What makes a good bug report? N Bettenburg, S Just, A Schröter, C Weiss, R Premraj, T Zimmermann Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations ¡¦, 2008 | 748 | 2008 |
Duplicate bug reports considered harmful¡¦ really? N Bettenburg, R Premraj, T Zimmermann, S Kim 2008 IEEE International Conference on Software Maintenance, 337-345, 2008 | 416 | 2008 |
What makes a good bug report? T Zimmermann, R Premraj, N Bettenburg, S Just, A Schroter, C Weiss IEEE Transactions on Software Engineering 36 (5), 618-643, 2010 | 376 | 2010 |
Extracting structural information from bug reports N Bettenburg, R Premraj, T Zimmermann, S Kim Proceedings of the 2008 international working conference on Mining software ¡¦, 2008 | 232 | 2008 |
Do stack traces help developers fix bugs? A Schroter, A Schröter, N Bettenburg, R Premraj 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010 ¡¦, 2010 | 201 | 2010 |
An empirical study on inconsistent changes to code clones at release level N Bettenburg, W Shang, W Ibrahim, B Adams, Y Zou, AE Hassan 2009 16th Working Conference on Reverse Engineering, 85-94, 2009 | 178 | 2009 |
Quality of bug reports in Eclipse N Bettenburg, S Just, A Schröter, C Wei©¬, R Premraj, T Zimmermann Proceedings of the 2007 OOPSLA workshop on eclipse technology eXchange, 21-25, 2007 | 164 | 2007 |
Think locally, act globally: Improving defect and effort prediction models N Bettenburg, M Nagappan, AE Hassan Proceedings of the 9th IEEE Working Conference on Mining Software ¡¦, 2012 | 160 | 2012 |
Studying the impact of social structures on software quality N Bettenburg, AE Hassan 2010 IEEE 18th International Conference on Program Comprehension, 124-133, 2010 | 109 | 2010 |
Studying the impact of social interactions on software quality N Bettenburg, AE Hassan Empirical Software Engineering 18 (2), 375-431, 2013 | 73 | 2013 |
On the relationship between comment update practices and Software Bugs WM Ibrahim, N Bettenburg, B Adams, AE Hassan Journal of Systems and Software 85 (10), 2293-2304, 2012 | 72 | 2012 |
Should I contribute to this discussion? WM Ibrahim, N Bettenburg, E Shihab, B Adams, AE Hassan 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010 ¡¦, 2010 | 60 | 2010 |
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data N Bettenburg, E Shihab, AE Hassan 2009 IEEE International Conference on Software Maintenance, 539-542, 2009 | 53 | 2009 |
Management of community contributions N Bettenburg, AE Hassan, B Adams, DM German Empirical Software Engineering 20 (1), 252-289, 2015 | 52 | 2015 |
On the central role of mailing lists in open source projects: An exploratory study E Shihab, N Bettenburg, B Adams, AE Hassan JSAI International Symposium on Artificial Intelligence, 91-103, 2009 | 45 | 2009 |
Towards Improving Statistical Modeling of Software Engineering Data: Think Locally, Act Globally! N Bettenburg, M Nagappan, AE Hassan | 36* | |
A lightweight approach to uncover technical artifacts in unstructured data N Bettenburg, B Adams, AE Hassan, M Smidt 2011 IEEE 19th international conference on program comprehension, 185-188, 2011 | 35 | 2011 |
Method and system for establishing trusted communication using a security device NJS Bettenburg, R Kuang US Patent 9,736,149, 2017 | 25 | 2017 |
Shannon Perfect Secrecy in a Discrete Hilbert Space R Kuang, N Bettenburg 2020 IEEE International Conference on Quantum Computing and Engineering (QCE ¡¦, 2020 | 21 | 2020 |
System and method for generating passwords using key inputs and contextual inputs SK Xavier, R Steklasa, N Bettenburg, R Kuang US Patent 9,521,142, 2016 | 20 | 2016 |