learning Fingerprint based Anti-Aliasing for correcting developer identity errors in version control systems","authors":[{"authorId":"3110752","name":"Sadika Amreen"},{"authorId":"1702551","name":"A. Mockus"},{"authorId":"2858102","name":"R. Zaretzki"},{"authorId":"2065313146","name":"Chris Bogart"},{"authorId":"2108079034","name":"Yuxia Zhang"}],"venue":"Empirical Software Engineering","publicationvenueid":"f528e58c-0e4e-45b0-9456-832847244f0e","year":2020,"referencecount":71,"citationcount":23,"influentialcitationcount":1,"isopenaccess":false,"s2fieldsofstudy":[{"category":"Computer Science","source":"s2-fos-model"},{"category":"Computer Science","source":"external"}],"publicationtypes":["JournalArticle"],"publicationdate":"2020-01-03","journal":{"name":"Empirical Software Engineering","pages":"1136 - 1167","volume":"25"}}