Secure open source collaboration: an empirical study of linus' law
暂无分享,去创建一个
[1] Eric S. Raymond,et al. The Cathedral and the Bazaar , 2000 .
[2] Meir M. Lehman,et al. Program evolution: processes of software change , 1985 .
[3] Ulrik Brandes,et al. Network Analysis: Methodological Foundations (Lecture Notes in Computer Science) , 2005 .
[4] Ian Witten,et al. Data Mining , 2000 .
[5] Brendan Murphy,et al. Can developer-module networks predict failures? , 2008, SIGSOFT '08/FSE-16.
[6] Avinash C. Kak,et al. PCA versus LDA , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[7] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[8] Carl E. Landwehr,et al. Does Open Source Improve System Security? , 2001, IEEE Softw..
[9] Dewayne E. Perry,et al. Metrics and laws of software evolution-the nineties view , 1997, Proceedings Fourth International Software Metrics Symposium.
[10] Josef Kittler,et al. Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Meir M. Lehman,et al. Rules and Tools for Software Evolution Planning and Management , 2001, Ann. Softw. Eng..
[12] Albert Endres,et al. A handbook of software and systems engineering - empirical observations, laws and theories , 2003, The Fraunhofer IESE series on software engineering.
[13] N. Nagappan,et al. Use of relative code churn measures to predict system defect density , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[14] Victor R. Basili,et al. The influence of organizational structure on software quality , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[15] Laurie A. Williams,et al. Predicting failures with developer networks and social network analysis , 2008, SIGSOFT '08/FSE-16.
[16] Premkumar T. Devanbu,et al. Latent social structure in open source projects , 2008, SIGSOFT '08/FSE-16.
[17] Eric Lease Morgan,et al. Review of The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary by Eric S. Raymond, Sebastopol, Calif.: O'Reilly, 1999 , 2000 .
[18] Jesús M. González-Barahona,et al. Applying Social Network Analysis to the Information in CVS Repositories , 2004, MSR.
[19] Satoru Miyano,et al. A Structure Learning Algorithm for Inference of Gene Networks from Microarray Gene Expression Data Using Bayesian Networks , 2007, 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering.
[20] Jr. Frederick P. Brooks,et al. The mythical man-month (anniversary ed.) , 1995 .
[21] Bart Jacobs,et al. Increased security through open source , 2007, Commun. ACM.
[22] Ian H. Witten,et al. Data Mining: Practical Machine Learning Tools and Techniques, 3/E , 2014 .
[23] Eric S. Raymond,et al. The cathedral and the bazaar - musings on Linux and Open Source by an accidental revolutionary , 2001 .
[24] Norman F. Schneidewind,et al. Methodology For Validating Software Metrics , 1992, IEEE Trans. Software Eng..
[25] Michael Eichberg,et al. A Handbook of Software and Systems Engineering , 2009 .
[26] Fred P. Brooks,et al. The Mythical Man-Month , 1975, Reliable Software.
[27] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.