Networking for big data: A survey

S Yu, M Liu, W Dou, X Liu… - … Communications Surveys & …, 2016‏ - ieeexplore.ieee.org
Complementary to the fancy big data applications, networking for big data is an
indispensable supporting platform for these applications in practice. This emerging research …

Blockchain-oriented software engineering: challenges and new directions

S Porru, A Pinna, M Marchesi… - 2017 IEEE/ACM 39th …, 2017‏ - ieeexplore.ieee.org
In this work, we acknowledge the need for software engineers to devise specialized tools
and techniques for blockchain-oriented software development. Ensuring effective testing …

Blockchain testing: Challenges, techniques, and research directions

C Lal, D Marijan - arxiv preprint arxiv:2103.10074, 2021‏ - arxiv.org
Specific testing solutions targeting blockchain-based software are gaining huge attention as
blockchain technologies are being increasingly incorporated into enterprise systems. As …

A large-scale empirical study on vulnerability distribution within projects and the lessons learned

B Liu, G Meng, W Zou, Q Gong, F Li, M Lin… - Proceedings of the …, 2020‏ - dl.acm.org
The number of vulnerabilities increases rapidly in recent years, due to advances in
vulnerability discovery solutions. It enables a thorough analysis on the vulnerability …

An exploratory study of bug prediction at the method level

R Mo, S Wei, Q Feng, Z Li - Information and software technology, 2022‏ - Elsevier
Context: During the past decades, researchers have proposed numerous studies to predict
bugs at different granularity levels, such as the file level, package level, module level, etc …

Analyzing maintainability and reliability of object-oriented software using weighted complex network

CY Chong, SP Lee - Journal of Systems and Software, 2015‏ - Elsevier
Modeling software systems using complex networks can be an effective technique for
analyzing the complexity of software systems. To enhance the technique, the structure of a …

Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties

K Sridhar, M Ng - Journal of Cybersecurity, 2021‏ - academic.oup.com
We ran a study of bug bounties, programs where gig economy security researchers are
compensated for pinpointing and explaining vulnerabilities in company code bases. Bug …

Combining object‐oriented metrics and centrality measures to predict faults in object‐oriented software: An empirical validation

A Ouellet, M Badri - Journal of Software: Evolution and Process, 2024‏ - Wiley Online Library
Many object‐oriented metrics have been proposed in the literature to measure various
structural properties of object‐oriented software. Furthermore, many centrality measures …

On software engineering repositories and their open problems

D Rodriguez, I Herraiz… - 2012 First International …, 2012‏ - ieeexplore.ieee.org
In the last decade, a large number of software repositories have been created for different
purposes. In this paper we present a survey of the publicly available repositories and …

Integrating technical debt management and software quality management processes: A normative framework and field tests

N Ramasubbu, CF Kemerer - IEEE Transactions on Software …, 2017‏ - ieeexplore.ieee.org
Despite the increasing awareness of the importance of managing technical debt in software
product development, systematic processes for implementing technical debt management in …