Automating code-related tasks through transformers: The impact of pre-training

R Tufano, L Pascarella, G Bavota - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Transformers have gained popularity in the software engineering (SE) literature. These deep
learning models are usually pre-trained through a self-supervised objective, meant to …

RefactoringMiner 2.0

N Tsantalis, A Ketkar, D Dig - IEEE Transactions on Software …, 2020 - ieeexplore.ieee.org
Refactoring detection is crucial for a variety of applications and tasks:(i) empirical studies
about code evolution,(ii) tools for library API migration,(iii) code reviews and change …

A large-scale study about quality and reproducibility of jupyter notebooks

JF Pimentel, L Murta, V Braganholo… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Jupyter Notebooks have been widely adopted by many different communities, both in
science and industry. They support the creation of literate programming documents that …

Accurate and efficient refactoring detection in commit history

N Tsantalis, M Mansouri, LM Eshkevari… - Proceedings of the 40th …, 2018 - dl.acm.org
Refactoring detection algorithms have been crucial to a variety of applications:(i) empirical
studies about the evolution of code, tests, and faults,(ii) tools for library API migration,(iii) …

Software documentation: the practitioners' perspective

E Aghajani, C Nagy, M Linares-Vásquez… - Proceedings of the acm …, 2020 - dl.acm.org
In theory,(good) documentation is an invaluable asset to any software project, as it helps
stakeholders to use, understand, maintain, and evolve a system. In practice, however …

On learning meaningful assert statements for unit test cases

C Watson, M Tufano, K Moran, G Bavota… - Proceedings of the …, 2020 - dl.acm.org
Software testing is an essential part of the software lifecycle and requires a substantial
amount of time and effort. It has been estimated that software developers spend close to …

The secret life of software vulnerabilities: A large-scale empirical study

E Iannone, R Guadagni, F Ferrucci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …

Just-in-time defect identification and localization: A two-phase framework

M Yan, X **a, Y Fan, AE Hassan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Defect localization aims to locate buggy program elements (eg, buggy files, methods or lines
of code) based on defect symptoms, eg, bug reports or program spectrum. However, when …

An empirical study of the long duration of continuous integration builds

TA Ghaleb, DA Da Costa, Y Zou - Empirical Software Engineering, 2019 - Springer
Continuous Integration (CI) is a set of software development practices that allow software
development teams to generate software builds more quickly and periodically (eg, daily or …

Understanding and improving the quality and reproducibility of Jupyter notebooks

JF Pimentel, L Murta, V Braganholo, J Freire - Empirical Software …, 2021 - Springer
Jupyter Notebooks have been widely adopted by many different communities, both in
science and industry. They support the creation of literate programming documents that …