,Document Title,Abstract,Year,PDF Link,label
0,Continuous integration in open source software development,"Commercial software firms are increasingly using and contributing to open source software. Thus, they need to understand and work with open source software development processes. This paper investigates whether the practice of continuous integration of agile software development methods has had an impact on open source software projects. Using fine-granular data from more than 5000 active open source software projects we analyze the size of code contributions over a project's life-span. Code contribution size has stayed flat. We interpret this to mean that open source software development has not changed its code integration practices. In particular, within the limits of this study, we claim that the practice of continuous integration has not yet significantly influenced the behavior of open source software developers. © 2008 by International Federation for Information Processing.",2019,https://scholar.google.com.br/,no
1,Block spectral precoding for blind multiuser detection of DS/CDMA signals,"A new approach for blind multiuser detection of DS/CDMA signals is proposed. This approach is based on modifying the data power spectrum, uniquely for each user, through a two-stage colouring-whitening precoding scheme. This enables detection of a desired user's signal in an unknown multipath channel, regardless of the power of the interferers. The proposed precoding method does not alter the data rate or system bandwidth. Detection does not require spreading code knowledge, and consequently avoids channel estimation and the possible associated errors. The method is seen to yield reasonable performance besides being able to operate properly in nearly saturated systems, in contrast to some existing methods. Besides this, it can tolerate severe carrier frequency offsets. © IEE, 2005.",2019,https://scholar.google.com.br/,no
2,Recent advances in the modelling of solid flows in the blast furnace,"The solid flow inside a blast furnace is modelled using a standalone finite element program and a constitutive equation called hypo-plastic, in order to better simulate the granular material behaviour. The parameters of this constitutive equation are calibrated using data obtained from simple soil mechanics tests on coke and sinter materials, such as triaxial and oedometric devices. Steady velocity, stress and void fraction fields are obtained after several iterations of the code. Knowledge of the solids velocity field makes it possible to determine the dead man profile, as well as its renewal kinetics. Burden trajectories and time lines are also computed. Knowledge of the stress field makes it possible to compute pressures acting on the burden as well as on the walls. Finally, knowledge of void fraction field makes it possible to determine gas paths. The solid flow model was validated on 2D and 3D small-scale cold blast furnaces, but the simulations never required any tuning parameter. This code is in fact an invaluable tool to determine the effect of blast furnace profile on solid flow conditions, and reciprocally.",2019,https://scholar.google.com.br/,no
3,Optimal time-hopping codes for multi-user interference mitigation in ultra-wide bandwidth impulse radio,"In this work we tackle the problem of mitigating the multi-user interference by optimizing the time-hopping codes, in an asynchronous impulse radio multiple access scheme. We derive the expression of the multi-user interference variance at the output of a rake receiver assuming that the codes are deterministic, for both pulse position modulation and pulse amplitude modulation formats, when propagating through multipath channels. The result shows that the code contribution is independent of the other parameters. We derive from this expression a practical criterion that enables us to find a set of optimal codes that ensures minimal multi-user interference variance at the receiver output. We check through simulations, that the set of optimal codes found using the criterion, leads to bit error rate improvement. © 2006 IEEE.",2019,https://scholar.google.com.br/,no
4,Towards a model-driven approach for reverse engineering design patterns,"The size and complexity of software systems is rapidly in- creasing. Meanwhile, the ability to understand and maintain such systems is decreasing almost as fast. Model Driven Engineering (MDE) promotes the notion of modeling to cope with software complexity; in this paper we report on our research that utilizes ontological modeling for understanding complex software systems. We focus the discussion on recovering design pattern information from source code. We thus argue that an effective recovery approach needs to utilize semantic reasoning to properly match an ontological representation of both: conceptual source code knowledge and design pattern descriptions. Since design patterns can take different forms when implemented in code, we argue that hard-coding their descriptions limits the exibility and usability of a detection mechanism.",2019,https://scholar.google.com.br/,no
5,A knowledge database for NC machine operating codes,"Machine parts operation process knowledge has been regarded as tacit knowledge and is difficult to express using words. This research used SOLIDCAM software to produce NC codes for plastic blow molding machinery used in parts design. The codes were saved and used to construct a process operation knowledge database. The proper NC codes can be chosen from the knowledge database and be sent to collaborating factories over the network. The collaborating factories will manage the parts operation according to the NC codes to achieve the target purchaser-managed quality (PMQ). To evaluate the benefits of establishing an NC code knowledge database, we used three types of machine, including a traditional machine, a CNC machine, and an NC-code-controlled machine, to produce the same parts. The difference in production cost, percentage of nonconforming parts, and delivery lead time were then identified. The comparative results showed that the average production cost using the NC-code-controlled machine was reduced by 3%. The percentage of nonconforming parts was reduced by 5%. The delivery lead time was shortened by 5 days. The traditional and CNC machine operations performed worse when the number of parts produced was less than five pieces. © Springer-Verlag London Limited 2006.",2019,https://scholar.google.com.br/,no
6,Knowledge management in software design: a tool and a trial,"The paper describes experiences in applying a knowledge management tool, called CODE, to the major knowledge management problems in the design of a large commercial software system. There is explanation of how the design of such a product was documented as a CODE knowledge base by using CODE to carefully analyse all the important concepts and terms in direct consultation with the developers. CODE could be described variously as a 'design knowledge capture tool', a 'conceptual design assistant', or a 'knowledge management system for technical documentation'. Its knowledge base and its highly interactive interface combine ideas from frame-based knowledge representation systems, object-oriented systems and hypertext systems. CODE is intended to augment and eventually replace conventional word-processing and graphical tools for the capture, editing and documentation of such knowledge. Hence it facilitates constructing definitions or descriptions of all the main concepts in a system, validating these so that the system designers are in agreement, and retrieving and graphically displaying such knowledge in various formats. CODE has been used in a wide variety of knowledge management situations, but here the focus is on its use in software engineering design.",2019,https://scholar.google.com.br/,no
7,Symbolic implementation of the algorithm for calculating Adomian polynomials,"In this paper, a symbolic implementation code is developed of a technique proposed by Wazwaz [Appl. Math. Comput. 111 (2000) 53] for calculating Adomian polynomials for nonlinear operators. The algorithm proposed by him [Appl. Math. Comput. 111 (2000) 53] offers a promising approach for calculating Adomian polynomials for all forms of nonlinearity, but it is not easy to implement due to its huge size of algebraic calculations, complicated trigonometric terms, and unique summation rules. It is well known that the algebraic manipulation language such as Mathematica is useful to facilitate such a hard computational work. Pattern-matching capabilities peculiar feature of Mathematica are used in index regrouping which is a key role in constructing Adomian polynomials. The computer algebra software Mathematica is used to collect terms to their order and to simplify the terms. The symbolic implementation code author developed (appearing at appendix) has the flexibility that may easily cover any length of Adomian polynomial for many forms of nonlinear cases. A nonlinear evolution equation is investigated in order to justify the availability of symbolic implementation code. © 2002 Elsevier Inc. All rights reserved.",2019,https://scholar.google.com.br/,no
8,Unmanned air vehicle air data estimation using a matrix of pressure sensors: A comparison of neural networks and look-up tables,"Flush airdata sensing (FADS) systems are cost- and weight- effective alternatives to current air data booms for measuring important air data parameters such as airspeed, angle of attack, sideslip, etc. Most applications consider large manned/unmanned air vehicles where the Pitot-static tube is located at the nose tip. However, traditional air data booms can be physically impractical for micro- (unmanned) air vehicles (MAVs) and, in this article, a FADS system mounted on the wing leading edge of a MAV flown at low speeds of Mach 0.07 (wind tunnel experiments under corresponding conditions) is designed. Moreover, two approaches for converting the FADS system pressure to meaningful air data are compared: a neural network (NN) approach and a look-up table (LUT). Results have shown that instrumentation weight and cost were reduced by 80 per cent and 97 per cent, respectively, in comparison to a traditional air data boom. Overall, the NN estimation accuracies were 0.51°, 0.44 lb/ft 2, and 0.62 m/s and the LUT estimation accuracies 1.32°, 0.11 lb/ft2, and 0.88 m/s for the angle of attack, static pressure, and airspeed, respectively. It was also found that the LUT has faster execution times while the NN was in most cases more robust to sensor faults. However, while the LUT requires high memory usage, especially for higher dimensions, the NN can be executed in a few lines of code. © Author 2011.",2019,https://scholar.google.com.br/,no
9,The application of mind mapping in maintenance knowledge management and sharing in practice,"The knowledge and experience regarding to maintenance management of government department in Taiwan are hard to be shared because of confused sources of law and the frequent transference of engineers. This study applied mind mapping to enhancing knowledge management (KM) performance in the construction project. Combined with mind mapping, this study proposes a Mind Map Knowledge Management (MMKM) approach to help engineers to reuse and share knowledge and experience. The proposed MMKM enables engineers to illustrate and share their experience with other engineers. Engineers are, thus, invited to exchange and share their knowledge from their experience. Mind mapping not only has a user-friendly interface, but also can annotate the main point by chromatic labeling tool. The user can also connect to cut-and-dried files or search the relative public information through the Internet by clicking a keyword or an import figure in the mind mapping. The mind mapping could help users generalize and manage the knowledge and experience among people. Moreover, senior and junior engineers can effectively and easily exchange knowledge and experience regarding a specific aspect of their current construction project. The MMKM approach is then applied in selected pilot test of a government department in Taiwan to verify our proposed approach in practice. The combined results demonstrate that the advantage of the MMKM approach not only in improving KM work efficiency, but also in facilitating easy identifying code knowledge and knowledge relationship integrated with mind mapping. Final suggestion and limitation are identified and discussed for further related applications.",2019,https://scholar.google.com.br/,no
10,Hybrid procedural/deductive executive for autonomous spacecraft,"The New Millennium Remote Agent (NMRA) will be the first AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic recoveries and robust concurrent execution, all in the presence of tight real-time deadlines, changing goals, scarce resource constraints, and a wide variety of possible failures. To achieve this level of execution robustness, we have integrated a procedural executive based on generic procedures with a deductive model-based executive. A procedural executive provides sophisticated control constructs such as loops, parallel activity, locks, and synchronization which are used for robust schedule execution, hierarchical task decomposition, and routine configuration management. A deductive executive provides algorithms for sophisticated state inference and optimal failure recovery planning. The integrated executive enables designers to code knowledge via a combination of procedures and declarative models, yielding a rich modeling capability suitable to the challenges of real spacecraft control. The interface between the two executives ensures both that recovery sequences are smoothly merged into high-level schedule execution and that a high degree of reactivity is retained to effectively handle additional failures during recovery.",2019,https://scholar.google.com.br/,no
11,"Amalgamating source code authors, maintainers, and change proneness to triage change requests","The paper presents an approach, namely iMacPro, to recommend developers who are most likely to implement incoming change requests. iMacPro amalgamates the textual similarity between the given change request and source code, change proneness information, authors, and maintainers of a software system. Latent Semantic Indexing (LSI) and a lightweight analysis of source code, and its commits from the software repository, are used. The basic premise of iMacPro is that the authors and maintainers of the relevant source code, which is change prone, to a given change request are most likely to best assist with its resolution. iMacPro unifies these sources in a unique way to perform its task, which was not investigated and reported in the literature previously. An empirical study on three open source systems, ArgoUML, JabRef , and jEdit , was conducted to assess the effectiveness of iMacPro. A number of change requests from these systems were used in the evaluated benchmark. Recall values for top one, five, and ten recommended developers are reported. Furthermore, a comparative study with a previous approach that uses the source-code authorship information for developer recommendation was performed. Results show that iMacPro could provide recall gains from 30% to 180% over its subjected competitor with statistical significance. Copyright © 2014 ACM.",2019,https://scholar.google.com.br/,yes
12,BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs),"Binary analysis is useful in many practical applications, such as the detection of malware or vulnerable software components. However, our survey of the literature shows that most existing binary analysis tools and frameworks rely on assumptions about specific compilers and compilation settings. It is well known that techniques such as refactoring and light obfuscation can significantly alter the structure of code, even for simple programs. Applying such techniques or changing the compiler and compilation settings can significantly affect the accuracy of available binary analysis tools, which severely limits their practicability, especially when applied to malware. To address these issues, we propose a novel technique that extracts the semantics of binary code in terms of both data and control flow. Our technique allows more robust binary analysis because the extracted semantics of the binary code is generally immune from light obfuscation, refactoring, and varying the compilers or compilation settings. Specifically, we apply data-flow analysis to extract the semantic flow of the registers as well as the semantic components of the control flow graph, which are then synthesized into a novel representation called the semantic flow graph (SFG). Subsequently, various properties, such as reflexive, symmetric, antisymmetric, and transitive relations, are extracted from the SFG and applied to binary analysis. We implement our system in a tool called BinGold and evaluate it against thirty binary code applications. Our evaluation shows that BinGold successfully determines the similarity between binaries, yielding results that are highly robust against light obfuscation and refactoring. In addition, we demonstrate the application of BinGold to two important binary analysis tasks: binary code authorship attribution, and the detection of clone components across program executables. The promising results suggest that BinGold can be used to enhance existing techniques, making them more robust and practical. © 2016 The Author(s)",2019,https://scholar.google.com.br/,no
13,Privacy and security constraints for code contributions,"In collaborative software development, developers submit their contributions, such as code commits or pull requests, to a repository. Often, this code contribution is reviewed in order to avoid privacy and security problems. Manual code review is a common way to detect such problems, but it is expensive, error-prone, and time consuming. Other automatic approaches are either designed for specific domains, such as Android platform, or demand significant effort from developers. To minimize these problems, we propose a new policy language to allow developers to specify constraints for code contributions and to enforce them between existing code and new code contributions. Our language implementation automatically checks adherence of new code contributions to these constraints for systems of different domains without demanding further effort from developers. Moreover, we plan to evaluate it regarding effectiveness and reduction of effort in finding privacy and security violations. © 2015 ACM.",2019,https://scholar.google.com.br/,no
14,Code architecture and open source software development,"A model is developed to study how the code architecture affects open source software (OSS) development. The model incorporates the resource heterogeneity and diverse motivations of various groups of programmers as well as the strategic interactions among them. We argue that the major advantage brought by a modular architecture of OSS code base is that it reduces both the cognitive cost and the coordination cost associated with OSS development, thus allowing programmers more easily to locate, manage, and contribute to the code base. We show that in OSS development, while modular architecture can potentially increase code contribution, it does not necessarily reduce free-riding; in fact it may well increase free-riding due to the strategic interactions among the programmers. We further empirically test the predictions using the SourceForge OSS development data, and the results confirm our theoretical predictions. The findings bear important theoretical as well as practical implications and provide guidelines for practitioners of OSS development and the collective innovation in general.",2019,https://scholar.google.com.br/,no
15,Methodology to assess impacts of alternative truck configurations on flexible highway pavement systems,"Assessing the appropriateness of truck axle weight limits and truck configurations from the standpoint of the impact on infrastructure is a critical issue in the determination of North American truck size and weight harmonization. A methodology is discussed for determination of pavement response, estimation of load equivalencies, and development of performance curves for different cases of flexible highway pavement and heavy-vehicle interactions for normal environmental and thaw conditions. The pavement response model uses the MSC Software Corporation's general-purpose finite element program, MSC.MARC.Seven different truck configurations, using North American axle weight limits, are used to illustrate the impacts of alternative truck configurations on flexible highway pavement systems. Three progressive schemes are employed for impact assessment: the truck-factor scheme, the repetitions-to-failure scheme, and the tonnage-over-life scheme.",2019,https://scholar.google.com.br/,no
16,On the usefulness of ownership metrics in open-source software projects,"Context Code ownership metrics were recently defined in order to distinguish major and minor contributors of a software module, and to assess whether the ownership of such a module is strong or shared between developers. Objective The relationship between these metrics and software quality was initially validated on proprietary software projects. Our objective in this paper is to evaluate such relationship in open-source software projects, and to compare these metrics to other code and process metrics. Method On a newly crafted dataset of seven open-source software projects, we perform, using inferential statistics, an analysis of code ownership metrics and their relationship with software quality. Results We confirm the existence of a relationship between code ownership and software quality, but the relative importance of ownership metrics in multiple linear regression models is low compared to metrics such as the number of lines of code, the number of modifications performed over the last release, or the number of developers of a module. Conclusion Although we do find a relationship between code ownership and software quality, the added value of ownership metrics compared to other metrics is still to be proven. © 2015 Elsevier B.V.",2019,https://scholar.google.com.br/,yes
17,Unveiling developers contributions behind code commits: An exploratory study,"The process and activities of software development are very dynamic and diverse. For instance, source code has to be written, tested and revised, e-mails have to be sent, bugs have to be communicated, managed and fixed. As a consequence, the contributions of the developers are very diversified. This paper describes an empirical study whose goal was to assess and compare the contributions of the developers through software repository mining. Two medium-sized projects - an open source and a commercial project - were analyzed. Overall, 17,490 commits and 10,308 bugs reports were analyzed. In the first part of our study, we have classified the developers based on their contribution to the software repository in three groups - core, active and peripheral developers. After that, we have collected a series of metrics - code contribution, buggy commits and resolution of priority bugs - for all the developers of the investigated projects. Finally, we have analyzed the collected metrics for the different developer groups. Our study findings show significant differences in the contribution provided by the developers groups considering the open-source and the commercial project. Copyright 2014 ACM.",2019,https://scholar.google.com.br/,yes
18,Social aspects of a continuous inspection platform for software source code,"Determining responsibility for a piece of source code is difficult when software is being developed collaboratively with weak code ownership. Nonetheless, a major factor for preventing ""cowboy coding"" and careless development of code is liability. We propose a tool for statistically acquiring per developer per document accountabilities and enable learning and self-monitoring processes within a development team while maintaining anonymity to a certain degree to not endanger team spirit. In this paper we want to examine possible social effects on the development team that employment of our tool has. Copyright 2008 ACM.",2019,https://scholar.google.com.br/,no
19,"Proceedings - 7th International Workshop on Emerging Trends in Software Metrics, WETSoM 2016",The proceedings contain 9 papers. The topics discussed include: Measuring High and Low Priority Defects on Traditional and Mobile open source software; do estimators learn? on the effect of a positively skewed distribution of effort data on software portfolio productivity; source code metrics for programmable logic controller (PLC) ladder diagram (LD) visual programming language; a statistical comparison of java and python software metric properties; behavioral complexity quantification (Becom-Q); metrics for feature-oriented programming; a case study on the relationship between code ownership and refactoring activities in a java software system; on the maintenance complexity of makefile; and a metric suite proposal for logical dependency.,2019,https://scholar.google.com.br/,no
20,Package Fingerprints: A visual summary of package interface usage,"Context: Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages. Maintainers of large systems need to understand how packages relate to each other, but this task is complex because packages often have multiple clients and play different roles (class container, code ownership, etc.). Several approaches have been proposed, among which the use of cohesion and coupling metrics. Such metrics help identify candidate packages for restructuring; however, they do not help maintainers actually understand the structure and interrelationships between packages. Objectives: In this paper, we use pre-attentive processing as the basis for package visualization and see to what extent it could be used in package understanding. Method: We present the Package Fingerprint, a 2D visualization of the references made to and from a package. The proposed visualization offers a semantically rich, but compact and zoomable views centered on packages. We focus on two views (incoming and outgoing references) that help users understand how the package under analysis is used by the system and how it uses the system. Results: We applied these views on four large systems: Squeak, JBoss, Azureus, and ArgoUML. We obtained several interesting results, among which, the identification of a set of recurring visual patterns that help maintainers: (a) more easily identify the role of and the way a package is used within the system (e.g., the package under analysis provides a set of layered services), and (b) detect either problematic situations (e.g., a single package that groups together a large number of basic services) or opportunities for better package restructuring (e.g., removing cyclic dependencies among packages). The visualization generally scaled well and the detection of different patterns was always possible. Conclusion: The proposed visualizations and patterns proved to be useful in understanding and maintaining the different systems we addressed. To generalize to other contexts and systems, a real user study is required. © 2010 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,no
21,Package surface blueprints: Visually supporting the understanding of package relationships,"Large object-oriented applications are structured over large number of packages. Packages are important but complex structural entities that may be difficult to understand since they play different development roles (i.e., class containers, code ownership basic structure, architectural elements...). Maintainers of large applications face the problem of understanding how packages are structured in general and how they relate to each others. In this paper, we present a compact visualization, named Package Surface Blueprint, that qualifies the relationships that a package has with its neighbours. A Package Surface Blueprint represents packages around the notion of package surfaces: groups of relationships according to the packages they refer to. We present two specific views one stressing the references made by a package and another showing the inheritance structure of a package. We applied the visualization on two large case studies: ArgoUML and Squeak. © 2007 IEEE.",2019,https://scholar.google.com.br/,no
22,Package reference fingerprint: A rich and compact visualization to understand package relationships,"Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages, allowing classes to be organized into named abstractions. Maintainers of large applications need to understand how packages are structured and how they relate to each other, but this task is very complex because packages often have multiple clients and different roles (class container, code ownership...). Cohesion and coupling are still among the most used metrics, because they help identify candidate packages for restructuring; however, they do not help maintainers understand the structure and interrelationships between packages. In this paper, we present the package fingerprint, a 2D visualization of the references made to and from a package. The proposed visualization offers a semantically rich, but compact and zoomable visualization centered on packages. We focus on two views (incoming and outgoing references) that help users understand how the package under analysis is used by the system and how it uses the system. We applied these views on three large case studies: JBoss, Azureus, and ArgoUML. This paper uses colors in the figures. Please read a colored printout of this paper. © 2008 IEEE.",2019,https://scholar.google.com.br/,no
23,Stochastic actor-oriented modeling for studying homophily and social influence in OSS projects,"Open Source Software projects are communities in which people “learn the ropes” from each other. The social and technical activities of developers evolve together, and as they link to each other they get organized in a network of changing socio-technical connections. Traces of those activities, or behaviors, are typically visible to all, in project repositories and through communication between them. Thus, in principle it may be possible to study those traces to tell which of the observable socio-technical behaviors of developers in these projects are responsible for the forming of persistent links between them. It may also be possible to tell the extent to which links participate in the spread of potential behavioral influences. Since OSS projects change in both social and technical activity over time, static approaches, that either ignore time or simplify it to a few slices, are frequently inadequate to study these networks. On the other hand, ad-hoc dynamic approaches are often only loosely supported by theory and can yield misleading findings. Here we adapt the stochastic actor-oriented models from social network analysis. These models enable the study of the interplay between behavior, influence and network architecture, for dynamic networks, in a statistically sound way. We apply the stochastic actor-oriented models in case studies of two Apache Software Foundation projects, and study code ownership and developer productivity as behaviors. For those, we find evidence of significant social selection effects (homophily) in both projects, but in different directions. However, we find no evidence for the spread (social influence) of either code ownership or developer productivity behaviors through the networks. © 2016 Springer Science+Business Media New York",2019,https://scholar.google.com.br/,yes
24,"2013 21st International Conference on Program Comprehension, ICPC 2013 - Proceedings",The proceedings contain 239 papers. The topics discussed include: evaluating source code summarization techniques: replication and expansion; part-of-speech tagging of program identifiers for improved text-based software engineering tools; SArF map: visualizing software architecture from feature and layer viewpoints; multiscale visual comparison of execution traces; in situ understanding of performance bottlenecks through visually augmented code; monitoring user interactions for supporting failure reproduction; quality analysis of source code comments; gapped code clone detection with lightweight source code analysis; insight into a method co-change pattern to identify highly coupled methods: an empirical study; patterns of cross-language linking in java frameworks; and using code ownership to improve IR-based traceability link recovery.,2019,https://scholar.google.com.br/,no
25,Extreme programming,"Extreme Programming (XP) is a lightweight design method developed by Kent Beck, Ward Cunningham, and others. After notable successes, XP has been generating huge interest, and no small amount of controversy. Much of the interest stems from XP's pragmatic approach to development. Key practices include pair programming, writing tests upfront, frequent refactoring and rebuild, continuous integration and testing. Key principles incremental and iterative development, working with the simplest solution, cutting out extraneous documentation, and collective code ownership.",2019,https://scholar.google.com.br/,no
26,Software process improvement with agile practices in a large telecom company,"Besides the promise of rapid and efficient software development, agile methods are well-appreciated lor boosting communication and motivation of development teams. However, they are not practical ""as such"" in large organizations, especially because of the well-established, rigid processes in the organizations. In this paper, we present a case study where a few agile practices were injected into the software process of a large organization in order to pilot pair programming and improve the motivation and competence build-up. The selected agile practices were pair programming, the planning game and collective code ownership. We show how we adjust these practices in order to integrate them into the existing software process of the company in the context of a real software project. © Springer-Verlag Berlin Heidelberg 2006.",2019,https://scholar.google.com.br/,no
27,XP practices: A successful tool for increasing and transferring practical knowledge in short-life software development projects,"The Gemplus and Axalto's horizontal merge in 2006, brought several challenges, resulting in a period of general instability in the newly created company. As a result, the Gemplus Personalization Team for Latin America put in place five of the twelve Extreme Programming Practices as a tool for incrementing and transferring knowledge between the two companies and among the existing/new members of the team. In addition to a successful knowledge transfer, results from this newly adopted approach, showed several benefits: collective code ownership, development autonomy, cleaner/more readable code, and an increment in development productivity, proving that in addition to being useful for practical knowledge transfer, XP Practices are a successful 'tool kit' to improve the software development process performance in short-life projects. © 2009 Springer Berlin Heidelberg.",2019,https://scholar.google.com.br/,no
28,Influences on agile practice tailoring in enterprise software development,"Agile development projects have become a reality in large enterprises using offshore development models. A case study involving seven international companies with offices in Bangalore, India, and London, UK was conducted, including interviews with 19 practitioners. The contribution of this paper is to illustrate the reasons for tailoring Agile practices within the context of large enterprises. The findings show that scrum roles and practices did not conflict with enterprise policies or processes and were thought to improve product quality and productivity. However, agile practices from the XP tradition were not so widely adopted. Test driven development did not integrate well within enterprises where independent quality assurance teams were constituted as separate departments. Continuous integration was found to be challenging where enterprise software products required time consuming regression testing and elaborate code release processes. While adoption of coding standards and collective code ownership are necessary to facilitate interaction between disparate stakeholder groups. © 2012 IEEE.",2019,https://scholar.google.com.br/,no
29,Common agile practices in software processes,"Objective: to investigate studies about software processes looking for practices which can be used to obtain agility in software processes. Method: A systematic review including seven search engines was executed in Feb/2010. To apply the defined criteria to select papers and extract information regarding working practices bringing agility to software processes. Results: from 6696 retrieved papers, 441 were selected to support the identification of 236 occurrences of 51 distinct practices associated with the concept of agility. Their descriptions were deeply analyzed and consolidated. After discarding those which appeared in the technical literature in a small amount of papers, 17 agile practices were identified. Conclusion: although further studies are necessary to evaluate the efficacy of these 17 agile practices, 12 of them have been more commonly approached in the software projects and could be primarily considered: test driven development, continuous integration, pair programming, planning game, onsite customer, collective code ownership, small releases, metaphor, refactoring, sustainable pace, simple design and coding standards. © 2011 IEEE.",2019,https://scholar.google.com.br/,no
30,Investigating the extreme programming system - An empirical study,"In this paper we discuss our empirical study about the advantages and difficulties 15 Greek software companies experienced applying Extreme Programming (XP) as a holistic system in software development. Based on a generic XP system including feedback influences and using a cause-effect model including social-technical affecting factors, as our research tool, the study statistically evaluates the application of XP practices in the software companies being studied. Data were collected from 30 managers and developers, using the sample survey technique with questionnaires and interviews, in a time period of six months. Practices were analysed individually, using Descriptive Statistics (DS), and as a whole by building up different models using stepwise Discriminant Analysis (DA). The results have shown that companies, facing various problems with common code ownership, on-site customer, 40-hour week and metaphor, prefer to develop their own tailored XP method and way of working-practices that met their requirements. Pair programming and test-driven development were found to be the most significant success factors. Interactions and hidden dependencies for the majority of the practices as well as communication and synergy between skilled personnel were found to be other significant success factors. The contribution of this preliminary research work is to provide some evidence that may assist companies in evaluating whether the XP system as a holistic framework would suit their current situation. © Springer Science + Business Media, Inc. 2006.",2019,https://scholar.google.com.br/,no
31,"WETSoM'11 - Proceedings of the 2nd International Workshop on Emerging Trends in Software Metrics, Co-located with ICSE 2011",The proceedings contain 15 papers. The topics discussed include: data quality: Cinderella at the software metrics ball?; integrating quality models and static analysis for comprehensive quality assessment; is my project's truck factor low? theoretical and empirical considerations about the truck factor threshold; analyzing tool usage to understand to what extent experts change their activities when mentoring; by no means: a study on aggregating software metrics; insights into component testing process; linking software design metrics to component change-proneness; stability of java interfaces: a preliminary investigation; different strokes for different folks: a case study on software metrics for different defect categories; concern-based cohesion as change proneness indicator: an initial empirical study; a revised web objects method to estimate web application development effort; and the fractal dimension metric and its use to assess object-oriented software quality.,2019,https://scholar.google.com.br/,no
32,Fractal figures: Visualizing development effort for CVS entities,"Versioning systems such as CVS or Subversion exhibit a large potential to investigate the evolution of software systems. They are used to record the development steps of software systems as they make it possible to reconstruct the whole evolution of single files. However they provide no good means to understand how much a certain file has been changed over time and by whom. In this paper we present an approach to visualize files using fractal figures, which (1) convey the overall development effort, (2) illustrate the distribution of the effort among various developers, and (3) allow files to be categorized in terms of the distribution of the effort following gestalt principles. Our approach allows us to discover files of high development efforts in terms of team size and effort intensity of individual developers. The visualizations allow an analyst or a project manager to get first insights into team structures and code ownership principles. We have analyzed Mozilla as a case study and we show some of the recovered team development patterns in this paper as a validation of our approach. © 2005 IEEE.",2019,https://scholar.google.com.br/,yes
33,Successful extreme programming: Fidelity to the methodology or good teamworking?,"Context: Developing a theory of agile technology, in combination with empirical work, must include assessing its performance effects, and whether all or some of its key ingredients account for any performance advantage over traditional methods. Given the focus on teamwork, is the agile technology what really matters, or do general team factors, such as cohesion, primarily account for a team's success? Perhaps the more specific software engineering team factors, for example the agile development method's collective ownership and code management, are decisive. Objective: To assess the contribution of agile methodology, agile-specific team methods, and general team factors in the performance of software teams. Method: We studied 40 small-scale software development teams which used Extreme Programming (XP). We measured (1) the teams' adherence to XP methods, (2) their use of XP-specific team practices, and (3) standard team attributes, as well as the quality of the project's outcomes. We used Williams et al.'s (2004a) [33] Shodan measures of XP methods, and regression analysis. Results: All three types of variables are associated with the project's performance. Teamworking is important but it is the XP-specific team factor (continuous integration, coding standards, and collective code ownership) that is significant. Only customer planning (release planning/planning game, customer access, short releases, and stand-up meeting) is positively related to performance. A negative relationship between foundations (automated unit tests, customer acceptance tests, test-first design, pair programming, and refactoring) is found and is moderated by craftsmanship (sustainable pace, simple design, and metaphor/system of names). Of the general team factors only cooperation is related to performance. Cooperation mediates the relationship between the XP-specific team factor and performance. Conclusion: Client and team foci of the XP method are its critical active ingredients. © 2012 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,no
34,Dedicated pavement type networks based on a probabilistic life-cycle cost analysis,"In 2001, the Que´bec Ministry of Transportation (MTQ), in Canada, adopted a policy subdividing the existing pavement network into dedicated concrete and asphalt networks. This paper summarizes the methodology used for determining these respective networks using probabilistic Life Cycle Cost Analysis (LCCA) and provides an assessment of the situation four years after implementation. Sixteen (16) different combinations of Average Annual Daily Traffic (AADT), number of lanes, truck percentage, and truck factor yielded 32 pavement designs in asphalt and concrete that were compared in pairs over an analysis period of 50 years using a probabilistic LCCA software. Regression equations were used to generalize the results of these standard cases. The network allocation criteria were determined by applying dominance tests to these probabilistic results; in the areas without clear dominance further analyses would be necessary using project-specific data. After minor adjustments to ensure continuity, the respective networks (""white"" for concrete, ""black"" for asphalt and ""gray"" for further analysis) were established officially. Since 2001, the clarity and convenience of this policy were seemingly appreciated both by the industry and MTQ officials.",2019,https://scholar.google.com.br/,no
35,Mitigation of spear phishing attacks: A content-based authorship identification framework,"Phishing is a semantic attack that takes advantage of the naivety of the human behind electronic systems (e.g. e-banking). Educating end-users can minimize the impact of phishing attacks, however it remains relatively expensive and time consuming. Thus, many software-based solutions, such as classifiers, are being proposed by researchers. However, no software solutions have been proposed to minimize the impact of spear phishing attacks, which are the targeted form of phishing, and have a higher success rate than generic bulk phishing attacks. In this paper, we describe a novel framework to mitigate spear phishing attacks via the use of document authorship techniques - Anti-Spear phishing Content-based Authorship Identification (ASCAI). ASCAI informs the user of possible mismatches between the writing styles of a received email body and of trusted authors by studying the email body itself (i.e. the writeprint), as opposed to traditional user ID-based authentication techniques which can be spoofed or abused. As a proof of concept, we implemented the proposed framework using Source Code Author Profiles (SCAP), and the evaluation results are presented. © 2011 ICITST.",2019,https://scholar.google.com.br/,no
36,Fatigue truck calibration for bi-linear fatigue design curves,"The Canadian Highway Bridge Design Code (CHBDC) CAN/CSA-S6-06 uses a fatigue truck factor to calibrate the design truck to the actual highway traffic. This factor accounts for the discrepancy between the fatigue damage induced by the actual truck traffic and the fatigue damage that would be induced by the CL-625 design truck. The factor is based on single-slope fatigue design curves with m=3. Although dual-slope (m=3 and 5) S-N curves have been adopted in CAN/CSA-S16-09, they have not yet been implemented in the CHBDC. This paper presents a calibration of the CSA-S6 design truck for the fatigue limit state using dual-slope S-N curves and weigh-in-motion data obtained from different Canadian sources. Weigh-in-motion truck data, collected from different stations in Quebec and Ontario were used as input for analysis of various bridge elements to derive load histories. Load spectra for various bridge details were obtained from a rainflow analysis and Miner's fatigue damage rule was used to derive a calibration factor for the CHBDC fatigue truck. The fatigue truck was calibrated for various critical sections of bridge spans varying from 2 m to 70 m and for single and multi-span bridges. The calibration results from three different sources were found to be close to each other. Based on the results of the calibration using dual slope curve, the study proposed a fatigue truck factor of 0.6 instead of 0.52, which is currently used in CHBDC.",2019,https://scholar.google.com.br/,no
37,Visualizing the evolution of code clones,"The knowledge of code clone evolution throughout the history of a software system is essential in comprehending and managing its clones properly and cost-effectively. However, investigating and observing facts in a huge set of text-based data provided by a clone genealogy extractor could be challenging without the support of a visualization tool. In this position paper, we present an idea of visualizing code clone evolution by exploiting the advantages of existing clone visualization techniques that would be both scalable and useful. © 2011 ACM.",2019,https://scholar.google.com.br/,no
38,DECLARATIVE KNOWLEDGE PROGRAMMING: BETTER THAN PROCEDURAL?,"The author reports on the use of the OPS5 rule-based language to code expertise for YES/MVS (Yorktown Expert System/MVS), an expert system that assists operators in controlling large computer centers that use the MVS operating system. He illustrates the advantages of declarative expression of knowledge, and explores its use with data-driven (forward-chaining) production systems in the implementation of an expert system.",2019,https://scholar.google.com.br/,no
39,ShadObf: A c-source obfuscator based on multi-objective optimisation algorithms,"The development of the new Cloud Computing paradigm as lead to a reevaluation of the security issues. When running a private code on a Public Cloud or on any remote machine, its owner has no guarantees that the code cannot be reverse engineered, understood and modified. One of the solutions for the code owner in order to protect his intellectual property is to obfuscate his algorithms. The obfuscation of source code is a mechanism to modify a source code to make it unintelligible by humans even with the help of computing resources. More precisely, the objective is to conceal the purpose of a program or its logic without altering its functionality, thus preventing the tampering or the reverse engineering of the program. Obfuscation is usually performed by applying transformations to the initial source code, but it reveals many open questions: what transformation should be chosen? In which order should the obfuscator apply them? How can we quantify the obfuscation capacity of a given program? In order to answer these questions, we propose here ShadObf, an obfuscation framework based on evolutionary heuristics designed to optimise for a given input C program, the sequence of transformations that should be applied to the source code to improve its obfuscation capacity. This last measure involves the combination of well known metrics, coming from the Software Engineering area, which are optimised simultaneously thanks to Multi Objective Evolutionary Algorithms. We have validated our approach over a classical matrix multiplication program-experiments on other applications are still in progress. © 2013 IEEE.",2019,https://scholar.google.com.br/,no
40,USING DECLARATIVE KNOWLEDGE REPRESENTATION TECHNIQUES: IMPLEMENTING TRUTH MAINTENANCE IN OPS5.,"The research reported grew out of an attempt to use OPS5 to code expertise for YES/MVS, an expert system that assists computer operators in controlling large computer centers that use the MVS operating system. The author illustrates the advantages of declarative expression of knowledge and describes how it can be used with data-driven (forward chaining) production systems, such as OPS5, in the implementation of an expert system. Using concrete examples from YES/MVS, the author discusses the control aspects needed for the execution aspects of declarative knowledge. The view of the execution control strategy as a kind of truth maintenance system (TMS) is contrasted with other aspects of TMS research. Finally, the effectiveness of OPS5 (with its RETE match algorithm) in providing the implementation environment for these techniques is analyzed.",2019,https://scholar.google.com.br/,no
41,Sparse space codes for multi-antenna systems,"Sparse space codes (SSC) are proposed as a novel transmission scheme for an under-determined MIMO channel. Each SSC codeword is a sparse vector of the size of the number of transmit antennas. The information is imparted through: (i) uncertainty in the positions of non-zero elements, and (ii) uncertainty in the symbol-space of non-zero elements. Basis-pursuit (BPD) and LASSO detectors are used with knowledge of code sparsity to detect SSC. However, their performance is found to be degraded compared to the Maximum Likelihood Detector (MLD). A runner-up basis pursuit algorithm is proposed that provides MLD-like performance with a small increment in complexity over BPD. Analytical and simulation results show that SSC outperforms orthogonal space time block codes in terms of word error rate at varying SNR ranges. © 2011 IEEE.",2019,https://scholar.google.com.br/,no
42,A computer vision system for automated container code recognition,"Container code examination is an essential step in the container flow management. To date, this step is mostly achieved by human visual inspections, which are however time-consuming and error-prone. We hence propose a new computer vision system for automated container code recognition. The proposed system consists of model construction and code recognition stages. In the model construction stage, we first incorporate a locally thresholding method with prior knowledge of code character geometry to segment the code characters, including English characters A-Z and numeric characters 0-9, from a training set of container images. With the segmentation results of each character, we subsequently construct its Eigen-feature model using the principal component analysis (PCA). In the recognition stage, the code characters are firstly segmented from the given container image. Each segmented character is then recognized by finding the best matched Eigen-feature model that maintains the minimal PCA reconstruction error of the character appearance. Experiments showed that the proposed method achieved the code recognition with a high recognition rate and little recognition time for each image automatically. Overall, our proposed system has great potential for improving the efficiency of container terminals as well as enhancing the container management.",2019,https://scholar.google.com.br/,no
43,EUFORIA HPC: Massive parallelisation for fusion community,"One of the central tasks of EUFORIA is to port, parallelise, and optimise fusion simulation codes, developed at individual research institutes in Europe. There are three supercomputer centres involved in the project located at Barcelona, Edinburgh, and Helsinki. For some of the fusion codes simply porting them to one of the supercomputers represents a major advancement in the use of the codes, as they until now have mainly been used by a small user community, or even exclusively by the author of the code. Also, where codes currently can only use one processor (i.e. are serial) providing any parallel functionality can be of major benefit to the code and the code owner(s). Many of the simulation codes for edge and core transport modelling of fusion plasma using high performance computing are estimated to currently require weeks or months of execution time to simulate science at a scale required to model the new fusion reactor ITER, and therefore these codes have to be optimised to run as fast as possible and parallelised in such a way that computer resources are used as effectively as possible. During the first fifteen month of the project, we have successfully ported eleven fusion codes to the supercomputers in Barcelona, Edinburgh and Helsinki. The installation procedure, library requirements and runtime scripts have been documented for each code, and deposited in the EUFORIA software repository and code revision system. Following this a number of these codes have been chosen for code optimisation and improvements in parallelisation and this paper outlines the experience that we have had with some of these codes, the performance improvements achieved, and the techniques used. © 2010 IEEE.",2019,https://scholar.google.com.br/,no
44,Accurate truck activity estimate for roadway link pm2.5 emissions,"Since diesel truck traffic is a major transportation on-road source of particulate matter (PM2.5), roadway link-based modeling of the truck emissions greatly rely on accurate estimate of truck fractions of traffic volumes as partial input to the MOVES model. However, present aggregated traffic volume and unreliable truck activity data provided from today's practice are obviously a concern in estimating the truck-traffic-source emission. The daily truck traffic activity is usually not estimated accurately and cannot be disaggregated to hourly activity using the traditional methods. To address this problem, two innovative econometric methods have been successfully enhanced in this study to enable accurate truck activity based inputs for the emission estimation. The truck factor spatial panel model (TFSP) and multinomial probit hourly VMT (MNP-HVMT) models have been improved and tested using the Greater Cincinnati area's regional traffic data. The application of those models indicates that using MOVES default input data underestimates the regional PM2.5 inventory. The proposed methodology also enables plotting the spatiotemporal distribution of PM2.5 emissions in a subarea. Such an integrated method provides a very useful decision support tool for practitioners since they can also model PM2.5 emissions at a detailed level as required by project-level conformity analysis. The presented methodology is scalable and transferable and holds technical promise in its application for different regions and for different pollutants. © 2012 American Society of Civil Engineering.",2019,https://scholar.google.com.br/,no
45,Efficient code diversification for network reprogramming in sensor networks,"As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network. To increase the survivability of a sensor network, code diversification has been shown to be an effective solution. However, disseminating many diversified code images is very costly in current network reprogramming systems, as it does not take advantage of the epidemic propagation of network reprogramming. New mechanisms need to be studied for integrating code diversification with network reprogramming. This paper proposes an efficient code diversification scheme for network reprogramming in sensor networks. The scheme uses Deluge to disseminate code images of sensor applications that carry diversification information and allows sensors to randomize the layout of their own executables. Such diversification can defeat a wide range of attacks that exploit the knowledge of code layout, as no sensors have the same code layout in their executables. Except the cost determined by the code size, the computational overhead of diversification in sensors can be reduced to 60%, while sacrificing only 10% of security. Copyright 2010 ACM.",2019,https://scholar.google.com.br/,no
46,Aircraft traffic mix analysis. Damage factors and coefficients,"Historically, traffic mix analyses have been based upon the use of the critical or most damaging aircraft. The damage effects of other aircraft are either ignored or empirically incorporated into the analysis. This paper presents an alternate traffic mix analysis procedure. In it, the damage produced by any given aircraft, at any specified gross weight and operating on any given pavement system is computed. Because the proposed procedure is computationally intensive, a computer solution developed by the authors is described. Also, recommendations are provided for establishing a simplified aircraft mix damage factor identical in concept to the highway truck factor.",2019,https://scholar.google.com.br/,no
47,Bloom's taxonomy: A framework for assessing programmers' knowledge of software systems,"Programmers must attain knowledge about a system before they can perform specific software maintenance tasks on it. Traditionally, computer scientists have described the activity of attaining this knowledge as 'software comprehension'. However, if we look at the educational literature, attainable knowledge has been described with much finer granularity. Bloom's (1956) taxonomy identifies six separate levels of knowledge within the cognitive domain, one of which refers to a (more constricted) definition of comprehension. Several other levels in Bloom's taxonomy seem to correlate more directly to specific software maintenance tasks. This article reviews Bloom's taxonomy as a richer descriptive framework for programmers' knowledge of code and illustrates how various software maintenance tasks map to knowledge levels in this hierarchy. A pilot study is presented showing how participants' knowledge of software may differ at various levels of this hierarchy. © 2003 IEEE.",2019,https://scholar.google.com.br/,no
48,Multicarrier spread spectrum watermarking for secure error concealment in fading channel,"This paper proposes a novel multicarrier spread spectrum (SS) watermarking scheme for the application of image error concealment using multicarrier-code division multiple access (MC-CDMA) with binary phase shift keying (BPSK) transmission in Rayleigh fading channel. The goal is achieved by embedding important information (image digest) which is extracted from the original image itself, and is used to introduce sufficient redundancy in the transmitted image. Half-toning technique is applied to obtain image digest from its low-resolution version. At the decoder side, data demodulation as well as watermark decoding are done using minimum mean square error combining (MMSEC) strategy. The extracted image digest is used to correct the damaged regions. The integration of SS watermarking with the existing SS modulation not only simplifies the design but also offers significant performance improvement for error concealment in fading channel. Authorized users having the knowledge of code patterns for SS watermarking can only perform the error concealment operation and the method is secured. Experimental results duly support the effectiveness of the proposed scheme. © Springer Science+Business Media, LLC 2010.",2019,https://scholar.google.com.br/,no
49,Adaptive MC-CDMA receiver with constrained constant modulus IQRD-RLS algorithm for MAI suppression,"The multicarrier code division multiple access (MC-CDMA) technique is considered to be one of the attractive candidates to achieve high data-rate for future wireless communication systems. In this paper, based on linearly constrained constant modulus (LCCM) least square (LS) criterion, a new robust adaptive constrained filtering algorithm, referred to as the LCCM inverse QRD-RLS (IQRD-RLS) algorithm, is devised for MC-CDMA detector. The proposed robust LCCM IQRD-RLS algorithm can be used to estimate the weights of the combining process to combat the multiple access interference (MAI), effectively, and is more robust to against the imperfect channel estimation error. By this approach we require only the knowledge of code sequences of desired user rather than the code sequences of other users. The superiority of the proposed algorithm for estimating the weights in the combining process is verified by evaluating the performance, in terms of output signal to interference and noise ratio (SINR) and bit error rate (BER). From computer simulation results we showed that it outperformed the conventional techniques, such as the maximum ratio combining (MRC), blind adaptation algorithm, least mean square algorithm with partitioned linear interference canceller structure (PLIC-LMS) and LCCM-gradient based approaches. © 2003 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,no
50,REVIEW OF SATELLITE CODE DIVISION MULTIPLE ACCESS AND A TECHNIQUE FOR DETERMINING THE NUMBER OF SIMULTANEOUS ACCESSES.,"A review of some important concepts and mathematical expressions for determining the capacity, in terms of the number of users, of a direct sequence, spread-spectrum, code-division multiple-access system is presented. Several references provide equations for approximating the number of simultaneous accesses. A comparison of these approximations and a sample computation is included to assist the communications engineer in determining system capacity when complete knowledge of code cross-correlation properties of the other users is not known.",2019,https://scholar.google.com.br/,no
51,Genetic programming to investigate design parameters contributing to crash occurrence on urban arterials,"Nonlinear models were developed to estimate crash frequency on urban arterials with partial access control. These multilane arterials consist of midblock segments joined by signalized and unsignalized intersections (or access points). Crashes included in the analysis are of three major types: rear-end, angle, and head-on. Each crash type is further sorted into mutually exclusive categories on the basis of the roadway element responsible for the crashes: midblock segment, signalized intersection, and access point. Genetic programming (GP) is adopted for predicting crash frequency. GP, which is primarily based on genetic algorithms, uses the concept of evolution to develop models through the processes of crossover and mutation. The GP modeling approach gives independence for model development without restrictions on distribution of data. The models developed were compared to the basic negative binomial models. Morning and afternoon peak periods are observed to have fewer occurrences of rear-end crashes at all roadway elements. Higher traffic volume results in an increased number of angle crashes. Instances of angle crashes have increased at signalized intersections, even at lower maximum posted speeds. A higher average truck factor increases the instances of head-on crashes on midblock segments and at signalized intersections.",2019,https://scholar.google.com.br/,no
52,Code Bad Smells: A review of current knowledge,"Fowler et al. identified 22 Code Bad Smells to direct the effective refactoring of code. These are increasingly being taken up by software engineers. However, the empirical basis of using Code Bad Smells to direct refactoring and to address 'trouble' in code is not clear, i.e., we do not know whether using Code Bad Smells to target code improvement is effective. This paper aims to identify what is currently known about Code Bad Smells. We have performed a systematic literature review of 319 papers published since Fowler et al. identified Code Bad Smells (2000 to June 2009). We analysed in detail 39 of the most relevant papers. Our findings indicate that Duplicated Code receives most research attention, whereas some Code Bad Smells, e.g., Message Chains, receive little. This suggests that our knowledge of some Code Bad Smells remains insufficient. Our findings also show that very few studies report on the impact of using Code Bad Smells, with most studies instead focused on developing tools and methods to automatically detect Code Bad Smells. This indicates an important gap in the current knowledge of Code Bad Smells. Overall this review suggests that there is little evidence currently available to justify using Code Bad Smells. Copyright © 2010 John Wiley & Sons, Ltd.",2019,https://scholar.google.com.br/,no
53,EARec: Leveraging expertise and authority for pull-request reviewer recommendation in GitHub,"Pull-Request (PR) is a primary way of code contribution from developers to improve quality of software projects in GitHub. For a popular GitHub project, tens of PR are submitted daily, while only a small number of developers, i.e core developers, have the grant to judge whether to merge these changes into the main branches or not. Due to the time-consumption of PR review and the diversity of PR aspects, it is becoming a big challenge for core developers to quickly discover the useful PR. Currently, recommending appropriate reviewers (developers) for incoming PR to quickly collect meaningful comments, is treated as an effective and crowdsourced way to help core developers to make decisions and thus accelerate project development. In this paper, we propose a reviewer recommendation approach (EARec) which simultaneously considers developer expertise and authority. Specifically, we first construct a graph of incoming PR and possible reviewers, and then take advantage of text similarity of PR and social relations of reviewers to find the appropriate reviewers. The experimental analysis on MSR Mining Challenge Dataset1 provides good evaluation for our approach in terms of precision and recall. © 2016 ACM.",2019,https://scholar.google.com.br/,yes
54,Toward understanding new feature request systems as participation architectures for supporting open innovation,"Most research regarding innovation in open source software communities pertains to identifying supporting conditions for promoting code contribution as a way to innovate the software. Instead, this paper seeks to identify social and technological affordances of new feature request systems and their potential to support open innovation through integration of peripheral community members' ideas for advancing the software. Initial findings from the first of a planned study of multiple open source software communities are presented to identify attributes of effective participation architectures. © 2015 ACM.",2019,https://scholar.google.com.br/,no
55,On the role of FOSS business models and participation architectures in supporting open innovation,"Most research regarding innovation in free and open source software (FOSS) pertains to identifying supporting conditions for promoting code contribution. This raises concerns about the ability of FOSS communities to remain innovative based only on the perspectives of developer-users. Preliminary research suggests different open source business models may provide motivation to support greater involvement of non-developer users. This research focuses on understanding the relationship between business model and supporting participation architectures, beyond users' code contributions, to enable user participation in design of the software.",2019,https://scholar.google.com.br/,no
56,The empirical commit frequency distribution of open source projects,"A fundamental unit of work in programming is the code contribution (\commit"") that a developer makes to the code base of the project in work. An author's commit frequency describes how often that author commits. Knowing the distribution of all commit frequencies is a fundamental part of understanding software development processes. This paper presents a detailed quantitative analysis of commit frequencies in open-source software development. The analysis is based on a large sample of open source projects, and presents the overall distribution of commit frequencies. We analyze the data to show the dierences between authors and projects by project size; we also includes a comparison of successful and non successful projects and we derive an activity indicator from these analyses. By measuring a fundamental dimension of programming we help improve software development tools and our understanding of software development. We also validate some fundamental assumptions about software development. Copyright 2010 ACM.",2019,https://scholar.google.com.br/,no
57,Visualizing code and coverage changes for code review,"One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code. To mitigate this problem, we developed OPERIAS, a tool that provides a combined visualization of fine-grained source code differences and coverage impact. OPERIAS works both as a stand-Alone tool on specific project versions and as a service hooked to GitHub. In the latter case, it provides automated reports for each new pull request, which reviewers can use to assess the code contribution. OPERIAS works for any Java project that works with maven and its standard Cobertura coverage plugin. We present how OPERIAS could be used to identify test-related problems in real-world pull requests. OPERIAS is open source and available on GitHub with a demo video: https://github.com/SERG-Delft/operias. © 2016 ACM.",2019,https://scholar.google.com.br/,no
58,How developers develop features,"Software systems are typically developed by teams of developers, with responsibilities for different parts of the code. Knowledge of how the developers collaborate, and how their responsibilities are distributed over the software artifacts is a valuable source of information when reverse engineering a system. Determining which developers are responsible for which software artifacts (e.g., packages or classes) is just one perspective. In this paper we complement the static perspective with the dynamic perspective of a system in terms of its features. We want to extract information about which developers are responsible for which features. To achieve these two perspectives, we correlate developer responsibilities both with a structural view of the system and with a feature view. We identify which developers are responsible for which features, and whether the responsibilities correspond with structural source code artifacts or with features. We apply our technique to two software projects developed by two teams of students as part of their course work, and to one large open source project. © 2007 IEEE.",2019,https://scholar.google.com.br/,yes
59,Can peer code reviews be exploited for later information needs?,"Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer that concerns the code being reviewed. We performed a study that looked at the code review practices of software product teams at Microsoft. The study results indicated that code reviews are a point at which design rationale is explicitly stated, but that retention and recovery of this information is not well supported in the current environment. The results also indicated that code reviews in collocated development environments such as Microsoft use a mix of face-to-face and electronic communication. © 2009 IEEE.",2019,https://scholar.google.com.br/,no
60,Block CMA-based blind and group-blind multiuser detectors,"We derive a new iterative multiuser detection algorithm based on a generalized sidelobe canceller which uses the constant modulus property of digitally modulated signals together with code knowledge given to a receiver in CDMA system. The proposed algorithm can be seen as an extension of least square constant modulus algorithm in a sense that it simultaneously minimizes the constant modulus (CM) and the least square (LS) cost functions iteratively. The proposed detector performs as well as the ideal MMSE detector in the high SNR region, in addition to resolving the interference capture problem existing in most constant modulus algorithm (CMA).",2019,https://scholar.google.com.br/,no
61,Automatic identification of knowledge points from program code based on syntax feature tree,"Whether it is in the program design training recommending system or in the code searching domain, it may need to identify or get the statistic of knowledge in the code. However, it is easy to be overlooked and to get errors using manual identification. Besides, it isn't real-time. This paper will use the method that generate the syntax tree and use feature tree to match the knowledge in the syntax tree to identify code knowledge automatically. The experimental results show that the system can effectively and accurately gathers the statistic of knowledge in program code in real time. © 2012 IEEE.",2019,https://scholar.google.com.br/,no
62,Network analysis of collaboration structure in Wikipedia,"In this paper we give models and algorithms to describe and analyze the collaboration among authors of Wikipedia from a network analytical perspective. The edit network encodes who interacts how with whom when editing an article; it significantly extends previous network models that code author communities in Wikipedia. Several characteristics summarizing some aspects of the organization process and allowing the analyst to identify certain types of authors can be obtained from the edit network. Moreover, we propose several indicators characterizing the global network structure and methods to visualize edit networks. It is shown that the structural network indicators are correlated with quality labels of the associated Wikipedia articles. Copyright is held by the International World Wide Web Conference Committee (IW3C2).",2019,https://scholar.google.com.br/,no
63,Reverse engineering of embedded software using syntactic pattern recognition,"When a secure component executes sensitive operations, the information carried by the power consumption can be used to recover secret information. Many different techniques have been developped to recover this secret, but only few of them focus on the recovering of the executed code itself. Indeed, the code knowledge acquired through this step of Simple Power Analysis (SPA) can help to identify implementation weaknesses and to improve further kinds of attacks. In this paper we present a new approach improving the SPA based on a pattern recognition methodology, that can be used to automatically identify the processed instructions that leak through power consumption. We firstly process a geometrical classification with chosen instructions to enable the automatic identification of any sequence of instructions. Such an analysis is used to reverse general purpose code executions of a recent secure component. © Springer-Verlag Berlin Heidelberg 2006.",2019,https://scholar.google.com.br/,no
64,Unifying program slicing and concept assignment for higher-level executable source code extraction,"Program slicing and concept assignment have both been proposed as source code extraction techniques. Unfortunately, each has a weakness that prevents wider application. For slicing, the extraction criterion is expressed at a very low level; constructing a slicing criterion requires detailed code knowledge which is often unavailable. The concept assignment extraction criterion is expressed at the domain level. However, unlike a slice, the extracted code is not executable as a separate subprogram in its own right. This paper introduces a unification of slicing and concept assignment which exploits their combined advantages, while overcoming these two individual weaknesses. Our 'concept slices' are executable programs extracted using high-level criteria. The paper introduces four techniques that combine slicing and concept assignment and algorithms for each. These algorithms were implemented in two separate tools used to illustrate the application of the concept slicing algorithms in two very different case studies. The first is a commercially-written COBOL module from a large financial organization, the second is an open source utility program written in C. Copyright © 2005 John Wiley & Sons, Ltd.",2019,https://scholar.google.com.br/,no
65,Estimation of temperature and other properties in pyrotechnic reactions using pressure measurements and application of thermodynamic equilibrium code,"The violent environment created when a NASA standard initiator (NSI) combusts within the confinement inside a pyrovalve is difficult to characterize using experimental measurement techniques. A chemical equilibrium code, knowledge of zirconium potassium perchlorate (ZPP) reactants, physical volume, and time-dependent pressure measurements were used to estimate other state parameters for the reaction. Computed values for reactant temperature versus time, species, enthalpy, and internal energy were determined. © 2008 by the American Institute of Aeronautics and Astronautics, Inc.",2019,https://scholar.google.com.br/,no
66,Design of online teacher professional development in a statewide Reading First professional development system,"This study examined the pedagogy of three online teacher professional development (oTPD) modules. Evidence of design features oriented to the how people learn framework was the primary research objective. An analytic framework was devised to code knowledge types, levels of cognitive demand, levels of interaction, and sensory details in the learning architecture of each module. All three online modules showed a didactic pedagogy (show and tell) rather than a constructivist one (teaching for understanding). Module content emphasized declarative types of knowledge (facts and concepts), and lower levels of cognitive demand (remember and understanding). The interaction pattern of two modules was largely passive, reflecting a limited level of learner participation, control, productivity, and creativity of experience. A third module, developed after research on the other two, provided learners with more guided and self-initiated interaction. Sensory design of the modules was the most well-developed and supportive of learner engagement. The study confirmed the need for more research on design principles and strategies to support constructivist principles in oTPD modules. © 2007 Elsevier Inc. All rights reserved.",2019,https://scholar.google.com.br/,no
67,Constrained blind adaptive multiuser detector for DS-CDMA UWB in multipath channels,In this paper we derive and propose constrained blind adaptive multiuser detection algorithm for DS-CDMA UWB multipath channel to suppress the multi access interference (MAI). Variance of the receiver output is minimized subject to appropriate constraints. Receiver does not require spreading code knowledge of all users other than that of the user of interest. Simulation results show that bit error probability performance of the proposed method is better than that of adaptive minimum mean square error (MMSE) detector and much better than RAKE receiver performance in multipath AWGN channel. © 2008 IEEE.,2019,https://scholar.google.com.br/,no
68,A probabilistic approach to source code authorship identification,"There exists a need for tools to help identify the authorship of source code. This includes situations in which the ownership of code is questionable, such as in plagiarism or intellectual property infringement disputes. Authorship identification can also be used to assist in the apprehension of the creators of malware. In this paper we present an approach to identifying the authors of source code. We begin by computing a set of metrics to build profiles for a population of known authors using code samples that are verified to be authentic. We then compute metrics on unidentified source code to determine the closest matching profile. We demonstrate our approach on a case study that involves two kinds of software: one based on open source developers working on various projects, and another based on students working on assignments with the same requirements. In our case study we are able to determine authorship with greater than 70% accuracy in choosing the single nearest match and greater than 90% accuracy in choosing the top three ordered nearest matches. © 2007 IEEE.",2019,https://scholar.google.com.br/,yes
69,Fine-grained binary code authorship identification,"Binary code authorship identification is the task of determin-ing the authors of a piece of binary code from a set of known authors. Modern software often contains code from multi-ple authors. However, existing techniques assume that each program binary is written by a single author. We present a new finer-grained technique to the tougher problem of deter-mining the author of each basic block. Our evaluation shows that our new technique can discriminate the author of a basic block with 52% accuracy among 282 authors, as opposed to 0.4% accuracy by random guess, and it provides a practical solution for identifying multiple authors in software. © 2016 ACM.",2019,https://scholar.google.com.br/,yes
70,Choosing a profile length in the SCAP method of source code authorship attribution,"Source code authorship attribution is the task of determining the author of source code whose author is not explicitly known. One specific method of source code authorship attribution that has been shown to be extremely effective is the SCAP method. This method, however, relies on a parameter L that has heretofore been quite nebulous. In the SCAP method, each candidate author's known work is represented as a profile of that author, where the parameter L defines the profile's maximum length. In this study, alternative approaches for selecting a value for L were investigated. Several alternative approaches were found to perform better than the baseline approach used in the SCAP method. The approach that performed the best was empirically shown to improve the performance from 91.0% to 97.2% measured as a percentage of documents correctly attributed using a data set consisting of 7,231 programs written in Java and C++.",2019,https://scholar.google.com.br/,yes
71,The significance of user-defined identifiers in java source code authorship identification,"When writing source code, programmers have varying levels of freedom when it comes to the creation and use of identifiers. Do they habitually use the same identifiers, names that are different to those used by others? Is it then possible to tel I who the author of a piece of code is by examining these identifiers? If so, can we use the presence or absence of identifiers to assist in correctly classifying programs to authors? Is it possible to hide the provenance of programs by identifier renaming? In this study, we assess the importance of three types of identifiers in source code author classification for two different Java program data sets. We do this through a sequence of experiments in which we disguise one type of identifier at a time. These experiments are performed using as a tool the Source Code Author Profiles (SCAP) method. The results show that, although identifiers when examined as a whole do not seem to reflect program authorship for these data sets, when examined separately there is evidence that class names do signal the author of the program. In contrast, simple variables and method names used in Java programs do not appear to reflect program authorship. On the contrary, our analysis suggests that such identifiers are so common as to mask authorship. We believe that these results have applicability in relation to the robustness of code plagiarism analysis and that the underlying methods could be valuable in cases of litigation arising from disputes over program authorship. © 2011 CRL Publishing Ltd.",2019,https://scholar.google.com.br/,no
72,A degree-of-knowledge model to capture source code familiarity,"The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts of the code. Existing approaches to this problem are based solely on authorship of code. In this paper, we present data from two professional software development teams to show that both authorship and interaction information about how a developer interacts with the code are important in characterizing a developer's knowledge of code. We introduce the degree-of-knowledge model that computes automatically a real value for each source code element based on both authorship and interaction information. We show that the degree-of-knowledge model can provide better results than an existing expertise finding approach and also report on case studies of the use of the model to support knowledge transfer and to identify changes of interest. © 2010 ACM.",2019,https://scholar.google.com.br/,yes
73,Source code authorship attribution using n-grams,"Plagiarism and copyright infringement are major problems in academic and corporate environments. Existing solutions for detecting infringements in structured text such as source code are restricted to textual similarity comparisons of two pieces of work. In this paper, we examine authorship attribution as a means for tackling plagiarism detection. Given several samples of work from several authors, we attempt to correctly identify the author of work presented as a query. On a collection of 1 640 documents written by 100 authors, we show that we can attribute authorship in up to 67% of cases. This work can be a valuable additional indicator for the more difficult plagiarism investigations.",2019,https://scholar.google.com.br/,yes
74,Refining code ownership with synchronous changes,"When mining software repositories, two distinct sources of information are usually explored: the history log and snapshots of the system. Results of analyses derived from these two sources are biased by the frequency with which developers commit their changes. We argue that the usage of mainstream SCM (software configuration management) systems influences the way that developers work. For example, since it is tedious to resolve conflicts due to parallel commits, developers tend to minimize conflicts by not contemporarily modifying the same file. This however defeats one of the purposes of such systems. We mine repositories created by our tool Syde, which records changes in a central repository whenever a file is compiled locally in the IDE (integrated development environment) by any developer in a multi-developer project. This new source of information can augment the accuracy of analyses and breaks new ground in terms of how such information can assist developers. We illustrate how the information we mine provides a refined notion of code ownership with respect to the one inferred by SCM system data. We demonstrate our approach on three case studies, including an industrial one. Ownership models suffer from the assumption that developers have a perfect memory. To account for their imperfect memory, we integrate into our ownership measurementa model of memory retention, to simulate the effect of memory loss over time. We evaluate the characteristics of this model for several strengths of memory. © Springer Science+Business Media, LLC 2011.",2019,https://scholar.google.com.br/,yes
75,Practice and perception of team code ownership,"Context: Team code ownership is a software development practice where any team member can modify any part of the team's code. However, many factors beyond official policy affect a developer's sense of ownership. Objective: The purpose of this paper is to understand the factors that affect a team's sense of code ownership. Method: Following Constructivist Grounded Theory, the first author conducted participant-observation of several software development projects, and interviewed 21 software engineers, interaction designers, and product managers. Iterating between theoretical sampling and analysis continued until achieving theoretical saturation. Results: Team code ownership is a feeling. Developers feel team code ownership more when they understand the system context, have contributed to the code in question, perceive code quality as high, believe the product will satisfy the user needs, and perceive high team cohesion. Limitations: Outcomes of grounded theory research are not statistically generalizable to defined populations, and may not apply to organizations with different software development cultures. Conclusion: Team code ownership is rooted in numerous cognitive, emotional, contextual and technical factors and cannot be achieved simply by policy. © 2016 Copyright held by the owner/author(s).",2019,https://scholar.google.com.br/,no
76,Code Ownership Perspectives,"In the essay 'Code Ownership-a Quality Issue,' Sigrid Eldh argues for adapting code ownership to specific situations, focusing on quality, and taking into account ownership of the test code. In the essay 'Code Ownership-More Complex to Understand Than Research Implies,' Brendan Murphy argues for a broader and deeper analysis of code ownership. © 1984-2012 IEEE.",2019,https://scholar.google.com.br/,no
77,A case study on the relationship between code ownership and refactoring activities in a Java software system,"Refactoring, the activity of changing source code design with- out affecting its external behavior, is a widely used practice among developers, since it is considered to positively affect the quality of software systems. However, there are some ""human factors"" to be considered while performing refactor-ing, including developers knowledge of systems architecture. Recent studies showed how much ""people"" metrics, such as code ownership, might affect software quality as well. In this preliminary study we investigated the relationship between code ownership and refactoring activity performed by developers. This study can provide useful insights on who performs refactoring and help team leaders to properly man- age human resources during software development. © 2016 ACM.",2019,https://scholar.google.com.br/,yes
78,Code ownership in open-source software,"Context: Ownership metrics measure how the workload of software modules is shared among their developers. They have been shown to be accurate indicators of software quality. Objective: Since ownership metrics studies were done only on industrial software projects, we replicated such a study on Java free/libre and open source software (FLOSS) projects. Our goal was to generalize an""ownership law""that stated that minor developers should be avoided. Method: We explored the relationship between ownership metrics and fault-proneness on seven FLOSS projects, using publicly available corpora to retrieve the fault-related information. Results: In our corpus, the relationship between ownership metrics and module faults is weak. At best, less than half of projects exhibit a significant correlation, and at worst, no projects at all. Moreover, fault-proneness seems to be much more inuenced by module size than by ownership. Conclusion: The results of ownership studies done on closed-source projects do not generalize to FLOSS projects. To understand the reasons for that, we performed an in-depth analysis and found that the lack of correlation between ownership metrics and module faults is due to the distributions of contributions among developers and the presence of ""heroes"" in FLOSS projects. Copyright 2014 ACM.",2019,https://scholar.google.com.br/,yes
79,Examining the significance of high-level programming features in source code author classification,"The use of Source Code Author Profiles (SCAP) represents a new, highly accurate approach to source code authorship identification that is, unlike previous methods, language independent. While accuracy is clearly a crucial requirement of any author identification method, in cases of litigation regarding authorship, plagiarism, and so on, there is also a need to know why it is claimed that a piece of code is written by a particular author. What is it about that piece of code that suggests a particular author? What features in the code make one author more likely than another? In this study, we describe a means of identifying the high-level features that contribute to source code authorship identification using as a tool the SCAP method. A variety of features are considered for Java and Common Lisp and the importance of each feature in determining authorship is measured through a sequence of experiments in which we remove one feature at a time. The results show that, for these programs, comments, layout features and package-related naming influence classification accuracy whereas user-defined naming, an obvious programmer related feature, does not appear to influence accuracy. A comparison is also made between the relative feature contributions in programs written in the two languages. © 2007 Elsevier Inc. All rights reserved.",2019,https://scholar.google.com.br/,yes
80,Revisiting code ownership and its relationship with software quality in the scope of modern code review,"Code ownership establishes a chain of responsibility for modules in large software systems. Although prior work uncovers a link between code ownership heuristics and software quality, these heuristics rely solely on the authorship of code changes. In addition to authoring code changes, developers also make important contributions to a module by reviewing code changes. Indeed, recent work shows that reviewers are highly active in modern code review processes, often suggesting alternative solutions or providing updates to the code changes. In this paper, we complement traditional code ownership heuristics using code review activity. Through a case study of six releases of the large Qt and OpenStack systems, we find that: (1) 67%-86% of developers did not author any code changes for a module, but still actively contributed by reviewing 21%-39% of the code changes, (2) code ownership heuristics that are aware of reviewing activity share a relationship with software quality, and (3) the proportion of reviewers without expertise shares a strong, increasing relationship with the likelihood of having post-release defects. Our results suggest that reviewing activity captures an important aspect of code ownership, and should be included in approximations of it in future studies. © 2016 ACM.",2019,https://scholar.google.com.br/,yes
81,Is my project's truck factor low? Theoretical and empirical considerations about the truck factor threshold,"The Truck Factor is a simple way, proposed by the agile community, to measure the system's knowledge distribution in a team of developers. It can be used to highlight potential project problems due to the inadequate distribution of the system knowledge. Notwithstanding its relevance, only few studies investigated the Truck Factor and proposed ways to efficiently measure, evaluate and use it. In particular, the effective use of the Truck Factor is limited by the lack of reliable thresholds. In this preliminary paper, we present a theoretical model concerning the Truck Factor and, in particular, we investigate its use to define the maximum achievable Truck Factor value in a project. The relevance of such a value concerns the definition of a reliable threshold for the Truck Factor. Furthermore in the paper, we document an experiment in which we apply the proposed model to real software projects with the aim of comparing the maximum achievable value of the Truck Factor with the unique threshold proposed in literature. The preliminary outcome we achieved shows that the existing threshold has some limitations and problems. © 2011 ACM.",2019,https://scholar.google.com.br/,no
82,On the difficulty of computing the truck factor,"In spite of the potential relevance for managers and even though the Truck Factor definition is well-known in the ""agile world"" for many years, shared and validated measurements, algorithms, tools, thresholds and empirical studies on this topic are still lacking. In this paper, we explore the situation implementing the only approach proposed in literature able to compute the Truck Factor. Then, using our tool, we conduct an exploratory study with 37 open source projects for discovering limitations and drawbacks that could prevent its usage. Lessons learnt from the execution of the exploratory study and open issues are drawn at the end of this work. The most important lesson that we have learnt is that more research is needed to render the notion of Truck Factor operative and usable. © 2011 Springer-Verlag.",2019,https://scholar.google.com.br/,yes
83,Managing code ownership,"The ownership of source code and other software artifacts that contribute to a software system during its development was discussed. Four models for software system ownership are: product specialist, subsystem ownership, chief architect and collective ownership. It was found that the dynamically assigned ownership can help balance a project's needs for communication, productivity and accountability against its needs for single-minded vision, product quality and manageable complexity.",2019,https://scholar.google.com.br/,no
84,Impact of increasing legal axle loads on truck factor in Egypt,"In 2005, the Ministry of Transport in Egypt issued new regulations for increasing legal truck axle loads. This paper presents an assessment of tuck factors (TF) under old and new regulations using actual truck loads and traffic data collected for three main roads in Egypt. Although axle load limits have increased by 17-36%, the TF increased by about 200%. The TF was used to determine the equivalent single axle load (ESAL) needed for pavement design and maintenance works. ESALs were found to increase by 75-136%. This impact was converted into additional thickness of asphalt layers, which ranged from 2.1-4.6 cm depending on restrictions on overloading and scenarios of freight volumes. © 2008 Taylor & Francis Group, London.",2019,https://scholar.google.com.br/,no
85,Methodological framework for truck-factor estimation considering vehicle-pavement interaction,"Truck traffic is usually characterized by using truck factors (TFs). A TF converts a mixed truck traffic stream over the pavement design lifetime into a number of equivalent single-axle loads (ESALs). This conversion requires equivalent single-axle load factors (EALFs), which can either be empirical or theoretical. The mechanistic-empirical pavement design guide (MEPDG) considers axle load spectra and uses it to run the response model, considering implicitly theoretical EALFs. This paper presents a methodology for TF estimation based on theoretical EALFs calculated by using simulated axle loads, thus overcoming the unavailability of data to define axle load spectra. Once the EALFs are calculated for several simulations, TFs are established and regression models are defined to predict TFs. To reach this point, the study considered the two most common Portuguese truck configurations and pavement structures. The methodology development and application revealed its flexibility and upgradability. The results indicated that vehicle-pavement interaction increases TFs by up to 27% when the initial international roughness index (IRI) increases 1 m/km, underling the importance of the dynamic behavior of the loads. © 2014 American Society of Civil Engineers.",2019,https://scholar.google.com.br/,no
86,Does a programmer's activity indicate knowledge of code?,"The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already assume a useful form of such a model can be created from data collected during development, such as expertise recommenders that use information about who has changed each file to suggest who might answer questions about particular parts of a system. In this paper, we report on an empirical study that investigates whether a programmer's activity can be used to build a model of what a programmer knows about a code base. In this study, nineteen professional Java programmers completed a series of questionnaires about the code on which they were working. These questionnaires were generated automatically and asked about program elements a programmer had worked with frequently and recently and ones that he had not. We found that a degree of interest model based on this frequency and recency of interaction can often indicate the parts of the code base for which the programmer has knowledge. We also determined a number of factors that may be used to improve the model, such as authorship of program elements, the role of elements, and the task being performed. Copyright 2007 ACM.",2019,https://scholar.google.com.br/,yes
87,Effective identification of source code authors using byte-level information,"Source code author identification deals with the task of identifying the most likely author of a computer program, given a set of predefined author candidates. This is usually based on the analysis of other program samples of undisputed authorship by the same programmer. There are several cases where the application of such a method could be of a major benefit, such as authorship disputes, proof of authorship in court, tracing the source of code left in the system after a cyber attack, etc. We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-gram profiles in order to represent a source code author's style. Experiments on data sets of different programming-language (Java or C++) and varying difficulty (6 to 30 candidate authors) demonstrate the effectiveness of the proposed approach. A comparison with a previous source code authorship identification study based on more complicated information shows that the SCAP approach is language independent and that n-gram author profiles are better able to capture the idiosyncrasies of the source code authors. Moreover, the SCAP approach is able to deal surprisingly well with cases where only a limited amount of very short programs per programmer is available for training. It is also demonstrated that the effectiveness of the proposed model is not affected by the absence of comments in the source code, a condition usually met in cyber-crime cases.",2019,https://scholar.google.com.br/,yes
88,Deep neural networks for source code author identification,"Plagiarism and copyright infringement are major problems in academic and corporate environments. Importance of source code authorship attribution arises as it is the starting point of detection for plagiarism, copyright infringement and law suit prosecution etc. There have been many research regard to this topic. Majority of these researches are based on various algorithms which compute similarity amongst source code files. However, for this Paper we have proposed Deep Neural Network (DNN) based technique to be used for source code authorship attribution. Results proved that DNN based author identification brings promising results once compared the accuracy against previously published research. © Springer-Verlag 2013.",2019,https://scholar.google.com.br/,yes
89,Effectiveness of code contribution: From patch-based to pull-request-based tools,"Code contributions in Free/Libre and Open Source Software projects are controlled to maintain high-quality of software. Alternatives to patch-based code contribution tools such as mailing lists and issue trackers have been developed with the pull request systems being the most visible and widely available on GitHub. Is the code contribution process more effective with pull request systems? To answer that, we quantify the effectiveness via the rates contributions are accepted and ignored, via the time until the first response and final resolution and via the numbers of contributions. To control for the latent variables, our study includes a project that migrated from an issue tracker to the GitHub pull request system and a comparison between projects using mailing lists and pull request systems. Our results show pull request systems to be associated with reduced review times and larger numbers of contributions. However, not all the comparisons indicate substantially better accept or ignore rates in pull request systems. These variations may be most simply explained by the differences in contribution practices the projects employ and may be less affected by the type of tool. Our results clarify the importance of understanding the role of tools in effective management of the broad network of potential contributors and may lead to strategies and practices making the code contribution more satisfying and efficient from both contributors' and maintainers' perspectives.",2019,https://scholar.google.com.br/,no
90,Source code author identification with unsupervised feature learning,"Automatic identification of source code authors has many applications in different fields such as source code plagiarism detection, and law suit prosecution. This paper presents a new source code author identification system based on an unsupervised feature learning technique. As a method of extracting features from high dimensional data, unsupervised feature learning has obtained a great success in many fields such as character recognition and image classification. However, according to our knowledge it has not been applied for source code author identification systems. Therefore, we investigated an unsupervised feature learning technique called sparse auto-encoder as a method of extracting features from source code files. Our system was evaluated with several datasets and results have shown that performance is very close to the state of art techniques in the source code identification field. © 2012 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,yes
91,Modularity and inequality of code contribution in open source software development,"We develop a model to study how the code architecture affects open source software (OSS) development. A major advantage brought by a modular architecture of code base is that it reduces both the cognitive cost and the coordination cost associated with OSS development. We show that in OSS development, the amount of individual code contribution, the inequality of code contribution among programmers, and the total output of code all have nonlinear relationships with the level of modularity of the project. We further empirically test the predictions using the SourceForge OSS development data, and the results confirm our theoretical predictions. © 2012 IEEE.",2019,https://scholar.google.com.br/,no
92,HACKAR: Helpful advice for code knowledge and attack resilience,"This paper describes a novel combination of Java program analysis and automated learning and planning architecture to the domain of Java vulnerability analysis. The key feature of our ""HACKAR: Helpful Advice for Code Knowledge and Attack Resilience"" system is its ability to analyze Java programs at development-time, identifying vulnerabilities and ways to avoid them. HACKAR uses an improved version of NASA's Java PathFinder (JPF) to execute Java programs and identify vulnerabilities. The system features new Hierarchical Task Network (HTN) learning algorithms that (I) advance stateof-the-art HTN learners with reasoning about numeric constraints, failures, and more general cases of recursion, and (2) contribute to problem-solving by learning a hierarchical dataflow representation of the program from the inputs of the program. Empirical evaluation demonstrates that HACKAR was able to suggest fixes for all of our test program suites. It also shows that HACKAR can analyze programs with string inputs that original JPF implementation cannot. © Copyright 2015, Association for the Advancement of Artificial Intelligence (www.aaai.org).",2019,https://scholar.google.com.br/,no
93,OvERVIeW: Ownership visualization word cloud,"In many situations, awareness about code ownership is important; for example, this awareness might allow to contact the responsible person(s) of a piece of code to get clarifications. Source versioning systems can provide information about code ownership. However, the considerable amount of data collected might prolong the time to retrieve the information needed. OvERVIeW addresses this issue: it collects data from a versioning system and visualizes developers' effort using a well-known and intuitive visualization, the word cloud. We applied pre-attentive processing principles in the designing phase, which use graphical properties (e.g., form and color) that are processed pre-attentively, i.e., they are understood faster. In our visualization, each word represents a class; the number of lines added and removed (during a given time period) is used as size metric, and the color represents the developer(s) working on the code. We show how OvERVIeW can be used to visualize three different cases of code ownership: collective, weak, and strong. We report a sample application of OvERVIeW in the context of a multi-developer OSS project. Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.",2019,https://scholar.google.com.br/,yes
94,Advantages and Disadvantages of using Shared code from the Developers Perspective: A qualitative study,"Context: The code ownership has influence on various aspects of software development, such as code quality, cooperation and team knowledge. However, there are few studies from the point of view of developers that seek to understand the advantages and disadvantages of code ownership. Goals: to investigate what are the advantages and disadvantages of practicing shared code ownership from the perspective of the software developers. Methodology: A qualitative study was conducted using a semi-structured interviews in three technology companies with different profiles. We conducted 19 interviews, that were audio recorded and then transcribed. We coded the data using qualitative coding techniques. Results: Considering companies' context, we have found six advantages and six disadvantages of using shared code ownership. Five proposition were presented. Conclusion: It is noted that the practice of shared code ownership, as described in theory, is more suitable for a more experienced programmers teams, who are able to understand codes without assistance. However, the adaptation of the practice, in which the author is consulted before any change is done, it is necessary for less experienced teams, who feel unsecure to modify the code cause other errors for the project.",2019,https://scholar.google.com.br/,no
95,Impact of Version History Metrics on Maintainability,"In this study we present how some version control history based metrics affect maintainability of the source code. These metrics cover intensity of modifications, code ownership and code aging. We determine the order of source files based on each analyzed metrics, and compare it with their maintainability based order. As a cross-check we perform a comparison test with post-release defects as well. We performed the analysis on 14 versions of 4 well-known open source software systems. The results show high correlation between the version control metrics and relative maintainability indexes, in each case. The comparison with post-release defects also support the results in most of the cases. © 2015 IEEE.",2019,https://scholar.google.com.br/,yes
96,Using the Gini coefficient for bug prediction in eclipse,"The Gini coefficient is a prominent measure to quantify the inequality of a distribution. It is often used in the field of economy to describe how goods, e.g., wealth or farmland, are distributed among people. We use the Gini coefficient to measure code ownership by investigating how changes made to source code are distributed among the developer population. The results of our study with data from the Eclipse platform show that less bugs can be expected if a large share of all changes are accumulated, i.e., carried out, by relatively few developers. © 2011 ACM.",2019,https://scholar.google.com.br/,yes
97,CodeVizard: A tool to aid the analysis of software evolution,"This extended poster abstract presents a software visualization tool (CodeVizard) that helps researchers and managers to analyze software repository data. The tool focuses on identifying areas of risks in software development projects, such as: Code Smells, degrading architectures, increasing software complexity, lack of documentation, process violations, and issues of code ownership. CodeVizard has been used to support six empirical studies, whose results have been published. This extended abstract gives a short summary of the important empirical results and features. © 2010 ACM.",2019,https://scholar.google.com.br/,no
98,Are Heroes common in FLOSS projects?,"Several projects rely on one or more Heroes who are the only ones who understand and know certain critical parts of a system. Often Heroes are very useful in the economy of a project but, their presence can increase the risk of project failure if they decide to leave the project. For this reason, tools for measuring the amount of spread of knowledge within a team (i.e. the Truck factor) and identifying possible Heroes are welcomed. In this paper, we have implemented a tool to compute the Truck factor and identify Heroes in a project. To assess the applicability and usefulness of the tool we have applied it to 20 randomly selected FLOSS projects. Preliminary results are encouraging: the approach seems to be applicable and useful. We found that Heroes are common in the considered set of FLOSS projects and that the Truck factor is in general low. © 2010 ACM.",2019,https://scholar.google.com.br/,yes
99,The influence of short project timeframes on web development practices: A field study,"A number of recent surveys of Web development have revealed that typical project timeframes are of the order of 3 months. This chapter reports the findings of a field study conducted in Ireland which set out to contribute towards a better understanding of the nature of high-speed Web development practices. Qualitative interview data was gathered from 14 interviewees, purposefully selected from a variety of different organisations and backgrounds. This data was then analysed using the Grounded Theory method, and ten core dimensions were revealed: (1) the role of collaborative groupware tools; (2) collective code ownership; (3) timeframe driven by business imperatives; (4) enablers of productivity; (5) quality ""satisficing""; (6) requirements clarity; (7) process maturity; (8) collectively agreed project schedules; (9) closeness to client; and (10) working software over documentation. © Springer Science+Business Media, LLC 2011.",2019,https://scholar.google.com.br/,no
100,Two case studies of open source software development: Apache and Mozilla,"According to its proponents, open source style software development has the capacity to compete successfully, and perhaps in many cases displace, traditional commercial development methods. In order to begin investigating such claims, we examine data from two major open source projects, the Apache web server and the Mozilla browser. By using email archives of source code change history and problem reports we quantify aspects of developer participation, core team size, code ownership, productivity, defect density, and problem resolution intervals for these OSS projects. We develop several hypotheses by comparing the Apache project with several commercial projects. We then test and refine several of these hypotheses, based on an analysis of Mozilla data. We conclude with thoughts about the prospects for high-performance commercial/open source process hybrids.",2019,https://scholar.google.com.br/,no
101,Case study of open source software development: the Apache server,"According to its proponents, open source style software development has the capacity to compete successfully, and perhaps in many cases displace, traditional commercial development methods. In order to begin investigating such claims, we examine the development process of a major open source application, the Apache web server. By using email archives of source code change history and problem reports we quantify aspects of developer participation, core team size, code ownership, productivity, defect density, and problem resolution interval for this OSS project. This analysis reveals a unique process, which performs well on important measures. We conclude that hybrid forms of development that borrow the most effective techniques from both the OSS and commercial worlds may lead to high performance software processes.",2019,https://scholar.google.com.br/,yes
102,Software evolution in agile development: A case study?,"The agile development method (ADM) is characterized by continuous feedback and change, and a software system developed using ADM evolves continuously through short iterations. Empirical studies on evolution of software following agile development method have been sparse. Most studies on software evolution have been performed on systems built using traditional (waterfall) development methods or using the open source development approach. This paper summarizes our study on the evolution of an enterprise software system following ADM. We evaluated key characteristics of evolution in the light of Lehman's laws of software evolution dealing with continuous change and growth, self-regulation and conservation, increasing complexity and declining quality. Our study indicates that most laws of evolution are followed by the system. We also present our observations on agile practices such as collective code ownership, test driven development and collaboration when the team is distributed. © 2010 ACM.",2019,https://scholar.google.com.br/,no
103,How developers drive software evolution,"As systems evolve their structure change in ways not expected upfront. As time goes by, the knowledge of the developers becomes more and more critical for the process of understanding the system. That is, when we want to understand a certain issue of the system we ask the knowledgeable developers. Yet, in large systems, not every developer is knowledgeable in all the details of the system. Thus, we would want to know which developer is knowledgeable in the issue at hand. In this paper we make use of the mapping between the changes and the author identifiers (e.g., user names) provided by versioning repositories. We first define a measurement for the notion of code ownership. We use this measurement to define the Ownership Map visualization to understand when and how different developers interacted in which way and in which part of the system1. We report the results we obtained on several large systems. © 2005 IEEE.",2019,https://scholar.google.com.br/,yes
104,IEEE International Working Conference on Mining Software Repositories,The proceedings contain 72 papers. The topics discussed include: confessions of a worldly software miner; code ownership and software quality: a replication study; extracting facts from performance tuning history of scientific applications for predicting effective optimization patterns; mining component repositories for instability issues; the uniqueness of changes: characteristics and applications; co-evolution of infrastructure and source code - an empirical study; mining energy-aware commits; ecosystems in GitHub and a method for ecosystem identification using reference coupling; a historical analysis of debian package incompatibilities; do bugs foreshadow vulnerabilities? a study of the chromium project; and characterization and prediction of issue-related risks in software projects.,2019,https://scholar.google.com.br/,no
105,Peripheral developer participation in open source projects: An empirical analysis,"The success of the Open Source model of software development depends on the voluntary participation of external developers (the peripheral developers), a group that can have distinct motivations from that of project founders (the core developers). In this study, we examine peripheral developer participation by empirically examining approximately 2,600 open source projects. In particular, we hypothesize that peripheral developer participation is higher when the potential for building reputation by gaining recognition from project stakeholders is higher. We consider recognition by internal stakeholders (such as core developers) and external stakeholders (such as end-users and peers). We find a positive association between peripheral developer participation and the potential of stakeholder recognition after controlling for bug reports, feature requests, and other key factors. Our findings provide important insights for OSS founders and corporate managers for open sourcing or OSS adoption decisions. © 2016 ACM.",2019,https://scholar.google.com.br/,no
106,Sustainable Software Development through Overlapping Pair Rotation,"Context: Conventional wisdom says that team disruptions (like team churn) should be avoided. However, we have observed software development projects that succeed despite high disruption. Objective: The purpose of this paper is to understand how to develop software effectively, even in the face of team disruption. Method: We followed Constructivist Grounded Theory. The primary researcher conducted participant-observation of several projects at Pivotal (a software development company), and interviewed 21 software engineers, interaction designers, and product managers. The researcher iteratively sampled and analyzed the collected data until achieving theoretical saturation. Results: This paper introduces a descriptive theory of Sustainable Software Development. The theory encompasses principles, policies, and practices aiming at removing knowledge silos and improving code quality (including discoverability and readability), hence leading to development sustainability. Limitations: While the results are highly relevant to the observed projects at Pivotal, the outcomes may not be transferable to other software development organizations with different software development cultures. Conclusion: The theory refines and extends the understanding of Extreme Programming by adding a few principles, policies, and practices (like the unique Overlapping Pair Rotation practice) and aligning these principles, policies, and practices towards the business goal of sustainability.",2019,https://scholar.google.com.br/,no
107,Iterative maintenance life cycle using extreme programming,"Software maintenance is a complex and life long process due to unstructured code, team morale, poor visibility of the project, lack of communication techniques and lack of proper test suite. On the other hand extreme programming is an existing process of software development with its challenges practices. In this paper, we propose an iterative maintenance life cycle using extreme programming practices. It would be able to resolve software maintenance issues in the smooth manner. The proposed approach speedsup maintenance process with less effort and produces a more maintainable code for future maintenance and evolution. © 2010 IEEE.",2019,https://scholar.google.com.br/,no
108,Heroes in FLOSS projects: An explorative study,"It is well recognized that the presence of Heroes, i.e., tireless developers who are the only ones who know certain critical parts of a system, can increase the risk of project failure, especially if these developers decide to leave the project. Instead, the relationship between Heroes and maintenance tasks is unknown because little investigated so far. In this paper, we first have implemented a tool to identify Heroes. Then, we have conducted an explorative study with 37 randomly selected open source projects to discover existing relationships between the presence of Heroes and the time required to implement change requests. Preliminary results show that: (i) Heroes are common in FLOSS projects and (ii) their presence seems to be beneficial because reduce the time to implement change requests. © 2010 IEEE.",2019,https://scholar.google.com.br/,yes
109,Maintaining mental models: A study of developer work habits,"To understand developers' typical tools, activities, and practices and their satisfaction with each, we conducted two surveys and eleven interviews. We found that many problems arose because developers were forced to invest great effort recovering implicit knowledge by exploring code and interrupting teammates and this knowledge was only saved in their memory. Contrary to expectations that email and IM prevent expensive task switches caused by face-to-face interruptions, we found that face-to-face communication enjoys many advantages. Contrary to expectations that documentation makes understanding design rationale easy, we found that current design documents are inadequate. Contrary to expectations that code duplication involves the copy and paste of code snippets, developers reported several types of duplication. We use data to characterize these and other problems and draw implications for the design of tools for their solution. Copyright 2006 ACM.",2019,https://scholar.google.com.br/,no
110,Behind the rules: XP experiences,"Agile processes such as XP (eXtreme Programming) have been recognised for their potential benefits of improving software. During adoption of the XP process, teams can misapply the XP principles by following them verbatim, ignoring the context in which they are applied. In this paper we document our experiences where naive applications of XP principles were altered in recognition of context. We detail our observations of how teams ""looked behind"" the rules and began fitting XP to the problem rather than attempting to fit the problem to XP. We conclude by reflectively focusing on how this transformation occurred and suggest that it is buying into the XP ethos that drives this change of perspective on the XP process and principles. © 2004 IEEE.",2019,https://scholar.google.com.br/,no
111,"12th Australasian Document Computing Symposium, ACDS 2007","This proceedings contains 21 papers. The two keynote talks, ten papers and nine posters published reflect the breadth of interest of the Australian research community in the area of document computing. It is also a highlight of ADCS that we are not only collocated with The Australasian Language Technology Workshop 2007, but are sharing a paper session, keynote talk, and social functions with the Australian natural language research community. The key terms of this proceedings include automatic thread classification, content selection evaluation, data mining process, document composition, document passages, entity ranking, extraction approach, hybrid bitvector index compression, information filtering, information retrieval, IR evaluation, Linux user forum information, meta-search engine, querying image ontology, rank-biased precision, retrieval systems, robust evaluation, score standardization, search tasks, source code authorship, user persistence, web spam, Wikipedia categories, XML elements.",2019,https://scholar.google.com.br/,no
112,"Proceedings - 2013 3rd International Workshop on Replication in Empirical Software Engineering Research, RESER 2013",The proceedings contain 11 papers. The topics discussed include: a decade of Conway's law: a literature review from 2003-2012; an evolutionary perspective on socio-technical congruence: the rubber band effect; impact of communication structure on system design: towards a controlled test of Conway's law; relationships between communication structure and software architecture: an empirical investigation of the Conway's law at the Federal University of Pernambuco; a replicable infrastructure for empirical studies of email archives; towards a taxonomy of replications in empirical software engineering research: a research proposal; a partial replication with a sample size of one: a smoke test for empirical software engineering; two replication studies for evaluating artifact models in re: results and lessons learnt; a replicated comparative study of source code authorship attribution; on parameter tuning in search based software engineering: a replicated empirical study; and the use of visual text mining to support the study selection activity in systematic literature reviews: a replication study.,2019,https://scholar.google.com.br/,no
113,Quantifying and mitigating turnover-induced knowledge loss: Case studies of chrome and a project at avaya,"The utility of source code, as of other knowledge artifacts, is predicated on the existence of individuals skilled enough to derive value by using or improving it. Developers leaving a software project deprive the project of the knowledge of the decisions they have made. Previous research shows that the survivors and newcomers maintaining abandoned code have reduced productivity and are more likely to make mistakes. We focus on quantifying the extent of abandoned source files and adapt methods from financial risk analysis to assess the susceptibility of the project to developer turnover. In particular, we measure the historical loss distribution and find (1) that projects are susceptible to losses that are more than three times larger than the expected loss. Using historical simulations we find (2) that projects are susceptible to large losses that are over five times larger than the expected loss. We use Monte Carlo simulations of disaster loss scenarios and find (3) that simplistic estimates of the truck factor' exaggerate the potential for loss. To mitigate loss from developer turnover, we modify Cataldo et al.'s coordination requirements matrices. We find (4) that we can recommend the correct successor 34% to 48% of the time. We also find that having successors reduces the expected loss by as much as 15%. Our approach helps large projects assess the risk of turnover thereby making risk more transparent and manageable. © 2016 ACM.",2019,https://scholar.google.com.br/,yes
114,"7th International Conference on Similarity Search and Applications, SISAP 2014","The proceedings contain 29 papers. The special focus in this conference is on technological problems shared by many application domains, such as data mining, information retrieval, computer vision, pattern recognition, computational biology, geography, biometrics and machine learning. The topics include: Efficient algorithms for similarity search in axis-aligned subspaces; partial refinement for similarity search with multiple features; video retrieval with feature signature sketches; metric space searching based on random bisectors and binary fingerprints; faster proximity searching with the distal SAT; a dynamic pivoting algorithm based on spatial approximation indexes; large-scale distributed locality-sensitive hashing for general metric data; dynamic list of clusters in secondary memory; index-based r-s similarity joins; a compressed index for hamming distances; perils of combining parallel distance computations with metric and Ptolemaic indexing in kNN queries; transition-sensitive distances; retrieval of binary features in image databases; the similarity-aware relational intersect database operator; high dimensional search using polyhedral query; generating synthetic data to allow learning from a single exemplar per class; similarity for natural semantic networks; anomaly detection in streaming time series based on bounding boxes; SVG-to-RDF image semantization; employing similarity methods for stellar spectra classification in astroinformatics; a similarity-based method for visual search in time series using Coulomb’s law; classification of epileptoid oscillations in EEG Using Shannon’s entropy amplitude probability distribution; entity recognition for duplicate filtering; a Bayesian ensemble classifier for source code authorship attribution; multi-core (CPU and GPU) for permutation-based indexing and an efficient DTW-based approach for melodic similarity in flamenco singing.",2019,https://scholar.google.com.br/,no
115,Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information,"Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data sets, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets. © Springer-Verlag Berlin Heidelberg 2007.",2019,https://scholar.google.com.br/,no
116,Constructing universal version history,"Developers often copy code for parts or entire products to start a new product or a new release. In order to understand the software change history and to determine the code authorship, we propose to construct a universal version history from multiple version control repositories. To that end we create two practical code copy detection methods at the level of the source code file: prefix-postfix algorithm and prefix algorithm. The full pathname of a file and its version history are used to construct the universal version history of a file by linking together change histories of files that had the same code at any point in the past. The assumption of both algorithms is that developers often duplicate files by copying entire directories. Once the copying is identified we propose an algorithm to link version histories from multiple repositories in order to construct universal version history. The results show that about 41.32% of source files (in the repository involving more than 6M versions of around 2M files) were duplicated among the Avaya's source code repositories for more than ten different projects. The prefix-postfix algorithm is more suitable than prefix algorithm due to the reasonable error rates after validation of the known copying behaviors. Copyright 2006 ACM.",2019,https://scholar.google.com.br/,no
117,An analysis of author contribution patterns in eclipse foundation project source code,"Collaborative development is a key tenet of open source software, but if not properly understood and managed, it can become a liability. We examine author contribution data for the newest revision of 251,633 Java source files in 592 Eclipse projects. We use this observational data to analyze collaboration patterns within files, and to explore relationships between file size, author count, and code authorship. We calculate author entropy to characterize the contributions of multiple authors to a given file, with an eye toward understanding the degree of collaboration and the most common interaction patterns. © IFIP International Federation for Information Processing 2011.",2019,https://scholar.google.com.br/,yes
118,Automatic software architecture recovery: A machine learning approach,"Automatically recovering functional architecture of the software can facilitate the developer's understanding of how the system works. In legacy systems, original source code is often the only available source of information about the system and it is very time consuming to understand source code. Current architecture recovery techniques either require heavy human intervention or fail to recover quality components. To alleviate these shortcomings, we propose use of machine learning techniques which use structural, runtime behavioral, domain, textual and contextual (e.g. code authorship, line co-change) features. These techniques will allow us to experiment with a large number of features of the software artifacts without having to establish a priori our own insights about what is important and what is not important. We believe this is a promising approach that may finally start to produce usable solutions to this elusive problem. © 2012 IEEE.",2019,https://scholar.google.com.br/,no
119,Comparing techniques for authorship attribution of source code,"Attributing authorship of documents with unknown creators has been studied extensively for natural language text such as essays and literature, but less so for non-natural languages such as computer source code. Previous attempts at attributing authorship of source code can be categorised by two attributes: the software features used for the classification, either strings of n tokens/bytes (n-grams) or software metrics; and the classification technique that exploits those features, either information retrieval ranking or machine learning. The results of existing studies, however, are not directly comparable as all use different test beds and evaluation methodologies, making it difficult to assess which approach is superior. This paper summarises all previous techniques to source code authorship attribution, implements feature sets that are motivated by the literature, and applies information retrieval ranking methods or machine classifiers for each approach. Importantly, all approaches are tested on identical collections from varying programming languages and author types. Our conclusions are as follows: (i) ranking and machine classifier approaches are around 90% and 85% accurate, respectively, for a one-in-10 classification problem; (ii) the byte-level n-gram approach is best used with different parameters to those previously published; (iii) neural networks and support vector machines were found to be the most accurate machine classifiers of the eight evaluated; (iv) use of n-gram features in combination with machine classifiers shows promise, but there are scalability problems that still must be overcome; and (v) approaches based on information retrieval techniques are currently more accurate than approaches based on machine learning. Copyright © 2012 John Wiley & Sons, Ltd. Copyright © 2012 John Wiley & Sons, Ltd.",2019,https://scholar.google.com.br/,no
120,"Proceedings: International Conference on Information Technology - New Generations, ITNG 2007",The proceedings contain 200 papers. The topics discussed include: programming highly parallel reconfigurable architectures for public-key cryptographic applications; two novel resource management schemes for integrated wireless networks; analysis of time based random waypoint mobility model for wireless mobile networks; study on worm poisoning technology; a direct-time queue analytical model based on dynamic random early drop; dynamic two-layer signature-based IDS with unequal databases; proactive model for mitigating Internet denial-of-service attacks; cell-based distributed addressing technique using clustered backbone approach; interference aware routing in sensor networks; genetic algorithm for energy efficient clusters in wireless sensor networks; a mobile context dissemination middleware; polygonal approximation of 2-D binary images; a probabilistic approach to source code authorship identification; and neural networks in cultivation.,2019,https://scholar.google.com.br/,no
121,Understanding the evolution process of program source for investigating software authorship and plagiarism,"This paper addresses the evolution process of program source codes to establish the framework for software authorship identification. Since program code cheating is getting serious in academic institutions, we will be able to apply the software authorship identification tool as a detection tool for code plagiarism. The main contribution of our work is twofold. First, we have devised new asymmetric distance measure to compute the distance of authorship between two different programs. Second, we have proposed an algorithm to construct the evolution tree(phylogenetic tree) for a set of similar program clones. For the experiment we have gathered two set of codes: a set of assignment programs and another program set which have been submitted to the ICPC, an international programming contests. Our experiment showed that our distance measure for program sources has successfully identified the code authorship and has also reliably detected plagiarized programs. This experiment has showed a strong possibility that the proposed construction algorithm for phylogenetic forest can be used to trace the evolution(improving) process of software. This paper shows the confidence of the authorship identification and plagiarism detection can be interchangeably applied for both these purposes in student assignment program domain. ©2007 IEEE.",2019,https://scholar.google.com.br/,no
122,VDJML: A file format with tools for capturing the results of inferring immune receptor rearrangements,"Background: The genes that produce antibodies and the immune receptors expressed on lymphocytes are not germline encoded; rather, they are somatically generated in each developing lymphocyte by a process called V(D)J recombination, which assembles specific, independent gene segments into mature composite genes. The full set of composite genes in an individual at a single point in time is referred to as the immune repertoire. V(D)J recombination is the distinguishing feature of adaptive immunity and enables effective immune responses against an essentially infinite array of antigens. Characterization of immune repertoires is critical in both basic research and clinical contexts. Recent technological advances in repertoire profiling via high-throughput sequencing have resulted in an explosion of research activity in the field. This has been accompanied by a proliferation of software tools for analysis of repertoire sequencing data. Despite the widespread use of immune repertoire profiling and analysis software, there is currently no standardized format for output files from V(D)J analysis. Researchers utilize software such as IgBLAST and IMGT/High V-QUEST to perform V(D)J analysis and infer the structure of germline rearrangements. However, each of these software tools produces results in a different file format, and can annotate the same result using different labels. These differences make it challenging for users to perform additional downstream analyses. Results: To help address this problem, we propose a standardized file format for representing V(D)J analysis results. The proposed format, VDJML, provides a common standardized format for different V(D)J analysis applications to facilitate downstream processing of the results in an application-agnostic manner. The VDJML file format specification is accompanied by a support library, written in C++ and Python, for reading and writing the VDJML file format. Conclusions: The VDJML suite will allow users to streamline their V(D)J analysis and facilitate the sharing of scientific knowledge within the community. The VDJML suite and documentation are available from https://vdjserver.org/vdjml/. We welcome participation from the community in developing the file format standard, as well as code contributions. © 2016 The Author(s).",2019,https://scholar.google.com.br/,no
123,CVExplorer: Identifying candidate developers by mining and exploring their open source contributions,"Open source code contributions contain a large amount of technical skill information about developers, which can help to identify suitable candidates for a particular development job and therefore impact the success of a development team. We develop CVExplorer as a tool to extract, visualize, and explore relevant technical skills data from GitHub, such as languages and libraries used. It allows non-technical users to filter and identify developers according to technical skills demonstrated across all of their open source contributions, in order to support more accurate candidate identification. We demonstrate the usefulness of CVExplorer by using it to recommend candidates for open positions in two companies. A video demonstration of the tool is available at https:// youtu.be/xRxK-wa7PME.",2019,https://scholar.google.com.br/,no
124,IEEE International Conference on Program Comprehension,The proceedings contain 45 papers. The topics discussed include: do code smells hamper novice programming?; improving code readability models with textual features; navigating the WordPress plugin landscape; a case study of program comprehension effort and technical debt estimations; on method ordering; identifying modularization patterns by visual comparison of multiple hierarchies; glyph-based software component identification; taming the IDE with fine-grained interaction data; learning to rank for bug report assignee recommendation; a novel approach for estimating truck factors; and can we enforce a benefit for dynamically typed languages in comparison to statically typed ones? a controlled experiment.,2019,https://scholar.google.com.br/,no
125,"Proceedings - 7th International Workshop on Emerging Trends in Software Metrics, WETSoM 2016",The proceedings contain 9 papers. The topics discussed include: Measuring High and Low Priority Defects on Traditional and Mobile open source software; do estimators learn? on the effect of a positively skewed distribution of effort data on software portfolio productivity; source code metrics for programmable logic controller (PLC) ladder diagram (LD) visual programming language; a statistical comparison of java and python software metric properties; behavioral complexity quantification (Becom-Q); metrics for feature-oriented programming; a case study on the relationship between code ownership and refactoring activities in a java software system; on the maintenance complexity of makefile; and a metric suite proposal for logical dependency.,2019,https://scholar.google.com.br/,no
126,Long-term active integrator prediction in the evaluation of code contributions,"In open source software (OSS) projects, integrators are given high-level access to repositories so that they could maintain and manage projects. Although integrators play a critical role in evaluating code changes for OSS projects, they may be short-term active. Long-term active integrators keep in evaluating code update submission and managing responses from contributors. In order to survive and succeed, OSS projects need to attract and retain long-term active integrators. To assist OSS projects to retain active integrators, we propose a method called LTAPredict to predict whether integrators will be longterm active in the evaluation of code contributions. LTAPredict collects activity data of integrators, extracts a rich set of features, and makes prediction via machine learning techniques. We perform experiments on 37 popular projects, containing a total of 1,073 integrators. Results show that based on the Decision Tree, LTAPredict achieves the accuracy as 0.829, the precision as 0.81, the recall as 0.827 and the F1 as 0.818. Meanwhile, we evaluate the feature importance to identify the most significant indicators of long-term active integrators. We observe that whether integrators becoming long-term active is associated with the number of active months and social distance with contributors in their first year as integrators. These findings assist OSS projects to identify potential long-term active integrators and adopt better strategies to retain them in the evaluation of code contributions. Copyright © 2016 by KSI Research Inc. and Knowledge Systems Institute Graduate School.",2019,https://scholar.google.com.br/,no
127,Statistical Analysis of Axle Load Distributions in India,"In this investigation, the axle load data for a particular stretch of National Highway (NH-58) in India was collected and statistical analysis was carried out. A lognormal and Weibull distribution was found to fit the single axles whereas lognormal mixed distribution was found to fit the tandem axles. Analysis of the data revealed considerable amount of overloading. When front and rear single axles were considered, unimodal distribution was found to fit the data. When only the tandem rear axles were considered, two or more peaks were observed, the first peak signified the mean of axle loads below the legal limit and the other peaks signified the means of axle loads exceeding the legal limit. Using the moment statistics, the load spectra factor was calculated for various axle types. The sensitivity of overloading in the calculation of equivalent single axle load was quantified using the vehicle damage factor and truck factors. © ASCE.",2019,https://scholar.google.com.br/,no
128,The effect of traffic overloads on road pavements,"The road pavements are designed to support the expected traffic, mainly the heavy traffic that is defined by the maximum legal loads for their axles or by the actual axle loads corresponding to a specific load spectrum. These vehicles are considered in the pavement design by converting their effects through the use of truck factors which transform the damage they apply to the pavement to the damage that would be applied by a standard axle. The definition of the truck factors to convert trucks into standard axles or load equivalent factors to convert axles into standard axles is carried out by considering the maximum legal loads for each axle or considering the loads measured in weigh-in-motion systems corresponding to the actual loads. However, there is an important number of vehicles that travel with axle loads above the maximum legal limit. These axles cause significant damage to the pavements that reduces the pavement life and increases the rehabilitation cost. This paper investigates the impact of overloaded vehicles using two weight databases by studying the truck factors for different vehicle cases applied to different pavements. The study concluded that the presence of overloaded vehicles increases pavement damage and life cycle costs compared to the cost of the same vehicles with legal loads. © Copyright 2016 by Mairepav8 2016 Organizers.",2019,https://scholar.google.com.br/,no
129,Performance study of artificial neural network modelling to predict carried weight in the transportation system,"The major aim of this study is to model and predict the amount of carried weight based on the five direct impact factors in the transportation system. In this study, artificial neural network (ANN) has been incorporated for developing a predictive model. Three different training algorithms, namely Levenberg-Marquardt-LM, batch backpropagation-BBP and quick propagation-QP, were used to train. The input parameters are the aforementioned five transportation factors plus two timing factors namely number of weeks and seasons while the carried weights is the output. The next purpose of this study is comparing the mentioned learning algorithm's performance based on predicting ability. The results showed that the QP algorithm with 7-4-1 network topology exhibited the highest predictive power. The available data have been trained by ANN (QP-7-4-1) and the responses were predicted. Moreover, the truck factor plays a slightly more dominant role in the prediction of carried weighs. Copyright © 2016 Inderscience Enterprises Ltd.",2019,https://scholar.google.com.br/,no
130,QR codes in education and communication,"Technological advances brought applications of innovations to education. Conventional education increasingly flourishes with new technologies accompanied by more learner active environments. In this continuum, there are learners preferring self-learning. Traditional learning materials yield attractive, motivating and technologically enhanced learning materials. The QR (Quick Response) Codes are one of these innovations. The aim of this study is to redesign a lesson unit supported with QR Codes and to get the learner views about the redesigned material. For this purpose, the redesigned lesson unit was delivered to 15 learners in Balikesir University in the academic year of 2013-2014. The learners were asked to study the material. The learners who had smart phones and Internet access were chosen for the study. To provide sectional diversity, three groups were created. The group learners were from Faculty of Education, Faculty of Science and Literature and Faculty of Engineering. After the semi-structured interviews were held, the learners were asked about their pre-knowledge about QR Codes, QR Codes' contribution to learning, difficulties with using QR Codes about and design issues. Descriptive data analysis was used in the study. The findings were interpreted on the basis of Theory of Diffusion of Innovations and Theory of Uses and Gratifications. After the research, the themes found were awareness of QR Code, types of QR Codes and applications, contributions to learning, and proliferation of QR Codes. Generally, the learners participating in the study reported that they were aware of QR Codes; that they could use the QR Codes; and that using QR Codes in education was useful. They also expressed that such features as visual elements, attractiveness and direct routing had positive impact on learning. In addition, they generally mentioned that they did not have any difficulty using QR Codes; that they liked the design; and that the content should include both superficial and in-depth information.",2019,https://scholar.google.com.br/,no
131,"Intent, tests, and release dependencies: Pragmatic recipes for source code integration","Continuous integration of source code changes, for example, via pull-request driven contribution channels, has become standard in many software projects. However, the decision to integrate source code changes into a release is complex and has to be taken by a software manager. In this work, we identify a set of three pragmatic recipes plus variations to support the decision making of integrating code contributions into a release. These recipes cover the isolation of source code changes, contribution of test code, and the linking of commits to issues. We analyze the development history of 21 open-source software projects, to evaluate whether, and to what extent, those recipes are followed in open-source projects. The results of our analysis showed that open-source projects largely follow recipes on a compliance level of > 75%. Hence, we conclude that the identified recipes plus variations can be seen as wide-spread relevant best-practices for source code integration. © 2015 IEEE.",2019,https://scholar.google.com.br/,no
132,Investigating code review quality: Do people and participation matter?,"Code review is an essential element of any mature software development project; it aims at evaluating code contributions submitted by developers. In principle, code review should improve the quality of code changes (patches) before they are committed to the project's master repository. In practice, bugs are sometimes unwittingly introduced during this process. In this paper, we report on an empirical study investigating code review quality for Mozilla, a large open-source project. We explore the relationships between the reviewers' code inspections and a set of factors, both personal and social in nature, that might affect the quality of such inspections. We applied the SZZ algorithm to detect bug-inducing changes that were then linked to the code review information extracted from the issue tracking system. We found that 54% of the reviewed changes introduced bugs in the code. Our findings also showed that both personal metrics, such as reviewer workload and experience, and participation metrics, such as the number of involved developers, are associated with the quality of the code review process. © 2015 IEEE.",2019,https://scholar.google.com.br/,no
133,Travel demand modeling to simulate traffic loads for pavement deterioration curves: Dealing with aggregate data at urban and regional scales,"Traditional pavement management system uses historical data on traffic volume or traffic growth rate to develop the pavement deterioration curves. This study simulates the traffic loads on regional and urban road networks to estimate the pavement deterioration curves applying travel demand models at urban and regional scales during the period of 2013–2062. Highways 1, 2, 7, 15, 16, 102, and 104 connecting the Atlantic Provinces of Canada are considered as the case study at regional scale. Arterial and local roads of both rigid and flexible pavement types in the city of Montreal are considered as the case study at urban scale. The TRANUS model integrates spatial input-output and transportation models to simulate interprovincial freight movement on the regional road network. Urban transportation planning system simulates the urban traffic on the road network of the city of Montreal. The accumulated traffic loads are calculated based on the predicted annual average daily traffic and locally observed truck distributions combined with truck factors. Roughness progression on regional highways and urban roads is estimated by applying regression model of international roughness index (IRI). The IRI will be 35.71, 43.33, 31.62, and 30.67 for flexible-arterial, rigid-arterial, flexible-local and rigid-local roads during the period of 2013–2062, respectively. Comparative evaluation of with and without simulated traffic reveals that the impact of simulated traffic is highest on the pavement structure of Highways 2 and 1 at regional level and rigid-arterial and flexible roads of Montreal. This study improves the traditional method of estimating pavement deterioration by incorporating the simulated traffic and traffic loads into the pavement performance function. © 2015, National Research Council of Canada, All Rights Reserved.",2019,https://scholar.google.com.br/,no
134,"SPLASH Companion 2015 - Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity",The proceedings contain 50 papers. The topics discussed include: consensus-based mining of API preconditions in big code; custom full-coverage dynamic program analysis for android; heterogeneous device hopping: bridging the mobile cross-platform gap via a declarative query language; making live programming practical by bridging the gap between trial-and-error development and unit testing; demonstrating programming language feature mining using boa; fraglight: shedding light on broken pointcuts in evolving aspect-oriented software; privacy and security constraints for code contributions; Panini: a concurrent programming model with modular reasoning; the spreadsheet paradigm: a basis for powerful and accessible programming; Shiranui: a live programming with support for unit testing; and evaluating work distribution patterns for parallel bitmap compression over SMPs.,2019,https://scholar.google.com.br/,no
135,Revisiting the applicability of the pareto principle to core development teams in open source software projects,"It is often observed that the majority of the development work of an Open Source Software (OSS) project is contributed by a core team, i.e., a small subset of the pool of active developers. In fact, recent work has found that core development teams follow the Pareto principle-roughly 80% of the code contributions are produced by 20% of the active developers. However, those findings are based on samples of between one and nine studied systems. In this paper, we revisit prior studies about core developers using 2,496 projects hosted on GitHub. We find that even when we vary the heuristic for detecting core developers, and when we control for system size, team size, and project age: (1) the Pareto principle does not seem to apply for 40%-87% of GitHub projects; and (2) more than 88% of GitHub projects have fewer than 16 core developers. Moreover, we find that when we control for the quantity of contributions, bug fixing accounts for a similar proportion of the contributions of both core (18%-20%) and non-core developers (21%-22%). Our findings suggest that the Pareto principle is not compatible with the core teams of many GitHub projects. In fact, several of the studied GitHub projects are susceptible to the bus factor, where the impact of a core developer leaving would be quite harmful. © 2015 ACM.",2019,https://scholar.google.com.br/,yes
136,IEEE International Working Conference on Mining Software Repositories,The proceedings contain 72 papers. The topics discussed include: confessions of a worldly software miner; code ownership and software quality: a replication study; extracting facts from performance tuning history of scientific applications for predicting effective optimization patterns; mining component repositories for instability issues; the uniqueness of changes: characteristics and applications; co-evolution of infrastructure and source code - an empirical study; mining energy-aware commits; ecosystems in GitHub and a method for ecosystem identification using reference coupling; a historical analysis of debian package incompatibilities; do bugs foreshadow vulnerabilities? a study of the chromium project; and characterization and prediction of issue-related risks in software projects.,2019,https://scholar.google.com.br/,no
137,Will They like this? Evaluating code contributions with language models,"Popular open-source software projects receive and review contributions from a diverse array of developers, many of whom have little to no prior involvement with the project. A recent survey reported that reviewers consider conformance to the project's code style to be one of the top priorities when evaluating code contributions on Github. We propose to quantitatively evaluate the existence and effects of this phenomenon. To this aim we use language models, which were shown to accurately capture stylistic aspects of code. We find that rejected change sets do contain code significantly less similar to the project than accepted ones, furthermore, the less similar change sets are more likely to be subject to thorough review. Armed with these results we further investigate whether new contributors learn to conform to the project style and find that experience is positively correlated with conformance to the project's code style. © 2015 IEEE.",2019,https://scholar.google.com.br/,no
138,Do onboarding programs work?,"Open source software systems rely on community source code contributions to fix bugs and develop new features. Unfortunately, it is often difficult to become an effective contributor on open-source projects due to the complexity of the tools required to develop and test new patches and the challenge of breaking into an already-formed social organization. To help new contributors learn their development practices, OSS projects have created on boarding programs that, for example, identify easy 'first bugs' and mentor new developers' contributions. However, we found that developers who join an organization through these programs are half as likely to transition into long-term community members than developers who do not use these programs. Measuring the impact of these programs is important, as coordinating and staffing on boarding projects is expensive. This paper examines on boarding programs employed by Mozilla and demonstrates that they are not as effective at transitioning new developers into long-term contributors as might be hoped, although developers who do succeed through these programs find them valuable. © 2015 IEEE.",2019,https://scholar.google.com.br/,no
139,Emergency codes: a study of hospital attitudes and practices,"Many hospitals use color codes to denote internal (i.e. patient respiratory distress), or external (i.e. natural disasters) emergencies, via public announcement systems. Variations in the codes used by different hospitals can create confusion among providers who may practice in more than one hospital. This study sought to understand emergency code practices in the Delaware Valley region, assess patient and provider knowledge of codes at one hospital in that region, and patient and provider preferences for emergency code standardization and format. Anonymous electronic surveys on procedural knowledge and perspectives of emergency codes were disseminated to hospital staff and patients located at a large regional hospital. Phone interviews were conducted with hospital administration at the regional hospital and other hospitals within a 50-mile radius. The author's research indicates that standardization would be accepted by patients and providers and its lack is considered a barrier to providing high quality care.",2019,https://scholar.google.com.br/,no
140,Experimental syudy of MFRC deep beam under shear failure,"Concrete is a largely used construction material all over world due to its compressive strength, high mold ability and durability, structural stability and economic consideration. Generally structure is subjected mainly four forces or load i.e. Tensile, compressive, shear, & flexure, but concrete is very weak in tensile and in shear. Shear strength of concrete we can’t calculate directly like a compressive strength due to its complexity. There for the main target of this paper is to study the increase in shear strength of the deep beams due to addition of the mixed fibers (steel-synthetic) without any shear reinforcement. In this study we test 27 reinforced concrete deep beams. For these we add a mixed fiber in different percentages (0%,1.5% and 2.5%), with the shear span to depth ratio is also varies i.e. (0.78, 0.73 and 0.69)by keeping a compressive strength and tensile reinforcement constant. All these specimens are tested under four-point bending test set-up up to failure and record the 1st crack load, failure load and central deflection after 28 day’s curing period. The obtained results are compared with the results of the equations proposed by different codes & authors find which equation gives accurate results. From this study it is clear that the shear strength of the longitudinally reinforced deep beam increases considerably due to the addition of the mixed fibers. It is also observed that shear strength increases with increase in the fiber content and decrease in the shear span to depth ratio (a/d). © Research India Publications.",2019,https://scholar.google.com.br/,no
141,Concrete and Masonry Movements,"Widely used in the construction of bridges, dams and pavements, concrete and masonry are two of the world's most utilized construction materials. However, many engineers lack a proper understanding of the methods for predicting and mitigating their movements within a structure. Concrete and Masonry Movements provides practical methods for predicting and preventing movement in concrete and masonry, saving time and money in retrofitting and repair cost. With this book in hand, engineers will discover new prediction models for masonry such as: irreversible moisture expansion of clay bricks, elasticity, creep and shrinkage. In addition, the book provides up-to-date information on the codes of practice. • Provides mathematical modelling tools for predicting movement in masonry • Up-to-date knowledge of codes of practice methods • Clearly explains the factors influencing all types of concrete and masonry movement • Fully worked out examples and set problems are included at the end of each chapter. © 2015 Elsevier Inc. All rights reserved.",2019,https://scholar.google.com.br/,no
142,Tax Code Knowledge and Behavioral Responses Among EITC Recipients: Policy Insights from Qualitative Data,"We build on the robust quantitative literature on behavioral responses to the Earned Income Tax Credit (EITC) by using in-depth qualitative interviews with 115 EITC recipients to examine how they understand and respond to its incentive structures regarding earnings, marriage, and childbearing. We find that respondents consider their tax refund as a whole, without differentiating the portion from the EITC; as a result, they cannot predict how their EITC refund would change if they altered their labor supply or marital status. Incentives for childbearing are better understood, but are not specific to the EITC; rather, parents respond to a combination of tax deductions and credits as a whole. Respondents would like to maximize their refunds, but most cannot or would not alter their behavior due to structural constraints they face in the labor and marriage markets. Rather than adjust work hours, defer marriage, or have additional children, respondents exhibit a different type of behavioral response to the incentive structure of the EITC: They alter their tax filing status in order to maximize their refunds. They routinely claim zero exemptions and deductions on their W-4s, file their tax returns as head of household rather than as married, and divide children among the tax returns of multiple caregivers. Although some of these behaviors qualify as tax noncompliance, they emerge because the intricacies of the tax code conflict with the complexity and fluidity of finances and family life in low-income households. © 2013 by the Association for Public Policy Analysis and Management.",2019,https://scholar.google.com.br/,no
143,"7th International Conference on Similarity Search and Applications, SISAP 2014","The proceedings contain 29 papers. The special focus in this conference is on technological problems shared by many application domains, such as data mining, information retrieval, computer vision, pattern recognition, computational biology, geography, biometrics and machine learning. The topics include: Efficient algorithms for similarity search in axis-aligned subspaces; partial refinement for similarity search with multiple features; video retrieval with feature signature sketches; metric space searching based on random bisectors and binary fingerprints; faster proximity searching with the distal SAT; a dynamic pivoting algorithm based on spatial approximation indexes; large-scale distributed locality-sensitive hashing for general metric data; dynamic list of clusters in secondary memory; index-based r-s similarity joins; a compressed index for hamming distances; perils of combining parallel distance computations with metric and Ptolemaic indexing in kNN queries; transition-sensitive distances; retrieval of binary features in image databases; the similarity-aware relational intersect database operator; high dimensional search using polyhedral query; generating synthetic data to allow learning from a single exemplar per class; similarity for natural semantic networks; anomaly detection in streaming time series based on bounding boxes; SVG-to-RDF image semantization; employing similarity methods for stellar spectra classification in astroinformatics; a similarity-based method for visual search in time series using Coulomb’s law; classification of epileptoid oscillations in EEG Using Shannon’s entropy amplitude probability distribution; entity recognition for duplicate filtering; a Bayesian ensemble classifier for source code authorship attribution; multi-core (CPU and GPU) for permutation-based indexing and an efficient DTW-based approach for melodic similarity in flamenco singing.",2019,https://scholar.google.com.br/,no
144,Inclusive spectra of protons and α particles from reactions induced by protons with an energy of 30.0 MeV on the 209Bi nucleus,"Inclusive spectra of protons and α particles resulting from the interaction between 30.0-MeV protons and the 209Bi nucleus are investigated. Double differential and integral cross sections for the (p,xp) and (p,xα) reactions are obtained and total partial cross sections for these reactions are subsequently determined. The experimental spectra are analyzed using a modified version of the exciton model of preequilibrium decay and the PRECO-2006 code. Contributions from the compound and direct mechanisms to the formation of integral cross sections are calculated. © 2014 Allerton Press, Inc.",2019,https://scholar.google.com.br/,no
145,Social preferences and open source software development,"Open source software (OSS), and open innovation in general, has received increasing attention from both researchers and practitioners. Based on recent literature on social preference from behavior economics, we propose a finite-horizon dynamic model to study the interactions between OSS developers who are either purely self-interested or conditional cooperators. We find that selfinterested developers who are predicted to free ride under conventional analysis may contribute to a public good, and the existence of purely these developers may, under certain conditions, even benefit the provision of a public good. We further analyze how code architecture affects OSS development outcome and propose that a higher level of code modularity leads to more code contributions overall, due to the strategic behavior of self-interested developers. However, a right mix of the two types of developers plays a critical role for modular design to make an impact. The findings bear important theoretical as well as practical implications and provide guidelines for OSS development and the collective innovation in general.",2019,https://scholar.google.com.br/,no
146,A multi-user virtual 3d training environment to advance collaboration among crane operator and ground personnel in blind lifts,"As one of the most expensive and frequently used resources, cranes play an essential role in the operation of activities on construction sites. They require certified operators whose knowledge of codes and regulations is essential for safe and productive lift tasks. Blind spots pose a significant issue for crane operators as they limit the crane operator's field-of-view that potentially slows down execution of such tasks. Often collaboration between crane operators and ground personnel is limited and requires advanced communication techniques, such as radios, to resolve the limited visibility issue. Although visualization technology has been widely adopted in practice to enhance visibility, education and training programs related to cranes lack multi-user collaboration environments. This paper presents an approach towards developing a virtual training environment that allows multiple subjects to participate in lifting operations cooperatively. Through a 3D real-time immersive user visualization interface users are able to perform hands-on tasks such as operating cranes and directing blind lifts. In addition, geometry constraints and safety hazards are introduced to augment the simulation-fidelity of the virtual training environment. A test involving two users was conducted and the results show that the proposed approach can effectively simulate collaborative tasks in crane lifting operations. This study has potential to enhance the productivity and safety of crane lifting operations. © ASCE 2014.",2019,https://scholar.google.com.br/,no
147,"Health ethics education: Knowledge, attitudes and practice of healthcare ethics among interns and residents in Pakistan","Objective: To assess the knowledge, attitudes, and practices among interns and residents about healthcare ethics in an attempt to assist in development of ethics curriculum in Pakistan.Methods: Four hundred respondents comprising of interns, junior and senior postgraduate trainees were recruited from two Public sector teaching institutions in different provinces of Pakistan for this cross sectional study. A self- administered questionnaire was used to collect data. Data was analysed using SPSS-17.Results: More than half of the respondents in all three groups encountered ethical problems on daily basis. These ethical issues were being discussed with the clinical supervisor in only 25% of the instances. Unethical behaviour of seniors towards junior doctors and patients were observed by more than three quarter of the respondents. A very high proportion of respondents (57%) had no knowledge of code of ethics of Pakistan Medical and Dental council. Helsinki declaration was known only to a few individuals. There were difference between interns, junior and senior residents with respect to their views about adherence to patient’s wishes, paternalistic attitude of physicians, treatment of children without parental consent, euthanasia, confidentiality and treatment of noncompliant patients.Conclusion: Junior doctors representing different levels of training in Pakistan face ethical dilemmas on a regular basis but their current teaching and training in ethics is insufficient to help them deal with these competently. © 2014, Postgraduate Medical Institute. All rights reserved.",2019,https://scholar.google.com.br/,no
148,Reviewer recommender of pull-requests in GitHub,"Pull-Request (PR) is the primary method for code contributions from thousands of developers in GitHub. To maintain the quality of software projects, PR review is an essential part of distributed software development. Assigning new PRs to appropriate reviewers will make the review process more effective which can reduce the time between the submission of a PR and the actual review of it. However, reviewer assignment is now organized manually in GitHub. To reduce this cost, we propose a reviewer recommender to predict highly relevant reviewers of incoming PRs. Combining information retrieval with social network analyzing, our approach takes full advantage of the textual semantic of PRs and the social relations of developers. We implement an online system to show how the reviewer recommender helps project managers to find potential reviewers from crowds. Our approach can reach a precision of 74% for top-1 recommendation, and a recall of 71% for top-10 recommendation. © 2014 IEEE.",2019,https://scholar.google.com.br/,no
149,Amplitude malformation in the IFFT ocean wave rendering under the influence of the fourier coefficient,"Although Tessendorf's IFFT Gerstner wave model has been widely used, the value of A, a constant of the Fourier coefficient, is not given. A will strongly influence the shape of the rendered ocean wave and even cause amplitude malformation. We study the algorithm of the IFFT Gerstner wave, and give the method of A calculating. The method of the paper can guarantee there is no amplitude malformation in rendered ocean waves. The expression of the IFFT Gerstner wave with the amplitude of the cosine wave is derived again. The definite integral of the wave number spectrum is discretized. Further, another expression of the IFFT Gerstner wave is gotten. The Fourier coefficient of the expression contains the wave number spectrum and the area of the discrete integral domain. The method makes the shape of the generated wave stable. Comparing Tessdendorf's method with the method of the paper, we find that the expression of A should contain the area of the discrete integral domain and the spectral constant of the wave number spectrum. If A contains only the spectral constant, the amplitude malformation may occur. By reading some well known open source codes, we find that the code authors adopted some factitious methods to suppress the malformed amplitude Obviously, the code authors have already noticed the phenomenon of the malformation, but not probed the cause. The rendering results of the codes are close to that of the method of the paper. Furthermore, the wave potential is computed using the Gerstner wave model directly, the author find it is quite close to that of the paper. The experimental results and comparisons show that the method of the paper correctly computes the wave potential and effectively solves the problem of amplitude malformation.",2019,https://scholar.google.com.br/,no
150,Impact of traffic overload on road pavement performance,"Traffic on a road pavement is characterized by a large number of different vehicle types, and these can be considered in pavement design by using truck factors to transform the damage.they apply to the pavement to the damage that would be applied by a standard axle. The truck factors to convert trucks into standard axles or the load equivalent factors to convert axles into standard axles are defined by considering the average loads for each axle. This process includes the vehicles that travel with axle loads above the maximum legal limit. There are also a substantial number of overloaded vehicles in terms of total vehicle weight. These axles/vehicles cause significant damage to the pavements, increasing the pavement construction and rehabilitation cost. Thus, this paper investigates the impact of overloaded vehicles on road pavements by studying the truck factors for different vehicle cases applied to a set of pavements composed of five different asphalt layer thicknesses and five different subgrade stiffness moduli. The study revealed that the presence of overloaded vehicles can increase pavement costs by more than 100% compared to the cost of the same vehicles with legal loads. Copyright © 2013 by American Society of Civil Engineers.",2019,https://scholar.google.com.br/,no
151,"Empirical impact evaluation of the WHO Global Code of Practice on the International Recruitment of Health Personnel in Australia, Canada, UK and USA","Background: The active recruitment of health workers from developing countries to developed countries has become a major threat to global health. In an effort to manage this migration, the 63rd World Health Assembly adopted the World Health Organization (WHO) Global Code of Practice on the International Recruitment of Health Personnel in May 2010. While the Code has been lauded as the first globally-applicable regulatory framework for health worker recruitment, its impact has yet to be evaluated. We offer the first empirical evaluation of the Code's impact on national and sub-national actors in Australia, Canada, United Kingdom and United States of America, which are the English-speaking developed countries with the greatest number of migrant health workers.Methods: 42 key informants from across government, civil society and private sectors were surveyed to measure their awareness of the Code, knowledge of specific changes resulting from it, overall opinion on the effectiveness of non-binding codes, and suggestions to improve this Code's implementation.Results: 60% of respondents believed their colleagues were not aware of the Code, and 93% reported that no specific changes had been observed in their work as a result of the Code. 86% reported that the Code has not had any meaningful impact on policies, practices or regulations in their countries.Conclusions: This suggests a gap between awareness of the Code among stakeholders at global forums and the awareness and behaviour of national and sub-national actors. Advocacy and technical guidance for implementing the Code are needed to improve its impact on national decision-makers. © 2013 Edge and Hoffman; licensee BioMed Central Ltd.",2019,https://scholar.google.com.br/,no
152,"2013 21st International Conference on Program Comprehension, ICPC 2013 - Proceedings",The proceedings contain 239 papers. The topics discussed include: evaluating source code summarization techniques: replication and expansion; part-of-speech tagging of program identifiers for improved text-based software engineering tools; SArF map: visualizing software architecture from feature and layer viewpoints; multiscale visual comparison of execution traces; in situ understanding of performance bottlenecks through visually augmented code; monitoring user interactions for supporting failure reproduction; quality analysis of source code comments; gapped code clone detection with lightweight source code analysis; insight into a method co-change pattern to identify highly coupled methods: an empirical study; patterns of cross-language linking in java frameworks; and using code ownership to improve IR-based traceability link recovery.,2019,https://scholar.google.com.br/,no
153,"URBAN CODES: Familiarity, impressiveness, complexity and liking in façades of houses","This study aims to see the local residents of Kahramanmaras who are not in the design profession, to know how they find connotative meanings in house styles concerning different cultures and to see how these meanings differ according to socio-demographic qualities. It is hypothesized that foreign examples would be preferred as a 'social status' indication compare to the domestic ones which might be considered as 'warm'. Regarding this, a total of 102 respondents, composed of middle- aged people (25 female, 26 male) and students (25 female, 26 male) have evaluated the façades of 12 houses through using five-point semantic differential scales under four headings: Familiarity, Impressiveness, Complexity and Liking. The results have shown that different styles with different forms, elements and materials have been evaluated differently by the respondent groups. While the most impressive foreign vernacular examples were defined as the 'social status' indication, the most familiar local vernacular examples were indicated as the 'warmest' house façades. Amongst these results, it was also noted that the students appreciated the foreign vernacular examples and found them attractive than the middle age respondents.",2019,https://scholar.google.com.br/,no
154,The effect of party wall permeability on estimations of infiltration from air leakage,"The importance of reducing adventitious infiltration in order to save energy is highlighted by the relevant building standards of many countries. This operational infiltration is often inferred via the measurement of the air leakage rate at a pressure differential of 50 Pascals. Some building codes, such as the UK's Standard Assessment Procedure, assume a simple relationship between the air leakage rate and mean infiltration rate during the heating season, the so-called leakage-infiltration ratio, which is scaled to account for the physical and environmental properties of a dwelling. The scaling does not take account of the permeability of party walls in conjoined dwellings and so cannot be used to differentiate between the infiltration of unconditioned ambient air that requires heating, and conditioned air from an adjacent dwelling that does not. This article evaluates the leakage infiltration ratio afresh using a theoretical model of adventitious infiltration for a conjoined dwelling. The model is used to predict the mean infiltration rate during the heating season for an apartment and a terraced house located in 14 different UK cities for two extreme assumptions of party wall permeability. The first assumption is that party walls are permeable - this results in a predicted leakageinfiltration ratio that is significantly greater than that used by building codes to evaluate the energy and environmental performance of dwellings. The second assumption is that party walls are impermeable - this results in a predicted leakage-infiltration ratio close to that used by building codes. Knowledge of party wall permeability is not provided by a standard measurement of air leakage but is shown to be vital for making informed decisions on the implementation of energy efficiency measures. These findings have significant energy and health implications and should be of great interest to the policy makers of any country with a large number of conjoined dwellings.",2019,https://scholar.google.com.br/,no
155,Are developers fixing their own bugs?: Tracing bug-fixing and bug-seeding committers,"The process of fixing software bugs plays a key role in the maintenance activities of a software project. Ideally, code ownership and responsibility should be enforced among developers working on the same artifacts, so that those introducing buggy code could also contribute to its fix. However, especially in FLOSS projects, this mechanism is not clearly understood: in particular, it is not known whether those contributors fixing a bug are the same introducing and seeding it in the first place. This paper analyzes the comm-central FLOSS project, which hosts part of the Thunderbird, SeaMonkey, Lightning extensions and Sunbird projects from the Mozilla community. The analysis is focused at the level of lines of code and it uses the information stored in the source code management system. The results of this study show that in 80% of the cases, the bug-fixing activity involves source code modified by at most two developers. It also emerges that the developers fixing the bug are only responsible for 3.5% of the previous modifications to the lines affected; this implies that the other developers making changes to those lines could have made that fix. In most of the cases the bug fixing process in comm-central is not carried out by the same developers than those who seeded the buggy code. © 2013 by IGI Global. All rights reserved.",2019,https://scholar.google.com.br/,no
156,"Proceedings - 2013 3rd International Workshop on Replication in Empirical Software Engineering Research, RESER 2013",The proceedings contain 11 papers. The topics discussed include: a decade of Conway's law: a literature review from 2003-2012; an evolutionary perspective on socio-technical congruence: the rubber band effect; impact of communication structure on system design: towards a controlled test of Conway's law; relationships between communication structure and software architecture: an empirical investigation of the Conway's law at the Federal University of Pernambuco; a replicable infrastructure for empirical studies of email archives; towards a taxonomy of replications in empirical software engineering research: a research proposal; a partial replication with a sample size of one: a smoke test for empirical software engineering; two replication studies for evaluating artifact models in re: results and lessons learnt; a replicated comparative study of source code authorship attribution; on parameter tuning in search based software engineering: a replicated empirical study; and the use of visual text mining to support the study selection activity in systematic literature reviews: a replication study.,2019,https://scholar.google.com.br/,no
157,"Cross sections of (n, α) reactions on rare-earth elements from Tb through Lu at En~14 MeV","The cross sections of the neutron reactions at En = 14.6 MeV on the isotopes of Tb-159, Dy-164, Er-168, Er-170, Yb-174, Yb-176, Lu-175, and Lu-176 with alpha-particle emission were studied by the use of new experimental data and different theoretical approaches. New and improved experimental data were obtained with the neutron-activation technique. The samples of natural composition of rare earth elements were irradiated with d-t neutrons from the neutron generator NG-300. Gamma-ray spectra of the induced activities of irradiated samples were measured with HPGe spectrometer. The uncertainties of the experimental cross sections were thoroughly estimated. Available experimental results and evaluated nuclear data from the EXFOR, TENDL, ENDF data libraries were compared with different systematics and calculations with the EMPIRE 3.0 and TALYS 1.2 codes. Contribution of pre-equilibrium decay was analyzed. Different systematics for estimations of the investigated cross-sections have been tested.",2019,https://scholar.google.com.br/,no
158,The analysis of the efficiency of parallelization of existing serial code on the basis of seismic migration,"Seismic migration is the most important procedure in hydrocarbons prospecting and is aimed to correct reconstruction of underground structure. It is one of the most complicated and time-consuming task of whole seismic processing chain. Many types of seismic migration algorithms were created and implemented in both commercial and free software. One of the most important of free and open seismic procedure packages is ""Seismic Un*x"". Many possible solutions of migration problems are available in this widely used system, unfortunately most of them were written as a serial codes. Authors focused on one of the serial migration code-time-wavenumber (T-K) domain migration for common-midpoint stacked data-and made an attempt of parallelization of existing code. © 2013 Springer Science+Business Media.",2019,https://scholar.google.com.br/,no
159,Determination of axle load spectra based on percentage of overloaded trucks for mechanistic-empirical pavement design,"The mechanistic-empirical pavement design guide (MEPDG) developed under National Cooperative Highway Research Program Project 1-37A requires the use of axle load spectra or load distribution factors (LDFs) for pavement thickness designs. The MEPDG allows for various levels of LDF inputs, varying from site-specific (level 1) to regional average (level 2) and national average (level 3). There exists a concern that the MEPDG level 2 and level 3 inputs do not take any site-specific information into consideration and thus may result in erroneous thickness design. This study proposed a new approach to determine the axle LDF and number of axles per truck (NAPT) for level 2 and level 3 inputs. The proposed approach requires that the design guide provide default LDFs and NAPTs for both normally loaded and overloaded trucks for various axle types and vehicle classes. Thus, design engineers can estimate LDFs and NAPTs for a particular project site based on the percentages of overloaded trucks of that site which are readily available from historical traffic data. The effectiveness of the proposed approach was evaluated using weight-in-motion data collected from 26 sites in China. The LDFs and NAPTs obtained from various approaches were used to predict truck factors using the American Association of State Highway and Transportation Officials equation and to predict pavement distresses using the MEPDG software. The prediction errors from the proposed approach are substantially reduced when compared to those obtained using the MEPDG approach, indicating the proposed approach to be a more accurate way for traffic loading characterisation. The proposed level 2 inputs can further reduce the prediction errors when compared to the proposed level 3 inputs. Among the three types of pavement distresses analysed using the MEPDG software, namely rutting, bottom-up and top-down fatigue cracking, rutting is the least sensitive to the variations in axle LDF and NAPT, while top-down cracking is the most sensitive to the variations. © 2012 Taylor & Francis.",2019,https://scholar.google.com.br/,no
160,Modeling the effects of project management strategies on long-term product knowledge,"In a team, people sometimes leave the team and become replaced by new persons with less experience, and sometimes people participate in new activities and thereby obtain new knowledge. Different processes, in terms of different management strategies, can be followed, e.g., to introduce people to new tasks so they get new knowledge. There is a need to investigate the long term effects of different strategies on a team's software product knowledge. This paper presents an initial approach for how this type of knowledge can be modeled as a stochastic process. Metrics representing the long term effects on knowledge are derived, and two different example strategies are investigated numerically. Based on this it is discussed how the model can be further elaborated and evaluated. © 2012 Springer-Verlag.",2019,https://scholar.google.com.br/,no
161,The assessment to environment influence for moving vibration of subway in a city of China,"The subway in a city of China is located in an alluvial plain. There are many universities and residential distribution districts. The vibration influence in corresponding zone of the subway should be made evaluation before construction. Based on the parameters of dynamic soil test, the one-dimensional elastic column is used to simulate for computation of the vertical vibration of the subway site. Considered the nonlinear and pseudo-damping of soil, the ground accelerations calculated are shown in this paper. Finally, according to the results of computation of the vibration response and comparing with the interrelated code authors present the relevant conclusion for environmental assessment for moving vibration of subway in this city. © (2012) Trans Tech Publications, Switzerland.",2019,https://scholar.google.com.br/,no
162,Spatial distribution of thorium fission rate in a fast spallation and fission neutron field: An experimental and Monte Carlo study,"The Energy plus Transmutation (EpT) set-up of the Joint Institute for Nuclear Research (JINR), Dubna, Russia is composed of a lead spallation target surrounded by a blanket of natural uranium. The resultant neutron spectrum is a combination of spallation and fission spectra, modified by a reflective external layer of polyethylene and an internal absorbing layer of cadmium. The EpT set-up was irradiated with a beam of 4 GeV deuterons from the Nuclotron Accelerator at JINR. The spatial distribution of thorium fission rate within the assembly was determined experimentally, using a fission track detector technique, and compared with Monte Carlo predictions of the MCNPX code. Contributions of neutrons, protons, deuterons, photons and pions to total fission were taken into account. Close agreement between the experimental and calculated results was found. © 2011 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,no
163,Modeling roadway link PM 2.5 emissions with accurate truck activity estimate for regional transportation conformity analysis,"The impact of fine particulate matter (PM) on public health has long been a concern. The primary mobile sources of fine (PM) (PM 2.5) are diesel trucks. In practice, accurate roadway link-based modeling of the truck emissions remains a major challenge because of aggregated and unreliable truck activity data. The advanced emission model MOVES has been recommended by the U.S. Environmental Protection Agency for estimating emission factors, but supplying accurate and detailed truck activity-related inputs has become another challenge. Daily truck traffic activity is usually not estimated accurately and cannot be disaggregated to hourly activity with traditional methods. To address this problem, two innovative econometric methods were successfully enhanced in this study to predict accurate truck activity-based inputs for emission estimation. The models for truck factor spatial panel and multinomial probit hourly vehicle miles traveled were improved and tested with regional traffic data from the greater Cincinnati, Ohio, area. The application of those models indicates that using MOVES default input data underestimates the regional PM 2.5 inventory. The proposed methodology enables plotting the spatiotemporal distribution of PM 2.5 emissions in a subarea. Such an integrated method provides a useful decision support tool for practitioners because they can also model PM 2.5 emissions at a detailed level as required by project-level conformity analysis. The methodology presented is scalable and transferable and holds technical promise in its application to different regions and different pollutants.",2019,https://scholar.google.com.br/,no
164,Computer modeling methodology for laser cutting process supported with experiment on stainless steel plate,The article is focused to the methodology of computer modeling of laser cutting process on stainless steel plate. Cutting plate of 5 mm in thickness was made in the Laser Center TU Vienna. Computer modeling of the laser cutting process is oriented on gradation of models from simple thermal model to combined thermal-fluid analysis. The results from of the model application with shell elements with killing elements are shown. Energy source geometry and beam penetration influence on temperature field in the cutting area are documented by results from the solid model in ANSYS and SYSWELD code. Authors considered thermal-fluid model whose proposal is in the article as the model closest to reality. Processing of simulation models are supported with obtained data from real experiment.,2019,https://scholar.google.com.br/,no
165,Equalization of time-varying channels,"The wireless communication channel can be modeled as a time-varying (TV) linear system whose output is corrupted by additive noise. To reliably recover the transmitted information from the channel output, the receiver must address the effects of both linear distortion and additive noise. Equalization leverages knowledge of channel structure to mitigate the effects of the linear distortion, whereas decoding leverages knowledge of code structure to mitigate the channel's additive noise component. The equalizer might be well informed about the channel (e.g., knowing the complete channel impulse response) or relatively uninformed (e.g., knowing only the maximum channel length). This chapter presents equalization techniques for doubly dispersive channels, and gives overview of both coherent and noncoherent detection, using linear and tree-search methods, iterative approaches, and joint detection-estimation schemes. © 2011 Elsevier Ltd. All rights reserved.",2019,https://scholar.google.com.br/,no
166,Closed-form correlation of buildings energy use with key design parameters calibrated using a genetic algorithm,"This work aims at developing a closed-form correlation between key building design variables and its energy use. The results can be utilized during the initial design stages to assess the different building shapes and designs according to their expected energy use. Prototypical, 20-floor office buildings were used. The relative compactness, footprint area, projection factor, and window-to-wall ratio were changed and the resulting buildings performances were simulated. In total, 729 different office buildings were developed and simulated in order to provide the training cases for optimizing the correlation's coefficients. Simulations were done using the VisualDOE TM software with a Typical Meteorological Year data file, Kuwait City, Kuwait. A real-coded genetic algorithm (GA) was used to optimize the coefficients of a proposed function that relates the energy use of a building to its four key parameters. The figure of merit was the difference in the ratio of the annual energy use of a building normalized by that of a reference building. The objective was to minimize the difference between the simulated results and the four-variable function trying to predict them. Results show that the real-coded GA was able to come up with a function that estimates the thermal performance of a proposed design with an accuracy of around 96, based on the number of buildings tested. The goodness of fit, roughly represented by R2, ranged from 0.950 to 0.994. In terms of the effects of the various parameters, the area was found to have the smallest role among the design parameters. It was also found that the accuracy of the function suffers the most when high window-to-wall ratios are combined with low projection factors. In such cases, the energy use develops a potential optimum compactness. The proposed function (and methodology) will be a great tool for designers to inexpensively explore a wide range of alternatives and assess them in terms of their energy use efficiency. It will also be of great use to municipality officials and building codes authors. © 2011 American Society of Mechanical Engineers.",2019,https://scholar.google.com.br/,no
167,Measuring multi-language software evolution: A case study,"Characterising and measuring software developed in multiple languages is a problem for practitioners. Rather than a language-based approach, we avoid difficulties related to syntax, semantics and language paradigms by looking directly at relative shared information content to perform these tasks. Measuring, for each language, the relative number of bits of shared binary information between artefacts representative of consecutive releases of the project using a common tool permits the direct comparison of evolution results for the multiple languages. This paper presents a case study of the program suite called git, written in C, perl and Bourne shell. The study uses this method to show that, for git, code in scripting languages does not prototype later C, Bourne shell and C code are written together and that the languages' code contributions occur concurrently. © 2011 ACM.",2019,https://scholar.google.com.br/,no
168,"WETSoM'11 - Proceedings of the 2nd International Workshop on Emerging Trends in Software Metrics, Co-located with ICSE 2011",The proceedings contain 15 papers. The topics discussed include: data quality: Cinderella at the software metrics ball?; integrating quality models and static analysis for comprehensive quality assessment; is my project's truck factor low? theoretical and empirical considerations about the truck factor threshold; analyzing tool usage to understand to what extent experts change their activities when mentoring; by no means: a study on aggregating software metrics; insights into component testing process; linking software design metrics to component change-proneness; stability of java interfaces: a preliminary investigation; different strokes for different folks: a case study on software metrics for different defect categories; concern-based cohesion as change proneness indicator: an initial empirical study; a revised web objects method to estimate web application development effort; and the fractal dimension metric and its use to assess object-oriented software quality.,2019,https://scholar.google.com.br/,no
169,Ocean observatories and social computing: Potential and progress,"In December 2009, after years of planning, preparations and extensive infrastructure deployment, the world's first regional-scale underwater ocean observatory was open for business. NEPTUNE Canada opened its instrument network and data archive to free and open access by anyone willing to register for an account. Thus, we have embarked on a journey to transform our observatory into an online platform for collaborative, multidisciplinary e-science. Four main areas of Internet-mediated activity characterize e-science: data provision, analysis & visualization, collaboration and publication. Data provision entails making our large and ever expanding data archive accessible and searchable through the Web. To support online analysis & visualization, tools must be developed, which allow scientists to display and manipulate a wide variety of data products derived from measurements gathered by the various instruments attached to the observatory. Virtual collaboration can be fostered by making it easy for groups of geographically or institutionally separated researchers to design experiments, control instruments, share analyses and discuss conclusions within a shared web-based workspace. Publication and dissemination of research findings can be supported by tools that help researchers manage and contribute to both informal outreach (e.g. blogs) and the iterative review and revision cycles required for formal manuscript authoring. E-science promises some tantalizing advantages over traditional approaches. By providing through-the-web access to a large multivariate data archive, researchers are freed from the burdens of data storage and management. Additionally, the archive can simultaneously serve multiple users at multiple institutions in widely separated locations. Community-driven development of analysis routines allows users to visualize the data using both existing and custom-created code. E-science also encourages higher levels of collaboration, allowing researchers to form virtual teams able to tackle complex problems, where expertise in a variety of disciplines is required. Finally, by opening new avenues for interaction between researchers and students or members of the general public, e-science can influence both the questions scientists choose to address and the scope of their investigations. Transforming the promise of e-science into reality, however, is fraught with both technical and organizational challenges. The sheer volume of data records (50+ Tb/year) and observation density pose significant challenges for observatory and researcher alike, requiring new data mining approaches to be developed. Evolving and sometimes competing data format standards must be grappled with. Questions of data reliability and security must be answered. New protocols for protecting intellectual property within an open data environment must be defined. Ground rules for providing equitable access to finite shared resources (eg. underwater camera control time) must be defined. Cultural, institutional and motivational barriers to distributed decision-making and virtual team coordination must be overcome. NEPTUNE Canada is working to address the many challenges of e-science through a wide range of possible solutions. To help researchers make more optimal use of our large and growing data archives, we are developing a facility that allows users to upload and run custom data analysis routines on NEPTUNE Canada servers. Code authors will be able to retain privacy of over their routines, or if desired, publish their code for sharing and possible additional development with the larger user community. NEPTUNE Canada is developing other tools in the form of web and mobile applications for data search and subscription, event detection, interactive data plotting and real-time collaborative multi-user device control. Other custom tools will give users the ability to search, browse and annotate streaming media, then integrate and compile playlists from multiple sources to produce custom movies. Finally, the ""glue"" for an effective e-science working environment is under development in the form of web-based facilities to support and encourage project team coordination, communications, collaboration and electronic publication. ©2010 IEEE.",2019,https://scholar.google.com.br/,no
170,Responsibility in context: Perspectives,"This path breaking volume raises a number of necessary questions related to various aspects of responsibility for others through its multidisciplinary approach. Unlike its predecessors it takes a starting point in various empirical contexts and consequently draws conclusions from there on. The importance of the topic is reflected by absolute domination of neo-liberalism: facing a dismantling of the welfare state, privatization and the spread of ""privatist"" mentality in the era of individualization. The economic rationality sets the values that we are expected to live up to, reincarnating yet again the classical Frankfurt School diagnosis: politics are determined by economy. The importance of the method is reflected by taking real life situations as a starting point. In doing so, the method also challenges the current trend science generally where concepts are kidnapped from their native contexts, and recycled: re-used in contexts unnatural to them, where the only reality that matters is the one determined by the scientists' ability to define it. This volume rejects the neo-liberal paradigm of 'responsibility' as the only valid interpretation of reality. Therefore academics, undergraduate and graduate students, as well as general readers will find this volume thought provoking. "". The commitment to situating questions of responsibility in social contexts - this is something that is neglected in philosophy and only recently coming to the fore in sociology."" Keith Tester, co-author of Bauman Before Postmodernity: Invitation, Conversations and Annotated Bibliography 1953-1989, author of The Social Thought of Zygmunt Bauman (2004), Conversations with Zygmunt Bauman (2001). ""This project is an original and valuable contribution to discussion of these important issues,... a good text for graduate and senior undergraduate texts in political theory, political philosophy, moral philosophy, and social and political thought."" Lorraine Code, author of Ecological Thinking, The Politics of Epistemic Location (2006); Encyclopaedia Of Feminist Theories (2000); Feminist Interpretations Of Hans-Georg Gadamer (2003). © Springer Science+Business Media B.V. 2010.",2019,https://scholar.google.com.br/,no
171,Hospitals are dangerous places.,"Hospital fire dangers are real, widespread, and ever present, the article demonstrates, spelling out the locations, conditions, and ignition potentials which exist in such a setting. Knowledge of codes and standards, good maintenance practices, and frequent drills in fire prevention and suppression are among the practices recommended for keeping a hospital fire from becoming a disaster, the author says.",2019,https://scholar.google.com.br/,no
172,"An impact evaluation of a federal mine safety training regulation on injury rates among US stone, sand, and gravel mine workers: An interrupted time-series analysis","Objectives. We evaluated the impact of a safety training regulation, implemented by the US Department of Labor's Mine Safety and Health Administration (MSHA) in 1999, on injury rates at stone, sand, and gravel mining operations. Methods. We applied a time-series design and analyses with quarterly counts of nonfatal injuries and employment hours from 7998 surface aggregate mines from 1995 through 2006. Covariates included standard industrial classification codes, ownership, and injury seventy. Results. Overall crude rates of injuries declined over the 12-year period. Reductions in incident rates for medical treatment only, restricted duty, and lost-time injuries were consistent with temporal trends and provided no evidence of an intervention effect attributable to the MSHA regulation. Rates of permanently disabling injuries (PDIs) declined markedly. Regression analyses documented a statistically significant reduction in the risk rate in the postintervention time period (risk rate = 0.591; 95% confidence interval=0.529,0.661). Conclusions. Although a causal relationship between the regulatory intervention and the decline in the rate of PDIs is plausible, inconsistency in the results with the other injury-severity categories preclude attributing the observed outcome to the MSHA regulation. Further analyses of these data are needed.",2019,https://scholar.google.com.br/,no
173,Correcting charge-constrained errors in the rank-modulation scheme,"We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permutation induced by the different charge levels of the individual cells. The resulting scheme eliminates the need for discrete cell levels, overcomes overshoot errors when programming cells (a serious problem that reduces the writing speed), and mitigates the problem of asymmetric errors. In this paper, we study the properties of error-correcting codes for charge-constrained errors in the rank-modulation scheme. In this error model the number of errors corresponds to the minimal number of adjacent transpositions required to change a given stored permutation to another erroneous onea distance measure known as Kendall's τ -distance. We show bounds on the size of such codes, and use metric-embedding techniques to give constructions which translate a wealth of knowledge of codes in the Lee metric to codes over permutations in Kendall's τ-metric. Specifically, the one-error-correcting codes we construct are at least half the ball-packing upper bound. © 2010 IEEE.",2019,https://scholar.google.com.br/,no
174,Work design for volunteers: The case of open source software development,"I propose and examine a model of the relationship between elements of software design and software development in open source software (OSS) development projects. Specifically, I hypothesize that software architecture affects characteristics of subsequent code contributions and code contributors. I conduct a cross-sectional and longitudinal analysis of 203 software releases in 46 OSS projects hosted on SourceForge.net. Results lend support for the hypothesized relationship between software architecture (degree of software modularity) and software development, suggesting that the degree of software modularity is positively associated with the number of contribution opportunities and number of code contributions, and negatively associated with contribution size. In addition, data suggest that degree of modularity is associated with more contributors, and also influences the size of contributions made by different types of contributors as well as the distribution of work across contributors. Implications are developed for the theory of modularity and the practice of software development.",2019,https://scholar.google.com.br/,no
175,Blind and post test calculation of the hydrogen stratification experiment HM-2 with the containment code system COCOSYS,"This paper shows the results that have been archieved with the German Lumped-Parameter (LP) Code COCOSYS during the blind and post test calculations of the experiment HM-2. The test was carried out in the frame of the OECD THAI Project and was used for a code benchmark in which 6 CFD and 5 LP- Code contributions were submitted. The main phenomena, the built up and the erosion of an atmospheric stratification, were predicted quite well in the blind calculations with COCOSYS. The post test calculations focus on the sensibility of modeling different zone sizes for the plume trace. It was pointed out that this is not a sensitive parameter unless unphysical small values are used. Copyright © 2009 by ASME.",2019,https://scholar.google.com.br/,no
176,Engineering fault tolerance for realistic quantum systems via the full error dynamics of quantum codes,"The standard approach to quantum fault tolerance is to calculate error thresholds on basic gates in the limit of arbitrarily many concatenation levels. In contrast this paper takes the number of qubits and the target implementation accuracy as given, and provides a framework for engineering the constrained quantum system to the required tolerance. The approach requires solving the full dynamics of the quantum system for an arbitrary admixture (biased or unbiased) of Pauli errors. The inaccuracy between ideal and implemented quantum systems is captured by the supremum of the Schatten-k norm of the difference between the ideal and implemented density matrices taken over all density matrices. This is a more complete analysis than the standard approach, where an intricate combination of worst case assumptions and combinatorial analysis is used to analyze the special case of equiprobable errors. Conditions for fault tolerance are now expressed in terms of error regions rather than a single number (the standard error threshold). In the important special case of a stochastic noise model and a single logical qubit, an optimization over all 2 × 2 density matrices is required to obtain the full dynamics. The complexity of this calculation is greatly simplified through reduction to an optimization over only three projectors. Error regions are calculated for the standard 5- and 7-qubit codes. Knowledge of the full dynamics makes it possible to design sophisticated concatenation strategies that go beyond repeatedly using the same code, and these strategies can achieve target fault tolerance thresholds with fewer qubits. © 2009 IEEE.",2019,https://scholar.google.com.br/,no
177,Assigning bug reports using a vocabulary-based expertise model of developers,"For popular software systems, the number of daily submitted bug reports is high. Triaging these incoming reports is a time consuming task. Part of the bug triage is the assignment of a report to a developer with the appropriate expertise. In this paper, we present an approach to automatically suggest developers who have the appropriate expertise for handling a bug report. We model developer expertise using the vocabulary found in their source code contributions and compare this vocabulary to the vocabulary of bug reports. We evaluate our approach by comparing the suggested experts to the persons who eventually worked on the bug. Using eight years of Eclipse development as a case study, we achieve 33.6% top-1 precision and 71.0% top-10 recall. © 2009 IEEE.",2019,https://scholar.google.com.br/,no
178,Practical quantum fault tolerance,"The standard approach to quantum fault tolerance is to calculate error thresholds on basic gates in the limit of arbitrarily many concatenation levels. In contrast this paper takes the number of qubits and the target implementation accuracy as given, and provides a framework for engineering the constrained quantum system to the required tolerance. The approach requires solving the full dynamics of the quantum system for an arbitrary admixture (biased or unbiased) of Pauli errors. The inaccuracy between ideal and implemented quantum systems is captured by the supremum of the Schatten k-norm of the difference between the ideal and implemented density matrices taken over all density matrices. This is a more complete analysis than the standard approach, where an intricate combination of worst case assumptions and combinatorial analysis is used to analyze the special case of equiprobable errors. Conditions for fault tolerance are now expressed in terms of error regions rather than a single number (the standard error threshold). In the important special case of a stochastic noise model and a single logical qubit, an optimization over all 2×2 density matrices is required to obtain the full dynamics. The complexity of this calculation is greatly simplified through reduction to an optimization over only three projectors. Error regions are calculated for the standard 5- and 7-qubit codes. Knowledge of the full dynamics makes it possible to design sophisticated concatenation strategies that go beyond repeatedly using the same code, and these strategies can achieve target fault tolerance thresholds with fewer qubits. © 2009 SPIE.",2019,https://scholar.google.com.br/,no
179,Simulated Codes: Understanding the Response of Undergraduate Nursing Students,"Background: A quantitative and qualitative study investigated how well nursing students applied cardiopulmonary arrest principles and identified factors influencing ability to function in an emergency. Method: A questionnaire elicited information about experiences related to cardiopulmonary resuscitation (CPR). Groups managed an unexpected simulated cardiopulmonary arrest. Performance was evaluated for correct application of basic life support (BLS). Debriefing transcripts were analyzed for themes. Participants responded to questions related to confidence and fear again 3 months later. Results: Confidence in code response increased and fear in encountering a code decreased following the simulated clinical experience (SCE). Four of ten groups implemented BLS correctly. Five themes were identified: future, managing the code, simulation versus reality, lack of knowledge, and personal feelings. Conclusions: Use of patient simulation increased confidence in ability to the same level as real experience did. Code management without risk to humans enhanced confidence and decreased fear of encountering a real code. Knowledge gaps were addressed through debriefing. Traditional CPR teaching methods did not effectively prepare participants to apply that knowledge and skill in an SCE comparable to a real experience. © 2009 International Nursing Association for Clinical Simulation and Learning.",2019,https://scholar.google.com.br/,no
180,The commit size distribution of open source software,"With the growing economic importance of open source, we need to improve our understanding of how open source software development processes work. The analysis of code contributions to open source projects is an important part of such research. In this paper we analyze the size of code contributions to more than 9,000 open source projects. We review the total distribution and distinguish three categories of code contributions using a size-based heuristic: single focused commits, aggregate team contributions, and repository refactorings. We find that both the overall distribution and the individual categories follow a power law. We also suggest that distinguishing these commit categories by size will benefit future analyses. © 2009 IEEE.",2019,https://scholar.google.com.br/,no
181,Specification and evaluation of polymorphic shellcode properties using a new temporal logic,"It is a well-known fact that polymorphism is one of the greatest find of malicious code authors. Applied in the context of Buffer Overflow attacks, the detection of such codes becomes very difficult. In view of this problematic, which constitutes a real challenge for all the international community, we propose in this paper a new formal language (based on temporal logics such as CTL) allowing to specify polymorphic codes, to detect them and to better understand their nature. The efficiency and the expressiveness of this language are shown via the specification of a variety of properties characterizing polymorphic shellcodes. Finally, to make the verification process automatic, this language is supported by a new IDS (Intrusion Detection System) that will also be presented in this paper. © Springer-Verlag France 2008.",2019,https://scholar.google.com.br/,no
182,A laboratory investigation of the effect of multiple axle and truck configurations on HMA mixture rutting,"Few studies have investigated pavement damage resulting from different axle and truck configurations, and they were generally limited to single and tandem axles. The unconfined compression cyclic load test with loading cycles that simulate different axle and truck configurations was used to examine their relative effect on permanent deformation of an asphalt mixture. The laboratory investigation indicates that the rutting damage due to different axle configurations is approximately proportional to the number of axles. However, the effect of rest period between axles groups within a truck configuration is significant. Calculating truck rutting damage by simply summing the vertical permanent deformation corresponding to its constituent axle groups results in erroneous predictions. The application of Miner's rule results in improved truck rutting damage predictions for a wider range of truck configurations, although it does not account for the effect of rest periods within a truck configuration. Finally, unique HMA rutting damage curves, which can be used for any axle or truck configuration, were developed using strain and energy response parameters. © 2008 Lavoisier.",2019,https://scholar.google.com.br/,no
183,Identification of major outage years in utility reliability performance,"This article illustrates the development of a method to identify adverse utility performance in the form of major outage years (MOYs). The historical utility data used in this article are taken from the Canadian Electrical Association's (CEA) annual reports. The objective of this research is to examine and analyze the variations in the annual performance indices of the participating utilities, including the overall indices and the cause code contributions. Identifying a MOY is an important task for a utility and provides an opportunity and the incentive to analyze the weak points of the system and to improve the system performance accordingly.",2019,https://scholar.google.com.br/,no
184,"AOP → Hidden metrics: Separation, extensibility and adaptability in SW measurement","Traditional approaches to dynamic system analysis and metrics measurement are based on system code (both source, intermediate and executable code) instrumentation or need ad hoc support by the run-time environment. In these contexts, the measurement process is tricky, invasive and the results could be affected by the process itself making the data not germane. Moreover, the tool based on these approaches are difficult to customize, extend and often use since their properties are rooted at specific system details (e.g., special tools such as bytecode analyzers or virtual machine goodies such as the debugger interface) and require high efforts, skills and knowledges to be adapted. Notwithstanding its importance, software measurement is clearly a nonfunctional concern and should not impact on the software development and efficiency. Aspect-oriented programming provides the mechanisms to deal with this kind of concern and to overcome the software measurement limitations. In this paper, we present a different approach to dynamic software measurements based on aspect-oriented programming and the corresponding support framework named AOP→HiddenMetrics. The proposed approach makes the measurement process highly customizable and easy to use reducing its invasiveness and the dependency from the code knowledge. © JOT, 2004.",2019,https://scholar.google.com.br/,no
185,"12th Australasian Document Computing Symposium, ACDS 2007","This proceedings contains 21 papers. The two keynote talks, ten papers and nine posters published reflect the breadth of interest of the Australian research community in the area of document computing. It is also a highlight of ADCS that we are not only collocated with The Australasian Language Technology Workshop 2007, but are sharing a paper session, keynote talk, and social functions with the Australian natural language research community. The key terms of this proceedings include automatic thread classification, content selection evaluation, data mining process, document composition, document passages, entity ranking, extraction approach, hybrid bitvector index compression, information filtering, information retrieval, IR evaluation, Linux user forum information, meta-search engine, querying image ontology, rank-biased precision, retrieval systems, robust evaluation, score standardization, search tasks, source code authorship, user persistence, web spam, Wikipedia categories, XML elements.",2019,https://scholar.google.com.br/,no
186,"Proceedings: International Conference on Information Technology - New Generations, ITNG 2007",The proceedings contain 200 papers. The topics discussed include: programming highly parallel reconfigurable architectures for public-key cryptographic applications; two novel resource management schemes for integrated wireless networks; analysis of time based random waypoint mobility model for wireless mobile networks; study on worm poisoning technology; a direct-time queue analytical model based on dynamic random early drop; dynamic two-layer signature-based IDS with unequal databases; proactive model for mitigating Internet denial-of-service attacks; cell-based distributed addressing technique using clustered backbone approach; interference aware routing in sensor networks; genetic algorithm for energy efficient clusters in wireless sensor networks; a mobile context dissemination middleware; polygonal approximation of 2-D binary images; a probabilistic approach to source code authorship identification; and neural networks in cultivation.,2019,https://scholar.google.com.br/,no
187,Distribution system reliability risk assessment using historical utility data,"This article describes the research conducted on the use of historical performance data in assessing the financial risk for a power distribution utility in a performance based regulation (PBR) regime. The historical utility data used in this research are taken from the Canadian Electrical Association (CEA) annual reports. The objectives of this article are to examine and analyze the variations in the annual performance indices of the participating utilities including the overall indices and the cause code contributions, and to examine the possible utilization of historic utility reliability indices to create suitable reward/penalty structures in a PBR protocol. The potential financial risk analyses for these selected utilities are conducted using their historical performance data imposed on a number of possible reward/penalty structures developed in this article. An approach to recognize adverse utility performance in the form of major outage years (MOY) is developed considering the influence of the MOY performance in PBR decision making.",2019,https://scholar.google.com.br/,no
188,AISC certification: Getting started and planning for success,"Specifiers and contractors appreciate the value of first-time quality, and cost and schedule risk mitigation, as well as the innovation of firms committed to quality principles. Building officials value AISC Certification as a means for prequalification and to increase their confidence that the public will be protected with work that adheres to the appropriate building codes. Owners of Certified firms find that their commitment to quality increases profits by producing higher-margin work and reducing waste and inefficiency in their operations. AISC Certification often enhances fabricator and erector employee performance as well. The internal audit process and annual audit by Quality Management Company, LLC open the channels of communication, enhancing knowledge and understanding through the exchange of ideas and exposure to quality professionals.",2019,https://scholar.google.com.br/,no
189,"2nd International Conference on E-business and Telecommunication Networks, ICETE 2005",The proceedings contain 24 papers. The special focus in this conference is on E-business and Telecommunication Networks. The topics include: Advertising via mobile terminals - delivering context sensitive and personalized advertising while guaranteeing privacy; on digital cash-like payment systems; in-depth analysis of selected topics related to the quality assessment of E-commerce systems; strategies for service composition in P2P networks; end to end adaptation for the web; voice biometrics within the family; exploring new approaches to biometric key encapsulation; adaptive real-time network monitoring system; guaranteeing security of financial transaction by using quantum cryptography in banking environment; optimal trade-off for Merkle tree traversal; effective discrimination of source code authors based on byte-level information; flooding attack on the binding cache in mobile IPv6; the robustness of blocking probability in a loss system with repeated customers; on the evaluation of a secure solution to access 802.11 networks; a comparative study of IEEE 802.11 MAC access mechanisms for different traffic types; an automatic blind modulation recognition algorithm for M-PSK signals based on MSE criterion; properties of dominant color temperature descriptor and test environment for performance evaluation of an internet radio.,2019,https://scholar.google.com.br/,no
190,Another neat tool for refactoring Erlang programs,"Refactoring is a program transformation aiming to improve the quality characteristics of the code (such as consistency, maintainability, transparency, execution time) while strictly preserving its functionality. Since functional programming languages, such as Erlang, are gaining more and more territory in this field of technology it is a highly significant and current task to develop a refactoring tool for this language. The present paper describes the elaboration of an Erlang refactoring tool where developers were striving to employ already existing (off-the-shelf) components and technologies. Refactoring cannot be performed without creating the model of the source code. Authors modeled the source code with an extended syntax tree represented in XML. Using XML as representation offers various tools available for transforming and visualizing the model. In the present article authors introduce the prototype version of the proposed refactoring tool and describe it in more details while solving a specific refactoring problem.",2019,https://scholar.google.com.br/,no
191,Source code author identification based on N-gram author profiles,"Source code author identification deals with the task of identifying the most likely author of a computer program, given a set of predefined author candidates. This is usually. based on the analysis of other program samples of undisputed authorship by the same programmer. There are several cases where the application of such a method could be of a major benefit, such as authorship disputes, proof of authorship in court, tracing the source of code left in the system after a cyber attack, etc. We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-gram profiles in order to represent a source code author's style. Experiments on data sets of different programming language (Java or C++) and varying difficulty (6 to 30 candidate authors) demonstrate the effectiveness of the proposed approach. A comparison with a previous source code authorship identification study based on more complicated information shows that the SCAP approach is language independent and that n-gram author profiles are better able to capture the idiosyncrasies of the source code authors. Moreover the SCAP approach is able to deal surprisingly well with cases where only a limited amount of very short programs per programmer is available for training. It is also demonstrated that the effectiveness of the proposed model is not affected by the absence of comments in the source code, a condition usually met in cyber-crime cases. © 2006 International Federation for Information Processing.",2019,https://scholar.google.com.br/,yes
192,Ethnic and Gender Differences in Willingness among High School Students to Donate Organs,"Purpose: To explore ethnic and gender differences in willingness to donate organs among teenagers and determine factors associated with those differences. Methods: A cross-sectional survey was administered to 883 students attending health science class at nine inner-city high schools in Seattle, Washington. Knowledge and personal experience regarding donation and transplantation, willingness to donate on an ordinal scale, and student demographics were measured. Results: Although only 40% of the cohort had a driver's license, 24% of those with driver's licenses had signed a donor card. Girls were more willing to donate than boys (p < .001) and whites more willing to donate than minorities (p < .001). In a multivariate ordinal logistic regression model, after controlling for school, age, religious preference, home zip code, knowledge regarding donation, willingness to receive a transplant, conversations with others regarding donation, and knowing someone who had donated or received an organ, girls remained more willing to donate compared to boys (odds ratio [OR] 2.10), and white students remained more willing to donate than black (OR 2.38), Chinese (OR 3.03), Hispanic (OR 2.5), Southeast Asian (OR 2.86) and other ethnic students (OR 3.33) (all p < .05). Conclusions: Gender and ethnic differences in willingness to donate organs exist among high school students. Efforts to increase teenage donation should focus on increasing knowledge and promoting communication about donation with others while remaining cognizant of gender and ethnic differences regarding motivators for donation. © 2006 Society for Adolescent Medicine.",2019,https://scholar.google.com.br/,no
193,Analysis of truck overweights in Egypt,"Structural design of highway pavements depends to a large extent on expected heavy vehicles with various axle loads and configurations. Most highway authorities stipulate that a maximum single axle load be allowed on their pavements. Load equivalency factors are used to estimate the number of repetitions of standard axle loads (usually 18-kips) for use in life cycle analysis and structural design of highway pavements. Load equivalency factors increase dramatically as axle load increases. Therefore, enforcing a maximum axle load limit has been mandated by highway authorities. This paper presents analysis results for truck overweight survey. Data were collected from 13 weighing stations across Egypt including truck type, number and configuration of axles as well as axle weight. Results indicated that the average overweight is 14 tons at permanent weighing stations and is about 18 tons at portable weighing stations. The regression analysis showed that the percentage of overweight trucks for all weighing stations continue to increase and will reach 100 % in the next few years. Estimated truck factors under current truck overweight percentage are increased by about 4 to 5 times. The disaggregate analysis of axle weight showed that the 10-ton single axle is loaded by 16 tons and the 16-ton dual axle is loaded by 24 tons. Two truck types (out of eight types) are dominantly overweight for most of the observed trucks.",2019,https://scholar.google.com.br/,no
194,Statistical methods for the discovery of co-operative transcription factors: The co-bind code revised,"Discovering co-operative Transcription Factors (TF's) within the genome is a computationally challenging problem, tackled through Monte Carlo-like analysis by the Co-Bind code, developed at the Department of Genetics of the St. Louis Washington University, Due to its statistical nature, Co-Bind is characterized by very long execution times, order of days on current high-end workstations, and could benefit from parallelization and a wise optimization, performed at both the algorithmic and coding levels. This work presents the results achieved by parallelizing Co-Bind and optimising the parallel code and shows that, on a 16-processor architecture, a speed-up greater than two orders of magnitude is achieved with respect to the serial version released by the code's authors.",2019,https://scholar.google.com.br/,no
195,Differential encoding of information about progress through multi-trial reward schedules by three groups of ventral striatal neurons,"In the course of daily activity we continually judge whether the goal sought is worth the work that must be done to obtain it. The ventral striatum is thought to play a central role in making such judgments. When reward schedules are used to investigate these judgments ventral striatum neurons show responses near the time of the cue, the bar-release, and/or the reward delivery. We evaluated the type of coding that occurs at these three time points by using codes or factorizations with: (1) two states for reward versus non-reward, (2) four states for the progress in the reward schedule, and (3) six states for all of the states of the schedule, quantified using information theory and ANOVA. For the bar-release- and reward-related responses the percent variance explained was as high for the two states code as with the six states code. The information for the four state code rose slightly but significantly for the bar-release-related neurons. For the cue-related neurons the code with six states carried more information than the simpler codes. Thus, responses at different times appear to play different roles. Responses occurring early in trials differentiate all states, i.e., the path to a reward, whereas those late in trials code knowledge of impending reward. © 2004 Elsevier Ireland Ltd and The Japan Neuroscience Society. All rights reserved.",2019,https://scholar.google.com.br/,no
196,Criminals Become Tech Savvy,"Most computer crime on the Internet is not financially motivated, it only resulted because of either curious or malicious technical attackers. The spam problem grew more than 50% of all email transmitted over the Internet. Spammers are becoming more sophisticated and are finding new open proxies or SMTP relays to send messages and hide their true sources. Criminals have adopted the techniques of crackers and malicious code authors and are pursuing their goal aggresively.",2019,https://scholar.google.com.br/,no
197,Representations of the human body in the production and imitation of complex movements,"Previous investigations suggest that there are at least three distinct types of representation of the human body. One representation codes structural information about body part location (body structural description), the second codes knowledge about body parts (body semantics or body image), and the third provides a dynamic mapping of the current positions of body parts relative to one another (body schema) (Buxbaum & Coslett, 2001; Schwoebel, Coslett, & Buxbaum, 2001; Sirigu, Grafman, Bressler, & Sunderland, 1991). In this study we used an influential ""two route"" model of gesture performance (Gonzalez Rothi, Ochipa, & Heilman, 1991) to derive predictions about the body representations expected to underlie the production and imitation of meaningful and meaningless movements. The relationships between these measures were examined in 55 patients with unilateral left-hemisphere lesions. Multiple regression analyses demonstrated that performance on body semantics and body schema tasks were significant and unique predictors of meaningful gesture performance, whereas the body schema measure alone predicted imitation of meaningless movements. Body structural descriptions did not enter into any of the models. These findings are consistent with performance of meaningful actions via a semantic route that accesses body semantics and other action knowledge, and performance of meaningless movements via a ""direct"" route that bypasses this information. © 2004 Psychology Press Ltd.",2019,https://scholar.google.com.br/,no
198,Neutron spallation source and the Dubna Cascade Code,"Neutron multiplicity per incident proton, n/p, in collision of high energy proton beam with voluminous Pb and W targets has been estimated from the Dubna Cascade Code and compared with the available experimental data for the purpose of benchmarking of the code. Contributions of various atomic and nuclear processes for heat production and isotopic yield of secondary nuclei are also estimated to assess the heat and radioactivity conditions of the targets. Results obtained from the code show excellent agreement with the experimental data at beam energy, E < 1.2 GeV and differ maximum up to 25% at higher energy.",2019,https://scholar.google.com.br/,no
199,Ethics Code Familiarity and Usefulness: Views on Idealist and Relativist Managers under Varying Conditions of Turbulence,"The purpose of this present research is to expand upon the foundation that codes of ethics are more useful guides to managers in their behavior and decision-making when managers are more familiar with code content and intentions. We explore whether the impact of code familiarity on code usefulness differs: (a) under varying conditions of turbulence and (b) between persons with relativist versus idealist personal values. Data have been collected from a sample of 1700 executives in member companies of the U.S. Direct Selling Association, and responses were received from 286 (16.8% returned). Perceptions of ethics code familiarity and usefulness decline as business turbulence increases. The decline in familiarity/usefulness was more pronounced for managers with a relativistic ethical orientation.",2019,https://scholar.google.com.br/,no
200,XP and Emotional Intelligence: Discovering Your Inner Merlin,"The correlation between extreme programming (XP) and emotional intelligence in software development process is discussed. The XP coding standard practice means that all the programmers use the same coding style. Pair programming and common code ownership ensures that more than one person know the functionality. For the programmers to work as a team and for collective code ownership to work, individual may have to align with team preferences rather than personal preferences.",2019,https://scholar.google.com.br/,no
201,Basic reading through dance program: The impact on first-grade students' basic reading skills,"This study evaluates the effectiveness of an arts-based educational program, Basic Reading Through Dance. Basic Reading Through Dance is a 20-session, curriculum-based reading intervention for first-grade students developed by Whirlwind, a not-for-profit organization. There were a total of 721 first-grade students from Chicago public schools who participated in the study, with 328 students from 6 schools receiving the program and 393 students from 9 schools serving as controls. The program was designed to improve reading skills, as assessed by the PhonoGraphix Test, such as code knowledge (alphabet sounds) and phoneme segmentation (separating letter sounds within spoken words). Results suggest that the students who participated in the program improved significantly more than control students on all reading skills that were assessed.",2019,https://scholar.google.com.br/,no
202,Gender differences in programming?,"This paper presents the findings of an interactive poster of the same name that was displayed at two Computer Science Education conferences during the summer of 2001. Delegates were presented with fragments of code written by first year Computer Science undergraduates and were asked to determine whether the code authors were male or female. The findings suggest that not only is it not possible to determine the gender of the author, but that the gender stereotyped 'clues' relied upon as a basis for the determination are unreliable predictors.",2019,https://scholar.google.com.br/,no
203,The impact of ethics code familiarity on manager behavior,"Codes of ethics exist in many, if not the majority, of all large U.S. companies today. But how the impact of these written codes affect managerial attitudes and behavior is still not clearly documented or explained. This study takes a step in that direction by proposing that attention should shift from the codes themselves as the sources of ethical behavior to the persons whose behavior is the focus of these codes. In particular, this study investigates the role of code familiarity as a factor impacting the influence of an ethics code on manager behavior. Data collected from 286 executives from companies in the direct selling industry are used to test hypotheses (1) that the perceived usefulness of ethics codes is positively related to the degree of familiarity with the code, and (2) that ethical climate as assessed by managers is positively related to the code's perceived usefulness. Both hypotheses are supported, and their implications and further research directions are discussed.",2019,https://scholar.google.com.br/,no
204,Trellis Structure and Higher Weights of Extremal Self-Dual Codes,"A method for demonstrating and enumerating uniformly efficient (permutation-optimal) trellis decoders for self-dual codes of high minimum distance is developed. Such decoders and corresponding permutations are known for relatively few codes. The task of finding such permutations is shown to be substantially simplifiable in the case of self-dual codes in general, and for self-dual codes of sufficiently high minimum distance it is shown that it is frequently possible to deduce the existence of these permutations directly from the parameters of the code. A new and tighter link between generalized Hamming weights and trellis representations is demonstrated: for some self-dual codes, knowledge of one of the generalized Hamming weights is sufficient to determine the entire optimal state complexity profile. These results are used to characterize the permutation-optimal trellises and generalized Hamming weights for all [32,16,8] binary self-dual codes and for several other codes. The numbers of uniformly efficient permutations for several codes, including the [24,12,8] Golay code and both [24,12,9] ternary self-dual codes, are found.",2019,https://scholar.google.com.br/,no
205,Seismic design regulation codes: Contribution of K-NET data to site effect evaluation,"The purpose of this study is to compare the site effect section of building codes (EC8 and UBC97) with the set of data provided by the Kyoshin network. In order to obtain a set of site coefficients and spectral shapes, we have first deduced an attenuation law for both horizontal and vertical motion. Site conditions are represented by the shear velocity averaged over the upper 30 m (V30s). Our site classification (4 categories similar to those proposed in the new EC8 and the UBC97) is based on borehole investigations at every station. This classification has permitted to distinguish clearly four response spectra which demonstrates the efficiency of V30s as characterising site conditions. Our law is then used to test site coefficients and spectral shapes of building codes EC8 and UBC97. Concerning spectral shapes and site coefficients, our results are found to be in good agreement with EC8 and UBC97 only if category B (400 < V30s < 800 m/s) is taken as reference. We also conclude that a site which is characterised as ""rock"" on geological criteria can not generally be classified in category A (V30s > 800 m/s). This suggests that classification in category A should be based only on field measurements. Concerning vertical motion, our analysis of the K-NET data shows that the ratio av/ah (vertical peak ground acceleration over horizontal peak ground acceleration) is between 0.50 and 0.68.",2019,https://scholar.google.com.br/,no
206,ABLSim: a user-friendly wave optics propagation code,"ABLSim is a software tool for high fidelity modeling of advanced optical systems such as laser weapons systems and compensated imaging systems. It makes use of a well established modeling approach known as 'wave optics', in which optical wavefronts are modeled using two-dimensional meshes of complex numbers. Wave optics is the most powerful approach known for predicting the performance of optical systems in the presence of strong turbulence. ABLSim differs from previous wave optics modeling tools primarily in that it is much easier to use. Historically, wave optics codes been notoriously difficult to use with the result that only a very small number of people - the code authors and a few others - could use the codes effectively. ABLSim is designed to make wave optics accessible to a much broader user community. In ABLSim, the user assembles system models in a 'connect-the-blocks' visual programming environment, where each block represents a system component such as an optical sensor, a laser source, a mirror or a lens. Each connection represents a specific type of interaction: for example, connections between optical components represent optical interfaces. ABLSim provides a GUI for setting up parameter studies and a Matlab interface for postprocessing.",2019,https://scholar.google.com.br/,no
207,GETENTRY: A simple Unix script for accessing the Protein Data Bank's anonymous ftp server,"The crystallographic problem: The Protein Data Bank's (Bernstein et al., 1977; Abola et al., 1987) archival computer database of three-dimensional structures of biological macro-molecules is a unique resource serving the international scientific community. The database contains atomic coordinates, bibliographic citations, and primary sequence and secondary structure information, as well as crystallographic structure factors and two-dimensional-NMR experimental data. Information is available on protein, DNA, RNA, virus and carbohydrate structures. The current release of the Protein Data Bank (PDB) contains atomic coordinate entries for over 8800 structures with about 170-200 new coordinate sets being added to the archive monthly. In 1992, the PDB established an anonymous ftp server (pdb.pdb.bnl.gov, 130.199.146.1) giving users access to the current archive via the Internet. Network access to the archive has several advantages: user access to the archive is free, new Layer 1 coordinate entries become available to the user immediately upon approval by the depositor, and disk and other hardware requirements are minimized. However, as the size of the PDB has grown, finding a particular entry among the thousands of entries in the PDB has become increasingly difficult. The PDB World Wide Web (WWW) browsers, 3DB-Browser and PDB-Lite, have proven to be powerful tools that allow most users to search the archive using various text fields. However, there remain a number of users requiring a more basic interface to the PDB files, particularly via VT-type terminals. Method of solution: A simple user-friendly command-line Unix shell script, GETENTRY, has been developed to search the PDB ftp archive and retrieve coordinate entries. It has been in use at the PDB since early 1993 and unlike the WWW-based browsers (Peitsch et al., 1995; Stampf et al., 1995; Biggs et al., 1996), GETENTRY can be run on any terminal or window connected to a Unix host. The following options are available. Entry retrieval by ID code (getentry ID code). Author search (getentry -a author name). Compound search (getentry -c compound name). Source search (getentry -s source name). Resolution search (getentry -r [<, < = , = = , > = , >] resolution). Download the list of pending or on hold entries (getentry -p). Search for crystallographer's e-mail address (getentry -x name). Retrieve BIOMOL entries (getentry -b ID code). Help text (getentry -h). Software environment: GETENTRY is command-line driven and uses standard Unix commands such as echo, ftp, pipe, awk, more and egrep. The script uses the PDB author, compound, source and resolution indices as well as the PDB-maintained e-mail list of Martha Teeter in its pattern searches. Pattern searches are performed using full regular expressions (i.e. the full set of alphanumeric and special characters). GETENTRY is fast, with search/transfer times ranging from 10 to 60 s (depending on the server location and Internet load) for most X-ray coordinate entries. GETENTRY requires that the user has a .netrc file with the correct protection (700) resident in his/her home directory and that the terminal, computer or workstation has access to the Internet. In addition, the script can be easily tailored to use local PDB file servers. Hardware environment: Unlike WWW-based browsers, hardware and installation requirements are minimal since GETENTRY will run on almost any terminal or PC connected to a Unix workstation. Availability: The script is available at no charge from the PDB anonymous ftp server or from the PDB WWW server (http://www.pdb.bnl.gov/pub-docs/software.html). © 1999 International Union of Crystallography.",2019,https://scholar.google.com.br/,no
208,Using facilitators in mock codes: recasting the parts for success.,"BACKGROUND: Members of the CHRISTUS Santa Rosa Children's Hospital staff development committee identified a need for a mock code program which would address a range of learning needs for nurses and other caregivers with varying levels of knowledge, skills, and experience. METHOD: We implemented a mock code program using experienced caregivers, usually emergency room and pediatric intensive care RNs and respiratory therapists to serve as facilitators to code participants during the mock code drills. Facilitators have dual roles of teaching and guiding the code participant as well as evaluating performance. RESULTS: Code participants and facilitators benefit from the design of this program. Debriefing session input and written program evaluations show that code participants value the opportunity to practice their skills in a nonthreatening situation in which they receive immediate feedback as needed. Facilitators learn to teach and coach and strengthen their own code knowledge and skills at the same time. CONCLUSION: This mock code program serves as a unique way to include novice and experienced nurses in mock codes together. The knowledge, skills, and confidence of the code participants and the facilitators have matured. The design of the program allows for immediate teaching/learning where needed, as well as appropriate evaluation. This program develops stronger, calmer, more efficient, and more confident nurses during codes. Practice and equipment changes can be based on findings from the mock codes. The program is invaluable to patients, staff, and hospital.",2019,https://scholar.google.com.br/,no
209,Theoretical analysis of the doubly excited 3lnl′ states of sodiumlike copper,"Energy levels, radiative transition probabilities and autoionization rates for CuXIX including the 1s22s22p53lnl′ (n = 3 ÷ 8, l′ ≤ n - 1) and 1s22s2p63lnl′ (n = 3 ÷ 4, l′ ≤ n - 1) doubly excited states were calculated using the multi-configurational Hartree-Fock method (Cowan code). Contributions of relativistic effects were discussed in comparison with data obtained by the multi-configurational Dirac-Fock method (YODA code). Application of the theoretical data for interpretation of experimental spectra obtained by double-electron capture in slow ion-atom collisions is discussed.",2019,https://scholar.google.com.br/,no
210,The language of business codes of ethics: Implications of knowledge and power,"In Australia as is the case elsewhere, ethics is a developing aspect of business behaviour. Many educational institutions and business enterprises have a strong interest in the subject, particularly from the practical viewpoint of creating an ethical culture in business that has substantial practical effects. In this paper, the codes of ethics of five large enterprises are examined. They were selected as being typical of a collection of corporate codes used in Australia held by the Ethics Research Group at the University of Technology, Sydney. Two codes were from international companies: a chemical manufacturing company and a health, beauty and medical manufacturer. The other codes were from an Australian bank, an Australian federal government business agency, and an Australian mining company. Corporate codes of ethics rarely contain operational definitions to direct their addressees on situations of moral hazard and the required response, to achieve a particular desired ethical corporate culture. Consequently, addressees constitute the locus of ethical decision making in enterprises. By contrast, the language used in the corporate codes examined construct an authoritarian position in the writer/ reader relationship from the overuse of grammatical structures such as relational clauses, the passive, nominalisation, grammatical metaphor and modality. Collectively, these structures communicate a strong sense of obligation and even powerlessness since a strong authoritarian tone is established which does not give the addressees the possibility of discretionary decision making. The authors acknowledge that these five grammatical structures have a place in corporate codes since they form part of the legitimate linguistic fabric of our language. Rather attention is drawn to this overuse to assist corporate code authors to avoid writing codes that have subtle unintended and contradictory messages.",2019,https://scholar.google.com.br/,no
211,Three-dimensional analysis of soil-steel bridges,"A three-dimensional finite element analysis is presented in this paper to examine the actual three-dimensional behaviour of soil-steel bridges. The thrust and bending moment around the conduit walls as well as the stability of a single conduit are presented and compared with the results obtained from plane-strain analysis. Also, the live load dispersion in the soil above the conduit is examined and compared with some present codes. -Authors",2019,https://scholar.google.com.br/,no
212,A demonstrational interface for recording technical procedures by annotation of videotaped examples,"In conventional knowledge acquisition, a domain expert interacts with a knowledge engineer, who interviews the expert, and codes knowledge about the domain objects and procedures in a rule-based language, or other textual representation language. This indirect methodology can be tedious and error-prone, since the domain expert's verbal descriptions can be inaccurate or incomplete, and the knowledge engineer may not correctly interpret the expert's intent. We describe a user interface that allows a domain expert who is not a programmer to construct representations of objects and procedures directly from a video of a human performing an example procedure. The domain expert need not be fluent in the underlying representation language, since all interaction is through direct manipulation. Starting from digitized video, the user selects significant frames that illustrate before- and after- states of important operations. Then the user graphically annotates the contents of each selected frame, selecting portions of the image to represent each part, labeling the parts, and indicating part/whole relationships. The actions that represent the transition between frames are described using the technique of programming by demonstration (also called programming by example). The user performs operations on concrete visual objects in the graphical interface, and the system records the user's actions. Explanation-based learning techniques are used to synthesize a generalized program that can be used on subsequent examples. The knowledge acquisition and video annotation facilities are implemented as part of the graphical editor Mondrian, which incorporates a programming by demonstration facility. We explain the operation of Mondrian's interface in its base domain of graphical editing as well as for the video annotation and knowledge acquisition application. The result of the knowledge acquisition process is object descriptions for each object in the domain, generalized procedural descriptions, and visual and natural language documentation of the procedure. We illustrate the system in the domain of documentation of operational and maintenance procedures for electrical devices. © 1995 Academic Press. All rights reserved.",2019,https://scholar.google.com.br/,no
213,AICPA rules of conduct and practitioner knowledge,"Accountants practicing in all segments of accounting need to understand both the relevant ethical standards of accounting and the mechanisms for enforcing these ethical standards. Further, accountants need to have an understanding of how to apply these standards in practical situations [Loeb, 1992]. In 1988, the AICPA restructured the profession's Code of Conduct. The changes resulted in a code with a more positive orientation. Since the 1988 Code restructuring, the Federal Trade Commission determined that certain rules embodied in the Code interfered with competition in violation of the FTC Act. Although the AICPA was reluctant to modify the existing Code, AICPA-FTC negotiations resulted in numerous amendments. Because of these recent changes, CPAs may be experiencing difficulty in maintaining an accurate perception of what constitutes acceptable conduct according to the Code. Consequently, this study addresses one important question. Do CPAs exhibit a satisfactory level of code knowledge when presented with a variety of ethical conflict situations? The results of this study are not encouraging for the profession. © 1995 Atlantic Economic Society.",2019,https://scholar.google.com.br/,no
214,Separation between buildings to avoid pounding during earthquakes,"This paper presents an analytical investigation on the required separations between adjacent buildings to avoid pounding during earthquakes. Five wall buildings, having 3, 6, 10, 15, and 25 storeys, were designed for three different seismic zones in Canada. For each zone, an ensemble of code compatible ground motions was identified. Nonlinear time-step dynamic analyses were performed to determine the separations to avoid pounding between each building pair under each earthquake. It was found that the National Building Code of Canada overestimates the required separations. A simplified spectral difference procedure is proposed for inclusion in future editions of the code. -Authors",2019,https://scholar.google.com.br/,no
215,The quality of family and household coding in the 1991 census of population and dwellings,"In the 1991 census of population and dwellings, Statistics New Zealand used computer programmes to assign family and household composition codes. Family codes describe each individual's place in a family. Household composition codes describe the number and characteristics of the families in each dwelling. The quality of these codes was measured in a study in which codes assigned by clerical staff were compared to the codes assigned by computer. In the next census, Statistics New Zealand can best improve the quality of family and household composition codes by identifying dwellings with imperfect data and giving these dwellings to specialist staff to code. -Author",2019,https://scholar.google.com.br/,no
216,User interface for knowledge acquisition from video,"In conventional knowledge acquisition, a domain expert interacts with a knowledge engineer, who interviews the expert, and codes knowledge about the domain objects and procedures in a rule-based language, or other textual representation language. This indirect methodology can be tedious and error-prone, since the domain expert's verbal descriptions can be inaccurate or incomplete, and the knowledge engineer may not correctly interpret the expert's intent. We describe a user interface that allows a domain expert who is not a programmer to construct representations of objects and procedures directly from a video of a human performing an example procedure. The domain expert need not be fluent in the underlying representation language, since all interaction is through direct manipulation. Starting from digitized video, the user selects significant frames that illustrate before- and after-states of important operations. Then the user graphically annotates the contents of each selected frame, selecting portions of the image to represent each part, labeling the parts, and indicating part/whole relationships. Finally, programming by demonstration techniques describe the actions that represent the transition between frames. The result is object descriptions for each object in the domain, generalized procedural descriptions, and visual and natural language documentation of the procedure. We illustrate the system in the domain of documentation of operational and maintenance procedures for electrical devices.",2019,https://scholar.google.com.br/,no
217,Modelling Pitch Perception with Adaptive Resonance Theory Artificial Neural Networks,"Most modern pitch-perception theories incorporate a pattern-recognition scheme to extract pitch. Typically, this involves matching the signal to be classified against a harmonic-series template for each pitch to find the one with the best fit. Although often successful, such approaches tend to lack generality and may well fail when faced with signals with much depleted or inharmonic components. Here, an alternative method is described, which uses an adaptive resonance theory (ART) artificial neural network (ANN). By training this with a large number of spectrally diverse input signals, we can construct more robust pitch-templates which can be continually updated without having to re-code knowledge already acquired by the ANN. The input signal is Fourier-transformed to produce an amplitude spectrum. A mapping scheme then transforms this to a distribution of amplitude within ‘semitone bins’. This pattern is then presented to an ARTMAP ANN consisting of an ART2 and ART1 unsupervised ANN linked by a map field. The system was trained with pitches ranging over three octaves (C3 to C6) on a variety of instruments and developed a desirable insensitivity to phase, timbre and loudness when classifying. © 1994, Taylor & Francis Group, LLC. All rights reserved.",2019,https://scholar.google.com.br/,no
218,Design procedure for stress intensification factors of 90-deg curved pipe having various tangent lengths,"A simple design procedure, based on 114 finite element analyses, was derived to predict the stress intensification factor for 90-deg curved pipe with end constraints composed of tangents of any length terminated by rigid flanges and no internal pressure loads. The results of this design procedure were then compared to stress intensification factors obtained from additional finite element analyses and experimental work. Stress intensification factors calculated using the design equations in the Power Piping Code (ANSI/ASME B31.1-1986) were also compared to all the finite element and experimental work. It was found that this design procedure more accurately predicts the stress intensification factors than the Power Piping Code. (Authors)",2019,https://scholar.google.com.br/,no
219,Design procedure for flexibility factors of 90-deg curved pipe having various tangent lengths,"A simple design procedure, based on 175 finite element analyses, was derived to predict the flexibility factor due to an in-plane or out-of-plane moment for a 90-deg curved pipe with end constraints composed of tangents of any length terminated by rigid flanges and no internal pressure loads. The results of this design procedure were then compared to flexibility factors obtained from additional finite element analyses and experimental work. Flexibility factors calculated using the design equations in the Power Piping Code (ANSI/ASME B31.1-1986) were also compared to all finite element and experimental work. It was found that this design procedure more accurately predicts the flexibility factors than the Power Piping Code. (Authors)",2019,https://scholar.google.com.br/,no
220,Study of design wind speed for low-rise buildings in Orissa coast,"The number of wind studies for extraordinary winds like tropical cyclones and tornadoes are very few, compared to the total number of studies on well behaved winds. This paper deals with the extreme design wind speed for low-rise buildings. The methods to calculate the extreme wind velocities have been described based on maximum average monthly speed, climatological consideration and Type I extreme value distribution. Using the above cited methods, extreme wind speeds are calculated for Orissa coast. Risk analysis, gust factor and confidence interval are also explained at length. Finally, extreme wind speeds calculated applying other procedures are compared with the values calculated using the Indian code. It is found that 3 seconds gust wind speeds for 50yr and 100yr return periods calculated using other methods closely match with those recommended by the Indian code. (Authors)",2019,https://scholar.google.com.br/,no
221,Co-word-based science maps of chemical engineering. Part II: Representations by combined clustering and multidimensional scaling,"In this paper we present the results of the second part of our study on science mapping. We discuss an improvement of co-word analysis based on a combination of a clustering technique applied to the word co-occurrence data matrix and multidimensional scaling of the resulting word-clusters. As in the first of our study, we construct journal-based, author-based, and conference-based co-word maps of chemical engineering. We apply word-similarity analysis to compare these different maps, using the views of the experts (as discussed in part I) as a frame of reference. Next, we apply word-similarity analysis to compare maps from subsequent periods of time, in order to identify developments over time. An important improvement in the practical applicability of our maps is attained by labelling the co-word clusters with data on journals, classification codes, authors and countries. Finally, we compare our author-based co-word maps with a ""hybrid"" author-keyword map and with a co-author map. Important developments in chemical engineering are indeed visualized by our mapping techniques. The usefulness of the various types of maps is strongly related with the questions one wants to answer. © 1993.",2019,https://scholar.google.com.br/,no
222,Earthquake hazard and urban development in Egypt,"Records of earthquakes affecting Egypt go back to 2800 BC; although not a country of great earthquake hazard, exposure to earthquakes does warrant precautionary planning. In particular, earthquakes are most likely in the delta region, as well as generally within northern Egypt, along the Red Sea margins and in the Aswan region. A new earthquake hazard map defines the degree of hazard based on a 20 × 20 km grid. This assessment takes account of previous earthquake history, local geology and other relevant ground conditions. Secondary damaging processes may include tsunamis, liquefaction and landslides. Vulnerability to damage can be reduced by appropriate planning measures and building codes. -Authors",2019,https://scholar.google.com.br/,no
223,Cell-centered multidimensional upwind algorithms and structured meshes,"A class of cell-centered multidimensional upwind schemes for structured meshes, using the classical central/dissipation flux formulation is developed. The numerical flux is based on two characteristic directions introduced in the 4-wave decomposition model of the Euler equations. A general theoretical analysis of linear convection schemes is the framework for the development of first and second order multidimensional upwind schemes. A monotone zero cross-diffusion algorithm is developed introducing classical limiters with multidimensional ratio's assuring the monotonicity property. Several combinations of algorithms with different characteristic directions are tested. Results near discontinuities are showing a sharper resolution than grid aligned methods. A significant improvement is obtained concerning robustness and flexibility for implementation of multidimensional methods in standard codes. (Authors)",2019,https://scholar.google.com.br/,no
224,Chance-constrained optimization model for determining river discharges to control sedimentation,"A nonlinear optimization model is formulated for determining optimal reservoir releases to minimize channel bed aggradation and degradation in downstream rivers. The model is based upon minimizing channel bed elevation changes subject to constraints that define system hydraulics (i.e. continuity and energy), sediment routing and transport equations, operational constraints, and boundary conditions. Sediment transport parameters cannot be evaluated with certainty, so the formulation of the optimization model has been extended to accommodate such uncertainties. This is accomplished by a chance-constrained formulation that considers the uncertainties in the sediment load, mean grain size and both the sediment load and mean grain size. The model is applied to a reservoir-river system consisting of an upstream reservoir which is used to regulate discharges to a downstream river. Input to the system is a reservoir inflow hydrograph. The objective is to determine the optimal reservoir releases to minimize aggradation and degradation in the downstream river. The nonlinear chance-constrained model can be solved using the GAMS-MINOS5 or GRG2 codes. (Authors)",2019,https://scholar.google.com.br/,no
225,Accelerated physical modelling of hazardous-waste transport,"Presents the results of a research programme conducted on a balanced-arm centrifuge, to study the long term transport of contaminants in the soil surrounding an engineered landfill site. The phenomena which govern the transport of hazardous waste through porous media are discussed, the principles of geotechnical centrifuge modelling are outlined, and relevant scaling laws that govern the relationship between the centrifuge model and its corresponding prototype, with respect to the problem of hazardous-waste transport, are presented. A centrifuge test, simulating two-dimensional migration of a conservative pollutant species from a landfill site, is described, and results from three such tests are presented. These results are compared with theoretical predictions from an existing one-dimensional transport code. -Authors",2019,https://scholar.google.com.br/,no
226,Fluid flow through patterned shear zones,"Numerical models demonstrate that fluid flow is affected by the formation of shear zones as predicted by a simple model based on the principle of effective stress but only under specific conditions of fluid flow and rate of material deformation. Under crustal conditions, patterned shear zones form during a simple shearing deformation history. Fluid flow is focussed into and along these shear zones for a hydrostatic pore pressure gradient, but is upwards and unperturbed by the shear zones for a lithostatic pore pressure gradient. Under certain conditions of fluid flow rate and deformation rate, the presence of a fluid appears to have a stabilising effect, and the material continues to deform homogeneously. Predictions based on the simplified principles of effective stress do not sufficiently describe the possible complex inter-relationships. It is therefore crucial to our understanding of fluid flow and deformation that we examine the full coupling by integrating field observations, laboratory experiments, theory and numerical codes. -Author",2019,https://scholar.google.com.br/,no
227,Heap-leaching pad volumetrics by computer methods,"Until recently, the volumes delivered and unloaded from heap-leaching pads have been estimated by manual methods at Wharf Resources' South Dakota operation. In August 1989, the Engineering Department acquired the MINE-SURVEY software developed by GEMCOM Services, Inc. of Vancover, Canada, as part of a mine planning/grade control software package. The implementation of MINE-SURVEY for pad control resulted in a cost-effective tool to provide accurate and prompt estimates of ore delivered or unloaded from the pads. Volumes can be calculated in a matter of minutes as opposed to hours or days. Another benefit is the ease of comparison of as-build and designed volumes, plotting cross-section in any orientation, importing into AUTOCAD, validation of ore densities and truck factors. This paper describes the application of the MINE-SURVEY systems in heap leaching pad volumetrics.",2019,https://scholar.google.com.br/,no
228,ORSEP (operations research software exchange program),"Since we have now reached the magical number of 13 code descriptions in ORSEP, it seems to be time to review this OR Software section. ORSEP has been introduced in 1989 as an opportunity for software developers and users to exchange operations research software. With this exchange the code authors receive valuable feedback and the users are able to get software suitable for their specific needs. It has been welcomed by the international OR community as can be seen by the numerous requests for copies of software and submissions of code descriptions. The idea of handling the distribution of their public domain codes has been accepted by some of the leading experts in our area. The rules of participating in ORSEP are basically unchanged since the beginning of the program. Authors submit their code and code description to the University of Kaiserslautern. We evaluate the code based on its potential interest for the readers of EJOR and test it. If it is accepted we publish the code description and satisfy requests for copies. The readers of ORSEP can get copies of software from me or directly from the authors by sending a formatted diskette and a self-addressed envelop. As a first reaction to some comments of software authors, I also publish code descriptions for which a small distribution fee is charged. This becomes particularly important for some of our colleagues who are in departments where a nominal fee for software developed in this department is mandatory. In this case requests for copies of codes must be sent to the authors and not to the University of Kaiserslautern. Code descriptions who are distributed on this basis are marked correspondingly in the technical information of the code. I also dropped the restriction of a one page limit for the code descriptions in cases where this seemed to be justified. For the future I would like to see that the users' side of ORSEP is getting more active. I particularly invite requests for software in specific topics which may be described in ORSEP. Table 1 contains a list of authors whose code descriptions have been published so far. Authors who plan to submit their code and code descriptions should provide the technical information shown in Table 2. © 1990.",2019,https://scholar.google.com.br/,no
229,Structural damage due to the 1985 Mexican earthquake.,Characteristics of the 1985 Mexican earthquake and the influence of the subsoil conditions on the strong ground motion in Mexico City are described. Some aspects of structural design practice and examples of structural damage are discussed along with the emergency changes to the building code.-Author,2019,https://scholar.google.com.br/,no
230,Dialogue management with computer-based statistical analysis,"It is argued that practical problems in the use of statistical software combines with the statistical knowledge of the user to influence the strategy employed within an analysis. Consequently, it is suggested that the integration of AI techniques into statistical software should address these practical issues, as well as provide a source of statistical expertise to the user. The resulting human interface would be an independent section of the statistical software package, containing various specialist intelligent systems co-operating to manage the interaction between the user and the application code. -Author",2019,https://scholar.google.com.br/,no
231,A regional financial reporting component,"An essential analysis and synthesis component of a Generic Urban Model is described. It is a reporting space that is helpful in the analysis of activity and results in the process and control spaces of WATGUM. This space includes analysis modules of Municipal Financial Tension, Financial Transfer and Income, Economic Base, and other summary report procedures and facilities. The design of a Municipal Fiscal Tension module is discussed since it provides important context for long term policy development. Comments by W.R.Code. -Author",2019,https://scholar.google.com.br/,no
232,Access to Identity-Specific Semantic Codes from Familiar Faces,"Information codes that can specify the surface form of a face are contrasted with semantic codes describing the properties of the person to whom the face belongs. Identity-specific semantic codes that specify characteristics of familiar people based on personal knowledge are in turn contrasted with the visually derived semantic codes and expression codes that can be derived even from unfamiliar faces. The idea that familiarity decisions (i.e., categorizing faces as belonging to known or unknown people) can be based on surface form, whereas certain types of semantic decision demand additional access to identity-specific semantic codes was investigated in four experiments. Experiments 1 and 3 showed that decisions based on identity-specific semantic codes (semantic decisions) usually take longer than decisions that do not demand access to an identity-specific semantic code (familiarity decisions). Experiment 2 showed that the use of familiar faces drawn from consistent or mixed categories affected reaction times for semantic decisions but not for familiarity decisions. Experiment 4 showed that semantic decisions to faces are taken more quickly (primed) when the faces have been recently seen, whereas there is no differential effect on semantic decisions to faces from previous semantic decisions involving the same people’s names. These findings are consistent with the view that identity-specific semantic codes are accessed via face recognition units, and that outputs from face recognition units (which respond to the face’s surface form) can be used as the basis for familiarity decisions. © 1986, IEEE. All rights reserved.",2019,https://scholar.google.com.br/,no
233,COPING WITH CRISIS IN CLEVELAND.,"Sixty new refuse collection trucks are keeping the city of Cleveland cleaner than ever while saving 1. 3 million in operating costs. By replacing the old vehicles with larger, high compaction equipment, the city has been able to reduce residential collection routes from ninety-six to eighty. This reduction saves the city the cost of sixteen trucks, four foremen, sixteen drivers, and thirty-two loaders. The decision was based on a detailed computer analysis of the cost of owning, operating, and maintaining each truck in the existing fleet. Using data collected over a period of one year, the division pinpointed the exact costs for operating each truck. Factors considered included: purchase price, depreciation, cost of consumables (such as fuel, oil, tires, and batteries), and total annual maintenance.",2019,https://scholar.google.com.br/,no
234,Numerical analysis of the forty five degree finite-difference equation for migration.,"Migration is now most commonly performed by means of a finite-difference solution of the wave equation in the space-time domain although alternative approaches such as f-k, Kirchhoff, finite-difference in the space-frequency domain have strong adherents. Claerbout's derivation of the 15-degree paraxial ray equation and its iteration to the 45-degree equation are well documented. On the other hand, the transcription of the differential equation to a finite-difference scheme has accreted with practical computing experience and is only mentioned piecemeal (when at all) in the literature. The full expression is reviewed here, as used in a typical production code. -Author",2019,https://scholar.google.com.br/,no
235,Comprehensive measurement of ride of in-service trucks,"This paper summarizes a comprehensive research program of the ride qualities of long-haul trucks. Factors are identified which contribute significantly to differences in ride quality between various truck models and configurations over a range of actual operating conditions. Detailed measurements of six floor and seat accelerations and driver and passenger ride ratings were made on ten in-service trucks over five segments, ranging from ""smooth"" to ""rough,"" of a typical California freeway. The experimental methodology is reviewed and validated, and example data and preliminary comparisons between the objective and subjective measures are presented. Copyright © 1981 Society of Automotive Engineers, Inc.",2019,https://scholar.google.com.br/,no
236,Orthography and familiarity effects in word processing,"Both orthographic regularity and visual familiarity have been implicated as contributors to the efficiency of processing visually presented words. Sets of letter strings in which orthography and familiarity were factorially combined were used as the basis for physical, phonetic, semantic, and lexical judgments in 4 experiments with a total of 64 paid Ss. The data indicated consistent effects of orthography on the activation of all codes. Familiarity had a clear influence on the activation of semantic codes and to a lesser extent affected phonetic codes. Results show that speeded decisions based on visual codes are most strongly influenced by rule-governed processing mechanisms sensitive to orthographic structure, whereas decisions based on phonetic and semantic codes are affected about equally by rule-governed mechanisms and by stimulus-specific mechanisms sensitive to familiarity. (59 ref) (PsycINFO Database Record (c) 2006 APA, all rights reserved). © 1979 American Psychological Association.",2019,https://scholar.google.com.br/,no
237,A Novel Approach for Estimating Truck Factors,"Truck Factor (TF) is a metric proposed by the agile community as a toolto identify concentration of knowledge in software developmentenvironments. It states the minimal number of developers that have to behit by a truck (or quit) before a project is incapacitated. In otherwords, TF helps to measure how prepared is a project to deal withdeveloper turnover. Despite its clear relevance, few studies explorethis metric. Altogether there is no consensus about how to calculate it,and no supporting evidence backing estimates for systems in the wild. Tomitigate both issues, we propose a novel (and automated) approach forestimating TF-values, which we execute against a corpus of 133 popularproject in GitHub. We later survey developers as a means to assess thereliability of our results. Among others, we find that the majority ofour target systems (65\%) have TF <= 2. Surveying developers from 67target systems provides confidence towards our estimates; in 84\% of thevalid answers we collect, developers agree or partially agree that theTF's authors are the main authors of their systems; in 53\% we receive apositive or partially positive answer regarding our estimated truckfactors.",2019,https://scholar.google.com.br/,yes
238,Code Ownership-More Complex to Understand Than Research Implies,,2019,https://scholar.google.com.br/,no
239,In-Situ Visualisation of Fractional Code Ownership over Time,"The term code ownership is used in software engineering to describe whoauthored a certain piece of software. Code ownership is commonlydetermined by investigating the data from version control systems,defining the owner as the person who contributed the most lines to afile, module, etc. Existing visualisation for ownership usually relieson per-line annotations from the version control system, thus onlyconveying the information who changed a line the last time, potentiallyadding some visual cue about how old the respective change is. This,however, can be misleading, because any change of even a singlecharacter changes ownership. In this paper, we propose a visualisationthat accounts for fractional ownership changes over time on aper-character basis. Our technique incorporates visual cues to conveythat typical definitions of ownership have an inherent uncertainty andprovides details on the cause of this uncertainty on demand. For ourdefinition of code ownership being a low-level one, we proposeimplementing the visualisation as an in-situ visualisation in the codeeditor of modern development environments. We will show examples of theefficacy of our approach and discuss its advantages and disadvantagescompared to conventional line-based ownership.",2019,https://scholar.google.com.br/,yes
240,Ask the Crowd: Scaffolding Coordination and Knowledge Sharing inMicrotask Programming,"Programming work is inherently interdependent, requiring developers toshare and coordinate decisions that crosscut the structure of code. Thisis particularly challenging for programming in a microtasking context,in which developers are assumed to be transient and thus cannot rely ontraditional learning and coordination mechanisms such as an extendedonboarding process and code ownership. In this paper, we explorescaffolding coordination and knowledge sharing through a question andanswer system, structuring project knowledge and coordination intoquestions and answers. To investigate its potential for enablingcoordination in a microtask setting, we implemented a Q\&A system formicrotask programming work and conducted a user study where a crowd usedit to coordinate their work on a software project over a 30-hour period.The results reveal both the potential for the use of Q\&A systems forwithin-project coordination and challenges that this approach brings.",2019,https://scholar.google.com.br/,no
241,Code Ownership and Software Quality: A Replication Study,"In a traditional sense, ownership determines rights and duties in regardto an object, for example a property. The owner of source code usuallyrefers to the person that invented the code. However, larger codeartifacts, such as files, are usually composed by multiple engineerscontributing to the entity over time through a series of changes.Frequently, the person with the highest contribution, e.g. the mostnumber of code changes, is defined as the code owner and takesresponsibility for it. Thus, code ownership relates to the knowledgeengineers have about code. Lacking responsibility and knowledge aboutcode can reduce code quality. In an earlier study, Bird et al. {[}1]showed that Windows binaries that lacked clear code ownership were morelikely to be defect prone. However recommendations for large artifactssuch as binaries are usually not actionable. E.g. changing the conceptof binaries and refactoring them to ensure strong ownership wouldviolate system architecture principles. A recent replication study byFoucault et al. {[}2] on open source software replicate the originalresults and lead to doubts about the general concept of ownershipimpacting code quality. In this paper, we replicated and extended theprevious two ownership studies {[}1, 2] and reflect on their findings.Further, we define several new ownership metrics to investigate thedependency between ownership and code quality on file and directorylevel for 4 major Microsoft products. The results confirm the originalfindings by Bird et al. {[}1] that code ownership correlates with codequality. Using new and refined code ownership metrics we were able toclassify source files that contained at least one bug with a medianprecision of 0.74 and a median recall of 0.38. On directory level, weachieve a precision of 0.76 and a recall of 0.60.",2019,https://scholar.google.com.br/,yes
242,Using Developer-Interaction Trails to Triage Change Requests,"The paper presents an approach, namely iHDev, to recommend developerswho are most likely to implement incoming change requests. The basicpremise of iHDev is that the developers who interacted with the sourcecode relevant to a given change request are most likely to best assistwith its resolution. A machine-learning technique is first used tolocate source code entities relevant to the textual description of agiven change request. iHDev then mines interaction trails (i.e., Mylynsessions) associated with these source code entities to recommend aranked list of developers. iHDev integrates the interaction trails in aunique way to perform its task, which was not investigated previously.An empirical study on open source systems Mylyn and Eclipse Project wasconducted to assess the effectiveness of iHDev. A number of changerequests were used in the evaluated benchmark. Recall for top one tofive recommended developers and Mean Reciprocal Rank (MRR) values arereported. Furthermore, a comparative study with two previous approachesthat use commit histories and/or the source code authorship informationfor developer recommendation was performed. Results show that iHDevcould provide a recall gain of up to 127.27\% with equivalent orimproved MRR values by up to 112.5\%.",2019,https://scholar.google.com.br/,yes
243,Assessing Developer Contribution with Repository Mining-Based Metrics,"Productivity as a result of individual developers' contributions is animportant aspect for software companies to maintain theircompetitiveness in the market. However, there is no consensus in theliterature on how to measure productivity or developer contribution.While some repository mining-based metrics have been proposed, they lackvalidation in terms of their applicability and usefulness from theindividuals who will use them to assess developer contribution: team andproject leaders. In this paper, we propose the design of a suite ofmetrics for the assessment of developer contribution, based on empiricalevidence obtained from project and team leaders. In a preliminaryevaluation with four software development teams, we found that codecontribution and code complexity metrics received the most positivefeedback, while participants pointed out several threats of usingbug-related metrics for contribution assessment. None of the metrics canbe used in isolation, and project leaders and developers need to beaware of the benefits, limitations, and threats of each one. Thesefindings present a first step towards the design of a larger suite ofmetrics as well as an investigation into the impact of using metrics toassess contribution.",2019,https://scholar.google.com.br/,no
244,Profile-driven Source Code Exploration,"The following study deals with static analysis of Java source codes andit is dedicated to those readers who are interested in techniques aimingat evaluation of programming abilities of job candidates or students. Inour case, the goal of the static analysis is to assemble the mostsignificant and interesting data about source code author (programmer).If properly visualized, such assembled data may form programmer'sprofile which, to impartial observer, may further determine author'sreal programming abilities and his/her habits, both good and the badones. The present study represents first experiments attempting to formprogrammer's profile by static analysis of language element frequency.Conclusion offers a broader view, combining also other techniques as afuture plan to generate knowledge profiles more precisely.",2019,https://scholar.google.com.br/,no
245,Cross-Project Defect Prediction with Respect to Code Ownership Model: anEmpirical Study,"The paper presents an analysis of 83 versions of industrial, open-sourceand academic projects. We have empirically evaluated whether thoseproject types constitute separate classes of projects with regard todefect prediction. Statistical tests proved that there exist significantdifferences between the models trained on the aforementioned projectclasses. This work makes the next step towards cross-project reusabilityof defect prediction models and facilitates their adoption, which hasbeen very limited so far.",2019,https://scholar.google.com.br/,no
246,Code Ownership: Impact on Maintainability,"Software systems erode during development, which results in highmaintenance costs in the long term. Is it possible to narrow down whereexactly this erosion happens? Can we infer the future erosion based onpast code changes?In this paper we investigate code ownership and show that a further stepof code quality decrease is more likely to happen due to the changes insource files modified by several developers in the past, compared tofiles with clear ownership. We estimate the level of code ownership andmaintainability changes for every commit of three open-source and oneproprietary software systems. With the help of Wilcoxon rank test wecompare the ownership values of the files in commits resultingmaintainability increase with those of decreasing the maintainability.Three tests out of the four gave strong results and the fourth one didnot contradict them either. The conclusion of this study is ageneralization of the already known fact that common code is moreerror-prone than those of developed by fewer developers.This result could be utilized in identifying the ``hot spots{''} of thesource code from maintainability point of view. A possible IDE plug-in,which indicates the risk of decreasing the maintainability of the sourcecode, could help the architect and warn the developers.",2019,https://scholar.google.com.br/,no
247,Research of ID Card Recognition Algorithm Based on Neural NetworkPattern Recognition,"How to quickly and correctly identify the second generation ID card codehas important practical significance in real life. The algorithms havebeen presented about the recognition and verification code of ID cards.In order to let computer own the knowledge of code of character image,firstly, transform the image of ID cards to binary image, then segmentimage character of ID card code and display image character using imageprocessing technique, secondly manual input corresponding correct codeof character image, thirdly character image is classification stored inthe corresponding folder according to the corresponding correct code.These character images are training samples, which are trained using thematlab toolbox of the neural network pattern to generate training model.Using the generated the training model to identify code of the ID cards.The validation algorithm is based on the generated the training model toidentify code of ID cards. Compare the consistent of code of ID cards toidentify the code, if recognition accuracy rate is not high, thetraining model need to be trained again, until the recognition accuracyrate is more than 95\%. Neural network pattern recognition andverification algorithm can take advantage of the training model toperfectly realize identification and validation the code of thesecond-generation ID card, the algorithms have application value in thereal work.",2019,https://scholar.google.com.br/,no
248,Code-switching at the auxiliary-VP boundary A comparison of heritagespeakers and L2 learners,"While early code-switching research (i.e., Poplack, 1980) focused on thepossibility of universal constraints on switching, MacSwan's (2010,2014) ``Constraint-Free{''} research program centers on the notion thatcode-switching is only constrained by the interaction of a bilingual'stwo grammars. In following with this proposal, the current studyexamines whether two types of Spanish-English bilinguals are equallysensitive to the (un)grammaticality of Spanish-English code-switching atthe subject-predicate and auxiliary-verb phrase boundaries. Twenty-fiveheritage Spanish speakers and forty-four L2 Spanish learners completedan Audio Naturalness Judgment Task in which they judged grammatical andungrammatical Spanish-English code-switching at these two syntacticjunctions. Results indicate that the L2 Spanish speakers and theheritage bilinguals, regardless of their self-reported exposure tocode-switching, correctly differentiated between grammatical andungrammatical switches, suggesting that they have implicit knowledge ofcode-switching grammaticality which falls out from syntactic knowledgeof the two languages.",2019,https://scholar.google.com.br/,no
249,OBA2: An Onion approach to Binary code Authorship Attribution,"A critical aspect of malware forensics is authorship analysis. Thesuccessful outcome of such analysis is usually determined by the reverseengineer's skills and by the volume and complexity of the code underanalysis. To assist reverse engineers in such a tedious and error-pronetask, it is desirable to develop reliable and automated tools forsupporting the practice of malware authorship attribution. In a recentwork, machine learning was used to rank and select syntax-based featuressuch as n-grams and flow graphs. The experimental results showed thatthe top ranked features were unique for each author, which was regardedas an evidence that those features capture the author's programmingstyles. In this paper, however, we show that the uniqueness of featuresdoes not necessarily correspond to authorship. Specifically, ouranalysis demonstrates that many ``unique{''} features selected usingthis method are clearly unrelated to the authors' programming styles,for example, unique IDs or random but unique function names generated bythe compiler; furthermore, the overall accuracy is generallyunsatisfactory. Motivated by this discovery, we propose a layered OnionApproach for Binary Authorship Attribution called OBA2. The novelty ofour approach lies in the three complementary layers: preprocessing,syntax-based attribution, and semantic-based attribution. Experimentsshow that our method produces results that not only are more accuratebut have a meaningful connection to the authors' styles. (C) 2014 TheAuthor. Published by Elsevier Ltd on behalf of DFRWS.",2019,https://scholar.google.com.br/,yes
250,Degree-of-Knowledge: Modeling a Developer's Knowledge of Code,"As a software system evolves, the system's codebase constantly changes,making it difficult for developers to answer such questions as who isknowledgeable about particular parts of the code or who needs to knowabout changes made. In this article, we show that an externalized modelof a developer's individual knowledge of code can make it easier fordevelopers to answer such questions. We introduce a degree-of-knowledgemodel that computes automatically, for each source-code element in acodebase, a real value that represents a developer's knowledge of thatelement based on a developer's authorship and interaction data. Wepresent evidence that shows that both authorship and interaction data ofthe code are important in characterizing a developer's knowledge ofcode. We report on the usage of our model in case studies on expertfinding, knowledge transfer, and identifying changes of interest. Weshow that our model improves upon an existing expertise-finding approachand can accurately identify changes for which a developer should likelybe aware. We discuss how our model may provide a starting point forknowledge transfer but that more refinement is needed. Finally, wediscuss the robustness of the model across multiple development sites.",2019,https://scholar.google.com.br/,yes
251,TAX CODE KNOWLEDGE AND BEHAVIORAL RESPONSES AMONG EITC RECIPIENTS:POLICY INSIGHTS FROM QUALITATIVE DATA,"We build on the robust quantitative literature on behavioral responsesto the Earned Income Tax Credit (EITC) by using in-depth qualitativeinterviews with 115 EITC recipients to examine how they understand andrespond to its incentive structures regarding earnings, marriage, andchildbearing. We find that respondents consider their tax refund as awhole, without differentiating the portion from the EITC; as a result,they cannot predict how their EITC refund would change if they alteredtheir labor supply or marital status. Incentives for childbearing arebetter understood, but are not specific to the EITC; rather, parentsrespond to a combination of tax deductions and credits as a whole.Respondents would like to maximize their refunds, but most cannot orwould not alter their behavior due to structural constraints they facein the labor and marriage markets. Rather than adjust work hours, defermarriage, or have additional children, respondents exhibit a differenttype of behavioral response to the incentive structure of the EITC: Theyalter their tax filing status in order to maximize their refunds. Theyroutinely claim zero exemptions and deductions on their W-4s, file theirtax returns as head of household rather than as married, and dividechildren among the tax returns of multiple caregivers. Although some ofthese behaviors qualify as tax noncompliance, they emerge because theintricacies of the tax code conflict with the complexity and fluidity offinances and family life in low-income households.",2019,https://scholar.google.com.br/,no
252,Algorithmic Complexity of the Truck Factor Calculation,"Software development projects differ in their sensitivity to losingdevelopers. Some projects must stop already if they lose a fewdevelopers, while other projects can continue if the same number ofdevelopers leave the project. The Truck Factor (TF) quantifies thesedifferences: It is the number of developers that would stop the projectif they left the project. Multiple specific variants of the TF have beensuggested in literature. This paper proves that some of theseimplementations are actually NP-hard to compute, including the promisingworst-case metric TFmin,c. NP-hardness prevents their use for largesoftware development projects. For the TF variants not proved to beNP-hard, this paper provides efficient algorithms. However, this paperargues that these TF variants have less explanatory power.",2019,https://scholar.google.com.br/,no
253,A Bayesian Ensemble Classifier for Source Code Authorship Attribution,"Authorship attribution of source code is the task of deciding who wrotesoftware, given its source code, when the author of the software is notexplicitly known. There are numerous scenarios in which it is necessaryto identify the author of a piece of software whose author is unknown,including software forensics investigations, plagiarism detection, andquestions of software ownership. A number of methods for authorshipattribution of source code have been presented in the past, includingtwo state-of-the-art methods: SCAP and Burrows. Each of these twostate-of-the-art methods was individually improved, and - as presentedin this paper - an ensemble method was developed from them based on theBayes optimal classifier. An empirical study was performed using a dataset consisting of 7,231 open-source and textbook programs written in C++and Java by thirty unique authors. The ensemble method successfullyattributed 98.2\% of all documents in the data set, compared to 88.9\%by the Burrows baseline method and 91.0\% by the SCAP baseline method.",2019,https://scholar.google.com.br/,yes
254,Improving Model-Based Collaboration by Social Media Integration,"Software engineering is inherently a collection of collaborative tasks,such as customer interviews to collect requirements, discussions aboutsoftware architecture and design, collective code ownership and theinteraction between developers, customers and testers to ensure softwarequality. Open source development communities are a particularly goodexample of a worldwide collaboration in software engineering.This position paper describes our opinion about the use of collaborationtechniques in software engineering education. We discuss the benefits ofmodel-based collaboration techniques as well as social media platforms.In a practical example, we show that the integration of both techniquescan significantly improve the collaboration in software engineeringcourses.",2019,https://scholar.google.com.br/,no
255,The attraction of contributors in free and open source software projects,"As firms increasingly sanction an open sourcing strategy, the questionof which open source project to undertake remains tentative. The lack ofestablished metrics makes it difficult to formulate such strategy. Whilemany projects have been formed and created, only a few managed to remainactive. With the majority of these projects failing, firms need areliable set of criteria to assess what makes a project appealing notonly to developers but also to visitors, users and commercial sponsors.In this paper, we develop a theoretical model to explore the contextualand causal factors of project attractiveness in inducing activities suchas source code contribution, software maintenance, and usage. We testour model with data derived from more than 4000 projects spanning 4years. Our main findings include that projects' set of conditions suchas license restrictiveness and their available resources provide thecontext that directly influence the amount of work activities observedin the projects. It was also found that indirect and unintendedcontributions such as recommending software, despite of beingnon-technical, cannot be ignored for project activeness, diffusion andsustainability. Finally, our analysis provide evidence that higherattractiveness leads to more code-related activities with the downsideof slowing down responsiveness to address projects' tasks, such as theimplementation of new features and bug fixes. Our model underscores thesignificance of the reinforcing effects of attractiveness and workactivities in open source projects, giving us the opportunity to discussstrategies to manage common traps such as the liability of newness. Weconclude by discussing the applicability of the research model to otheruser-led initiatives. (C) 2012 Elsevier B.V. All rights reserved.",2019,https://scholar.google.com.br/,no
256,How Multiple Developers Affect the Evolution of Code Clones,"The use of copy and paste in programming causes redundant passages ofsource code. The effect such clones have on software quality andmaintainability in particular has been subject to various studies in therecent past. Although negative effects could not be confirmed ingeneral, a non-negligible number of situations where clones did causeproblems has been found. Hence, there may be yet unknown influencingfactors that cause these problems. One such factor may be the number ofdevelopers involved in the creation and maintenance of a clone. Theinteraction of multiple developers, unevenly distributed knowledge andcommunication deficiencies may lead to unwanted inconsistencies andbugs, when the clones are changed. This paper presents an empiricalstudy on long-lived software systems, in which we analyze how manydevelopers are involved in the maintenance exact clones and whether thenumber of developers affects the likelihood of inconsistent changes. Ourresults indicate that differences between single-author and multi-authorclones exist. Nevertheless, we did not find multiple developers to bethe cause of problematic changes to clones.",2019,https://scholar.google.com.br/,no
257,Mining Software Repositories for Accurate Authorship,"Code authorship information is important for analyzing software quality,performing software forensics, and improving software maintenance.However, current tools assume that the last developer to change a lineof code is its author regardless of all earlier changes. Thisapproximation loses important information. We present two new line-levelauthorship models to overcome this limitation. We first define therepository graph as a graph abstraction for a code repository, in whichnodes are the commits and edges represent the development dependencies.Then for each line of code, structural authorship is defined as asubgraph of the repository graph recording all commits that changed theline and the development dependencies between the commits; weightedauthorship is defined as a vector of author contribution weights derivedfrom the structural authorship of the line and based on a code changemeasure between commits, for example, best edit distance. We haveimplemented our two authorship models as a new git built-in toolgit-author. We evaluated git-author in an empirical study and acomparison study. In the empirical study, we ran git-author on five opensource projects and found that git-author can recover more informationthan a current tool (git-blame) for about 10\% of lines. In thecomparison study, we used git-author to build a line-level model for bugprediction. We compared our line-level model with a representativefile-level model. The results show that our line-level model performsconsistently better than the file-level model when evaluated on our datasets produced from the Apache HTTP server project.",2019,https://scholar.google.com.br/,yes
258,Using Code Ownership to Improve IR-Based Traceability Link Recovery,"Information Retrieval (IR) techniques have gained wide-spread acceptanceas a method for automating traceability recovery. These techniquesrecover links between software artifacts based on their textualsimilarity, i.e., the higher the similarity, the higher the likelihoodthat there is a link between the two artifacts. A common problem withall IR-based techniques is filtering out noise from the list ofcandidate links, in order to improve the recovery accuracy. Indeed,software artifacts may be related in many ways and the textualinformation captures only one aspect of their relationships. In thispaper we propose to leverage code ownership information to capturerelationships between source code artifacts for improving the recoveryof traceability links between documentation and source code.Specifically, we extract the author of each source code component andfor each author we identify the ``context{''} she worked on. Thus, for agiven query from the external documentation we compute the similaritybetween it and the context of the authors. When retrieving classes thatrelate to a specific query using a standard IR-based approach we rewardall the classes developed by the authors having their context mostsimilar to the query, by boosting their similarity to the query. Theproposed approach, named TYRION (TraceabilitY link Recovery usingInformation retrieval and code OwNership), has been instantiated for therecovery of traceability links between use cases and Java classes of twosoftware systems. The results indicate that code ownership informationcan be used to improve the accuracy of an IR-based traceability linkrecovery technique.",2019,https://scholar.google.com.br/,yes
259,PRACTICAL ASPECTS OF PLAGIARISM DETECTION IN COMPUTER SCIENCE E-LEARNING,"We present some practical experiences in the application of e-learningmethods and techniques in the computer science curriculum at SofiaUniversity, where the e-learning system Moodle is being actively used toaid lectures and exercises in several programming courses, based on thelanguages C/C++ and Scheme. One of the grade components in those coursesare homework assignments, which are electronically submitted by studentsusing standard file upload functionality. The source code is evaluatedby a teacher, rather than automatically, since in addition to programcorrectness other aspects of the submission are reviewed such asalgorithmic efficiency, style, readability, modularity. Grades areindividual and one of the conditions is that the submission needs to beoriginal work. Unfortunately, very often collaboration between studentsultimately leads to similar submissions due to plagiarism and subsequentskewing of grades.The present paper is focused on detection of plagiarism ofelectronically submitted homework assignments. We review several populartools and techniques for source code analysis and evaluation ofauthorship and similarity. We compare their applicability in the lightof several case studies based on actual student submissions and discusstheir effectiveness in practical situations.",2019,https://scholar.google.com.br/,no
260,A Model of the Commit Size Distribution of Open Source,A fundamental unit of work in programming is the code contribution({''}commit{''}) that a developer makes to the code base of the projectin work. We use statistical methods to derive a model of theprobabilistic distribution of commit sizes in open source projects andwe show that the model is applicable to different project sizes. We useboth graphical as well as statistical methods to validate the goodnessof fit of our model. By measuring and modeling a fundamental dimensionof programming we help improve software development tools and ourunderstanding of software development.,2019,https://scholar.google.com.br/,no
261,Author Identification in Imbalanced Sets of Source Code Samples,"Similarly to natural language texts, source code documents can bedistinguished by their style. Source code author identification can beviewed as a text classification task given that samples of knownauthorship by a set of candidate authors are available. Although verypromising results have been reported for this task, the evaluation ofexisting approaches avoids focusing on the class imbalance problem andits effect on the performance. In this paper, we present a systematicexperimental study of author identification in skewed training setswhere the training samples are unequally distributed over the candidateauthors. Two representative author identification methods are examined,one follows the profile-based paradigm (where a single representation isproduced for all the available training samples per author) and theother follows the instance-based paradigm (where each training samplehas its own individual representation). We examine the effect of thesource code representation on the performance of these methods and showthat the profile-based method is better able to handle cases of highlyskewed training sets while the instance-based method is a better choicein balanced or slightly-skewed training sets.",2019,https://scholar.google.com.br/,no
262,"Triaging Incoming Change Requests: Bug or Commit History, or CodeAuthorship?","There is a tremendous wealth of code authorship information available insource code. Motivated with the presence of this information, in anumber of open source projects, an approach to recommend expertdevelopers to assist with a software change request (e. g., a bug fixesor feature) is presented. It employs a combination of an informationretrieval technique and processing of the source code authorshipinformation. The relevant source code files to the textual descriptionof a change request are first located. The authors listed in the headercomments in these files are then analyzed to arrive at a ranked list ofthe most suitable developers. The approach fundamentally differs fromits previously reported counterparts, as it does not require softwarerepository mining. Neither does it require training from pastbugs/issues, which is often done with sophisticated techniques such asmachine learning, nor mining of source code repositories, i.e., commits.An empirical study to evaluate the effectiveness of the approach onthree open source systems, ArgoUML, JEdit, and MuCommander, is reported.Our approach is compared with two representative approaches: 1) usingmachine learning on past bug reports, and 2) based on commit logs. Thepresented approach is found to provide recommendation accuracies thatare equivalent or better than the two compared approaches. Thesefindings are encouraging, as it opens up a promising and orthogonalpossibility of recommending developers without the need of anyhistorical change information.",2019,https://scholar.google.com.br/,yes
263,Evaluation of truck factors for pavement design in developing countries,"The traffic represents a fundamental parameter used in the analysis anddesign of pavement structures. In order to simplify the characterizationof the traffic variable for pavement structural analysis and design, thevehicle axles are converted to a number of 80 kN Equivalent Single AxleLoads (ESALs) through the Load Equivalency Factors (LEF). A Truck Factorrepresents the ESALs applications per commercial vehicle. This studydetermined the Truck Factors for commercial vehicles operating inColombia. The high Truck Factor values found in this investigation couldbe used to explain the current critical condition of Colombian roadinfrastructure (C) 2012 The Authors. Published by Elsevier Ltd.Selection and/or peer-review under responsibility of SIIV2012 ScientificCommittee",2019,https://scholar.google.com.br/,no
264,Assessing Third Year Medical Students' Understanding of Code Status,"Purpose: To assess third-year medical students' understanding of codestatus and its impact on patient care.Methods: Nonrandomized, cross-sectional survey completed at the end ofinpatient internal medicine clerkship rotation. The survey assessedthird-year medical students' understanding, knowledge, experiences, andattitudes pertaining to code status.Results: Sixty-three of 94 third-year medical students completed thesurvey at the end of their medicine rotation in academic year 2009. Morethan 90\% of the respondents stated that ``on the job training'' wastheir primary means of knowledge of code status and that they would liketo have code status discussion as part of their medical school'scurriculum. Although 100\% of students knew what ``code status'' means,only 17\% reported an ``excellent'' understanding. Only about 5\% ofstudents were ``extremely comfortable'' in facilitating a code statusconversation with their patients and more than 95\% felt it should besupervised. Themes emerged included the importance of role modeling andaccountability for good patient care.Conclusions: Third-year medical students' understanding of code statuswas limited to informal training during clinical care. Students perceivea lack of preparedness, which indicates an inadequacy in educatingmedical trainees about medical decision for resuscitation. The trainingfor code status is greatly influenced by both resident and attendingphysicians, which accounts for variability in students' experiences.Further development in clinical teaching and learning about medicaldecision for resuscitation is needed.",2019,https://scholar.google.com.br/,no
265,LeakChaser: Helping Programmers Narrow Down Causes of Memory Leaks,"In large programs written in managed languages such as Java and C\#,holding unnecessary references often results in memory leaks and bloat,degrading significantly their run-time performance and scalability.Despite the existence of many leak detectors for such languages, thesedetectors often target low-level objects; as a result, their reportscontain many false warnings and lack sufficient semantic information tohelp diagnose problems. This paper introduces a specification-basedtechnique called LeakChaser that can not only capture precisely theunnecessary references leading to leaks, but also explain, withhigh-level semantics, why these references become unnecessary.At the heart of LeakChaser is a three-tier approach that uses varyinglevels of abstraction to assist programmers with different skill levelsand code familiarity to find leaks. At the highest tier of the approach,the programmer only needs to specify the boundaries of coarse-grainedactivities, referred to as transactions. The tool automatically infersliveness properties of these transactions, by monitoring the execution,in order to find unnecessary references. Diagnosis at this tier can beperformed by any programmer after inspecting the APIs and basic modulesof a program, without understanding of the detailed implementation ofthese APIs. At the middle tier, the programmer can introduceapplication-specific semantic information by specifying properties forthe transactions. At the lowest tier of the approach is a livenesschecker that does not rely on higher-level semantic information, butrather allows a programmer to assert lifetime relationships for pairs ofobjects. This task could only be performed by skillful programmers whohave a clear understanding of data structures and algorithms in theprogram.We have implemented LeakChaser in Jikes RVM and used it to help usdiagnose several real-world leaks. The implementation incurs areasonable overhead for debugging and tuning. Our case studies indicatethat the implementation is powerful in guiding programmers with varyingcode familiarity to find the root causes of several memory leaks-evensomeone who had not studied a leaking program can quickly find the causeafter using LeakChaser's iterative process that infers and checksproperties with different levels of semantic information.",2019,https://scholar.google.com.br/,no
266,"Ownership, Experience and Defects: A Fine-Grained Study of Authorship","Recent research indicates that ``people{''} factors such as ownership,experience, organizational structure, and geographic distribution have abig impact on software quality. Understanding these factors, andproperly deploying people resources can help managers improve qualityoutcomes. This paper considers the impact of code ownership anddeveloper experience on software quality. In a large project, a filemight be entirely owned by a single developer, or worked on by many.Some previous research indicates that more developers working on a filemight lead to more defects. Prior research considered this phenomenon atthe level of modules or files, and thus does not tease apart and studythe effect of contributions of different developers to each module orfile. We exploit a modern version control system to examine this issueat a fine-grained level. Using version history, we examine contributionsto code fragments that are actually repaired to fix bugs. Are these codefragments ``implicated{''} in bugs the result of contributions frommany? or from one? Does experience matter? What type of experience? Wefind that implicated code is more strongly associated with a singledeveloper's contribution; our findings also indicate that an author'sspecialized experience in the target file is more important than generalexperience. Our findings suggest that quality control efforts could beprofitably targeted at changes made by single developers with limitedprior experience on that file.",2019,https://scholar.google.com.br/,yes
267,Empirical Software Evolvability - Code Smells and Human Evaluations,"Low software evolvability may increase costs of software development forover 30\%. In practice, human evaluations and discoveries of softwareevolvability dictate the actions taken to improve the softwareevolvability, but the human side has often been ignored in priorresearch. This dissertation synopsis proposes a new group of code smellscalled the solution approach, which is based on a study of 563evolvability issues found in industrial and student code reviews.Solution approach issues require re-thinking of the existingimplementation rather than just reorganizing the code throughrefactoring. This work also contributes to the body of knowledge aboutsoftware quality assurance practices by confirming that 75\% of defectsfound in code reviews affect software evolvability rather thanfunctionality. We also found evidence indicating that context-specificdemographics, i.e., role in organization and code ownership, affectevolvability evaluations, but general demographics, i.e., workexperience and education, do not",2019,https://scholar.google.com.br/,no
268,Who are Source Code Contributors and How do they Change?,"Determining who are the copyright owners of a software system isimportant as they are the individuals and organizations that license thesoftware to its users, and ultimately the legal entities that canenforce its licensing terms, and change its license. In this paper wedescribe the difficulties of identifying the explicit copyright ownersof a system, and those who contribute source code to it who couldpotentially claim are also copyright owners of it.The paper introduces a method to track the names of contributors,including those explicitly listed as copyright owners from licensingstatements in source code file. Then, it reports an empirical studyperformed on four open source systems namely ArgoUML, Mozilla, Samba,and Squid-aimed at investigating the characteristics of theircontributors and how they relate to the commits recorded in the systemand users who perform them (its committers).Results indicate that explicit contributors and copyright owners are notnecessarily the most frequent committers. Also, they are often addedduring larger changes than average.",2019,https://scholar.google.com.br/,yes
269,On the Use of Discretized Source Code Metrics for Author Identification,"Intellectual property infringement and plagiarism litigation involvingsource code would be more easily resolved using code authorshipidentification tools. Previous efforts in this area have demonstratedthe potential of determining the authorship of a disputed piece ofsource code automatically, This was achieved by using source codemetrics to build a database of developer profiles, thus characterizing apopulation of developers. These profiles were then used to determine thelikelihood that the unidentified source code was authored by a givendeveloper.In this paper we evaluate the effect of discretizing source code metricsfor use in building developer profiles. It is well known that machinelearning techniques perform better when using categorical variables asopposed to continuous ones. We present a genetic algorithm to discretizemetrics to improve source code to author classification. We evaluate theapproach with a case study involving 20 open source developers and over750,000 lines of Java source code.",2019,https://scholar.google.com.br/,yes
270,Succession: Measuring Transfer of Code and Developer Productivity,"Code ownership transfer or succession is a crucial ingredient in opensource code, reuse and in off shoring projects. Measuring succession canhelp understand factors that affect the success of such transfers andsuggest ways to make them more efficient. We propose and evaluateseveral methods to measure succession based on the chronology and tracesof developer activities. Using ten instances of off-shoring successionidentified through interviews, we find that the best succession measurecan accurately pinpoint the most likely, mentors. We model theproductivity ratio of more than 1000 developer pairs involved in thesuccession to test conjectures formulated using the organizationalsocialization theory and find the ratio to decrease for instances ofoffshoring and for mentors who have worked primarily on a single projector have transferred ownership for their non-primary project code, thussupporting a theory-based conjectures and providing practicalsuggestions on how to improve succession.",2019,https://scholar.google.com.br/,yes
271,Mining the History of Synchronous Changes to Refine Code Ownership,"When software repositories are mined, two distinct sources ofinformation are usually explored: the history log and snapshots of thesystem. Results of analyses derived from these two sources are biased bythe frequency with which developers commit their changes. We argue thatthe usage of mainstream SCM systems influences the way that developerswork. For example, since it is tedious to resolve conflicts due toparallel commits, developers tend to minimize conflicts by notcontemporarily modifying the same file. This however defeats one of thepurposes of such systems.We mine repositories created by our Syde tool, which records everychange by every developer in multi-developer projects. This new sourceof information can augment the accuracy of analyses and breaks newground in terms of how such information can assist developers. In thispaper we illustrate how the information we mine can help to provide arefined notion of code ownership. As a case study, we analyze thedevelopers' activities of the development of a commercial system.",2019,https://scholar.google.com.br/,yes
272,Application of Information Retrieval Techniques for Source CodeAuthorship Attribution,"Authorship attribution assigns works of contentions authorship to theirrightful owners solving cases of theft, plagiarism and authorshipdisputes in academia and industry. In this paper we investigate theapplication of information retrieval techniques to attribution ofauthorship of C source code. In particular, we explore novel methods forconverting C code into documents suitable for retrieval systems,experimenting with 1,597 student programming assignments. We investigateseveral possible program derivations, partition attribution results byoriginal program length to measure effectiveness of modest and lengthyprograms separately, and evaluate three different methods forinterpreting document rankings as authorship attribution. The best ofour methods achieves an average of 76.78\% classification accuracy for aone-in-ten classification problem which is competitive against sixexisting baselines. The techniques that we present can be the basis ofpractical software to support source code authorship investigations.",2019,https://scholar.google.com.br/,yes
273,Understanding the Rationale for Updating a Function's Comment,"Up-to-date comments are critical for the successful evolution of asoftware application. When modifying a function, developers may updatethe comment associated with the function or may not update it. Forexample, comments associated with a complex function are likely to beupdated more often when the function is modified to prevent the code andthe comments from drifting apart. Nevertheless, the rationale behindupdating a comment has never been studied.In this paper, we present a large empirical study to better understandthe rationale for updating comments. We recover the code change historyfor four large open source projects (GCC: a compiler, FreeBSD: anoperation system, PostgreSQL: a database management system, andGCluster: a clustering framework) with an average code history of 10years. Using the Random Forests algorithm, we investigate the rationalefor updating comments along three dimensions: characteristics of thechanged function, characteristics of the change itself and time and codeownership characteristics. Our case study shows that we can predict withan accuracy of 80\%; the likelihood of updating the comment associatedwith a modified function. We perform a sensitivity analysis to determinethe most important attributes. Our analysis shows that the percentage ofchanged call dependencies and control statements, the age of themodified function and the number of co-changed functions which depend onit are the most important attributes in determining the likelihood ofupdating comments.",2019,https://scholar.google.com.br/,no
274,Measuring the Impact of Different Categories of Software Evolution,"Software evolution involves different categories of interventions,having variable impact on the code. Knowledge about the expected impactof an intervention is fundamental for project planning and resourceallocation. Moreover, deviations from the expected impact may hint forareas of the system having a poor design. In this paper, we investigatethe relationship between evolution categories and impacted code by meansof a set of metrics computed over time for a subject system.",2019,https://scholar.google.com.br/,no
275,The FreeBSD project: A replication case study of open source development,"Case studies can help to validate claims that open source softwaredevelopment produces higher quality software at lower cost thantraditional commercial development. One problem inherent in case studiesis external validity-we do not know whether or not results from one casestudy apply to another development project. We gain or lose confidencein case study results when similar case studies are conducted on otherprojects. This case study of the FreeBSD project, a long-lived opensource project, provides further understanding of open sourcedevelopment. The paper details a method for mining repositories andquerying project participants to retrieve key process information. TheFreeBSD development process is fairly well-defined with proscribedmethods for determining developer responsibilities, dealing withenhancements and defects, and managing releases. Compared to the Apacheproject, FreeBSD uses 1) a smaller set of core developers-developers whocontrol the code base-that implement a smaller percentage of the system,2) a larger set of top developers to implement 80 percent of the system,and 3) a more well-defined testing process. FreeBSD and Apache have asimilar ratio of core developers to people involved in adapting anddebugging the system and people who report problems. Both systems havesimilar defect densities and the developers are also users in bothsystems.",2019,https://scholar.google.com.br/,no
276,Block spectral precoding detection of DS/CDMA for blind multiusersignals,"A new approach for blind multiuser detection of DS/CDMA signals isproposed. This approach is based on modifying the data power spectrum,uniquely for each user, through a two-stage colouring-whiteningprecoding scheme. This enables detection of a desired user's signal inan unknown multipath channel, regardless of the power of theinterferers. The proposed precoding method does not alter the data rateor system bandwidth. Detection does not require spreading codeknowledge, and consequently avoids channel estimation and the possibleassociated errors. The method is seen to yield reasonable performancebesides being able to operate properly in nearly saturated systems, incontrast to some existing methods. Besides this, it can tolerate severecarrier frequency offsets.",2019,https://scholar.google.com.br/,no
277,The drawing carousel: A Pair Programming experience,"The participants will experience how a pair programming team works.Working in a single pair is different from working on your own: You haveto articulate what you want to do, the other person (probably) has somedifferent insights, and the result will be different from what you wouldhave done on your own. But.. this is only half of the story: working ina Pair Programming Team has many more advantages: knowledge is spread,the team creates an own style, parallel development becomes easy, truckfactor (http://c2.con/cgi/wiki?TruckNumber) is reduced. The team createsthe product (instead of individual programmers creating the parts), theproduct is a whole, not a mixture of individual results. You will learnabout the necessity of agile tools like daily standup meetings, pairrotation, coding standards and collective code ownership, how they work,and what their effects are. You will experience improvements for thequality of you product, and for the productivity of the team.",2019,https://scholar.google.com.br/,no
278,Extreme Programming and its development practices,"Extreme Programming (XP) has attracted our attention through its fiercedenial of many of our well-accepted software engineering practices whichwe consider today as a sound approach to the development of intensivesoftware systems. XP has been declared to be a new way of softwaredevelopment: a lightweight methodology which is efficient, low-risk,flexible, predictable, scientific, and distinguishable from any othermethodology. In the core of the XP practices are programming activities,with strong emphasis on oral communications, automated tests, pairprogramming, storytelling culture and collective code-ownership at anytime in the XP project.. This paper gives an overview of XP practicesand raises some serious concerns regarding their role in conceptualmodelling and code generation; which directly affects softwarearchitecture solutions. The paper also tackles similarities betweenRational Unified Process (RUP) and XP, which have lately been very oftenjuxtaposed by software developers.",2019,https://scholar.google.com.br/,no
279,"IDENTIFIED (integrated dictionary-based extraction ofnon-language-dependent token information for forensic identification,examination, and discrimination): A dictionary-based system forextracting source code metrics for software forensics","The frequency and severity of computer-based attacks such as viruses andworms, logic bombs, trojan horses, computer fraud, and plagiarism ofsoftware code have all become of increasing concern to many of thoseinvolved with information systems. Pall of the difficulty experienced incollecting evidence regarding the attack or theft in such situations hasbeen the definition and collection of appropriate measurements to use inmodels of authorship. With this purpose in mind a system calledIDENTIFIED is being developed to assist with the task of softwareforensics which is the use of software code authorship analysis forlegal or official purposes. IDENTIFIED uses combinations of wildcardsand special characters to define count-based metrics, allows forhierarchical meta-metric definitions, automates much of the pie handlingtask, extracts metric values from source code, and assists with theanalysis and modelling processes. It is hoped that the availability ofsuch tools will encourage more detailed research into this area ofever-increasing importance.",2019,https://scholar.google.com.br/,yes
280,A fuzzy logic approach to computer software source code authorshipanalysis,"Software source code authorship analysis has become an important area inrecent years with promising applications in both the legal sector (suchas proof of ownership and software forensics) and the education sector(such as plagiarism detection and assessing style). Authorship analysisencompasses the sub-areas of author discrimination, authorcharacterization, and similarity detection (also referred to asplagiarism detection). While a large number of metrics have beenproposed for this task, many borrowed or adapted from the area ofcomputational linguistics, there is a difficulty with capturing certaintypes of information in terms of quantitative measurement. Here it isproposed that existing numerical metrics should be supplemented withfuzzy-logic linguistic variables to capture more subjective elements ofauthorship, such as the degree to which comments match the actual sourcecode's behavior. These variables avoid the need for complex andsubjective rules, replacing these with an expert's judgement.Fuzzy-logic models may also help to overcome problems with small datasets for calibrating such models. Using authorship discrimination as atest case, the utility of objective and fuzzy measures, singularly andin combination, is assessed as well as the consistency of the measuresbetween counters.",2019,https://scholar.google.com.br/,yes
281,Software visualization in the large,"Production-sized systems, particularly legacy software, can containmillions of lines of code. Even a seemingly simple, small-ream project,such as a spreadsheet, is quite complicated. Understanding, changing,and repairing code in large systems is especially time-consuming andcostly.Knowledge of code decays as the software ages and the originalprogrammers and design ream move on ro new assignments. The designdocuments are also usually out of date, leaving the code as the onlyguide to system behavior. It is tedious to reconstruct complex systembehavior by analyzing code.Perhaps the most difficult software engineering projects involve`'programming in the large.'' These large-team projects, often inmaintenance mode, require enhancements involving subtle changes tocomplex legacy code written over many years. Under these circumstances,programmer productivity is low, changes are more likely to introduceerrors, and software projects are often late.Software visualization can help software engineers cope with thiscomplexity while increasing programmer productivity. Software isintangible, having no physical shape or size. After it is written, code`'disappears'' into files kept on disks. Software visualization toolsuse graphical techniques to make software visible by displayingprograms, program artifacts, and program behavior. Pictures of thesoftware can help slow knowledge decay by helping project membersremember-and new members discover-how the code works.Three basic properties of software can be visualized: software structure(as in directed graphs); runtime behavior (as in algorithm animation);and the code itself (as in pretty printers).Previous approaches to software visualization, although useful for smallprojects, do not scale to the production-sized systems currently beingmanufactured. The graphical techniques found in programming,program-visualization, and algorithm-animation environments target smallsystems. Algorithm visualizations are usually handcrafted and requirethe designer to understand the code before visualizing it, making thistechnique infeasible for large systems or tasks involving programmerdiscovery. The general strategy for large projects is to decompose theproject into modules, usually hierarchically, and display each moduleindividually. In practice, this decomposition is often the mostdifficult aspect of the visualization. When software is decomposed, the`'big picture'' is lost, often defeating the purpose of thevisualization.To address these shortcomings, the authors developed scalable techniquesfor visualizing program text, text properties, and relationshipsinvolving program text, as text is the dominant medium for implementinglarge software systems. They have applied their tools to visualize codeversion history, differences between releases, static properties ofcode, code profiling and execution hot spots, and dynamic programslices.The systems presented are used daily within Bell Laboratories'development community, helping software developers work on the SESSproduct, a real-time switching system containing millions of lines ofcode developed over the past two decades by thousands of softwareengineers. The initial developer feedback has been very positive.",2019,https://scholar.google.com.br/,no