67 Hits in 5.7 sec

Promises and Perils of Inferring Personality on GitHub [article]

Frenk van Mil, Ayushi Rastogi, Andy Zaidman
2021 arXiv   pre-print
This paper compares the inferential ability of three widely studied text-based personality tests against each other and the ground truth on GitHub.  ...  Today, the applications of personality are widespread, built on the solutions from psychology to infer personality.  ...  ACKNOWLEDGMENTS We thank all survey participants and Xunhui Zhang for technical support. This research was partially funded by the Dutch science foundation NWO through the Vici "TestShift" grant (No.  ... 
arXiv:2107.05829v2 fatcat:w364ryjr6jep5odrptjimq22dy

An in-depth study of the promises and perils of mining GitHub

Eirini Kalliamvakou, Georgios Gousios, Kelly Blincoe, Leif Singer, Daniel M. German, Daniela Damian
2015 Empirical Software Engineering  
Our results indicate that while GitHub is a rich source of data on software development, mining GitHub for research purposes should take various potential perils into consideration.  ...  For example, we show that the majority of the projects are personal and inactive, and that almost 40 % of all pull requests do not appear as merged even though they were.  ...  Acknowledgments We would like to thank the authors of Padhye et al. (2014) and Matragkas et al. (2014) for their valuable feedback regarding the evaluation of the impact of these perils on their research  ... 
doi:10.1007/s10664-015-9393-5 fatcat:hoiypztavrg33n3stbn3a7vuwm

The promises and perils of mining GitHub

Eirini Kalliamvakou, Georgios Gousios, Kelly Blincoe, Leif Singer, Daniel M. German, Daniela Damian
2014 Proceedings of the 11th Working Conference on Mining Software Repositories - MSR 2014  
We show, for example, that the majority of the projects are personal and inactive; that GitHub is also being used for free storage and as a Web hosting service; and that almost 40% of all pull requests  ...  Our results indicate that, while GitHub is a rich source of data on software development, mining GitHub for research purposes should take various potential perils into consideration.  ...  On the Users Involved with Projects Peril V: Two thirds of projects (71.6% of repositories) are personal.  ... 
doi:10.1145/2597073.2597074 dblp:conf/msr/KalliamvakouGBSGD14 fatcat:2oo6n7yu2zeajg34whqtxbyike

GitHub Projects. Quality Analysis of Open-Source Software [chapter]

Oskar Jarczyk, Błażej Gruszka, Szymon Jaroszewicz, Leszek Bukowski, Adam Wierzbicki
2014 Lecture Notes in Computer Science  
After developing the metrics we have gathered characteristics of several GitHub projects and analyzed their influence on the project quality using statistical regression techniques.  ...  This paper develops two such metrics, first one reflecting project's popularity, and the second one -the quality of support offered by team members to users.  ...  Among other things they show that the majority of the projects on GitHub are personal and inactive.  ... 
doi:10.1007/978-3-319-13734-6_6 fatcat:xhcem7dmobalbk3doidvpvmcsu

Recommending relevant projects via user behaviour: an exploratory study on github

Lingxiao Zhang, Yanzhen Zou, Bing Xie, Zixiao Zhu
2014 Proceedings of the 1st International Workshop on Crowd-based Software Development Methods and Technologies - CrowdSoft 2014  
In this paper, we explore the possibilities of such a method by conducting a set of experiments on selected data sets from Github.  ...  ., Github) provide various features like Forking and Sending Pull-requests to support crowdbased software engineering. When using these features, a large amount of user behavior data is recorded.  ...  The data sets provided by github have also become the resource pool for many researchers. Bird et al. [2] summarized promises and perils of mining Github data sets.  ... 
doi:10.1145/2666539.2666570 dblp:conf/sigsoft/ZhangZXZ14 fatcat:43xiujhoi5grhp75aukqosb6li

GitHub: exploring the space between boss-less and hierarchical forms of organizing

Richard M. Burton, Dorthe Døjbak Håkonsson, Jackson Nickerson, Phanish Puranam, Maciej Workiewicz, Todd Zenger
2017 Journal of Organization Design  
Similar to Valve, the subject of the previous article in the series (Puranam and Håkonsson, J Organ Design 4: 2-4, 2015) GitHub is used to delegate the choice of projects and project allocation to its  ...  We asked several renowned organization scientists to share their thoughts on this interesting case and discuss what we can learn from it.  ...  Acknowledgements Many thanks to Teppo Felin, Karim Lakhani, and the participants of the "Organizational Safari" session at the Academy of Management conference in Vancouver.  ... 
doi:10.1186/s41469-017-0020-3 fatcat:v42gr2mlf5bmtfnfiloilgv3vq

The promises and perils of mining git

Christian Bird, Peter C. Rigby, Earl T. Barr, David J. Hamilton, Daniel M. German, Prem Devanbu
2009 2009 6th IEEE International Working Conference on Mining Software Repositories  
Decentralization comes with both the promise of new data and the peril of its misinterpretation. We focus on git, a very popular DSCM used in high-profile projects.  ...  Our goal is to help researchers interested in DSCMs avoid these and other perils when mining and analyzing git data. Out of a stem that scored the hand I wrung it in a weary land. A. E.  ...  Any person may make their own git repository publicly accessible and there already exists free git hosting services, such as GitHub, Gitorious, and  ... 
doi:10.1109/msr.2009.5069475 dblp:conf/msr/BirdRBHGD09 fatcat:52yvlcno6vdtlncauaw2cvaz2q

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols

Divya Siddarth, Sergey Ivliev, Santiago Siri, Paula Berman
2020 Frontiers in Blockchain  
In this review, we will outline the approaches of these new and natively digital sources of authentication-their attributes, methodologies, strengths, and weaknesses-and sketch out possible directions  ...  The legitimacy of claims is instead derived from traditional centralized institutions such as national ID issuers and KYC providers.  ...  ACKNOWLEDGMENTS We would like to express our sincere gratitude to Adam Stallard, Clément Lesaege, Peter Porobov, Rich McAteer, Vinay Taylor, and Hugo Trentesaux for sharing their work with us and contributing  ... 
doi:10.3389/fbloc.2020.590171 fatcat:e72zwsczqjbdfldfqgh7odlwfm

Putting the Semantics into Semantic Versioning [article]

Patrick Lam and Jens Dietrich and David J. Pearce
2020 arXiv   pre-print
In particular, contracts (both traditional and lightweight) are a promising input to semantic versioning calculators, which can suggest whether an upgrade is likely to be safe.  ...  Upgrading too late leaves downstream vulnerable to security issues and missing out on useful improvements; upgrading too early results in excess work.  ...  We thank Chintan Patel for developing tools to identify some of the breaking changes we used as examples, and Laurian Angelescu, Max Dietrich, Leo Meyerovich, and Lucas Wojciechowski for valuable insights  ... 
arXiv:2008.07069v1 fatcat:khw5phyplrdcrpi24xyz644nt4

Social Computing Unhinged

James Evans
2020 Journal of Social Computing  
This leads to a vision of social computing as an extreme form of human computer interaction, whereby machines and persons recursively combine to augment one another in generating collective intelligence  ...  We provide examples of current and planned social and behavioral science investigations uniquely enabled by software-defined sensors as part of the SAGE project, an expanded follow-on effort that includes  ...  From the origins of social messaging and media [7] to the contemporary widespread production of open source software on collaborative sites like GitHub [8] , which enable unparalleled observation of  ... 
doi:10.23919/jsc.2020.0002 fatcat:6mlmavmvtndabd4pbgp2ighouy

EDITH :ECG biometrics aided by Deep learning for reliable Individual auTHentication [article]

Nabil Ibtehaz, Muhammad E. H. Chowdhury, Amith Khandakar, Serkan Kiranyaz, M. Sohel Rahman, Anas Tahir, Yazan Qiblawey, Tawsifur Rahman
2021 arXiv   pre-print
We have evaluated EDITH using 4 commonly used datasets and outperformed the prior works using less number of beats.  ...  In recent years, physiological signal based authentication has shown great promises,for its inherent robustness against forgery.  ...  Acknowledgement This work was supported by Grant NPRP12S-0227-190164 from the Qatar National Research Fund, a member of Qatar Foundation, Doha, Qatar and the claims made herein are solely the responsibility  ... 
arXiv:2102.08026v2 fatcat:2hrhbk3yvba3bnhp34bze6wp2y

Benchmarking Multimodal AutoML for Tabular Data with Text Fields [article]

Xingjian Shi, Jonas Mueller, Nick Erickson, Mu Li, Alexander J. Smola
2021 arXiv   pre-print
We consider the use of automated supervised learning systems for data tables that not only contain numeric/categorical columns, but one or more text fields as well.  ...  classification and regression tasks), number of features (with the number of text columns ranging from 1 to 28 between datasets), as well as how the predictive signal is decomposed between text vs. numeric  ...  Yes anybody may open Pull Request with desired changes on GitHub.  ... 
arXiv:2111.02705v1 fatcat:kvnyjxgkqbdbpedbgat433v5uu

Coding Culture: Challenges and Recommendations for Comparative Cultural Databases

Edward Slingerland, Quentin D. Atkinson, Carol R. Ember, Oliver Sheehan, Michael Muthukrishna, Joseph Bulbulia, Russell D. Gray
2020 Evolutionary Human Sciences  
of analysis, data gathering and sampling strategies, winning expert buy-in, achieving reliability and reproducibility in coding, and ensuring interoperability and sustainability of the resulting databases  ...  Media summary: This paper describes major challenges in, and proposes best practices for, the construction of large coded databases of cultural history.  ...  We would like to thank Adam Barnett for Figures 1 and 3 , Hedvig Skirgård for Figure 2 , and Harald Hammarström for discussion about the automated coding of grammars, as well as Amir Ashtari and Cyrus  ... 
doi:10.1017/ehs.2020.30 fatcat:7jctrw4efzgebkvzupgqxjgkya

The Who, What, How of Software Engineering Research: A Socio-Technical Framework [article]

Margaret-Anne Storey and Neil A. Ernst and Courtney Williams and Eirini Kalliamvakou
2020 arXiv   pre-print
Software engineering is a socio-technical endeavor, and while many of our contributions focus on technical aspects, human stakeholders such as software developers are directly affected by and can benefit  ...  In particular, there is a need for strategies that aim at a deeper understanding of human and social aspects of software development practice to balance the design and evaluation of technical innovations  ...  Acknowledgements We would like to thank Cassandra Petrachenko, Alexey Zagalsky and Soroush Yousefi for their invaluable help with this paper and research.  ... 
arXiv:1905.12841v3 fatcat:l6f4g4yjwzdhxjj4hbiydnt7r4

A Case for the Public Domain

Clark D. Asay
2013 Social Science Research Network  
relating to innovation and creativity based on the experiences of the open license movements and the arguments of this Article.  ...  Such movements rely on this IP-based approach due to fears that, without IP rights and such conditions, a tragedy of the commons would ensue.  ...  Magliocca, Blackberries and Barnyards: Patent Trolls and the Perils of Innovation, 82 NOTRE DAME L.  ... 
doi:10.2139/ssrn.2201066 fatcat:q5nfrlh5wfaibliememuopwkpe
« Previous Showing results 1 — 15 out of 67 results