nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An empirical study of the impact of modern code review practices on software quality
|
McIntosh, Shane |
|
2015 |
21 |
5 |
p. 2146-2189 |
artikel |
2 |
An in-depth study of the promises and perils of mining GitHub
|
Kalliamvakou, Eirini |
|
2015 |
21 |
5 |
p. 2035-2071 |
artikel |
3 |
A survey on the use of topic models when mining software repositories
|
Chen, Tse-Hsun |
|
2015 |
21 |
5 |
p. 1843-1919 |
artikel |
4 |
Change-based test selection: an empirical evaluation
|
Soetens, Quinten David |
|
2015 |
21 |
5 |
p. 1990-2032 |
artikel |
5 |
Game of detections: how are security vulnerabilities discovered in the wild?
|
Hafiz, Munawar |
|
2015 |
21 |
5 |
p. 1920-1959 |
artikel |
6 |
Guest editorial: mining software repositories
|
Pinzger, Martin |
|
2016 |
21 |
5 |
p. 2033-2034 |
artikel |
7 |
Prompter
|
Ponzanelli, Luca |
|
2015 |
21 |
5 |
p. 2190-2231 |
artikel |
8 |
Studying just-in-time defect prediction using cross-project models
|
Kamei, Yasutaka |
|
2015 |
21 |
5 |
p. 2072-2106 |
artikel |
9 |
Studying the needed effort for identifying duplicate issues
|
Rakha, Mohamed Sami |
|
2015 |
21 |
5 |
p. 1960-1989 |
artikel |
10 |
Towards building a universal defect prediction model with rank transformed predictors
|
Zhang, Feng |
|
2015 |
21 |
5 |
p. 2107-2145 |
artikel |