Computer Science ›› 2020, Vol. 47 ›› Issue (6): 51-58.doi: 10.11896/jsjkx.190300140
• Intelligent Software Engineering • Previous Articles Next Articles
HE Peng1,2, YU Lv-jun1
CLC Number:
[1]BROWN A W,BOOCH G.Reusing Open-Source Software and Practices:The Impact of Open-Source on Commercial Vendors[C]//International Conference on Software Reuse.2002:123-136. [2]YANG B,YU Q,ZHANG W,et al.Influence Factors Correlation Analysis in Github Open Source Software Development Process[J].Journal of Software,2017,28(6):1330-1342. [3]HE P,LI B,YANG X H,et al.Research On Developer Preferential Collaboration in Open-Source Software Community[J].Computer Science,2015,42(2):161-166. [4]ZHOU M H.Looking for micro-process in large-scale data[C]//Proceedings of the 2nd International Workshop on Evidential Assessment of Software Technologies.New York:ACM,2012:39-42. [5]KALLIAMVAKOU E,GOUSIOS G,BLINCOE K,et al.The Promises and Perils of Mining Github[C]//Proceedings of the 11th Working Conference on Mining Software Repositories.New York:ACM,2014:92-101. [6]LI W P,WANG J B,LIN Z Q,et al.Software Knowledge Graph Building Method for Open Source Project[J].Journal of Frontiers of Computer Science & Technology,2017,11(6):851-862. [7]JUNG H W,KIM S G,CHUNG C S.Measuring Software Product Quality:A Survey of ISO/IEC 9126[J].IEEE Software,2004,21(5):88-92. [8]GIRBEA A,SUCIU C,NECHIFOR S,et al.Design and Implementation of a Service-Oriented Architecture for the Optimization of Industrial Applications[J].IEEE Transactions on Industrial Informatics,2014,10(1):185-196. [9]MENEELY A,WILLIAMS L,SNIPES W,et al.Predicting Failures with Developer Networks and Social Network Analysis[C]//Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2008:13-23. [10]LIMAM N,BOUTABA R.Assessing Software Service Quality and Trustworthiness at Selection Time[J].IEEE Transactions on Software Engineering,2010,36(4):559-574. [11]MACLEAN A C,PRATT L J,KREIN J L,et al.Trends that Affect Temporal Analysis using Sourceforge data[C]//Proceedings of the 5th International Workshop on Public Data about Software Development.North Carolina,USA,2010:6-11. [12]MACLEAN A C.Commit Patterns and Threats to Validity in Analysis of Open Source Software Repositories[D].Utah:Brigham Young University,2012. [13]PRATT L J.Cliff Walls:Threats to Validity in Empirical Studies of Open Source Forges[D].Utah:Brigham Young University,2013. [14]CHENG C,LI B,LI Z Y,et al.Developer Role Evolution in Open Source Software Ecosystem:An Explanatory Study on GNOME[J].Journal of Computer Science and Technology,2017,32(2):396-414. [15]PRATT L J,MACLEAN A C,KNUTSON C D,et al.Cliff Walls:An Analysis of Monolithic Commits Using Latent Dirichlet Allocation[C]//IFIP International Conference on Open Source Systems.Springer,2011:282-298. [16]CHEN D,WANG X,HE P,et al.Towards Understanding Existing Developers’ Collaborative Behavior In OSS Communities[J].ComputerScience,2016,43(6A):476-479. [17]GRÖNLUND M,JEFFORD-BAKER J.Measuring correlation between commit frequency and popularity on GitHub[D].Stockholm:KTH Royal Institute of Technology,2017. [18]SINHA V S,MANI S,SINHA S.Entering the circle of trust:developer initiation as committers in open-source projects[C]//Proceedings of the 8th Working Conference on Mining Software Repositories.2011:133-142. [19]MA Y T,WU Y,XU Y W.Dynamics of open-source software developer's commit behavior[C]//Proceedings of the 29th Annual ACM Symposium on Applied Computing(SAC’14).New York,USA:ACM Press,2014:1171-1173. [20]GOUSIOS G.The GHTorent dataset and tool suite[C]//Proceedings of the 10th Working Conference on Mining Software Repositories.2013:233-236. [21]Struggling in IT.GitHub 2018 Annual Report[EB/OL].http://www.wh-ford.com/f828820/20181030A1WJZ800.html. [22]HINDLE A,GERMAN D M,HOLT R C,et al.Automatic Classification of Large Changes into Maintenance Categories[C]//IEEE International Conference on Program Comprehension.IEEE,2009:99-108. [23]ARAFAT O,RIEHLE D.The Commit Size Distribution of Open Source Software[C]//Hawaii International Conference on System Science.IEEE,2009:1-8. [24]GU Q,CHEN D X.Validation and Simulation of Software System Evolution Rules Using Software Networks[J].Scientia Sinica Informationis,2014,44(1):20-36. [25]GU Q,XIONG S J,CHEN D X.Correlations between characteristics of maximum influence and degree distributions in software networks[J].SCIENCE CHINA Information Sciences,2014,57(7):1-12. [26]HE P,WANG P,LI B,et al.An Evolution Analysis of Software System Based On Multi-Granularity Software Network[J].Acta Electronica Sinica,2018,46(2):257-267. [27]PAN W F,LI B,MA Y T,et al.Multi-Granularity Evolution Analysis of Software Using Complex Network Theory[J].Journal of Systems Science and Complexity,2011,24(6):1068-1082. [28]NEWMAN M E J.Fast Algorithm for Detecting Community Structure in Networks[J].Physical Review E,2003,69(6):066133. |
[1] | FAN Jia-kuan, WANG Hao-yue, ZHAO Sheng-yu, ZHOU Tian-yi, WANG Wei. Data-driven Methods for Quantitative Assessment and Enhancement of Open Source Contributions [J]. Computer Science, 2021, 48(5): 45-50. |
[2] | ZHANG Jiu-jie, CHEN Chao, NIE Hong-xuan, XIA Yu-qin, ZHANG Li-ping, MA Zhan-fei. Empirical Study on Stability of Clone Code Sets Based on Class Granularity [J]. Computer Science, 2021, 48(5): 75-85. |
[3] | WANG Ji-wen, WU Yi-jian, PENG Xin. Approach of God Class Detection Based on Evolutionary and Semantic Features [J]. Computer Science, 2021, 48(12): 59-66. |
[4] | ZHANG Jing-xuan, JIANG He. Research Status and Development Trend of Identifier Normalization [J]. Computer Science, 2020, 47(3): 1-4. |
[5] | LU Dong-dong, WU Jie, LIU Peng, SHENG Yong-xiang. Analysis of Key Developer Type and Robustness of Collaboration Network in Open Source Software [J]. Computer Science, 2020, 47(12): 100-105. |
[6] | ZHAO Liang. Analysis of Impact of Open Source Components in Mixed Source Software Projects [J]. Computer Science, 2020, 47(11A): 541-543. |
[7] | ZHONG Lin-hui, FU Li-juan, YE Hai-tao, QI Jie, XU Jing. Study on Reverse Engineering Generation Method of Software Evolution History [J]. Computer Science, 2020, 47(11A): 549-556. |
[8] | WANG Kuo, WANG Zhong-jie. Crowdsourcing Collaboration Process Recovery Method [J]. Computer Science, 2020, 47(10): 19-25. |
[9] | PAN Hao, ZHENG Wei, ZHANG Zi-feng, LU Chao-qun. Study on Fractal Features of Software Networks [J]. Computer Science, 2019, 46(2): 166-170. |
[10] | TANG Qian-wen, CHEN Liang-yu. Analysis of Java Open Source System Evolution Based on Complex Network Theory [J]. Computer Science, 2018, 45(8): 166-173. |
[11] | ZHENG Jiao-jiao, LI Tong, LIN Ying, XIE Zhong-wen, WANG Xiao-fang, CHENG Lei, LIU Miao. Judgement Method of Evolution Consistency of Component System [J]. Computer Science, 2018, 45(10): 189-195. |
[12] | HE Yun, WANG Wei and LI Tong. Formal Method for Describing Software Evolution Ability Feature [J]. Computer Science, 2017, 44(7): 128-136. |
[13] | ZHAO Hui-qun and HUANG Yu-han. Program Verification of Software Model’s Algebraic Properties [J]. Computer Science, 2017, 44(11): 240-245. |
[14] | CHEN Dan, WANG Xing, HE Peng and ZENG Cheng. Towards Understanding Existing Developers’ Collaborative Behavior in OSS Communities [J]. Computer Science, 2016, 43(Z6): 476-479. |
[15] | ZHONG Lin-hui, LI Jun-jie, XIA Jin and XUE Liang-bo. Research on Evolution Similarity Measurement of Component-based Software Based on Multi-dimensional Evolution Properties [J]. Computer Science, 2016, 43(Z11): 499-505. |
|