Skip to main content

Showing 1–44 of 44 results for author: Hassan, A E

  1. arXiv:2407.04065  [pdf, other

    cs.SE cs.LG

    On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards

    Authors: Zhimin Zhao, Abdul Ali Bangash, Filipe Roseiro Côgo, Bram Adams, Ahmed E. Hassan

    Abstract: Foundation models (FM), such as large language models (LLMs), which are large-scale machine learning (ML) models, have demonstrated remarkable adaptability in various downstream software engineering (SE) tasks, such as code completion, code understanding, and software development. As a result, FM leaderboards, especially those hosted on cloud platforms, have become essential tools for SE teams to… ▽ More

    Submitted 12 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

    Comments: awesome foundation model leaderboard list: https://github.com/SAILResearch/awesome-foundation-model-leaderboards

  2. arXiv:2405.13852  [pdf, other

    cs.SE

    Predicting long time contributors with knowledge units of programming languages: an empirical study

    Authors: Md Ahasanuzzaman, Gustavo A. Oliva, Ahmed E. Hassan

    Abstract: Predicting potential long-time contributors (LTCs) early allows project maintainers to effectively allocate resources and mentoring to enhance their development and retention. Mapping programming language expertise to developers and characterizing projects in terms of how they use programming languages can help identify developers who are more likely to become LTCs. However, prior studies on predi… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  3. arXiv:2405.00796  [pdf, other

    cs.SE

    Does Using Bazel Help Speed Up Continuous Integration Builds?

    Authors: Shenyu Zheng, Bram Adams, Ahmed E. Hassan

    Abstract: A long continuous integration (CI) build forces developers to wait for CI feedback before starting subsequent development activities, leading to time wasted. In addition to a variety of build scheduling and test selection heuristics studied in the past, new artifact-based build technologies like Bazel have built-in support for advanced performance optimizations such as parallel build and increment… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  4. arXiv:2404.19048  [pdf, other

    cs.CL cs.AI

    A Framework for Real-time Safeguarding the Text Generation of Large Language Model

    Authors: Ximing Dong, Dayi Lin, Shaowei Wang, Ahmed E. Hassan

    Abstract: Large Language Models (LLMs) have significantly advanced natural language processing (NLP) tasks but also pose ethical and societal risks due to their propensity to generate harmful content. To address this, various approaches have been developed to safeguard LLMs from producing unsafe content. However, existing methods have limitations, including the need for training specific control models and… ▽ More

    Submitted 1 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

  5. arXiv:2404.10225  [pdf

    cs.SE cs.AI

    Rethinking Software Engineering in the Foundation Model Era: From Task-Driven AI Copilots to Goal-Driven AI Pair Programmers

    Authors: Ahmed E. Hassan, Gustavo A. Oliva, Dayi Lin, Boyuan Chen, Zhen Ming, Jiang

    Abstract: The advent of Foundation Models (FMs) and AI-powered copilots has transformed the landscape of software development, offering unprecedented code completion capabilities and enhancing developer productivity. However, the current task-driven nature of these copilots falls short in addressing the broader goals and complexities inherent in software engineering (SE). In this paper, we propose a paradig… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  6. arXiv:2403.18958  [pdf, other

    cs.SE cs.AI

    A State-of-the-practice Release-readiness Checklist for Generative AI-based Software Products

    Authors: Harsh Patel, Dominique Boucher, Emad Fallahzadeh, Ahmed E. Hassan, Bram Adams

    Abstract: This paper investigates the complexities of integrating Large Language Models (LLMs) into software products, with a focus on the challenges encountered for determining their readiness for release. Our systematic review of grey literature identifies common challenges in deploying LLMs, ranging from pre-training and fine-tuning to user experience considerations. The study introduces a comprehensive… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  7. arXiv:2403.17154  [pdf, other

    cs.SE

    On the Impact of Black-box Deployment Strategies for Edge AI on Latency and Model Performance

    Authors: Jaskirat Singh, Bram Adams, Ahmed E. Hassan

    Abstract: Deciding what combination of operators to use across the Edge AI tiers to achieve specific latency and model performance requirements is an open question for MLOps engineers. This study aims to empirically assess the accuracy vs inference time trade-off of different black-box Edge AI deployment strategies, i.e., combinations of deployment operators and deployment tiers. In this paper, we conduct i… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  8. arXiv:2403.10468  [pdf, other

    cs.SE

    An Empirical Study on Developers Shared Conversations with ChatGPT in GitHub Pull Requests and Issues

    Authors: Huizi Hao, Kazi Amit Hasan, Hong Qin, Marcos Macedo, Yuan Tian, Steven H. H. Ding, Ahmed E. Hassan

    Abstract: ChatGPT has significantly impacted software development practices, providing substantial assistance to developers in a variety of tasks, including coding, testing, and debugging. Despite its widespread adoption, the impact of ChatGPT as an assistant in collaborative coding remains largely unexplored. In this paper, we analyze a dataset of 210 and 370 developers shared conversations with ChatGPT in… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  9. arXiv:2403.09012  [pdf, other

    cs.SE

    Leveraging the Crowd for Dependency Management: An Empirical Study on the Dependabot Compatibility Score

    Authors: Benjamin Rombaut, Filipe R. Cogo, Ahmed E. Hassan

    Abstract: Dependabot, a popular dependency management tool, includes a compatibility score feature that helps client packages assess the risk of accepting a dependency update by leveraging knowledge from "the crowd". For each dependency update, Dependabot calculates this compatibility score as the proportion of successful updates performed by other client packages that use the same provider package as a dep… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  10. An Empirical Study of Challenges in Machine Learning Asset Management

    Authors: Zhimin Zhao, Yihao Chen, Abdul Ali Bangash, Bram Adams, Ahmed E. Hassan

    Abstract: In machine learning (ML), efficient asset management, including ML models, datasets, algorithms, and tools, is vital for resource optimization, consistent performance, and a streamlined development lifecycle. This enables quicker iterations, adaptability, reduced development-to-deployment time, and reliable outputs. Despite existing research, a significant knowledge gap remains in operational chal… ▽ More

    Submitted 28 February, 2024; v1 submitted 25 February, 2024; originally announced February 2024.

    Journal ref: Empirical Software Engineering 2024

  11. arXiv:2402.15943  [pdf

    cs.SE cs.AI

    Rethinking Software Engineering in the Foundation Model Era: A Curated Catalogue of Challenges in the Development of Trustworthy FMware

    Authors: Ahmed E. Hassan, Dayi Lin, Gopi Krishnan Rajbahadur, Keheliya Gallaba, Filipe R. Cogo, Boyuan Chen, Haoxiang Zhang, Kishanthan Thangarajah, Gustavo Ansaldi Oliva, Jiahuei Lin, Wali Mohammad Abdullah, Zhen Ming Jiang

    Abstract: Foundation models (FMs), such as Large Language Models (LLMs), have revolutionized software development by enabling new use cases and business models. We refer to software built using FMs as FMware. The unique properties of FMware (e.g., prompts, agents, and the need for orchestration), coupled with the intrinsic limitations of FMs (e.g., hallucination) lead to a completely new set of software eng… ▽ More

    Submitted 3 March, 2024; v1 submitted 24 February, 2024; originally announced February 2024.

  12. arXiv:2312.15350  [pdf, other

    cs.CR cs.SE

    Why Not Mitigate Vulnerabilities in Helm Charts?

    Authors: Yihao Chen, Jiahuei Lin, Bram Adams, Ahmed E. Hassan

    Abstract: [Context]: Containerization ensures the resilience of distributed applications by Kubernetes. Helm is a package manager for Kubernetes applications. A Helm package, namely "Chart'', is a set of pre-configured resources that one could quickly deploy a complex application. However, Helm broadens the attack surface of the distributed applications. [Objective]: This study aims to investigate the pre… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

  13. arXiv:2312.12604  [pdf

    cs.SE cs.LG

    An empirical study of testing machine learning in the wild

    Authors: Moses Openja, Foutse Khomh, Armstrong Foundjem, Zhen Ming, Jiang, Mouna Abidi, Ahmed E. Hassan

    Abstract: Recently, machine and deep learning (ML/DL) algorithms have been increasingly adopted in many software systems. Due to their inductive nature, ensuring the quality of these systems remains a significant challenge for the research community. Unlike traditional software built deductively by writing explicit rules, ML/DL systems infer rules from training data. Recent research in ML/DL quality assuran… ▽ More

    Submitted 13 July, 2024; v1 submitted 19 December, 2023; originally announced December 2023.

    Comments: Accepted paper at TOSEM journal

  14. arXiv:2311.12019  [pdf, other

    cs.SE

    An Empirical Study of Self-Admitted Technical Debt in Machine Learning Software

    Authors: Aaditya Bhatia, Foutse Khomh, Bram Adams, Ahmed E Hassan

    Abstract: The emergence of open-source ML libraries such as TensorFlow and Google Auto ML has enabled developers to harness state-of-the-art ML algorithms with minimal overhead. However, during this accelerated ML development process, said developers may often make sub-optimal design and implementation decisions, leading to the introduction of technical debt that, if not addressed promptly, can have a signi… ▽ More

    Submitted 9 June, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

  15. arXiv:2311.03213  [pdf, other

    cs.SE

    On the Model Update Strategies for Supervised Learning in AIOps Solutions

    Authors: Yingzhe Lyu, Heng Li, Zhen Ming, Jiang, Ahmed E. Hassan

    Abstract: AIOps (Artificial Intelligence for IT Operations) solutions leverage the massive data produced during the operation of large-scale systems and machine learning models to assist software engineers in their system operations. As operation data produced in the field are constantly evolving due to factors such as the changing operational environment and user base, the models in AIOps solutions need to… ▽ More

    Submitted 11 April, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  16. arXiv:2305.13884  [pdf, other

    cs.CR cs.AI cs.SE

    Multi-Granularity Detector for Vulnerability Fixes

    Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach D. Le, David Lo

    Abstract: With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vulnerability-fixing commits. Prior works have proposed methods that can automatically identify such vulnerability-fixing commits. However, identifying s… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Software Engineering, 2023

  17. arXiv:2305.05654  [pdf, other

    cs.SE

    Using Knowledge Units of Programming Languages to Recommend Reviewers for Pull Requests: An Empirical Study

    Authors: Md Ahasanuzzaman, Gustavo A. Oliva, Ahmed E. Hassan

    Abstract: Code review is a key element of quality assurance in software development. Determining the right reviewer for a given code change requires understanding the characteristics of the changed code, identifying the skills of each potential reviewer (expertise profile), and finding a good match between the two. To facilitate this task, we design a code reviewer recommender that operates on the knowledge… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  18. arXiv:2211.15733  [pdf, other

    cs.SE cs.AI

    An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks

    Authors: Mohamed Raed El aoun, Lionel Nganyewou Tidjon, Ben Rombaut, Foutse Khomh, Ahmed E. Hassan

    Abstract: Recent advances in deep learning (dl) have led to the release of several dl software libraries such as pytorch, Caffe, and TensorFlow, in order to assist machine learning (ml) practitioners in developing and deploying state-of-the-art deep neural networks (DNN), but they are not able to properly cope with limitations in the dl libraries such as testing or data processing. In this paper, we present… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  19. arXiv:2206.08959  [pdf, other

    cs.SE

    Is my transaction done yet? An empirical study of transaction processing times in the Ethereum Blockchain Platform

    Authors: Michael Pacheco, Gustavo A. Oliva, Gopi Krishnan Rajbahadur, Ahmed E. Hassan

    Abstract: Ethereum is one of the most popular platforms for the development of blockchain-powered applications. These applications are known as Dapps. When engineering Dapps, developers need to translate requests captured in the front-end of their application into one or more smart contract transactions. Developers need to pay for these transactions and, the more they pay (i.e., the higher the gas price), t… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: Under review in Transactions of Software Engineering and Methodology journal

  20. arXiv:2206.08905  [pdf, other

    cs.SE cs.DC cs.NI

    What makes Ethereum blockchain transactions be processed fast or slow? An empirical study

    Authors: Michael Pacheco, Gustavo A. Oliva, Gopi Krishnan Rajbahadur, Ahmed E. Hassan

    Abstract: The Ethereum platform allows developers to implement and deploy applications called Dapps onto the blockchain for public use through the use of smart contracts. To execute code within a smart contract, a paid transaction must be issued towards one of the functions that are exposed in the interface of a contract. However, such a transaction is only processed once one of the miners in the peer-to-pe… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: Under Peer review in Empirical Software Engineering Journal

  21. arXiv:2204.03794  [pdf

    cs.SE

    On the Importance of Performing App Analysis Within Peer Groups

    Authors: Safwat Hassan, Heng Li, Ahmed E. Hassan

    Abstract: The competing nature of the app market motivates us to shift our focus on apps that provide similar functionalities and directly compete with each other (i.e., peer apps). In this work, we study the ratings and the review text of 100 Android apps across 10 peer app groups. We highlight the importance of performing peer-app analysis by showing that it can provide a unique perspective over performin… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  22. arXiv:2202.08701  [pdf, other

    cs.SE

    Revisiting reopened bugs in open source software systems

    Authors: Ankur Tagra, Haoxiang Zhang, Gopi Krishnan Rajbahadur, Ahmed E. Hassan

    Abstract: Reopened bugs can degrade the overall quality of a software system since they require unnecessary rework by developers. Moreover, reopened bugs also lead to a loss of trust in the end-users regarding the quality of the software. Thus, predicting bugs that might be reopened could be extremely helpful for software developers to avoid rework. Prior studies on reopened bug prediction focus only on thr… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  23. The Impact of Using Regression Models to Build Defect Classifiers

    Authors: Gopi Krishnan Rajbahadur, Shaowei Wang, Yasutaka Kamei, Ahmed E. Hassan

    Abstract: It is common practice to discretize continuous defect counts into defective and non-defective classes and use them as a target variable when building defect classifiers (discretized classifiers). However, this discretization of continuous defect counts leads to information loss that might affect the performance and interpretation of defect classifiers. Another possible approach to build defect cla… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Journal ref: IEEE/ACM 14th International Conference on Mining Software Repositories (MSR), 2017, pp. 135-145

  24. Impact of Discretization Noise of the Dependent variable on Machine Learning Classifiers in Software Engineering

    Authors: Gopi Krishnan Rajbahadur, Shaowei Wang, Yasutaka Kamei, Ahmed E. Hassan

    Abstract: Researchers usually discretize a continuous dependent variable into two target classes by introducing an artificial discretization threshold (e.g., median). However, such discretization may introduce noise (i.e., discretization noise) due to ambiguous class loyalty of data points that are close to the artificial threshold. Previous studies do not provide a clear directive on the impact of discreti… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Journal ref: IEEE Transactions on Software Engineering, Vol 47, Issue 7 (2021), 1414-1430

  25. Revisiting the Impact of Dependency Network Metrics on Software Defect Prediction

    Authors: Lina Gong, Gopi Krishnan Rajbahadur, Ahmed E. Hassan, Shujuan Jiang

    Abstract: Software dependency network metrics extracted from the dependency graph of the software modules by the application of Social Network Analysis (SNA metrics) have been shown to improve the performance of the Software Defect prediction (SDP) models. However, the relative effectiveness of these SNA metrics over code metrics in improving the performance of the SDP models has been widely debated with no… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

  26. arXiv:2202.04431  [pdf, other

    cs.SE cs.PL

    Assessing the alignment between the information needs of developers and the documentation of programming languages: A case study on Rust

    Authors: Filipe R. Cogo, Xin Xia, Ahmed E. Hassan

    Abstract: Programming language documentation refers to the set of technical documents that provide application developers with a description of the high-level concepts of a language. Such documentation is essential to support application developers in the effective use of a programming language. One of the challenges faced by documenters (i.e., personnel that produce documentation) is to ensure that documen… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Journal ref: ACM Transactions on Software Engineering and Methodology (2022)

  27. arXiv:2202.02389  [pdf, other

    cs.LG cs.AI cs.SE

    The impact of feature importance methods on the interpretation of defect classifiers

    Authors: Gopi Krishnan Rajbahadur, Shaowei Wang, Yasutaka Kamei, Ahmed E. Hassan

    Abstract: Classifier specific (CS) and classifier agnostic (CA) feature importance methods are widely used (often interchangeably) by prior studies to derive feature importance ranks from a defect classifier. However, different feature importance methods are likely to compute different feature importance ranks even for the same dataset and classifier. Hence such interchangeable use of feature importance met… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  28. arXiv:2109.13172  [pdf, other

    cs.SE

    An empirical study of question discussions on Stack Overflow

    Authors: Wenhan Zhu, Haoxiang Zhang, Ahmed E. Hassan, Michael W. Godfrey

    Abstract: Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments also contain rich information. On Stack Overflow, discussions through comments and chat rooms can be tied to questions or answers. In this paper, we conduct an empirical study that focuses… ▽ More

    Submitted 19 July, 2022; v1 submitted 27 September, 2021; originally announced September 2021.

    Comments: 27 pages, 9 figures

  29. An Exploratory Study on the Repeatedly Shared External Links on Stack Overflow

    Authors: Jiakun Liu, Haoxiang Zhang, Xin Xia, David Lo, Ying Zou, Ahmed E. Hassan, Shanping Li

    Abstract: On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack Overflow. Some of the external links, so-called as repeated external links, can be shared for multiple times. We observe that 82.5% of the link sharing activ… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  30. Studying Ad Library Integration Strategies of Top Free-to-Download Apps

    Authors: Md Ahasanuzzaman, Safwat Hassan, Ahmed E. Hassan

    Abstract: In-app advertisements have become a major revenue source for app developers in the mobile app ecosystem. Ad libraries play an integral part in this ecosystem as app developers integrate these libraries into their apps to display ads. In this paper, we study ad library integration practices by analyzing 35,459 updates of 1,837 top free-to-download apps of the Google Play Store. We observe that ad l… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  31. An Empirical Study of the Characteristics of Popular Minecraft Mods

    Authors: Daniel Lee, Gopi Krishnan Rajbahadur, Dayi Lin, Mohammed Sayagh, Cor-Paul Bezemer, Ahmed E. Hassan

    Abstract: It is becoming increasingly difficult for game developers to manage the cost of developing a game, while meeting the high expectations of gamers. One way to balance the increasing gamer expectation and development stress is to build an active modding community around the game. There exist several examples of games with an extremely active and successful modding community, with the Minecraft game b… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

    Journal ref: Empirical Software Engineering, 25, 2020, 3396-3429

  32. Building the perfect game -- an empirical study of game modifications

    Authors: Daniel Lee, Dayi Lin, Cor-Paul Bezemer, Ahmed E. Hassan

    Abstract: Game developers cannot always meet the growing and changing needs of the gaming community, due to the often already overloaded schedules of developers. So-called modders can potentially assist game developers with addressing gamers' needs. Modders are enthusiasts who provide modifications or completely new content for a game. By supporting modders, game developers can meet the rapidly growing and… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: Published in Empirical Software Engineering journal. Please cite "Lee, D. et al. Building the perfect game - an empirical study of game modifications. Empir Software Eng 25, 2485-2518 (2020). https://doi.org/10.1007/s10664-019-09783-w"

    Journal ref: Empirical Software Engineering 25 (2020): 2485-2518

  33. arXiv:2103.00141  [pdf, other

    cs.SE

    A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping Algorithms

    Authors: Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Yuan Wang, Shanping Li

    Abstract: Abstract syntax tree (AST) mapping algorithms are widely used to analyze changes in source code. Despite the foundational role of AST mapping algorithms, little effort has been made to evaluate the accuracy of AST mapping algorithms, i.e., the extent to which an algorihtm captures the evolution of code. We observe that a program element often has only one best-mapped program element. Based on this… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

    Journal ref: International Conference on Software Engineering 2021

  34. Broken External Links on Stack Overflow

    Authors: Jiakun Liu, Xin Xia, David Lo, Haoxiang Zhang, Ying Zou, Ahmed E. Hassan, Shanping Li

    Abstract: Stack Overflow hosts valuable programming-related knowledge with 11,926,354 links that reference to the third-party websites. The links that reference to the resources hosted outside the Stack Overflow websites extend the Stack Overflow knowledge base substantially. However, with the rapid development of programming-related knowledge, many resources hosted on the Internet are not available anymore… ▽ More

    Submitted 9 October, 2020; originally announced October 2020.

  35. What Makes a Popular Academic AI Repository?

    Authors: Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Shanping Li

    Abstract: Many AI researchers are publishing code, data and other resources that accompany their papers in GitHub repositories. In this paper, we refer to these repositories as academic AI repositories. Our preliminary study shows that highly cited papers are more likely to have popular academic AI repositories (and vice versa). Hence, in this study, we perform an empirical study on academic AI repositories… ▽ More

    Submitted 9 October, 2020; v1 submitted 6 October, 2020; originally announced October 2020.

    Journal ref: Empirical Software Engineering (2021)

  36. arXiv:2005.14373  [pdf, ps, other

    cs.SE cs.IR

    CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words

    Authors: Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li

    Abstract: To accelerate software development, developers frequently search and reuse existing code snippets from a large-scale codebase, e.g., GitHub. Over the years, researchers proposed many information retrieval based models for code search, but they fail to connect the semantic gap between query and code. An early successful deep learning based model DeepCS solved this issue by learning the relationship… ▽ More

    Submitted 22 February, 2022; v1 submitted 28 May, 2020; originally announced May 2020.

  37. arXiv:1904.02724  [pdf, other

    cs.SE

    Bounties in Open Source Development on GitHub: A Case Study of Bountysource Bounties

    Authors: Jiayuan Zhou, Shaowei Wang, Cor-Paul Bezemer, Ying Zou, Ahmed E. Hassan

    Abstract: Due to the voluntary nature of open source software, it can be hard to find a developer to work on a particular task. For example, some issue reports may be too cumbersome and unexciting for someone to volunteer to do them, yet these issue reports may be of high priority to the success of a project. To provide an incentive for implementing such issue reports, one can propose a monetary reward, i.e… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

  38. arXiv:1904.00946  [pdf, other

    cs.SE

    Does the hiding mechanism for Stack Overflow comments work well? No!

    Authors: Haoxiang Zhang, Shaowei Wang, Tse-Hsun Peter Chen, Ahmed E. Hassan

    Abstract: Stack Overflow has accumulated millions of answers. Informative comments can strengthen their associated answers (e.g., providing additional information). Currently, Stack Overflow hides comments that are ranked beyond the top 5. Stack Overflow aims to display more informative comments (i.e., the ones with higher scores) and hide less informative ones using this mechanism. As a result, 4.4 million… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: 12 pages

  39. An Empirical Study of Obsolete Answers on Stack Overflow

    Authors: Haoxiang Zhang, Shaowei Wang, Tse-Hsun, Chen, Ying Zou, Ahmed E. Hassan

    Abstract: Stack Overflow accumulates an enormous amount of software engineering knowledge. However, as time passes, certain knowledge in answers may become obsolete. Such obsolete answers, if not identified or documented clearly, may mislead answer seekers and cause unexpected problems (e.g., using an out-dated security protocol). In this paper, we investigate how the knowledge in answers becomes obsolete a… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Comments: 14 pages

    Journal ref: IEEE Transactions on Software Engineering (2019)

  40. The Impact of IR-based Classifier Configuration on the Performance and the Effort of Method-Level Bug Localization

    Authors: Chakkrit Tantithamthavorn, Surafel Lemma Abebe, Ahmed E. Hassan, Akinori Ihara, Kenichi Matsumoto

    Abstract: Context: IR-based bug localization is a classifier that assists developers in locating buggy source code entities (e.g., files and methods) based on the content of a bug report. Such IR-based classifiers have various parameters that can be configured differently (e.g., the choice of entity representation). Objective: In this paper, we investigate the impact of the choice of the IR-based classifier… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

    Comments: Accepted at Journal of Information and Software Technology (IST)

  41. arXiv:1801.10271  [pdf, other

    cs.SE

    The Impact of Correlated Metrics on Defect Models

    Authors: Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Ahmed E. Hassan

    Abstract: Defect models are analytical models that are used to build empirical theories that are related to software quality. Prior studies often derive knowledge from such models using interpretation techniques, such as ANOVA Type-I. Recent work raises concerns that prior studies rarely remove correlated metrics when constructing such models. Such correlated metrics may impact the interpretation of models.… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

    Comments: 16 pages, under review at a software engineering journal

  42. arXiv:1801.10270  [pdf, other

    cs.SE

    The Impact of Automated Parameter Optimization on Defect Prediction Models

    Authors: Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto

    Abstract: Defect prediction models---classifiers that identify defect-prone software modules---have configurable parameters that control their characteristics (e.g., the number of trees in a random forest). Recent studies show that these classifiers underperform when default settings are used. In this paper, we study the impact of automated parameter optimization on defect prediction models. Through a case… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

    Comments: 32 pages, accepted at IEEE Transactions on Software Engineering

  43. arXiv:1801.10269  [pdf, other

    cs.SE

    The Impact of Class Rebalancing Techniques on the Performance and Interpretation of Defect Prediction Models

    Authors: Chakkrit Tantithamthavorn, Ahmed E. Hassan, Kenichi Matsumoto

    Abstract: Defect prediction models that are trained on class imbalanced datasets (i.e., the proportion of defective and clean modules is not equally represented) are highly susceptible to produce inaccurate prediction models. Prior research compares the impact of class rebalancing techniques on the performance of defect prediction models. Prior research efforts arrive at contradictory conclusions due to the… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

    Comments: 20 pages, under review at a software engineering journal

  44. arXiv:1104.5387  [pdf

    cs.SE

    Model based system engineering approach of a lightweight embedded TCP/IP

    Authors: M. Z. Rashed, Ahmed E. Hassan, Ahmed I. Sharaf

    Abstract: The use of embedded software is growing very rapidly. Accessing the internet is a necessary service which has large range of applications in many fields. The Internet is based on TCP/IP which is a very important stack. Although TCP/IP is very important there is not a software engineering model describing it. The common method in modeling and describing TCP/IP is RFCs which is not sufficient for so… ▽ More

    Submitted 28 April, 2011; originally announced April 2011.