An empirical study of pre-trained model reuse in the hugging face deep learning model registry

W Jiang, N Synovic, M Hyatt… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep Neural Networks (DNNs) are being adopted as components in software systems.
Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the …

Revisiting software ecosystems research: A longitudinal literature study

K Manikas - Journal of Systems and Software, 2016 - Elsevier
Abstract 'Software ecosystems' is argued to first appear as a concept more than 10 years
ago and software ecosystem research started to take off in 2010. We conduct a systematic …

A look at the dynamics of the JavaScript package ecosystem

E Wittern, P Suter, S Rajagopalan - Proceedings of the 13th international …, 2016 - dl.acm.org
The node package manager (npm) serves as the frontend to a large repository of JavaScript-
based software packages, which foster the development of currently huge amounts of server …

A comprehensive study of bloated dependencies in the maven ecosystem

C Soto-Valero, N Harrand, M Monperrus… - Empirical Software …, 2021 - Springer
Build automation tools and package managers have a profound influence on software
development. They facilitate the reuse of third-party libraries, support a clear separation …

Pitfalls and guidelines for using time-based Git data

SW Flint, J Chauhan, R Dyer - Empirical Software Engineering, 2022 - Springer
Many software engineering research papers rely on time-based data (eg, commit
timestamps, issue report creation/update/close dates, release dates). Like most real-world …

[LIBRO][B] The art and science of analyzing software data

C Bird, T Menzies, T Zimmermann - 2015 - books.google.com
The Art and Science of Analyzing Software Data provides valuable information on analysis
techniques often used to derive insight from software data. This book shares best practices …

VulinOSS: a dataset of security vulnerabilities in open-source systems

A Gkortzis, D Mitropoulos, D Spinellis - Proceedings of the 15th …, 2018 - dl.acm.org
Examining the different characteristics of open-source software in relation to security
vulnerabilities, can provide the research community with findings that can lead to the …

Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities

A Gkortzis, D Feitosa, D Spinellis - Journal of Systems and Software, 2021 - Elsevier
Software reuse is a widely adopted practice among both researchers and practitioners. The
relation between security and reuse can go both ways: a system can become more secure …

Tracking known security vulnerabilities in proprietary software systems

M Cadariu, E Bouwers, J Visser… - 2015 IEEE 22nd …, 2015 - ieeexplore.ieee.org
Known security vulnerabilities can be introduced in software systems as a result of being
dependent upon third-party components. These documented software weaknesses are …

[HTML][HTML] Tracing known security vulnerabilities in software repositories–A Semantic Web enabled modeling approach

SS Alqahtani, EE Eghan, J Rilling - Science of Computer Programming, 2016 - Elsevier
The introduction of the Internet has revolutionized not only our society but also transformed
the software industry, with knowledge and information sharing becoming a central part of …