What makes a good bug report? N Bettenburg, S Just, A Schröter, C Weiss, R Premraj, T Zimmermann Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008 | 793 | 2008 |
Duplicate bug reports considered harmful… really? N Bettenburg, R Premraj, T Zimmermann, S Kim 2008 IEEE International Conference on Software Maintenance, 337-345, 2008 | 428 | 2008 |
What makes a good bug report? T Zimmermann, R Premraj, N Bettenburg, S Just, A Schroter, C Weiss IEEE Transactions on Software Engineering 36 (5), 618-643, 2010 | 403 | 2010 |
Extracting structural information from bug reports N Bettenburg, R Premraj, T Zimmermann, S Kim Proceedings of the 2008 international working conference on Mining software …, 2008 | 235 | 2008 |
Do stack traces help developers fix bugs? A Schroter, A Schröter, N Bettenburg, R Premraj 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010 …, 2010 | 223 | 2010 |
An empirical study on inconsistent changes to code clones at release level N Bettenburg, W Shang, W Ibrahim, B Adams, Y Zou, AE Hassan 2009 16th Working Conference on Reverse Engineering, 85-94, 2009 | 184 | 2009 |
Quality of bug reports in Eclipse N Bettenburg, S Just, A Schröter, C Weiß, R Premraj, T Zimmermann Proceedings of the 2007 OOPSLA workshop on eclipse technology eXchange, 21-25, 2007 | 168 | 2007 |
Think locally, act globally: Improving defect and effort prediction models N Bettenburg, M Nagappan, AE Hassan Proceedings of the 9th IEEE Working Conference on Mining Software …, 2012 | 164 | 2012 |
Studying the impact of social structures on software quality N Bettenburg, AE Hassan 2010 IEEE 18th International Conference on Program Comprehension, 124-133, 2010 | 114 | 2010 |
On the relationship between comment update practices and Software Bugs WM Ibrahim, N Bettenburg, B Adams, AE Hassan Journal of Systems and Software 85 (10), 2293-2304, 2012 | 78 | 2012 |
Studying the impact of social interactions on software quality N Bettenburg, AE Hassan Empirical Software Engineering 18, 375-431, 2013 | 74 | 2013 |
Should I contribute to this discussion? WM Ibrahim, N Bettenburg, E Shihab, B Adams, AE Hassan 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010 …, 2010 | 62 | 2010 |
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data N Bettenburg, E Shihab, AE Hassan 2009 IEEE International Conference on Software Maintenance, 539-542, 2009 | 56 | 2009 |
Management of community contributions: A case study on the Android and Linux software ecosystems N Bettenburg, AE Hassan, B Adams, DM German Empirical Software Engineering 20, 252-289, 2015 | 55 | 2015 |
On the central role of mailing lists in open source projects: An exploratory study E Shihab, N Bettenburg, B Adams, AE Hassan New Frontiers in Artificial Intelligence: JSAI-isAI 2009 Workshops, LENLS …, 2010 | 48 | 2010 |
Towards Improving Statistical Modeling of Software Engineering Data: Think Locally, Act Globally! N Bettenburg, M Nagappan, AE Hassan | 40* | |
A lightweight approach to uncover technical artifacts in unstructured data N Bettenburg, B Adams, AE Hassan, M Smidt 2011 IEEE 19th international conference on program comprehension, 185-188, 2011 | 37 | 2011 |
Method and system for establishing trusted communication using a security device NJS Bettenburg, R Kuang US Patent 9,736,149, 2017 | 33 | 2017 |
Shannon Perfect Secrecy in a Discrete Hilbert Space R Kuang, N Bettenburg 2020 IEEE International Conference on Quantum Computing and Engineering (QCE …, 2020 | 27 | 2020 |
System and method for generating passwords using key inputs and contextual inputs SK Xavier, R Steklasa, N Bettenburg, R Kuang US Patent 9,521,142, 2016 | 23 | 2016 |