Works (47)

Updated: August 12th, 2023 17:54

2019 journal article

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 45(9), 877–897.

By: J. Smith n, B. Johnson*, E. Murphy-Hill n, B. Chu* & H. Lipford*

author keywords: Software engineering; human factors; security; software tools; programming environments
TL;DR: The defect resolution process is studied—from the questions developers ask to their strategies for answering them and how future tools can leverage the findings to encourage better strategies. (via Semantic Scholar)
Source: Web Of Science
Added: October 7, 2019

2019 article

Investigating the Effects of Gender Bias on GitHub

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), pp. 700–711.

By: N. Imtiaz n, J. Middleton n, J. Chakraborty n, N. Robson n, G. Bai n & E. Murphy-Hill*

author keywords: GitHub; gender; open source
TL;DR: The effects of gender bias are largely invisible on the GitHub platform itself, but there are still signals of women concentrating their work in fewer places and being more restrained in communication than men. (via Semantic Scholar)
Source: Web Of Science
Added: September 7, 2020

2018 article

Discovering API Usability Problems at Scale

2018 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON API USAGE AND EVOLUTION (WAPI), pp. 14–17.

By: E. Murphy-Hill n, C. Sadowski*, A. Head*, J. Daughtry*, A. Macvean*, C. Jaspan*, C. Winter*

TL;DR: This paper describes an analysis technique designed to find API usability problems by comparing successive file-level changes made by individual software developers, and applies this tool to the file histories of real developers doing real tasks at Google. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 article

Does ACM's Code of Ethics Change Ethical Decision Making in Software Development?

ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 729–733.

By: A. McNamara n, J. Smith n & E. Murphy-Hill n

author keywords: ACM code of ethics; software engineering
TL;DR: This work replicated a prior behavioral ethics study with 63 software engineering students and 105 professional software developers, and found that explicitly instructing participants to consider the ACM code of ethics in their decision making had no observed effect when compared with a control group. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: March 25, 2019

2018 article

How Should Compilers Explain Problems to Developers?

ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 633–643.

By: T. Barik*, D. Ford n, E. Murphy-Hill n & C. Parnin n

author keywords: communication theory; compilers; debugging; error messages; explanations; Stack Overflow
TL;DR: Because error messages present poor explanations, theories of explanation---such as Toulmin's model of argument---can be applied to improve their quality, and three practical design principles are contributed to inform the design and evaluation of compiler error messages. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: March 25, 2019

2018 article

Sentiment and Politeness Analysis Tools on Developer Discussions Are Unreliable, but so Are People

2018 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON EMOTION AWARENESS IN SOFTWARE ENGINEERING (SEMOTION), pp. 55–61.

By: N. Imtiaz n, J. Middleton n, P. Girouard n & E. Murphy-Hill n

author keywords: sentiment; politeness; affect analysis; GitHub; developer discussion
TL;DR: This paper evaluates popular existing tools for sentiment and politeness detection over a dataset of 589 manually rated GitHub comments that represent developer discussions, and develops a coding scheme on how to quantify politeness for conversational texts found on collaborative platforms. (via Semantic Scholar)
Source: Web Of Science
Added: March 4, 2019

2018 article

When Not to Comment Questions and Tradeoffs with API Documentation for C plus plus Projects

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 643–653.

By: A. Head*, C. Sadowski*, E. Murphy-Hill n & A. Knight*

TL;DR: A set of questions maintainers and tool developers should consider when improving API-level documentation is identified, which may provide only limited value for developers, while requiring effort maintainers don't want to invest. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 article

Which Contributions Predict Whether Developers Are Accepted Into GitHub Teams

2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), pp. 403–413.

By: J. Middleton n, E. Murphy-Hill n, D. Green n, A. Meade n, R. Mayer n, D. White n, S. McDonald n

TL;DR: This work studies project communities on GitHub to discover which forms of software contribution characterize developers who begin as development team outsiders and eventually join the team, in contrast to developers who remain team outsiders. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: March 4, 2019

2017 article

Cheetah: Just-in-Time Taint Analysis for Android Apps

PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), pp. 39–42.

By: L. Do, K. Ali*, B. Livshits*, E. Bodden*, J. Smith n & E. Murphy-Hill n

TL;DR: Cheetah is a static taint analysis tool for Android apps that interleaves bug fixing and code development in the Eclipse integrated development environment that discovers and reports the most relevant results to the developer fast, and computes the more complex results incrementally later. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Design and evaluation of a multi-recommendation system for local code search

JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 39, 1–9.

By: . Ge*, D. Shepherd*, K. Damevski* & E. Murphy-Hill n

author keywords: Code search; Recommender systems; Field study
TL;DR: A multi-recommendation system that relies on the cooperation between several query recommendation techniques and shows that over 34% of all queries were adopted from recommendation; and recommended queries retrieved results 11% more often than manual queries. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Gender differences and bias in open source: pull request acceptance of women versus men

PeerJ Computer Science.

By: J. Terrell, A. Kofink, J. Middleton, C. Rainear, E. Murphy-Hill, C. Parnin, J. Stallings

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A Perspective on blending programming environments and games: beyond points, badges, and leaderboards

2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 134–142.

By: T. Batik, E. Murphy-Hill n & T. Zimmermann*

TL;DR: It is argued that more authentic game experiences are possible when programming environments are re-conceptualized and assessed as holistic, serious games, and broad gamification enables us to more effectively apply and leverage the breadth of game elements to the construction and understanding of programming environments. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

A process for surviving survey design and sailing through survey deployment

Perspectives on Data Science for Software Engineering, 213–219.

By: T. Barik & E. Murphy-Hill

Source: NC State University Libraries
Added: August 6, 2018

2016 article

Designing for Dystopia Software Engineering Research for the Post-apocalypse

FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 924–927.

By: T. Barik n, R. Pandita n, J. Middleton n & E. Murphy-Hill n

author keywords: culture; design fiction; dystopia; ideation; post-apocalypse; software engineering
TL;DR: This paper demonstrates through three pop culture dystopias, Battlestar Galactica, Fallout 3, and Children of Men, how reflecting on dystopian scenarios provides research opportunities as well as implications, such as making research accessible to non-experts, that are relevant to the authors' present. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2016 article

From Quick Fixes to Slow Fixes: Reimagining Static Analysis Resolutions to Enable Design Space Exploration

32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), pp. 212–222.

By: T. Barik n, Y. Song n, B. Johnson n & E. Murphy-Hill n

TL;DR: An extension to the FindBugs defect finding tool is implemented, called FixBugs, an interactive resolution approach within the Eclipse development environment that prioritizes other design criteria to the successful application of suggested fixes. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 article

Perquimans: A Tool for Visualizing Patterns of Spreadsheet Function Combinations

2016 IEEE WORKING CONFERENCE ON SOFTWARE VISUALIZATION, pp. 51–60.

By: J. Middleton n & E. Murphy-Hill n

TL;DR: Perquimans is a tool that analyzes spreadsheet collections to visualize patterns of function combination as an interactive tree, representing both the most common and most anomalous patterns of formula construction and their contexts. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Veteran developers' contributions and motivations: an open source perspective

2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 171–179.

By: P. Morrison n, R. Pandita n, E. Murphy-Hill n & A. McLaughlin n

TL;DR: The results suggest that veterans' are less motivated by social interactions than their younger peers, and could contribute a broader knowledge of software development than their young peers, as well as knowledge of old technologies that can be applied to newer technologies. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

from quick fixes to slow fixes: reimagining static analysis resolutions to enable design space exploration

32nd ieee international conference on software maintenance and evolution (icsme 2016), 212–222.

By: T. Barik, Y. Song, B. Johnson & E. Murphy-Hill

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A study of interactive code annotation for access control vulnerabilities

Proceedings 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 73–77.

By: T. Thomas*, B. Chu*, H. Lipford*, J. Smith n & E. Murphy-Hill n

TL;DR: This paper evaluated whether developers could indicate access control logic using interactive annotation and understand the vulnerabilities reported as a result and provided design guidance for improving the interaction and communication of such security tools with developers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Bespoke Tools: Adapted to the Concepts Developers Know

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 878–881.

By: B. Johnson n, R. Pandita n, E. Murphy-Hill n & S. Heckman n

author keywords: adaptive tools; IDE; concept models
TL;DR: This paper proposes the idea of automatically customizing development tools by modeling what a developer knows about software concepts and sketches three such ``bespoke'' tools and describes how development data can be used to infer what adeveloper knows about relevant concepts. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 article

Can Social Screencasting Help Developers Learn New Tools?

2015 IEEE/ACM 8TH INTERNATIONAL WORKSHOP ON COOPERATIVE AND HUMAN ASPECTS OF SOFTWARE ENGINEERING CHASE 2015, pp. 113–114.

By: K. Lubick n, T. Barik* & E. Murphy-Hill n

TL;DR: An online social screen casting system is explored that removes the dependencies of colocation and availability while maintaining the beneficial tool knowledge transfer of peer observation, and concludes that while peer observation facilitates online knowledge transfer, it is not the only component -- other social factors may be involved. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Commit Bubbles

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 631–634.

By: T. Barik n, K. Lubick n & E. Murphy-Hill n

TL;DR: This contribution is a fragment-oriented concept called Commit Bubbles that will allow developers to construct systematic commit histories that adhere to version control best practices with less cognitive effort, and in a way that integrates with their as-needed coding workflows. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Enron's Spreadsheets and Related Emails: A Dataset and Analysis

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 7–16.

By: F. Hermans* & E. Murphy-Hill n

TL;DR: An analysis of a new dataset, extracted from the Enron email archive, containing over 15,000 spreadsheets used within the Enrock Corporation, shows that the spreadsheets are substantially more smelly than the EUSES corpus, especially in terms of long calculation chains. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik n, K. Lubick n, J. Smith n, J. Slankas n & E. Murphy-Hill n

TL;DR: A corpus, called Fuse, containing 2,127,284 URLs that return spreadsheets (and their HTTP server responses), and 249,376 unique spreadsheets, contained within a public web archive of over 26.83 billion pages is described. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 article

GUEST EDITORS' INTRODUCTION REFACTORING

IEEE SOFTWARE, Vol. 32, pp. 27–29.

By: E. Murphy-Hill n, D. Roberts*, P. Sommerlad* & W. Opdyke*

TL;DR: The articles selected for this issue range from historical, exploring refactoring research's origins, to practical, exploring software developers' experiences withRefactoring, to theoretical, exploring new refactored techniques that haven't yet appeared in the wild. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

How Do Users Discover New Tools in Software Development and Beyond?

COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES, 24(5), 389–422.

By: E. Murphy-Hill n, D. Lee n, G. Murphy* & J. McGrenere*

author keywords: Discovery; Learning; Programmers; Programming tools
TL;DR: It is found that social learning of software tools, while sometimes effective, is infrequent; software users appear to discover tools from peers only once every few months. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Quantifying Developers' Adoption of Security Tools

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 260–271.

By: J. Witschey n, O. Zielinska n, A. Welk n, E. Murphy-Hill n, C. Mayhorn n & T. Zimmermann*

author keywords: security; tools; adoption; developers
TL;DR: Developers who perceive security to be important are more likely to use security tools than those who do not, and developers' ability to observe their peers using security tools is the strongest predictor of security tool use. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 article

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 248–259.

By: J. Smith n, B. Johnson n, E. Murphy-Hill n, B. Chu* & H. Lipford*

author keywords: Developer questions; human factors; security; static analysis
TL;DR: An exploratory study with novice and experienced software developers equipped with Find Security Bugs and observed their interactions with security vulnerabilities in an open-source system that they had previously contributed to found that they asked questions not only about security vulnerabilities, associated attacks, and fixes, but also questions about the software itself, the social ecosystem that built the software, and related resources and tools. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

The Design Space of Bug Fixes and How Developers Navigate It

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 41(1), 65–81.

By: E. Murphy-Hill n, T. Zimmermann*, C. Bird* & N. Nagappan*

author keywords: Design concepts; human factors in software design; maintainability
TL;DR: A number of factors, many of them non-technical, that influence how bugs are fixed, such as how close to release the software is, are found. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

The The human factor: A challenge for network reliability design

2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), 115–118.

By: M. Mushi n, E. Murphy-Hill n & R. Dutta n

TL;DR: The proposition that the future of network reliability engineering must actively address the human process of system administration and management and concommittant misconfigurations is advanced. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2014 journal article

Degree-of-Knowledge: Modeling a Developer's Knowledge of Code

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 23(2).

By: T. Fritz*, G. Murphy*, E. Murphy-Hill n, J. Ou* & E. Hill*

author keywords: Human Factors; Authorship; degree-of-interest; degree-of-knowledge; expertise; onboarding; recommendation; development environment
TL;DR: A degree-of-knowledge model is introduced that computes automatically, for each source-code element in a codebase, a real value that represents a developer's knowledge of that element based on a developers' authorship and interaction data. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2014 article

How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction

2014 SECOND IEEE WORKING CONFERENCE ON SOFTWARE VISUALIZATION (VISSOFT), pp. 87–96.

By: T. Barik n, K. Lubick n, S. Christie n & E. Murphy-Hill n

TL;DR: It is shown that a foundational set of visual annotations that aid developers in better comprehending error messages when compilers expose their internal reasoning allow developers to give significantly better self-explanations when compared against today's dominant visualization paradigm. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2014 conference paper

How developers use multi-recommendation system in local code search

2014 ieee symposium on visual languages and human-centric computing (vl/hcc 2014), 69–76.

By: X. Ge n, D. Shepherd*, K. Damevski* & E. Murphy-Hill n

TL;DR: This study studied several query recommendation techniques by extending Sando and conducting a longitudinal field study, and shows that over 30% of all queries were adopted from recommendation; and recommended queries retrieved results 7% more often than manual queries. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

How the Sando search tool recommends queries

2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), 425–428.

By: X. Ge n, D. Shepherd*, K. Damevski* & E. Murphy-Hill n

TL;DR: This paper demonstrates the recommendation techniques integrated in Sando, a state-of-the-art local code search tool, which suggests that developers are sometimes unacquainted with their local codebase. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

The Future of Social Learning in Software Engineering

COMPUTER, 47(1), 48–54.

By: E. Murphy-Hill n

author keywords: Software; Blogs; Communities; Servers; Computers; Companies; software engineering; social screencasting; social learning; tool discovery
TL;DR: Continuous social screencasting is a promising technique for sharing and learning about new software development tools and should be considered for use in education. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Comparing approaches to analyze refactoring activity on software repositories

JOURNAL OF SYSTEMS AND SOFTWARE, 86(4), 1006–1022.

By: G. Soares*, R. Gheyi*, E. Murphy-Hill n & B. Johnson n

author keywords: Refactoring; Repository; Manual analysis; Automated analysis
TL;DR: Three different approaches based on manual analysis, commit message and dynamic analysis are compared to detect whether a pair of versions determines a refactoring, in terms of behavioral preservation, and Ratzinger's approach is found to be able to detect most applied refactorings. (via Semantic Scholar)
UN Sustainable Development Goal Categories
8. Decent Work and Economic Growth (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Conducting interview studies: Challenges, lessons learned, and open questions

2013 1st International Workshop on Conducting Empirical Studies in Industry (CESI), 51–54.

By: J. Witschey n, E. Murphy-Hill n & S. Xiao n

TL;DR: This experience report describes nine challenges the authors encountered in planning and conducting an interview study with industrial practitioners, from choosing a population of interest to presenting the work in a way that resonates with the research community. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 article

Interactive ambient visualizations for soft advice

Murphy-Hill, E., Barik, T., & Black, A. P. (2013, April). INFORMATION VISUALIZATION, Vol. 12, pp. 107–132.

By: E. Murphy-Hill n, T. Barik n & A. Black*

author keywords: Software; refactoring; code smells; design; soft advice; visualization; ambient; grammar; style
TL;DR: An interactive ambient visualization to help users identify, understand, and interpret soft advice is described to help programmers interpret code smells, which are indications that a software project may be suffering from design problems. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

The design of bug fixes

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 332–341.

By: E. Murphy-Hill n, T. Zimmermann*, C. Bird* & N. Nagappan*

TL;DR: A number of factors, many of them non-technical, that influence how bugs are fixed, such as how close to release the software is, are found. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Why don't software developers use static analysis tools to find bugs?

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 672–681.

By: B. Johnson n, Y. Song n, E. Murphy-Hill n & R. Bowdidge*

TL;DR: Why developers are not widely using static analysis tools and how current tools could potentially be improved are investigated and several implications are discussed, such as the need for an interactive mechanism to help developers fix defects. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Adoption and use of Java generics

Empirical Software Engineering, 18(6), 1047–1089.

By: C. Parnin*, C. Bird* & E. Murphy-Hill n

author keywords: Generics; Annotations; Java; Languages; Post-mortem analysis
TL;DR: This paper reports on the first empirical investigation into how Java generics have been integrated into open source software by automatically mining the history of 40 popular open source Java programs, traversing more than 650 million lines of code in the process. (via Semantic Scholar)
Sources: Web Of Science, Crossref
Added: August 6, 2018

2012 conference paper

An exploratory study of blind software developers

2012 IEEE symposium on visual languages and human-centric computing (vl/hcc), 71–74.

By: S. Mealin n & E. Murphy-Hill n

TL;DR: The first exploratory empirical study, where eight interviews with blind software developers were conducted to identify aspects of software development that are a challenge, suggests that visually impaired software developers face challenges, for instance, when using screen readers to look up information when writing code. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Continuous social screencasting to facilitate software tool discovery

2012 34th international conference on software engineering (icse), 1317–1320.

By: E. Murphy-Hill*

TL;DR: The idea of continuous social screencasting is introduced, a novel mechanism to help developers gain awareness of relevant tools by enabling them to learn remotely and asychronously from their peers. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Reconciling manual and automatic refactoring

2012 34th international conference on software engineering (icse), 211–221.

By: X. Ge n, Q. DuBose n & E. Murphy-Hill n

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Restructuring software with gestures

2011 ieee symposium on visual languages and human-centric computing (vl/hcc 2011), 165–172.

By: E. Murphy-Hill n, M. Ayazifar n & A. Black*

TL;DR: A memorable mapping from gestures to refactorings, and an implementation of that mapping in the form of marking menus that suggests that programmers can infer the gesture that will invoke the appropriate refactoring tool, even if they do not know the name of theRefactoring. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

An interactive ambient visualization for code smells

Softvis 2010: Proceedings of the 2010 International Symposium on Software Visualization, 5–14.

By: E. Murphy-Hill n & A. Black*

TL;DR: A novel smell detector called Stench Blossom is proposed that provides an interactive ambient visualization designed to first give programmers a quick, high-level overview of the smells in their code, and then, if they wish, to help in understanding the sources of those code smells. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

Component-based end-user database design for ecologists

Journal of Intelligent Information Systems, 29(1), 7–24.

By: J. Cushing*, N. Nadkarni*, M. Finch*, A. Fiala*, E. Murphy-Hill*, L. Delcambre*, D. Maier*

author keywords: ecosystem informatics; end-user programming; domain-specific data structures; spatial databases; scientific visualization
TL;DR: The CanopyDataBank is described, through which individual ecologists in the forest canopy research community to be their own database programmers are enabled, and the key feature that makes this possible is domain-specific database components, which are called templates. (via Semantic Scholar)
Source: Crossref
Added: June 6, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.