Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Rochester Institute of Technology

Articles

Discipline
Keyword
Publication Year

Articles 1 - 30 of 55

Full-Text Articles in Physical Sciences and Mathematics

A Primer On The Legendre Transformation, Steven J. Kilner, David L. Farnsworth Nov 2023

A Primer On The Legendre Transformation, Steven J. Kilner, David L. Farnsworth

Articles

Guidance is offered for understanding and using the Legendre transformation and its associated duality among functions and curves. The genesis of this paper was encounters with colleagues and students asking about the transformation. A main feature is simplicity of exposition, while keeping in mind the purpose or application for using the transformation.


Probability Distributions Arising In Connection With The Inspection Paradox For Bernoulli Trials., James E. Marengo, Anne Marino Himes, W. Cade Reinberger, David L. Farnsworth Nov 2023

Probability Distributions Arising In Connection With The Inspection Paradox For Bernoulli Trials., James E. Marengo, Anne Marino Himes, W. Cade Reinberger, David L. Farnsworth

Articles

In renewal theory, the Inspection Paradox refers to the fact that an interarrival period in a renewal process which contains a fixed inspection time tends to be longer than one for the corresponding uninspected process. We focus on the paradox for Bernoulli trials. Probability distributions and moments for the lengths of the interarrival periods are derived for the inspected process, and we compare them to those for the uninspected case.


The State Of Accessibility In Blackboard: Survey And User Reviews Case Study, Mohamed Wiem Mkaouer, Wajdi Aljedaani, Stephanie Ludi, Mohammed Alkahtani, Marcelo M. Eler, Marouane Kessentini, Ali Ouni Apr 2023

The State Of Accessibility In Blackboard: Survey And User Reviews Case Study, Mohamed Wiem Mkaouer, Wajdi Aljedaani, Stephanie Ludi, Mohammed Alkahtani, Marcelo M. Eler, Marouane Kessentini, Ali Ouni

Articles

Context: Nowadays, mobile applications (or apps) have become vital in our daily life, particularly within education. Many institutions increasingly rely on mobile apps to provide access to all their students. However, many education mobile apps remain inaccessible to users with disabilities who need to utilize accessibility features like talkback or screen reader features. Accessibility features have to be considered in mobile apps to foster equity and inclusion in the educational environment allowing to use of such apps without limitations. Gaps in the accessibility to educational systems persist.

Objective: In this paper, we focus on the accessibility of the Blackboard mobile …


Modeling And Fitting Two-Way Tables Containing Outliers, David L. Farnsworth Feb 2023

Modeling And Fitting Two-Way Tables Containing Outliers, David L. Farnsworth

Articles

A model is proposed for two-way tables of measurement data containing outliers. The two independent variables are categorical and error free. Neither missing values nor replication are present. The model consists of the sum of a customary additive part that can be fit using least squares and a part that is composed of outliers. Recommendations are made for methods for identifying cells containing outliers and for fitting the model. A graph of the observations is used to determine the outliers’ locations. For all cells containing an outlier, replacement values are determined simultaneously using a classical missing-data tool. The result is …


A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim Jan 2023

A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim

Articles

This report presents a mathematical model of juvenile delinquency in the New York State. In particular, we develop a juvenile delinquency system of non-linear differential equations using the mathematical epidemiology framework. In constructing this model, we assume that juvenile delinquency can be studied as a socially infectious disease. The stability of the juvenile delinquency-free equilibrium of the model is examined using the standard non-linear dynamical systems theory technique. We carried out a data fitting based on real-life data from the New York State Criminal Justice Services. The research result reveals that the formulated model conforms with the available data and …


An Exploratory Study On Refactoring Documentation In Issues Handling, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni May 2022

An Exploratory Study On Refactoring Documentation In Issues Handling, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni

Articles

Understanding the practice of refactoring documentation is of paramount importance in academia and industry. Issue tracking systems are used by most software projects enabling developers, quality assurance, managers, and users to submit feature requests and other tasks such as bug fixing and code review. Although recent studies explored how to document refactoring in commit messages, little is known about how developers describe their refactoring needs in issues. In this study, we aim at exploring developer-reported refactoring changes in issues to better understand what developers consider to be problematic in their code and how they handle it. Our approach relies on …


Code Review Practices For Refactoring Changes: An Empirical Study On Openstack, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Moatz Chouchen, Ali Ouni May 2022

Code Review Practices For Refactoring Changes: An Empirical Study On Openstack, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Moatz Chouchen, Ali Ouni

Articles

Modern code review is a widely used technique employed in both industrial and open-source projects to improve software quality, share knowledge, and ensure adherence to coding standards and guidelines. During code review, developers may discuss refactoring activities before merging code changes in the code base. To date, code review has been extensively studied to explore its general challenges, best practices and outcomes, and socio-technical aspects. However, little is known about how refactoring is being reviewed and what developers care about when they review refactored code. Hence, in this work, we present a quantitative and qualitative study to understand what are …


Controlling Unequal Surface Energy Results Caused By Test Liquids: The Case Of Uv/O3 Treated Pet, Bilge N. Altay, Paul D. Fleming, Md Arifur Rahman, Alexandra Pekarovicova, Bruce Myers, Cem Aydemir, Arif Karademir Apr 2022

Controlling Unequal Surface Energy Results Caused By Test Liquids: The Case Of Uv/O3 Treated Pet, Bilge N. Altay, Paul D. Fleming, Md Arifur Rahman, Alexandra Pekarovicova, Bruce Myers, Cem Aydemir, Arif Karademir

Articles

Ultraviolet/ozone (UV/O3) treatment has been reported to be an effective method to modify properties such as wettability, adhesion or adsorption of plastic surfaces. The change in the surface is measured by contact angle analysis, which employs liquids and their surface tensions (ST) to estimate the surface energy (SE). We found two different practices in the scientific community: (1) the majority of researchers adopted the ST value of liquids from the literature, while (2) other researchers conducted real-time measurements in the lab under ambient conditions prior to SE estimation. To the best of our knowledge, there is no study that compares …


Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D Feb 2022

Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D

Articles

Healthcare systems are under siege globally regarding technology adoption; the recent pandemic has only magnified the issues. Providers and patients alike look to new enabling technologies to establish real-time connectivity and capability for a growing range of remote telehealth solutions. The migration to new technology is not as seamless as clinicians and patients would like since the new workflows pose new responsibilities and barriers to adoption across the telehealth ecosystem. Technology-mediated workflows (integrated software and personal medical devices) are increasingly important in patient-centered healthcare; software-intense systems will become integral in prescribed treatment plans [1]. My research explored the path to …


Probability Models With Discrete And Continuous Parts, James E. Marengo, David L. Farnsworth Feb 2022

Probability Models With Discrete And Continuous Parts, James E. Marengo, David L. Farnsworth

Articles

In mathematical statistics courses, students learn that the quadratic function E ((X – x )-squared) is minimized when x is the mean of the random variable X, and that the graphs of this function for any two distributions of X are simply translates of each other. We focus on the problem of minimizing the function defined by y ( x) = E ( IX – xI-squared ) in the context of mixtures of probability distributions of the discrete, absolutely continuous, and singular continuous types. This problem is important, for example, in Bayesian statistics, when one attempts to compute the decision …


Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman Jan 2022

Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman

Articles

Self-Admitted Technical Debt (SATD) is a metaphorical concept to describe the self-documented addition of technical debt to a software project in the form of source code comments. SATD can linger in projects and degrade source-code quality, but it can also be more visible than unintentionally added or undocumented technical debt. Understanding the implications of adding SATD to a software project is important because developers can benefit from a better understanding of the quality trade-offs they are making. However, empirical studies, analyzing the survivability and removal of SATD comments, are challenged by potential code changes or SATD comment updates that may …


Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li Dec 2021

Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li

Articles

Goals: This paper discusses the need for a predictable method to evaluate gains and gaps of collaborative technology-mediated workflows and introduces an evaluation framework to address this need. Methods: The Collaborative Space Analysis Framework (CS-AF), introduced in this research, is a cross-disciplinary evaluation method designed to evaluate technology-mediated collaborative workflows. The 5-step CS-AF approach includes: (1) current-state workflow definition, (2) current-state (baseline) workflow assessment, (3) technology-mediated workflow development and deployment, (4) technology-mediated workflow assessment, (5) analysis, and conclusions. For this research, a comprehensive, empirical study of hypertension exam workflow for telehealth was conducted using the CS-AF approach. Results: The CS-AF …


On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu Dec 2021

On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu

Articles

Commit messages are the atomic level of software documentation. They provide a natural language description of the code change and its purpose. Messages are critical for software maintenance and program comprehension. Unlike documenting feature updates and bug fixes, little is known about how developers document their refactoring activities. Specifically, developers can perform multiple refactoring operations, including moving methods, extracting classes, renaming attributes, for various reasons, such as improving software quality, managing technical debt, and removing defects. Yet, there is no systematic study that analyzes the extent to which the documentation of refactoring accurately describes the refactoring operations performed at the …


On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni Dec 2021

On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni

Articles

Context: Refactoring is the art of modifying the design of a system without altering its behavior. The idea is to reorganize variables, classes and methods to facilitate their future adaptations and comprehension. As the concept of behavior preservation is fundamental for refactoring, several studies, using formal verification, language transformation and dynamic analysis, have been proposed to monitor the execution of refactoring operations and their impact on the program semantics. However, there is no existing study that examines the available behavior preservation strategies for each refactoring operation.

Objective: This paper identifies behavior preservation approaches in the research literature. Method: We conduct, …


Behind The Scenes: On The Relationship Between Developer Experience And Refactoring, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Anthony Peruma, Christian D. Newman, Ali Ouni Oct 2021

Behind The Scenes: On The Relationship Between Developer Experience And Refactoring, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Anthony Peruma, Christian D. Newman, Ali Ouni

Articles

Refactoring is widely recognized as one of the efficient techniques to manage technical debt and maintain a healthy software project through enforcing best design practices, or coping with design defects. Previous refactoring surveys have shown that code refactoring activities are mainly executed by developers who have sufficient knowledge of the system’s design, and disposing of leadership roles in their development teams. However, these surveys were mainly limited to specific projects and companies. In this paper, we explore the generalizability of the previous results by analyzing 800 open-source projects. We mine their refactoring activities, and we identify their corresponding contributors. Then, …


Locating Identities In Time: An Examination Of The Impact Of Temporality On Presentations Of The Self Through Location-Based Social Networks, Konstantinos Papangelis, Ioanna Lykourentzou, Vassilis-Javed Khan, Alan Chamberlain, Ting Cao, Micahel Saker, Nicolas Lalone Jul 2021

Locating Identities In Time: An Examination Of The Impact Of Temporality On Presentations Of The Self Through Location-Based Social Networks, Konstantinos Papangelis, Ioanna Lykourentzou, Vassilis-Javed Khan, Alan Chamberlain, Ting Cao, Micahel Saker, Nicolas Lalone

Articles

Studies of identity and location-based social networks (LBSN) have tended to focus on the performative aspects associated with marking one’s location. Yet, these studies often present this practice as being an a priori aspect of locative media. What is missing from this research is a more granular understanding of how this process develops over time. Accordingly, we focus on the first six weeks of 42 users beginning to use an LBSN we designed and named GeoMoments. Through our analysis of our users' activities, we contribute to understanding identity and LBSN in two distinct ways. First, we show how LBSN users …


1d Conditional Generative Adversarial Network For Spectrum-To-Spectrum Translation Of Simulated Chemical Reflectance Signatures, Cara Murphy, John Kerekes Jun 2021

1d Conditional Generative Adversarial Network For Spectrum-To-Spectrum Translation Of Simulated Chemical Reflectance Signatures, Cara Murphy, John Kerekes

Articles

The classification of trace chemical residues through active spectroscopic sensing is challenging due to the lack of physics-based models that can accurately predict spectra. To overcome this challenge, we leveraged the field of domain adaptation to translate data from the simulated to the measured domain for training a classifier. We developed the first 1D conditional generative adversarial network (GAN) to perform spectrum-to-spectrum translation of reflectance signatures. We applied the 1D conditional GAN to a library of simulated spectra and quantified the improvement in classification accuracy on real data using the translated spectra for training the classifier. Using the GAN-translated library, …


Pivot Points In Bivariate Linear Regression, David L. Farnsworth, Carl V. Lutzer Jun 2021

Pivot Points In Bivariate Linear Regression, David L. Farnsworth, Carl V. Lutzer

Articles

There are little-noticed points in the plane, which are artifacts of linear regression. The points, which are called pivot points, are the intersections of sets of regression lines. We derive the coordinates of the pivot point and explain its sources. We show how a pivot point arises in a certain notable data set, which has been analyzed often for points of high leverage. We obtain the application of pivot points that shortens calculations when updating a set of bivariate observations by adding a new point.


A Geometric Approach To Conditioning And The Search For Minimum Variance Unbiased Estimators, David L. Farnsworth, James E. Marengo Jun 2021

A Geometric Approach To Conditioning And The Search For Minimum Variance Unbiased Estimators, David L. Farnsworth, James E. Marengo

Articles

Our purpose is twofold: to present a prototypical example of the conditioning technique to obtain the best estimator of a parameter and to show that this technique resides in the structure of an inner product space. The technique uses conditioning of an unbiased estimator on a sufficient statistic. This procedure is founded upon the conditional variance formula, which leads to an inner product space and a geometric interpretation. The example clearly illustrates the dependence on the sampling methodology. These advantages show the power and centrality of this process.


Mining And Managing Big Data Refactoring For Design Improvement: Are We There Yet?, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni May 2021

Mining And Managing Big Data Refactoring For Design Improvement: Are We There Yet?, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni

Articles

Refactoring is a set of code changes applied to improve the internal structure of a program, without altering its external behavior. With the rise of continuous integration and the awareness of the necessity of managing technical debt, refactoring has become even more popular in recent software builds. Recent studies indicate that developers often perform refactorings. If we consider all refactorings performed across all projects, this consists of the refactoring knowledge that represents a rich source of information that can be useful for both developers and practitioners to better understand how refactoring is being applied in practice. However, mining, processing, and …


Refactoring Practices In The Context Of Modern Code Review: An Industrial Case Study At Xerox, Eman Abdullah Alomar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini May 2021

Refactoring Practices In The Context Of Modern Code Review: An Industrial Case Study At Xerox, Eman Abdullah Alomar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini

Articles

Modern code review is a common and essential 2 practice employed in both industrial and open-source projects 3 to improve software quality, share knowledge, and ensure con4 formance with coding standards. During code review, developers 5 may inspect and discuss various changes including refactoring 6 activities before merging code changes in the code base. To date, 7 code review has been extensively studied to explore its general 8 challenges, best practices and outcomes, and socio-technical 9 aspects. However, little is known about how refactoring activities 10 are being reviewed, perceived, and practiced. 11 This study aims to reveal insights into …


Finding The Needle In A Haystack: On The Automatic Identification Of Accessibility User Reviews, Eman Abdullah Alomar, Wajdi Aljedaani, Murtaza Tamjeed, Mohamed Wiem Mkaouer, Yasime Elglaly May 2021

Finding The Needle In A Haystack: On The Automatic Identification Of Accessibility User Reviews, Eman Abdullah Alomar, Wajdi Aljedaani, Murtaza Tamjeed, Mohamed Wiem Mkaouer, Yasime Elglaly

Articles

In recent years, mobile accessibility has become an important trend with the goal of allowing all users the possibility of using any app without many limitations. User reviews include insights that are useful for app evolution. However, with the increase in the amount of received reviews, manually analyzing them is tedious and time-consuming, especially when searching for accessibility reviews. The goal of this paper is to support the automated identification of accessibility in user reviews, to help technology professionals in prioritizing their handling, and thus, creating more inclusive apps. Particularly, we design a model that takes as input accessibility user …


Physics-Guided Neural Network For Predicting Chemical Signatures, Cara Murphy, John Kerekes Apr 2021

Physics-Guided Neural Network For Predicting Chemical Signatures, Cara Murphy, John Kerekes

Articles

Achieving high classification accuracy on trace chemical residues in active spectroscopic sensing is challenging due to the limited amount of training data available to the classifier. Such classifiers often rely on physics-based models for generating training data though these models are not always accurate when compared to measured data. To overcome this challenge, we developed a physics-guided neural network (PGNN) for predicting chemical reflectance for a set of parameterized inputs that is more accurate than the state-of-the-art physics-based signature model for chemical residues. After training the PGNN, we use it to generate a library of predicted spectra for training a …


Collaborative Behavior, Performance And Engagement With Visual Analytics Tasks Using Mobile Devices, Lei Chen, Hai-Ning Liang, Feiyu Lu, Konstantinos Papangelis, Ka Lok Man, Yong Yue Jan 2021

Collaborative Behavior, Performance And Engagement With Visual Analytics Tasks Using Mobile Devices, Lei Chen, Hai-Ning Liang, Feiyu Lu, Konstantinos Papangelis, Ka Lok Man, Yong Yue

Articles

Interactive visualizations are external tools that can support users’ exploratory activities. Collaboration can bring benefits to the exploration of visual representations or visu‐ alizations. This research investigates the use of co‐located collaborative visualizations in mobile devices, how users working with two different modes of interaction and view (Shared or Non‐Shared) and how being placed at various position arrangements (Corner‐to‐Corner, Face‐to‐Face, and Side‐by‐Side) affect their knowledge acquisition, engagement level, and learning efficiency. A user study is conducted with 60 partici‐ pants divided into 6 groups (2 modes×3 positions) using a tool that we developed to support the exploration of 3D visual …


An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill Jan 2021

An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill

Articles

This paper presents an ensemble part-of-speech tagging approach for source code identifiers. Ensemble tagging is a technique that uses machine-learning and the output from multiple part-of-speech taggers to annotate natural language text at a higher quality than the part-of-speech taggers are able to obtain independently. Our ensemble uses three state-of-the-art part-of-speech taggers: SWUM, POSSE, and Stanford. We study the quality of the ensemble's annotations on five different types of identifier names: function, class, attribute, parameter, and declaration statement at the level of both individual words and full identifier names. We also study and discuss the weaknesses of our tagger to …


On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill Dec 2020

On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill

Articles

Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …


An Examination Of Enhanced Atmospheric Methane Detection Methods For Predicting Performance Of A Novel Multiband Uncooled Radiometer Imager, Cody M. Webber, John P. Kerekes Oct 2020

An Examination Of Enhanced Atmospheric Methane Detection Methods For Predicting Performance Of A Novel Multiband Uncooled Radiometer Imager, Cody M. Webber, John P. Kerekes

Articles

To evaluate the potential for a new uncooled infrared radiometer imager to detect enhanced atmospheric levels of methane, three different analysis methods were examined. A single-pixel brightness temperature to noise-equivalent delta temperature (NEdT) comparison study performed using data simulated from MODTRAN6 revealed that a single thermal band centered on the 7.68 µm methane feature leads to a detectable brightness temperature difference exceeding the sensor noise level for a plume of about 17 ppm at ambient atmospheric temperature compared to an ambient plume with no enhanced methane present. Application of a normalized differential methane index method, a novel approach for methane …


Increasing The Trust In Refactoring Through Visualization, Alex Bogart, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni Jun 2020

Increasing The Trust In Refactoring Through Visualization, Alex Bogart, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni

Articles

In software development, maintaining good design is essential. The process of refactoring enables developers to improve this design during development without altering the program’s existing behavior. However, this process can be time-consuming, introduce semantic errors, and be difficult for developers inexperienced with refactoring or unfamiliar with a given code base. Automated refactoring tools can help not only by applying these changes, but by identifying opportunities for refactoring. Yet, developers have not been quick to adopt these tools due to a lack of trust between the developer and the tool. We propose an approach in the form of a visualization to …


On The Relationship Between Developer Experience And Refactoring: An Exploratory Study And Preliminary Results, Eman Abdullah Alomar, Anthony Peruma, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni Jun 2020

On The Relationship Between Developer Experience And Refactoring: An Exploratory Study And Preliminary Results, Eman Abdullah Alomar, Anthony Peruma, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni

Articles

Refactoring is one of the means of managing technical debt and maintaining a healthy software structure through enforcing best design practices, or coping with design defects. Previous refactoring surveys have shown that these code restructurings are mainly executed by developers who have sufficient knowledge of the system’s design, and disposing of leadership roles in their development teams. However, these surveys were mainly limited to specific projects and companies. In this paper, we explore the generalizability of the previous results though analyzing 800 open-source projects. We mine their refactoring activities, and we identify their corresponding contributors. Then, we associate an expertise …


An Exploratory Study On How Software Reuse Is Discussed In Stack Overflow, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Jiaqian Liu, Ali Ouni, Christian D. Newman, Diego Barinas May 2020

An Exploratory Study On How Software Reuse Is Discussed In Stack Overflow, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Jiaqian Liu, Ali Ouni, Christian D. Newman, Diego Barinas

Articles

Software reuse is an important and crucial quality attribute in modern software engineering, where almost all software projects, open source or commercial, no matter small or ultra-large, source code reuse in one way or another. Although software reuse has experienced an increased adoption throughout the years with the exponentially growing number of available third-party libraries, frameworks and APIs, little knowledge exists to investigate what aspects of code reuse developers discuss. In this study, we look into bridging this gap by examining Stack Overflow to understand the challenges developers encounter when trying to reuse code. Using the Stack Overflow tags “code-reuse” …