Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects

A Pinna, MI Lunesu, S Orrù, R Tonelli - Future Internet, 2023 - mdpi.com
Technical debt refers to decisions made during the design and development of software that
postpone the resolution of technical problems or the enhancement of the software's features …

Self-admitted technical debt in ethereum smart contracts: a large-scale exploratory study

AM Ebrahimi, GA Oliva… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Programmable blockchain platforms such as Ethereum offer unique benefits to application
development, including a decentralized infrastructure, tamper-proof transactions, and …

From SATD Recognition to an Interpretation Method Based on the Dataset

Y Meng, B Tie, D Lin - International Journal of Software Engineering …, 2023 - World Scientific
Technical debt describes a trade-off between short-term goals and long-term code quality
during software development. Self-admitted technical debt (SATD), a type of technical debt …

A Multiple Case Study on Executive IT Manager Experience of Technical Debt

AL Creech - 2024 - search.proquest.com
Poor technical debt management processes negatively impact development teams and can
severely impact the quality of work. However, how executive IT leadership of software …

[PDF][PDF] Self-Admitted Scientific Debt: Navigating Cross-Domain Challenges in Scientific Software

AM Awon - 2024 - dspace.library.uvic.ca
Scientific software development faces unique cross-domain challenges, requiring expertise
from both scientific and software engineering disciplines. These challenges often manifest …

A Network Traffic Anomaly Detection Method Based on Shapelet and KNN

S Yu, X **e, Z Li, W Zhen, T Cai - International Conference on Artificial …, 2023 - Springer
Network traffic anomaly detection is the foundation for discovering malicious attacks and
securing network security. With the emergence of new technologies such as port …

A Stealthy Backdoor Attack for Code Models

S Huang, X Chen, X Ju, L Li, X Wang, Y Yao, Z **ao - 2024 - researchsquare.com
Recent studies have shown that code models are susceptible to backdoor attacks. When
injected with a backdoor, the victim code model can function normally on benign samples …