An empirical study of pre-trained model reuse in the hugging face deep learning model registry
Deep Neural Networks (DNNs) are being adopted as components in software systems.
Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the …
Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the …
Revisiting software ecosystems research: A longitudinal literature study
K Manikas - Journal of Systems and Software, 2016 - Elsevier
Abstract 'Software ecosystems' is argued to first appear as a concept more than 10 years
ago and software ecosystem research started to take off in 2010. We conduct a systematic …
ago and software ecosystem research started to take off in 2010. We conduct a systematic …
A look at the dynamics of the JavaScript package ecosystem
The node package manager (npm) serves as the frontend to a large repository of JavaScript-
based software packages, which foster the development of currently huge amounts of server …
based software packages, which foster the development of currently huge amounts of server …
A comprehensive study of bloated dependencies in the maven ecosystem
Build automation tools and package managers have a profound influence on software
development. They facilitate the reuse of third-party libraries, support a clear separation …
development. They facilitate the reuse of third-party libraries, support a clear separation …
Pitfalls and guidelines for using time-based Git data
Many software engineering research papers rely on time-based data (eg, commit
timestamps, issue report creation/update/close dates, release dates). Like most real-world …
timestamps, issue report creation/update/close dates, release dates). Like most real-world …
[LIBRO][B] The art and science of analyzing software data
The Art and Science of Analyzing Software Data provides valuable information on analysis
techniques often used to derive insight from software data. This book shares best practices …
techniques often used to derive insight from software data. This book shares best practices …
VulinOSS: a dataset of security vulnerabilities in open-source systems
Examining the different characteristics of open-source software in relation to security
vulnerabilities, can provide the research community with findings that can lead to the …
vulnerabilities, can provide the research community with findings that can lead to the …
Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities
Software reuse is a widely adopted practice among both researchers and practitioners. The
relation between security and reuse can go both ways: a system can become more secure …
relation between security and reuse can go both ways: a system can become more secure …
Tracking known security vulnerabilities in proprietary software systems
M Cadariu, E Bouwers, J Visser… - 2015 IEEE 22nd …, 2015 - ieeexplore.ieee.org
Known security vulnerabilities can be introduced in software systems as a result of being
dependent upon third-party components. These documented software weaknesses are …
dependent upon third-party components. These documented software weaknesses are …
[HTML][HTML] Tracing known security vulnerabilities in software repositories–A Semantic Web enabled modeling approach
The introduction of the Internet has revolutionized not only our society but also transformed
the software industry, with knowledge and information sharing becoming a central part of …
the software industry, with knowledge and information sharing becoming a central part of …