Sciweavers

APSEC
2004
IEEE
13 years 8 months ago
MUDABlue: An Automatic Categorization System for Open Source Repositories
Open Source communities typically use a software repository to archive various software projects with their source code, mailing list discussions, documentation, bug reports, and ...
Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushit...
ICEGOV
2007
ACM
13 years 8 months ago
Analysis of popular open source licenses and their applicability to e-governance
The paper analyses existing open source licenses with the aim of choosing a license that is suitable for e-Governance projects. A method is presented for systematically choosing t...
Jaijit Bhattacharya, Sourabh Suman
ICSM
2000
IEEE
13 years 8 months ago
Evolution in Open Source Software: A Case Study
Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of se...
Michael W. Godfrey, Qiang Tu
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
13 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
MSR
2010
ACM
13 years 9 months ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
IWPSE
2003
IEEE
13 years 9 months ago
The Contribution of Free Software to Software Evolution
It is remarkable to think that even without any interest in finding suitable methods and concepts that would allow complex software systems to evolve and remain manageable, the e...
Andreas Bauer 0002, Markus Pizka
ICSM
2003
IEEE
13 years 9 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
CLEF
2004
Springer
13 years 9 months ago
Mono- and Crosslingual Retrieval Experiments at the University of Hildesheim
In this year’s participation we continued to evaluate open source information retrieval software. We used mainly the system Lucene and experimented with some of the most effecti...
René Hackl, Thomas Mandl, Christa Womser-Ha...
PDC
2004
ACM
13 years 10 months ago
The promise and perils of a participatory approach to developing an open source community learning network
This paper describes and analyses the early developmental stages of a community learning network based in an urban community and social service agency. With government funding, th...
Robert Luke, Andrew Clement, Randall Terada, Domin...
WEBI
2005
Springer
13 years 10 months ago
Opportunities from Open Source Search
Internet search has a strong business model that permits a free service to users, so it is difficult to see why, if at all, there should be open source offerings as well. This pa...
Wray L. Buntine, Karl Aberer, Ivana Podnar, Martin...