Publications

Publications by categories in reversed chronological order. generated by jekyll-scholar.

2024

  1. SCAM
    Migrating Unit Tests Across Java Applications
    Ajay Kumar Jha, and Sarah Nadi
    In Proceedings of IEEE International Working Conference on Source Code Analysis & Manipulation (SCAM ’24’) , 2024
  2. ESEM
    An Empirical Study of API Misuses of Data-Centric Libraries
    Akalanka Galappaththi, Sarah Nadi, and Christoph Treude
    In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’24), 2024
  3. MSR
    Analyzing Developer Use of ChatGPT Generated Code in Open Source GitHub Projects
    Balreet Grewal, Wentao Lu, Sarah Nadi, and Cor-Paul Bezemer
    In Proceedings of the 21st ACM International Conference on Mining Software Repositories (MSR) – Mining Challenge Track , 2024
  4. ESEC/FSE
    Characterizing Python Library Migrations
    Mohayeminul Islam, Ajay Kumar Jha, Ildar Akhmetov, and Sarah Nadi
    In Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE), 2024

2023

  1. SecDev
    Securing Your Crypto-API Usage Through Tool Support - A Usability Study
    Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl
    In IEEE Secure Development Conference (SecDev), 2023
  2. TSE
    An Empirical Evaluation of Using Large Language Models for Automated Unit Test Generation
    Max Schäefer, Sarah Nadi, Aryaz Eghbali, and Frank Tip
    IEEE Transactions on Software Engineering, 2023
  3. TSE
    Operation-Based Refactoring-Aware Merging: An Empirical Evaluation
    Max Ellis, Sarah Nadi, and Danny Dig
    IEEE Transactions on Software Engineering, 2023
  4. MSR
    PyMigBench: A Benchmark for Python Library Migration
    Mohayeminul Islam, Ajay Kumar Jha, Sarah Nadi, and Ildar Akhmetov
    In Proceedings of the 20th ACM International Conference on Mining Software Repositories (MSR) – Data Showcase Track , 2023
  5. ICSME
    An Empirical Study on Bugs Inside PyTorch: A Replication Study
    Sharon Chee Yin Ho, Vahid Majdinasab, Mohayeminul Islam, Diego Elias Costa, Emad Shihab, Foutse Khomh, Sarah Nadi, and Muhammad Raza
    In Proceedings of the 39th IEEE International Conference on Software Maintenance and Evolution (ICSME ’23), 2023
  6. MSR
    Evaluating Software Documentation Quality
    Henry Tang, and Sarah Nadi
    In Proceedings of the 20th ACM International Conference on Mining Software Repositories (MSR), 2023
  7. ICSME
    Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities
    Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali, James Wright, and Cristina Cifuentes
    In International Conference on Software Maintenance and Evolution, Sep 2023
  8. MSR
    Energy Consumption Estimation of API-usage in Mobile Apps via Static Analysis
    Abdul Ali Bangash, Kalvin Eng, Qasim Jamal, Karim Ali, and Abram Hindle
    In International Conference on Mining Software Repositories, May 2023
  9. GAS
    Exploring Quality Assurance Practices and Tools for Indie Games
    Jeff Cho, and Karim Ali
    In International ICSE Workshop on Games and Software Engineering, May 2023

2022

  1. EMSE
    Selecting Third-party Libraries: The Data Scientist’s Perspective
    Sarah Nadi, and Nourhan Sakr
    Empirical Software Engineering Journal (EMSE), May 2022
  2. CASCON
    A Human-in-the-loop Approach to Generate Annotation Usage Rules: A Case Study with MicroProfile
    Mansur Gulami, Ajay Kumar Jha, Sarah Nadi, Karim Ali, Emily Jiang, and Yee-Kang Chang
    In Annual International Conference on Computer Science and Software Engineering (CASCON ’22), May 2022
  3. ICSME
    Mining Annotation Usage Rules: A Case Study with MicroProfile
    Batyr Nuryyev, Ajay Kumar Jha, Sarah Nadi, Yee-Kang Chang, Emily Jiang, and Vijay Sundaresan
    In Proceedings of the 38th IEEE International Conference on Software Maintenance and Evolution – Industry Track, May 2022
  4. EMSE
    Reuse and Maintenance Practices among Divergent Forks in Three Software Ecosystems
    John Businge, Moses Openja, Sarah Nadi, and Thorsten Berger
    Empirical Software Engineering, May 2022
  5. MSR
    Does This Apply to Me? An Empirical Study of Technical Context in Stack Overflow
    Akalanka Galappaththi, Sarah Nadi, and Christoph Treude
    In Proceedings of the 19th ACM International Conference on Mining Software Repositories (MSR) , May 2022
  6. MSR
    An Empirical Evaluation of GitHub Copilot’s Code Suggestions
    Nhan Nguyen, and Sarah Nadi
    In Proceedings of the 19th ACM International Conference on Mining Software Repositories (MSR) , May 2022
  7. TSE
    Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations
    Lisa Nguyen Quang Do, James R. Wright, and Karim Ali
    IEEE Transactions on Software Engineering, Jun 2022
  8. ICSE
    A Black Box Technique to Reduce Energy Consumption of Android Apps
    Abdul Ali Bangash, Karim Ali, and Abram Hindle
    In International Conference on Software Engineering New Ideas and Emerging Results Track (ICSE NIER ’22, May 2022
  9. Designing UIs for Static Analysis Tools
    Daniil Tiganov, Lisa Nguyen Quang Do, and Karim Ali
    Communications of the ACM, May 2022

2021

  1. EMSE
    FACER: An API Usage-based Code-example Recommender for Opportunistic Reuse
    Shamsa Abid, Shafay Shamail, Hamid Abdul Basit, and Sarah Nadi
    Empirical Software Engineering, May 2021
  2. ICSE
    Challenges of Implementing Software Variability in Eclipse OMR: An Interview Study
    Batyr Nuryyev, Sarah Nadi, Nazim Uddin Bhuiyan, and Leonardo Bandareli
    In 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), May 2021
  3. ICSE
    ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel
    Patrick Franz, Thorsten Berger, Ibrahim Fayaz, Sarah Nadi, and Evgeny Groshev
    In 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), May 2021
  4. EMSE
    On Using Stack Overflow Comment-Edit Pairs to Recommend Code Maintenance Changes
    Henry Tang, and Sarah Nadi
    Empirical Software Engineering, May 2021
  5. TSE
    A Study of Call Graph Construction for JVM-Hosted Languages
    Karim Ali, Xioani Lai, Zhaoyi Luo, Ondřej Lhoták, Julian Dolby, and Frank Tip
    IEEE Transactions on Software Engineering, Nov 2021
  6. TSE
    CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
    Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini
    IEEE Transactions on Software Engineering, Oct 2021
  7. CASCON
    Hotfixing Misuses of Crypto APIs in Java Programs
    Kristen Newbury, Karim Ali, and Andrew Craik
    In International Conference on Computer Science and Software Engineering, Nov 2021
  8. CASCON
    U Can’t Inline This!
    Erick Ochoa, Cijie Xia, Karim Ali, Andrew Craik, and José Nelson Amaral
    In International Conference on Computer Science and Software Engineering, Nov 2021
  9. ICSME
    Energy Efficient Guidelines for iOS Core Location Framework
    Abdul Ali Bangash, Daniil Tiganov, Karim Ali, and Abram Hindle
    In International Conference on Software Maintenance and Evolution, Jun 2021
  10. Assessment of the Benefit of Post-Inlining Program Transformation in Inlining Decisions
    Jun 2021
  11. Hybrid Computing Device Selection Analysis
    Jun 2021
  12. Designing UIs for Static Analysis Tools: Evaluating Tool Design Guidelines with SWAN
    Daniil Tiganov, Lisa Nguyen Quang Do, and Karim Ali
    ACM Queue, Jun 2021

2020

  1. ICSME
    A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub
    Changyuan Lin, Sarah Nadi, and Hamzeh Khazaei
    In Proceedings of the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME), Jun 2020
  2. SCAM
    Annotation practices in Android apps
    Ajay Kumar Jha, and Sarah Nadi
    In Proceedings of 30th IEEE International Working Conference on Source Code Analysis & Manipulation (SCAM) , Jun 2020
  3. SBES
    A Semi-Automated Iterative Process for Detecting Feature Interactions
    Larissa Rocha Soares, Ivan Machado, Eduardo Santana Almeida, Christian Kästner, and Sarah Nadi
    In Proceedings of the 34th Brazilian Symposium on Software Engineering (SBES), Oct 2020
  4. ESEC/FSE
    LibComp: An IntelliJ Plugin for Comparing Java Libraries
    Rehab El-Hajj, and Sarah Nadi
    In Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’20), Oct 2020
  5. SANER
    Essential Sentences for Navigating Stack Overflow
    Sarah Nadi, and Christoph Treude
    In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER ’20), Oct 2020
  6. EMSE
    On the Time-Based Conclusion Stability of Software Defect Prediction Models
    Abdul Ali Bangash, Hareem Sahar, Abram Hindle, and Karim Ali
    International Journal on Empirical Software Engineering, Aug 2020
  7. TSE
    Debugging Static Analysis
    Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden
    IEEE Transactions on Software Engineering, Jan 2020
  8. ESEC/FSE
    SWAN: A Static Analysis Framework for Swift
    Daniil Tiganov, Jeff Cho, Karim Ali, and Julian Dolby
    In ACM International Conference on the Foundations of Software Engineering, Aug 2020
  9. CGO
    \textscCogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
    Stefan Krüger, Karim Ali, and Eric Bodden
    In International Symposium on Code Generation and Optimization, Feb 2020
  10. CGO
    Cognicrypt gen: generating code for the secure usage of crypto apis
    Stefan Krüger, Karim Ali, and Eric Bodden
    In Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization, Feb 2020

2019

  1. ESEM
    Predicting Merge Conflicts in Collaborative Software Development
    Moein Owhadi-Kareshk, Sarah Nadi, and Julia Rubin
    In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’19), Feb 2019
  2. MSR
    A Dataset of Non-Functional Bugs
    Aida Radu, and Sarah Nadi
    In Proceedings of the 16th International Conference on Mining Software Repositories (MSR ’19) – Data Showcase Track, Feb 2019
  3. MSR
    Analyzing Comment-induced Updates on Stack Overflow
    Abhishek Soni, and Sarah Nadi
    In Proceedings of the 16th International Conference on Mining Software Repositories (MSR ’19) – Challenge Track, Feb 2019
  4. MSR
    Investigating Next-Steps in Static API-Misuse Detection
    Sven Amann, Hoan Nguyen, Sarah Nadi, Tien Nguyen, and Mira Mezini
    In Proceedings of the 16th International Conference on Mining Software Repositories (MSR ’19) , Feb 2019
  5. MSR
    Scalable Software Merging Studies with MERGANSER
    Moein Owhadi-Kareshk, and Sarah Nadi
    In Proceedings of the 16th International Conference on Mining Software Repositories (MSR ’19) , Feb 2019
  6. SANER
    Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts
    Mehran Mahmoudi, Sarah Nadi, and Nikolaos Tsantalis
    In Proc. of the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER ’19), Feb 2019
  7. MSR
    What do developers know about machine learning: a study of ML discussions on StackOverflow
    Abdul Ali Bangash, Hareem Sahar, Shaiful Alam Chowdhury, Alexander William Wong, Abram Hindle, and Karim Ali
    In International Conference on Mining Software Repositories, May 2019
  8. HIPS
    Toward an Analytical Performance Model to Select between GPU and CPU Execution
    Artem Chikin, José Nelson Amaral, Karim Ali, and Ettore Tiotto
    In IEEE International Workshop on High-Level Parallel Programming Models and Supportive Environments, Feb 2019
  9. POPL
    Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems
    Johannes Späth, Karim Ali, and Eric Bodden
    In ACM SIGPLAN Symposium on Principles of Programming Languages, Jan 2019

2018

  1. PROMISE
    An Empirical Study of Metric-based Comparisons of Software Libraries
    Fernando Lopez Mora, and Sarah Nadi
    In Proc. of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering (PROMISE ’18), Jan 2018
  2. SPLC
    Using Static Analysis to Support Variability Implementation Decisions in C++
    Samer Al Masri, Sarah Nadi, Matthew Gaudet, Xiaoli Liang, and Robert W. Young
    In Proceedings of the 22nd International Systems and Software Product Line Conference (SPLC ’18) – Industrial Track, Jan 2018
  3. GPCE
    Exploring Feature Interactions Without Specifications: A Controlled Experiment
    Larissa Rocha Soares, Jens Meinicke, Sarah Nadi, Christian Kästner, and Eduardo Santana Almeida
    In Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, Boston, MA, USA, Jan 2018
  4. ICSME
    Clone-Based Variability Management in the Android Ecosystem
    John Businge, Openja Moses, Sarah Nadi, Engineer Bainomugisha, and Thorsten Berger
    In Proc. of the 34th International Conference on Software Maintenance and Evolution (ICSME ’18) – Industry Track, Jan 2018
  5. TSE
    A Systematic Evaluation of Static API-Misuse Detectors
    Sven Amann, Hoan A. Nguyen, Sarah Nadi, Tien N. Nguyen, and Mira Mezini
    IEEE Transactions on Software Engineering, Jan 2018
  6. MSR
    The Android Update Problem: An Empirical Study
    Mehran Mahmoudi, and Sarah Nadi
    In Proceedings of the 15th International Conference on Mining Software Repositories (MSR ’18), Jan 2018
  7. ICSE
    Which library should I use? A metric-based comparison of software libraries
    Fernando Lopez Mora, and Sarah Nadi
    In Proceedings of the 40th International Conference on Software Engineering New Ideas and Emerging Results Track (ICSE NIER ’18), Jan 2018
  8. VaMoS
    VarXplorer: Lightweight Process for Dynamic Inspection of Feature Interactions
    Larissa Rocha Soares, Jens Meinicke, Sarah Nadi, Christian Kästner, and Eduardo Santana Almeida
    In Proceedings of the 12nd International Workshop on Variability Modelling of Software-Intensive Systems (VaMoS), Jan 2018
  9. ECOOP
    CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
    Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini
    In European Conference on Object-Oriented Programming, Jul 2018
  10. ICSE
    VISUFLOW: A Debugging Environment for Static Analyses
    Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden
    In International Conference on Software Engineering Demonstrations Track (ICSE DEMO ’18), May 2018

2017

  1. ASE
    CogniCrypt: Supporting Developers in using Cryptography
    Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
    In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE ’17) – Tool Demo Track, May 2017
  2. CASCON
    Software Variability Through C++ Static Polymorphsim: A Case Study of Challenges and Open Problems in Eclipse OMR
    Samer Al Masri, Nazim Uddin Bhuiyan, Sarah Nadi, and Matthew Gaudet
    In Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering (CASCON ’17) – Position Paper, May 2017
  3. TSE
    On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study
    Guido Salvaneschi, Sebastian Proksch, Sven Amann, Sarah Nadi, and Mira Mezini
    IEEE Transactions on Software Engineering, May 2017
  4. SANER
    Enriching In-IDE Process Information with Fine-grained Source Code History
    Sebastian Proksch, Sarah Nadi, Sven Amann, and Mira Mezini
    In Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER ’17), May 2017
  5. OOPSLA
    IDE\(^a\)\(^l\): Efficient and Precise Alias-Aware Dataflow Analysis
    Johannes Späth, Karim Ali, and Eric Bodden
    In ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages and Applications, Oct 2017
  6. SCAM
    Detecting Security Vulnerabilities in Object-Oriented PHP Programs
    Mona Nashaat, Karim Ali, and James Miller
    In IEEE International Conference on Source Code Analysis and Manipulation, Sep 2017
  7. FSP
    A Case for Better Integration of Host and Target Compilation When Using OpenCL for FPGAs
    Taylor Lloyd, Artem Chikin, Erick Ochoa, Karim Ali, and José Nelson Amaral
    In International Workshop on FPGAs for Software Programmers, Aug 2017
  8. ISSTA
    Just-in-Time Static Analysis
    Lisa Nguyen Quang Do, Karim Ali, Ben Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill
    In International Symposium on Software Testing and Analysis, Jul 2017
  9. ICSE
    Cheetah: Just-in-Time Taint Analysis for Android Apps
    Lisa Nguyen Quang Do, Karim Ali, Ben Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill
    In International Conference on Software Engineering Demonstrations Track (ICSE DEMO ’17), May 2017

2016

  1. ASE
    Evaluating the Evaluations of Code Recommender Systems: A Reality Check
    Sebastian Proksch, Sven Amann, Sarah Nadi, and Mira Mezini
    In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE ’16), Singapore, Singapore, May 2016
  2. Addressing Scalability in API Method Call Analytics
    Ervina Cergani, Sebastian Proksch, Sarah Nadi, and Mira Mezini
    In 2nd International Workshop on Software Analytics (SWAN ’16), May 2016
  3. ICPC
    FeedBaG: An Interaction Tracker for Visual Studio
    Sven Amann, Sebastian Proksch, and Sarah Nadi
    In Proceedings of the 24th International Conference on Program Comprehension – Tool Track (ICPC ’16), May 2016
  4. ICSE
    "Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs?
    Sarah Nadi, Stefan Krüger, Mira Mezini, and Eric Bodden
    In Proceedings of the 38th International Conference on Software Engineering (ICSE ’16), May 2016
  5. VaMoS
    Variability Modeling of Cryptographic Components (Clafer Experience Report)
    Sarah Nadi, and Stefan Krüger
    May 2016
  6. SANER
    A Study of Visual Studio Usage in Practice
    Sven Amann, Sebastian Proksch, Sarah Nadi, and Mira Mezini
    In Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER ’16), May 2016
  7. MSR
    MUBench: A Benchmark for API-Misuse Detectors
    Sven Amann, Sarah Nadi, Hoan A. Nguyen, Tien N. Nguyen, and Mira Mezini
    In Proceedings of the 13th International Conference on Mining Software Repositories – Data Showcase Track (MSR ’16), May 2016
  8. MSR
    A Dataset of Simplified Syntax Trees for C#
    Sebastian Proksch, Sven Amann, Sarah Nadi, and Mira Mezini
    In Proceedings of the 13th International Conference on Mining Software Repositories – Data Showcase Track (MSR ’16), May 2016
  9. ECOOP
    Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis
    Johannes Späth, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden
    In European Conference on Object-Oriented Programming, May 2016

2015

  1. ONWARD
    Towards Secure Integration of Cryptographic Software
    Steven Arzt, Sarah Nadi, Karim Ali, Eric Bodden, Sebastian Erdweg, and Mira Mezini
    In Proceedings of the SIGPLAN Symposium on New Ideas in Programming and Reflections on Software at SPLASH (ONWARD ’15), Pittsburg, PA, USA, May 2015
    (Acceptance Rate: 17/37 = 35%)
  2. ECOOP
    The Love/Hate Relationship with the C Preprocessor: An Interview Study
    Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Sarah Nadi, and Rohit Gheyi
    In Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP ’15), May 2015
    (Acceptance Rate: 31/136 = 23%)
  3. TSE
    Where do configuration constraints stem from? An extraction approach and an empirical study
    Sarah Nadi, Thorsten Berger, Christian Kästner, and Krzysztof Czarnecki
    IEEE Transactions on Software Engineering (TSE), May 2015
  4. RELENG
    Extracting Configuration Knowledge from Build Files with Symbolic Analysis
    Shurui Zhou, Jafar Al-Kofahi, Tien N. Nguyen, Christian Kästner, and Sarah Nadi
    , Florence, Italy, May 2015
  5. TOSEM
    Type-Based Call Graph Construction Algorithms for Scala
    Karim Ali, Marianna Rapoport, Ondřej Lhoták, Julian Dolby, and Frank Tip
    ACM Transactions on Software Engineering and Methodology, May 2015

2014

  1. ICSE
    Mining configuration constraints: Static analyses and empirical results
    Sarah Nadi, Thorsten Berger, Christian Kästner, and Krzysztof Czarnecki
    In Proceedings of the 36th International Conference on Software Engineering (ICSE ’14), Hyderabad, India, May 2014
    (Acceptance Rate: 99/495 = 20%)
  2. ECOOP
    Constructing Call Graphs of Scala Programs
    Karim Ali, Marianna Rapoport, Ondřej Lhoták, Julian Dolby, and Frank Tip
    In European Conference on Object-Oriented Programming, May 2014

2013

  1. MSR
    The MSR cookbook: Mining a decade of research
    Hadi Hemmati, Sarah Nadi, Olga Baysal, Oleksii Kononenko, Wei Wang, Reid Holmes, and Michael W. Godfrey
    In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR ’13), San Francisco, CA, USA, May 2013
    (Acceptance Rate: 31/81 = 38%)
  2. MSR
    Linux variability anomalies: What causes them and how do they get fixed?
    Sarah Nadi, Christian Dietrich, Reinhard Tartler, Richard C. Holt, and Daniel Lohmann
    In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR ’13), San Francisco, CA, USA, May 2013
    (Acceptance Rate: 31/81 = 38%)
  3. ICSE
    A study of variability spaces in Open Source Software
    Sarah Nadi
    , San Francisco, CA, USA, May 2013
    (Acceptance Rate: 19/35 = 54%)
  4. The Linux kernel: A case study of build system variability
    Sarah Nadi, and Richard C. Holt
    Journal of Software: Evolution and Process (JSEP), May 2013
  5. ECOOP
    Averroes: Whole-Program Analysis without the Whole Program
    Karim Ali, and Ondřej Lhoták
    In European Conference on Object-Oriented Programming, May 2013

2012

  1. JSEP
    Mining Kbuild to detect variability anomalies in Linux
    Sarah Nadi, and Richard C. Holt
    In Proceedings of the 16th European Conference on Software Maintenance and Reengineering (CSMR ’12), May 2012
    (Acceptance Rate: 30/108 = 27%). Invited for a special issue of JSEP
  2. ECOOP
    Application-Only Call Graph Construction
    Karim Ali, and Ondřej Lhoták
    In European Conference on Object-Oriented Programming, May 2012

2011

  1. WCRE
    Make it or break it: Mining anomalies from Linux Kbuild
    Sarah Nadi, and Richard C. Holt
    In Proceedings of the 18th Working Conference on Reverse Engineering (WCRE ’11), May 2011
    (Acceptance Rate: 27/104 = 26%)

2010

  1. CSMR
    Does the past say it all? Using history to predict change sets in a CMDB
    Sarah Nadi, Richard C. Holt, and Serge Mankovskii
    In Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR ’10), May 2010
    (Acceptance Rate: 21/80 = 26%)

2009

  1. CASCON
    DRACA: Decision support for root cause analysis and change impact analysis for CMDBs
    Sarah Nadi, Richard C. Holt, Ian Davis, and Serge Mankovskii
    In Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research (CASCON ’09), Ontario, Canada, May 2009
    (Acceptance Rate: 22/88 = 25%). Best Paper Award
  2. GIIS
    P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks
    Karim Ali, Issam Aib, and Raouf Boutaba
    In Global Information Infrastructure Symposium, May 2009
  3. GIIS
    Applying Kernel Methods to Anomaly-based Intrusion Detection Systems
    Karim Ali, and Raouf Boutaba
    In Global Information Infrastructure Symposium, May 2009

2008

  1. IJCSNS
    A Java-Based programming language support of location management in pervasive systems
    Sherif G. Aly, Sarah Nadi, and Karim Hamdan
    International Journal of Computer Science and Network Security (IJCSNS), May 2008