The raw data of the reduction of the 238 bugs as extracted from the runs of the four algorithms ddmin, verify, closure, binary. An extra column also exists that describes the run of Binary Reduction on the list of classes directly. The columns in `deliverable.csv` are predicate (the name of the decompiler), name (the name of the project we ran on), size (number of classes), scc (number of strongly connected components). Then for each tool we have size, scc (final size and scc), iters (iterations to last success), total-iters (iterations before finishing), time (time to last success (s)), total-time (time before finishing), timeout (did the predicate timeout, or succeed), check (did the bug still exist after reduction) The `benchmarks.csv`...
In (open-source) development, developers routinely rely on other libraries to improve their coding e...
Several authors have found evidence of large dependence clusters in the source code of a diverse ran...
The increasing complexity of today's software requires the contribution of thousands of developers. ...
This dataset includes 3 folders. Folder recurring-patterns contains successful untangling cases w...
International audienceWell-designed and publicly available datasets of bugs are an invaluable asset ...
We introduced a new approach to describe Java software as graph, where nodes represent a Java file -...
The usage of libraries, both commercial and open-source, provides the implementation of certain func...
This zip contains three CSV files and one folder. This dataset contains information for the recent t...
Complex network theory has been successfully introduced into the field of software engineering. Many...
Reproducibility package for the paper *Elimination of Detached Regions in Dependency Graph Verificat...
This research methodology isolates coding properties and identifies the probability of security vuln...
We present in this paper several solutions to the challenging task of clustering software defect rep...
Abstract—Consider the execution of a failing program as a sequence of program states. Each state ind...
In the bug triage we have an unavoidable step of fixing the bugs which helps in correctly assigning ...
Dependency injection (DI) is generally known to improve maintainability by keeping application class...
In (open-source) development, developers routinely rely on other libraries to improve their coding e...
Several authors have found evidence of large dependence clusters in the source code of a diverse ran...
The increasing complexity of today's software requires the contribution of thousands of developers. ...
This dataset includes 3 folders. Folder recurring-patterns contains successful untangling cases w...
International audienceWell-designed and publicly available datasets of bugs are an invaluable asset ...
We introduced a new approach to describe Java software as graph, where nodes represent a Java file -...
The usage of libraries, both commercial and open-source, provides the implementation of certain func...
This zip contains three CSV files and one folder. This dataset contains information for the recent t...
Complex network theory has been successfully introduced into the field of software engineering. Many...
Reproducibility package for the paper *Elimination of Detached Regions in Dependency Graph Verificat...
This research methodology isolates coding properties and identifies the probability of security vuln...
We present in this paper several solutions to the challenging task of clustering software defect rep...
Abstract—Consider the execution of a failing program as a sequence of program states. Each state ind...
In the bug triage we have an unavoidable step of fixing the bugs which helps in correctly assigning ...
Dependency injection (DI) is generally known to improve maintainability by keeping application class...
In (open-source) development, developers routinely rely on other libraries to improve their coding e...
Several authors have found evidence of large dependence clusters in the source code of a diverse ran...
The increasing complexity of today's software requires the contribution of thousands of developers. ...