Detecting missing information in bug descriptions

O Chaparro, J Lu, F Zampetti, L Moreno… - Proceedings of the …, 2017 - dl.acm.org
Bug reports document unexpected software behaviors experienced by users. To be
effective, they should allow bug triagers to easily understand and reproduce the potential …

SentiStrength-SE: Exploiting domain specificity for improved sentiment analysis in software engineering text

MR Islam, MF Zibran - Journal of Systems and Software, 2018 - Elsevier
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …

Discovering essential code elements in informal documentation

PC Rigby, MP Robillard - 2013 35th International Conference …, 2013 - ieeexplore.ieee.org
To access the knowledge contained in developer communication, such as forum posts, it is
useful to determine automatically the code elements referred to in the discussions. We …

Leveraging automated sentiment analysis in software engineering

MR Islam, MF Zibran - 2017 IEEE/ACM 14th International …, 2017 - ieeexplore.ieee.org
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …

Content classification of development emails

A Bacchelli, T Dal Sasso, M D'Ambros… - 2012 34th …, 2012 - ieeexplore.ieee.org
Emails related to the development of a software system contain information about design
choices and issues encountered during the development process. Exploiting the knowledge …

Extracting development tasks to navigate software documentation

C Treude, MP Robillard… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Knowledge management plays a central role in many software development organizations.
While much of the important technical knowledge can be captured in documentation, there …

Too long; didn't watch! extracting relevant fragments from software development video tutorials

L Ponzanelli, G Bavota, A Mocci, M Di Penta… - Proceedings of the 38th …, 2016 - dl.acm.org
When knowledgeable colleagues are not available, developers resort to offline and online
resources, eg, tutorials, mailing lists, and Q&A websites. These, however, need to be found …

Use at your own risk: The java unsafe api in the wild

L Mastrangelo, L Ponzanelli, A Mocci, M Lanza… - ACM Sigplan …, 2015 - dl.acm.org
Java is a safe language. Its runtime environment provides strong safety guarantees that any
Java application can rely on. Or so we think. We show that the runtime actually does not …

Investigating Documented Privacy Changes in Android OS

C Yan, MH Meng, F **e, G Bai - Proceedings of the ACM on Software …, 2024 - dl.acm.org
Android has empowered third-party apps to access data and services on mobile devices
since its genesis. This involves a wide spectrum of user privacy-sensitive data, such as the …

Api entity and relation joint extraction from text via dynamic prompt-tuned language model

Q Huang, Y Sun, Z **ng, M Yu, X Xu, Q Lu - ACM Transactions on …, 2023 - dl.acm.org
Extraction of Application Programming Interfaces (APIs) and their semantic relations from
unstructured text (eg, Stack Overflow) is a fundamental work for software engineering tasks …