Detecting missing information in bug descriptions
Bug reports document unexpected software behaviors experienced by users. To be
effective, they should allow bug triagers to easily understand and reproduce the potential …
effective, they should allow bug triagers to easily understand and reproduce the potential …
SentiStrength-SE: Exploiting domain specificity for improved sentiment analysis in software engineering text
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
Discovering essential code elements in informal documentation
To access the knowledge contained in developer communication, such as forum posts, it is
useful to determine automatically the code elements referred to in the discussions. We …
useful to determine automatically the code elements referred to in the discussions. We …
Leveraging automated sentiment analysis in software engineering
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
Content classification of development emails
Emails related to the development of a software system contain information about design
choices and issues encountered during the development process. Exploiting the knowledge …
choices and issues encountered during the development process. Exploiting the knowledge …
Extracting development tasks to navigate software documentation
Knowledge management plays a central role in many software development organizations.
While much of the important technical knowledge can be captured in documentation, there …
While much of the important technical knowledge can be captured in documentation, there …
Too long; didn't watch! extracting relevant fragments from software development video tutorials
When knowledgeable colleagues are not available, developers resort to offline and online
resources, eg, tutorials, mailing lists, and Q&A websites. These, however, need to be found …
resources, eg, tutorials, mailing lists, and Q&A websites. These, however, need to be found …
Use at your own risk: The java unsafe api in the wild
Java is a safe language. Its runtime environment provides strong safety guarantees that any
Java application can rely on. Or so we think. We show that the runtime actually does not …
Java application can rely on. Or so we think. We show that the runtime actually does not …
Investigating Documented Privacy Changes in Android OS
Android has empowered third-party apps to access data and services on mobile devices
since its genesis. This involves a wide spectrum of user privacy-sensitive data, such as the …
since its genesis. This involves a wide spectrum of user privacy-sensitive data, such as the …
Api entity and relation joint extraction from text via dynamic prompt-tuned language model
Extraction of Application Programming Interfaces (APIs) and their semantic relations from
unstructured text (eg, Stack Overflow) is a fundamental work for software engineering tasks …
unstructured text (eg, Stack Overflow) is a fundamental work for software engineering tasks …