Reproducible, scalable, and shareable analysis pipelines with bioinformatics workflow managers

L Wratten, A Wilm, J Göke - Nature methods, 2021 - nature.com
The rapid growth of high-throughput technologies has transformed biomedical research.
With the increasing amount and complexity of data, scalability and reproducibility have …

" Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain

D Wermke, JH Klemmer, N Wöhler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …

Selecting third-party libraries: The practitioners' perspective

E Larios Vargas, M Aniche, C Treude… - Proceedings of the 28th …, 2020 - dl.acm.org
The selection of third-party libraries is an essential element of virtually any software
development project. However, deciding which libraries to choose is a challenging practical …

Demystifying faulty code: Step-by-step reasoning for explainable fault localization

R Widyasari, JW Ang, TG Nguyen… - … on Software Analysis …, 2024 - ieeexplore.ieee.org
Fault localization is a critical process that involves identifying specific program elements
responsible for program failures. Manually pinpointing these elements, such as classes …

Systematic literature review of the trust reinforcement mechanisms exist in package ecosystems

A Temelko, F Hou, S Farshidi, S Jansen - arXiv preprint arXiv:2407.02522, 2024 - arxiv.org
We conducted a thorough SLR to better grasp the challenges and possible solutions
associated with existing npm security tools. Our goal was to delve into documented …

Concept-annotated examples for library comparison

L Yan, M Kim, B Hartmann, T Zhang… - Proceedings of the 35th …, 2022 - dl.acm.org
Programmers often rely on online resources—such as code examples, documentation,
blogs, and Q&A forums—to compare similar libraries and select the one most suitable for …

What is the intended usage context of this model? An exploratory study of pre-trained models on various model repositories

L Gong, J Zhang, M Wei, H Zhang… - ACM Transactions on …, 2023 - dl.acm.org
There is a trend of researchers and practitioners to directly apply pre-trained models to solve
their specific tasks. For example, researchers in software engineering (SE) have …

Natural language-guided programming

G Heyman, R Huysegems, P Justen… - Proceedings of the 2021 …, 2021 - dl.acm.org
In today's software world with its cornucopia of reusable software libraries, when a
programmer is faced with a programming task that they suspect can be completed through …

Are we ready to embrace generative AI for software Q&A?

B Xu, TD Nguyen, T Le-Cong, T Hoang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Stack Overflow, the world's largest software Q&A (SQA) website, is facing a significant traffic
drop due to the emergence of generative AI techniques. ChatGPT is banned by Stack …

What are the characteristics of highly-selected packages? A case study on the npm ecosystem

S Mujahid, R Abdalkareem, E Shihab - Journal of Systems and Software, 2023 - Elsevier
With the popularity of software ecosystems, the number of open source components (known
as packages) has grown rapidly. Identifying high-quality and well-maintained packages from …