Computer Science ›› 2015, Vol. 42 ›› Issue (2): 161-166.doi: 10.11896/j.issn.1002-137X.2015.02.035

Previous Articles     Next Articles

Research on Developer Preferential Collaboration in Open-source Software Community

HE Peng, LI Bing, YANG Xi-hui and XIONG Wei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper mainly focused on the analysis of developer’s behavior in open-source community.At first,we ana-lyzed the growth of the number of projects and developers in community to witness its rapid development.Then,we investigated the quantities of new developers and collaborations in a two months interval,and divided the new collaborations into four categories to explore their differences and then judge the cooperation order among developers.Finally,with respect to the collaboration between new and old members,we further analyzed the relationship between preferential behavior and centrality measures such as degree centrality,betweenness centrality and closeness centrality,the number of projects developed and their roles.The result shows that a new developer will prefer collaborating with those who have great betweenness centrality or degree centrality,because they develop more projects and play important roles.Our work will optimize the development process of collaborative development,and lay a solid foundation to improve the productivity and quality of software.

Key words: Collaborative development,Social networks analysis,Preferential cooperation,Behavior analysis

[1] Hinds D,Lee R M.Social Network Structure as a Critical Success Condition for Virtual Communities[C]∥ Proceedings of the 41st Annual,Hawaii International Conference on System Science.IEEE,2008:323
[2] 吴江,胡斌,张金隆.开源软件开发者和源代码协调性的网络分析[J].科研管理,2011,8(32):133-141
[3] Sen R,Singh S S,Borle S.Open source software success:Measures and analysis[J].Decision Support Systems,2012,52(2):364-372
[4] Whitehead J,Mistrík I,Grundy J,et al.Collaborative Software Engineering:Concepts and Techniques[M]∥Collaborative Software Engineering,2010:1-30
[5] Hossain L,Zhou D.Measuring OSS quality through centrality[C]∥Proceedings of the 2008 International Workshop on Cooperative and Human Aspects of Software.2008:65-68
[6] Wolf T,Schroter A,Damian D,et al.Predicting build failuresusing social network analysis on developer communication[C]∥Proceedings of the 31st International Conference on Software Engineering.ACM,2009:1-11
[7] Hinds D.Social Network Structure as a Critical Success Condition for Open Source Software Project Communities[D].Florida International University,2008
[8] Hinds D,Lee R M.Social network structure as a critical success condition for virtual communities[C]∥Proceedings of the 41st Annual Hawaii International conferenceon System Sciences.Washington DC,USA,2008:323
[9] 毛清华,高杨.基于社会网络中心性分析的虚拟团队知识共享促进策略[J].情报杂志,2010,9(10):130-133
[10] Toral S L,Martínez-Torres M R,Barrero F.Analysis of virtual communities supporting OSS projects using social network analy-sis[J].Information and Software Technology,2010,52(3):296-303
[11] Hossain L,Zhu D.Social networks and coordination perform-ance of distributed software development teams[J].The Journal of High Technology Management Research,2009,20(1):52-61
[12] Datta S,Kaulgud V,Sharma V S.A Social Network Based Study of Software Team Dynamics[C]∥ISEC.2010:33-41
[13] Datta S,Sindhgatta R,Sengupta B.Evolution of developer collaboration on the jazz platform a study of a large scale agile project[C]∥ISEC.2011:21-30
[14] Pinzger M,Nagappan N,Murphy B.Can developer -module networks predict failures?[C]∥Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering.ACM,2008:2-12
[15] Huang S K,Liu K M.Mining version histories to verify thelearning process of legitimate peripheral participants[C]∥Proceedings of 2005 International Workshop on Mining Software Repositories.New York,USA,2005:1-5
[16] Lave J,Wenger E.Situated Learning:Legitimate Peripheral Participation[M].Cambridge: Cambridge University Press,1991
[17] Crowston K,Howison J.Assessing the health of open sourcecommunities[J].Computer,2006,39(5):89-91
[18] Sureka A,Goyal A,Rastogi A.Using Social Network Analysis for Mining Collaboration Data in a Defect Tracking System for Risk and Vulnerability Analysis[C]∥Proceeding of 4th India Software Engineering Conferene.ACM,2011:195-204
[19] Hahn J,Moon J Y,Zhang C.Emergence of New Project Teams from Open Source Software Developer Networks:Impact of Prior Collaboration Ties[J].Information Systems Research,2008,9(3):369-391
[20] Cavrak,Orlic M,Crnkovic I.Collaboration patterns in distribu-ted software development projects[C]∥ICSE 2012,2012:1235-1244
[21] Bosnic,Cavrak I,Orlic M,et al.Student Motivation in Distributed Software Development Projects[C]∥Proceedings of Colla-borative Teaching of Globally Distributed Software Development:Community Building Workshop (CTGDSD 2011).2011:31-35
[23] 何鹏,李兵,潘伟丰.基于管理者合作网络的开源软件开发社区中心性分析[J].小型微型计算机系统,2013,4(1):54-57
[24] Bosnic′,Cˇ avrak I,Zˇ agar M,et al.“Customers’ Role in Teaching Distributed Software Development[C]∥IEEE Conference on Software Engineering Education and Training.2010:73-80
[25] Conaldi G,Lomi A,Tonellato M.Dynamic Models of Affiliation and the Network Structure of Problem Solving in an Open Source Software Project[J].Organizational Research Methods,Jan.2012,15(3):385-412
[26] Barabasi A L,Albert R.Emergence of scaling in random net-works[J].Science,1999,286:509-511
[27] Abbasi,Hossain L,Leydesdorff L.Betweenness centrality as a driver of preferential attachment in the evolution of research collaboration networks[J].Journal of Informetrics,2012,6(3):403-412

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .