A survey on the use of topic models when mining software repositories Tse-Hsun ChenStephen W. ThomasAhmed E. Hassan OriginalPaper 10 September 2015 Pages: 1843 - 1919
Game of detections: how are security vulnerabilities discovered in the wild? Munawar HafizMing Fang OriginalPaper 15 September 2015 Pages: 1920 - 1959
Studying the needed effort for identifying duplicate issues Mohamed Sami RakhaWeiyi ShangAhmed E. Hassan OriginalPaper 04 November 2015 Pages: 1960 - 1989
Change-based test selection: an empirical evaluation Quinten David SoetensSerge DemeyerJavier PĂ©rez OriginalPaper 11 November 2015 Pages: 1990 - 2032
Guest editorial: mining software repositories Martin PinzgerSunghun Kim Editorial 09 August 2016 Pages: 2033 - 2034
An in-depth study of the promises and perils of mining GitHub Eirini KalliamvakouGeorgios GousiosDaniela Damian OriginalPaper 05 September 2015 Pages: 2035 - 2071
Studying just-in-time defect prediction using cross-project models Yasutaka KameiTakafumi FukushimaAhmed E. Hassan OriginalPaper 14 September 2015 Pages: 2072 - 2106
Towards building a universal defect prediction model with rank transformed predictors Feng ZhangAudris MockusYing Zou OriginalPaper 30 August 2015 Pages: 2107 - 2145
An empirical study of the impact of modern code review practices on software quality Shane McIntoshYasutaka KameiAhmed E. Hassan OriginalPaper 25 April 2015 Pages: 2146 - 2189