Information technologies (IT) have spread throughout all areas of modern society. However, the evolution of ethics that guide their use lags behind technological advances [2]. A p...
Carlos Alberto Dorantes, Barbara Hewitt, Tim Goles
—This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the...
Files, classes, or methods have frequently been investigated in recent research on co-change. In this paper, we present a first study at the level of lines. To identify line chan...
Thomas Zimmermann, Sunghun Kim, Andreas Zeller, E....
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Our approach to better understand the nature of collaboration in open-source software (OSS) development is to view it as a participative system, where people and artifacts are int...