Searched for: subject%3A%22Software%22
(1 - 6 of 6)
document
Hejderup, J.I. (author)
Developers strategically reuse code to expedite project development and lower maintenance costs. With the advent of software supply chains, integrating open-source libraries into projects has transitioned from a cumbersome, manual task to an automated, streamlined process. However, this ease of integration has downsides; adding just one library...
doctoral thesis 2024
document
Hejderup, J.I. (author), Gousios, G. (author)
Developers are increasingly using services such as Dependabot to automate dependency updates. However, recent research has shown that developers perceive such services as unreliable, as they heavily rely on test coverage to detect conflicts in updates. To understand the prevalence of tests exercising dependencies, we calculate the test...
journal article 2022
document
Hejderup, J.I. (author), Beller, M.M. (author), Triantafyllou, K. (author), Gousios, G. (author)
Modern programming languages such as Java, JavaScript, and Rust encourage software reuse by hosting diverse and fast-growing repositories of highly interdependent packages (i.e., reusable libraries) for their users. The standard way to study the interdependence between software packages is to infer a package dependency network by parsing...
journal article 2022
document
Hejderup, J.I. (author), van Deursen, A. (author), Gousios, G. (author)
A popular form of software reuse is the use of open source software libraries hosted on centralized code repositories, such as Maven or npm. Developers only need to declare dependencies to external libraries, and automated tools make them available to the workspace of the project. Recent incidents, such as the Equifax data breach and the leftpad...
conference paper 2018
document
Larios Vargas, E. (author), Hejderup, J.I. (author), Kechagia, M. (author), Bruntink, Magiel (author), Gousios, G. (author)
Modern software projects consist of more than just code: teams follow development processes, the code runs on servers or mobile phones and produces run time logs and users talk about the software in forums like StackOverflow and Twitter and rate it on app stores. Insights stemming from the real-time analysis of combined software engineering data...
conference paper 2018
document
Hejderup, J.I. (author)
Web-enabled services hold valuable information that attracts attackers to exploit services for unauthorized access. The transparency of Open-Source projects, shallow screening of hosted projects on public software repositories and access to vulnerability databases pave the way for attackers to gain strategic information to exploit software...
master thesis 2015
Searched for: subject%3A%22Software%22
(1 - 6 of 6)