Filters








10,831 Hits in 4.9 sec

Understanding Digits in Identifier Names: An Exploratory Study [article]

Anthony Peruma, Christian D. Newman
2022 arXiv   pre-print
This paper explores the presence and purpose of digits in identifier names through an empirical study of 800 open-source Java systems.  ...  We study how digits contribute to the semantics of identifier names and how identifier names that contain digits evolve over time through renaming.  ...  Newman Table 1 : 1 Understanding Digits in Identifier Names: An Exploratory Study NLBSE '22, May 8, 2022, Virtual Event, USA Volume of rename and non-rename refactoring operations in the source dataset  ... 
arXiv:2203.00113v4 fatcat:3uqtanie7fgqzazzzktqvmk2c4

Towards a Model to Appraise and Suggest Identifier Names

Anthony Peruma
2019 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
Even though correcting poor names through rename operations is a viable option for solving this problem, renaming itself is an act of rework and is not immune to defect injection.  ...  In this study, we aim to understand the motivations that drive developers to name and rename identifiers and the decisions they make in determining the name.  ...  This exploratory study will constitute of an eye-tracking study on developer actions and reactions to identifier names in source code.  ... 
doi:10.1109/icsme.2019.00103 dblp:conf/icsm/Peruma19 fatcat:zkbqnnqjurcbxcos2h3gt5kqzm

Linux variability anomalies: What causes them and how do they get fixed?

Sarah Nadi, Christian Dietrich, Reinhard Tartler, Richard C. Holt, Daniel Lohmann
2013 2013 10th Working Conference on Mining Software Repositories (MSR)  
We first perform an exploratory case study that uses an existing set of patches which solve variability anomalies to identify patterns for their causes.  ...  In this work, we provide an analysis of the causes and fixes of variability anomalies in Linux.  ...  To determine how variability anomalies get introduced, we first perform an exploratory case study [6] based on an existing set of 106 patches that fix variability anomalies.  ... 
doi:10.1109/msr.2013.6624017 dblp:conf/msr/NadiDTHL13 fatcat:mgyysix4ijg45bjacxhgejcsca

On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven Libraries [article]

Ayano Ikegami, Raula Gaikovina Kula, Bodin Chinthanet, Vittunyuta Maeprasart, Ali Ouni, Takashi Ishio, Kenichi Matsumoto
2022 arXiv   pre-print
Surprisingly, our exploratory results show that developers incorporate refactoring operations in their fixes, with 31.9% (112 out of 351) of the vulnerabilities paired with refactoring actions.  ...  We conducted a case study to analyze 143 maven libraries in which 351 known vulnerabilities had been detected and fixed.  ...  A summary statistic of the data collection is shown in Table 1 . EXPLORATORY STUDY RESULTS We now present the results of our study.  ... 
arXiv:2205.08116v1 fatcat:ab7qc6di4vapbgpbtheeizci5m

Renaming Me: Assessing the Influence of Gender Identity on Name Selection

Sharon N. Obasi, Richard Mocarski, Natalie Holt, Debra A. Hope, Nathan Woodruff
2018 Names  
This exploratory study offers insight into the connection between gender and naming strategies in an adult TGNC population.  ...  Renaming, the process of selecting and using a new name, can be instrumental in expressing an authentic gender identity.  ...  Of particular interest in this study was the renaming process of participants who identified as gender nonconforming.  ... 
doi:10.1080/00277738.2018.1536188 fatcat:vadxyxcutzdgbdw36bxuonvs5q

Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship Between Technical Debt and Refactoring [article]

Anthony Peruma, Eman Abdullah AlOmar, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni
2022 arXiv   pre-print
In this study, we explore developers repaying this debt through refactoring operations by examining occurrences of SATD removal in the code of 76 open-source Java systems.  ...  As a means of improving source code quality, developers often apply a series of refactoring operations to their codebase.  ...  Clean-up activities can include removing temporary code or renaming identifiers, such as in the case the developer renames an identifier (e.g., "TODO -Rename variable to commandId" [5]).  ... 
arXiv:2203.05660v1 fatcat:szuj6zervzhqvgbum3dr77ninu

An exploratory factor analysis of risk management practices: A study among small and medium contractors in Gauteng

Bérenger Renault, Justus Agumba, Nazeem Ansary
2018 Acta Structilia  
An extensive review of relevant literature on RMPs was conducted and used to develop a structured questionnaire posted to construction SMEs who were conveniently sampled in the Gauteng province of South  ...  It is important to note that the study was not conducted across South Africa; hence, the findings cannot be generalized.  ...  The purpose of this study is, therefore, to determine the reliable and valid RM practices tailored for construction SMEs projects, using exploratory factor analysis.  ... 
doi:10.18820/24150487/as25i1.1 fatcat:ho4schr62fcsppk2ola3l7ulxa

Development and validation of Speech-Language Pathology Occupational Stress Questionnaire (SLP-OSQ)

Pooja Nirmal Kumar, Rohit Ravi, Vani R. Lakshmi, Dhanshree Rajesh Gunjawate
2022 Clinical Epidemiology and Global Health  
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version  ...  of record.  ...  Exploratory factor analysis was carried out to identify and establish the constructs/factors among the measured items.  ... 
doi:10.1016/j.cegh.2022.101130 fatcat:gqjv4mu3enhupblwkpkiliq6wu

An Exploratory Factor Analysis of the Awareness of Fundamental Liberties among Students

Hazlina Mohd Padil, Nor Laila Ahmad, Noorsaliza Amin Nudin
2021 International Journal of Academic Research in Business and Social Sciences  
An exploratory factor analysis was conducted to find the factors that will be the measurement instrument in identifying the awareness of fundamental liberties among students.  ...  A total of 3 factors consist of 17 items were extracted from the exploratory factor analysis.  ...  Since the study was not based on any prior theory, exploratory factor analysis was employed to identify the number of factors relevant to the study.  ... 
doi:10.6007/ijarbss/v11-i9/10882 fatcat:v5y7yidftbgflaymh5loa2cpbu

Identifying outdated requirements based on source code changes

Eya Ben Charrada, Anne Koziolek, Martin Glinz
2012 2012 20th IEEE International Requirements Engineering Conference (RE)  
We evaluated our approach in a case study where we analyzed two consecutive source code versions and were able to detect 12 requirements-related changes out of 14 with a precision of 79%.  ...  We evaluated our approach in a case study where we analyzed two consecutive source code versions and were able to detect 12 requirements-related changes out of 14 with a precision of 79%.  ...  In Section II, we describe an exploratory case study to characterize source code changes that likely affect functional requirements and to derive heuristics to identify such changes.  ... 
doi:10.1109/re.2012.6345840 dblp:conf/re/CharradaKG12 fatcat:rpfnj3qwtvbq7ai3wxwmsxfspi

Page 1345 of Management & Marketing Abstracts Vol. 31, Issue 9 [page]

2006 Management & Marketing Abstracts  
The study used a modified version of a doctoral level programme, renamed Action E-Learning (AEL). Course members each presented an actual business issue.  ...  MMA Vol. 31, No. 9 (2006) Human resource development 2641 Action e-learning: an exploratory case study of action learning applied online Dewolfe Waddill D, Hum. Resour. Dev.  ... 

Historical perspectives of the American Association for Thoracic Surgery

J.Gordon Scannell
1996 Journal of Thoracic and Cardiovascular Surgery  
the clinical scene in New York and with his colleague, Willy Meyer, of the German Hospital, renamed the Lenox Hill in 1917.  ...  , a conclusion later challenged by Cannon's pioneer fluoroscopic studies of swallowing.  ...  In the Dictionary of American Biography he is identified primarily as a physiologist, yet this is the man who provided space in his laboratory for Sauerbruch's positive-pressure chamber when Willy Meyer  ... 
doi:10.1016/s0022-5223(96)70363-x pmid:8614160 fatcat:vjztby5ozjdo5kfal3x4eubqva

ADvISE: Architectural Decay in Software Evolution

Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol
2012 2012 16th European Conference on Software Maintenance and Reengineering  
In this paper, we propose a quantitative approach to study the evolution of the architecture of object oriented systems over time.  ...  We use these triplets as basic unit to measure the stability of an architecture.  ...  ACKNOWLEDGMENT This research was partially supported by NSERC (Research Chairs in Software Patterns and Patterns of Software and in Software Evolution) and FQRNT.  ... 
doi:10.1109/csmr.2012.34 dblp:conf/csmr/HassaineGHA12 fatcat:6aze66oa4jhyrbsxx6cweqqrde

Effects of Renaming Schizophrenia on Destigmatization among Medical Students in One Taiwan University

Yi-Hang Chiu, Meei-Ying Kao, Kah Kheng Goh, Cheng-Yu Lu, Mong-Liang Lu
2021 International Journal of Environmental Research and Public Health  
The aim of this study was to compare the differences of public stigma, self-stigma, and social distance associated with schizophrenia between old and new name of schizophrenia in medical students.  ...  In total, 52 and 71 of the first- and fourth-year medical students, respectively, participated in the study. Among them, there were 51 females and 72 males.  ...  In agreement with previous study [28] , an exploratory factor analysis of the modified attribution questionnaire in the old and new name of schizophrenia yielded a six-factor solution, accounting for  ... 
doi:10.3390/ijerph18179347 pmid:34501941 fatcat:t7ryhy3b25ekzllax64ew2cm2m

On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study

F. Jaafar, S. Hassaine, Y. Gueheneuc, S. Hamel, B. Adams
2013 2013 17th European Conference on Software Maintenance and Reengineering  
However, many studies thus far did not link the evolution of classes to faults.  ...  We perform an empirical study, on three open-source programs: ArgoUML, JFreechart, and XercesJ, to examine the relation between the evolution of object-oriented source code at class level and fault-proneness  ...  ACKNOWLEDGMENT This work has been partly funded a FQRNT team grant and the Canada Research Chair in Software Patterns and Patterns of Software.  ... 
doi:10.1109/csmr.2013.12 dblp:conf/csmr/JaafarHGHA13 fatcat:akl6i6dwhrg2lbdwk3jnuvoppy
« Previous Showing results 1 — 15 out of 10,831 results