The Pushback Effects of Race, Ethnicity, Gender, and Age in Code Review | 0 | 0.34 | 2022 |
Engineering Impacts of Anonymous Author Code Review: A Field Experiment | 0 | 0.34 | 2022 |
The Diversity Crisis in Software Development | 4 | 0.66 | 2021 |
Data Analysts and Their Software Practices: A Profile of the Sabermetrics Community and Beyond | 0 | 0.34 | 2020 |
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security | 0 | 0.34 | 2020 |
Enabling the Study of Software Development Behavior With Cross-Tool Logs | 1 | 0.36 | 2020 |
Predicting developers' negative feelings about code review | 5 | 0.43 | 2020 |
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool | 5 | 0.52 | 2019 |
Do developers discover new tools on the toilet? | 0 | 0.34 | 2019 |
Investigating the effects of gender bias on GitHub | 1 | 0.35 | 2019 |
Advantages and disadvantages of a monolithic repository: a case study at google. | 4 | 0.43 | 2018 |
Automatic web security unit testing: XSS vulnerability detection. | 1 | 0.35 | 2018 |
When not to comment: questions and tradeoffs with API documentation for C++ projects. | 1 | 0.35 | 2018 |
Does ACM's code of ethics change ethical decision making in software development? | 5 | 0.45 | 2018 |
How should compilers explain problems to developers? | 7 | 0.50 | 2018 |
Discovering API Usability Problems at Scale. | 1 | 0.35 | 2018 |
Just-in-time static analysis. | 7 | 0.47 | 2017 |
Gender differences and bias in open source: pull request acceptance of women versus men. | 36 | 1.27 | 2017 |
Do developers read compiler error messages? | 16 | 0.71 | 2017 |
Design and evaluation of a multi-recommendation system for local code search. | 2 | 0.35 | 2017 |
Refactoring-aware code review. | 0 | 0.34 | 2017 |
Cheetah: just-in-time taint analysis for Android apps. | 2 | 0.36 | 2017 |
Flower: Navigating program flow in the IDE. | 1 | 0.34 | 2017 |
Designing for dystopia: software engineering research for the post-apocalypse. | 0 | 0.34 | 2016 |
A perspective on blending programming environments and games: Beyond points, badges, and leaderboards. | 3 | 0.66 | 2016 |
Software security education at scale. | 0 | 0.34 | 2016 |
Perquimans: A Tool for Visualizing Patterns of Spreadsheet Function Combinations | 0 | 0.34 | 2016 |
Gender bias in open source: Pull request acceptance of women versus men. | 4 | 0.45 | 2016 |
The persuasive phish: examining the social psychological principles hidden in phishing emails. | 2 | 0.44 | 2016 |
From Quick Fixes to Slow Fixes: Reimagining Static Analysis Resolutions to Enable Design Space Exploration | 4 | 0.41 | 2016 |
Veteran developers' contributions and motivations: An open source perspective. | 1 | 0.40 | 2016 |
Questions developers ask while diagnosing potential security vulnerabilities with static analysis | 21 | 0.83 | 2015 |
Quantifying developers' adoption of security tools | 16 | 0.65 | 2015 |
Enron's spreadsheets and related emails: a dataset and analysis | 21 | 0.81 | 2015 |
Exploring expert and novice mental models of phishing | 1 | 0.35 | 2015 |
The human factor: A challenge for network reliability design | 2 | 0.42 | 2015 |
How Do Users Discover New Tools in Software Development and Beyond? | 6 | 0.42 | 2015 |
A study of interactive code annotation for access control vulnerabilities | 9 | 0.56 | 2015 |
Commit Bubbles. | 2 | 0.37 | 2015 |
The Design Space of Bug Fixes and How Developers Navigate It | 22 | 0.73 | 2015 |
Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task. | 3 | 0.39 | 2015 |
I heart hacker news: expanding qualitative research findings by analyzing social news websites | 5 | 0.44 | 2015 |
Can Social Screencasting Help Developers Learn New Tools? | 0 | 0.34 | 2015 |
Refactoring. | 0 | 0.34 | 2015 |
Bespoke tools: adapted to the concepts developers know | 5 | 0.45 | 2015 |
How programming languages will co-evolve with software engineering: a bright decade ahead. | 5 | 0.43 | 2014 |
How developers use multi-recommendation system in local code search | 2 | 0.35 | 2014 |
Technical and Personal Factors Influencing Developers' Adoption of Security Tools | 4 | 0.49 | 2014 |
The Future of Refactoring (Dagstuhl Seminar 14211). | 1 | 0.36 | 2014 |
SIW 2014: First Workshop on Security Information Workers. | 0 | 0.34 | 2014 |