-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathour-papers.bib
More file actions
2641 lines (2486 loc) · 149 KB
/
our-papers.bib
File metadata and controls
2641 lines (2486 loc) · 149 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
@inproceedings{Palyart2014Speculative,
abstract = {{Although software development involves making numerous decisions amongst alternatives, the design and implementation choices made typically become invisible; what a developer sees in the project's artifacts are the end result of all of the decisions. What if, instead, all of the choices made were tracked and it was easy for a developer to revisit a point where a decision was made and choose another alternative? What if the development environment could detect and suggest alternative choices? What if it was easy and low-cost to try another path? We explore the idea of speculative reprogramming that could support a what-if environment for the programming stages of software development.}},
address = {New York, NY, USA},
author = {Palyart, Marc and Murphy, Gail C. and Murphy-Hill, Emerson and Blanc, Xavier},
booktitle = {Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering},
citeulike-article-id = {14110662},
citeulike-linkout-0 = {http://www.cs.ubc.ca/\~{}mpalyart/paper/2014\_FSE\_SpeculativeReprogramming.pdf},
citeulike-linkout-1 = {http://portal.acm.org/citation.cfm?id=2666609},
citeulike-linkout-2 = {http://dx.doi.org/10.1145/2635868.2666609},
doi = {10.1145/2635868.2666609},
isbn = {978-1-4503-3056-5},
keywords = {discovery},
location = {Hong Kong, China},
pages = {837--840},
posted-at = {2016-08-10 03:47:48},
priority = {2},
publisher = {ACM},
series = {FSE 2014},
title = {{Speculative Reprogramming}},
url = {http://www.cs.ubc.ca/\~{}mpalyart/paper/2014\_FSE\_SpeculativeReprogramming.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Zielinska2016Temporal,
author = {Zielinska, Olga A. and Welk, Allaire K. and Mayhorn, Christopher B. and Murphy-Hill, Emerson},
booktitle = {Annual Meeting of the Human Factors and Ergonomics Society},
citeulike-article-id = {14104541},
keywords = {phishing},
posted-at = {2016-07-29 23:39:13},
priority = {2},
title = {A Temporal Analysis of Persuasion Principles in Phishing Emails},
year = {2016},
howpublished = {2. Conference},
}
@article{Ge2016Design,
author = {Ge, Xi and Shepherd, David C. and Damevski, Kostadin and Murphy-Hill, Emerson},
citeulike-article-id = {14104539},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/jvlc16.pdf},
journal = {Journal of Visual Languages and Computing},
posted-at = {2016-07-29 23:33:32},
priority = {2},
title = {{Design and Evaluation of a Multi-Recommendation System for Local Code Search}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/jvlc16.pdf},
year = {2016},
howpublished = {1. Journal},
}
@inproceedings{Middleton2016Tool,
author = {Middleton, Justin and Murphy-Hill, Emerson},
booktitle = {Working Conference on Software Visualization},
citeulike-article-id = {14104519},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/vissoft16.pdf},
keywords = {adoption, discovery, spreadsheets},
posted-at = {2016-07-29 20:15:14},
priority = {2},
title = {{A Tool for Visualizing Patterns of Spreadsheet Function Combinations}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/vissoft16.pdf},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Barik2016Perspective,
author = {Barik, Titus and Murphy-Hill, Emerson and Zimmermann, Thomas},
booktitle = {Visual Languages and Human-Centric Computing},
citeulike-article-id = {14104505},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc16-gamification.pdf},
keywords = {program\_analysis},
posted-at = {2016-07-29 20:09:23},
priority = {2},
title = {{A Perspective on Blending Programming Environments and Games: Beyond Points, Badges, and Leaderboards}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc16-gamification.pdf},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Morrison2016Veteran,
author = {Morrison, Patrick and Pandita, Rahul and Murphy-Hill, Emerson and McLaughlin, Anne},
booktitle = {Visual Languages and Human-Centric Computing},
citeulike-article-id = {14104499},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc16-veterans.pdf},
keywords = {adoption, discovery},
posted-at = {2016-07-29 20:02:16},
priority = {2},
title = {{Veteran Developers' Contributions and Motivations: An Open Source Perspective}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc16-veterans.pdf},
year = {2016},
howpublished = {2. Conference},
keywords = {ageing,discovery},
}
@inproceedings{Smith2016Resolving,
author = {Smith, Justin},
booktitle = {Visual Languages and Human-Centric Computing, Graduate Consortium},
citeulike-article-id = {14104209},
howpublished = {6. Poster},
keywords = {security},
posted-at = {2016-07-29 19:19:15},
priority = {2},
title = {{Resolving Input Validation Vulnerabilities by Retracing Taint Flow Through Source Code}},
year = {2016}
}
@inproceedings{Barik2016From,
author = {Barik, Titus and Song, Yoonki and Johnson, Brittany and Murphy-Hill, Emerson},
booktitle = {International Conference on Software Maintenance and Evolution},
citeulike-article-id = {14104203},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/icsme16.pdf},
keywords = {program\_analysis},
posted-at = {2016-07-29 19:06:52},
priority = {2},
title = {{From Quick Fixes to Slow Fixes: Reimagining Static Analysis Resolutions to Enable Design Space Exploration}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/icsme16.pdf},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Barik2016Designing,
author = {Barik, Titus and Pandita, Rahul and Middleton, Justin and Murphy-Hill, Emerson},
booktitle = {Foundations of Software Engineering, Visions and Reflections Track},
citeulike-article-id = {14104202},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/fse16titus.pdf},
keywords = {adoption, discovery},
posted-at = {2016-07-29 19:03:19},
priority = {2},
title = {{Designing for Dystopia: Software Engineering Research for the Post-Apocalypse}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse16titus.pdf},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Barik2016How,
author = {Barik, Titus},
booktitle = {Foundations of Software Engineering, Student Research Competition},
citeulike-article-id = {14104201},
howpublished = {6. Poster},
keywords = {program\_analysis},
posted-at = {2016-07-29 18:57:32},
priority = {2},
title = {{How should static analysis tools explain anomalies to developers?}},
year = {2016}
}
@inproceedings{Johnson2016CrossTool,
author = {Johnson, Brittany and Pandita, Rahul and Smith, Justin and Ford, Denae and Elder, Sarah and Murphy-Hill, Emerson and Heckman, Sarah and Sadowski, Caitlin},
booktitle = {Foundations of Software Engineering},
citeulike-article-id = {14104200},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/fse16.pdf},
keywords = {program\_analysis, security},
posted-at = {2016-07-29 18:55:04},
priority = {2},
title = {{A Cross-Tool Communication Study on Program Analysis Tool Notifications}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse16.pdf},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Thomas2016What,
author = {Thomas, Tyler W. and Smith, Justin and Lipford, Heather and Chu, Bill and Murphy-Hill, Emerson},
booktitle = {Workshop on Security Information Workers},
citeulike-article-id = {14104198},
citeulike-linkout-0 = {https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/thomas},
howpublished = {4. Workshop},
keywords = {security},
posted-at = {2016-07-29 18:46:40},
priority = {2},
title = {{What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool}},
url = {https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/thomas},
year = {2016}
}
@inproceedings{Mohammadi2016Automatic,
abstract = {{Integrating security testing into the workflow of software developers not only can save resources for separate security testing but also reduce the cost of fixing security vulnerabilities by detecting them early in the development cycle. We present an automatic testing approach to detect a common type of Cross Site Scripting (XSS) vulnerability caused by improper encoding of untrusted data. We automatically extract encoding functions used in a web application to sanitize untrusted inputs and then evaluate their effectiveness by automatically generating XSS attack strings. Our evaluations show that this technique can detect 0-day XSS vulnerabilities that cannot be found by static analysis tools. We will also show that our approach can efficiently cover a common type of XSS vulnerability. This approach can be generalized to test for input validation against other types injections such as command line injection.}},
address = {New York, NY, USA},
author = {Mohammadi, Mahmoud and Chu, Bill and Lipford, Heather R. and Murphy-Hill, Emerson},
booktitle = {Proceedings of the 11th International Workshop on Automation of Software Test},
citeulike-article-id = {14104186},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2896921.2896929},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2896921.2896929},
doi = {10.1145/2896921.2896929},
howpublished = {4. Workshop},
isbn = {978-1-4503-4151-6},
keywords = {security},
location = {Austin, Texas},
pages = {78--84},
posted-at = {2016-07-29 18:23:41},
priority = {2},
publisher = {ACM},
series = {AST '16},
title = {{Automatic Web Security Unit Testing: XSS Vulnerability Detection}},
url = {http://dx.doi.org/10.1145/2896921.2896929},
year = {2016}
}
@inproceedings{Zielinska2016Persuasive,
abstract = {{Phishing is a social engineering tactic used to trick people into revealing personal information [Zielinska, Tembe, Hong, Ge, Murphy-Hill, \& Mayhorn 2014]. As phishing emails continue to infiltrate users' mailboxes, what social engineering techniques are the phishers using to successfully persuade victims into releasing sensitive information? Cialdini's [2007] six principles of persuasion (authority, social proof, liking/similarity, commitment/consistency, scarcity, and reciprocation) have been linked to elements of phishing emails [Akbar 2014; Ferreira, \& Lenzini 2015]; however, the findings have been conflicting. Authority and scarcity were found as the most common persuasion principles in 207 emails obtained from a Netherlands database [Akbar 2014], while liking/similarity was the most common principle in 52 personal emails available in Luxemborg and England [Ferreira et al. 2015]. The purpose of this study was to examine the persuasion principles present in emails available in the United States over a period of five years. Two reviewers assessed eight hundred eighty-seven phishing emails from Arizona State University, Brown University, and Cornell University for Cialdini's six principles of persuasion. Each email was evaluated using a questionnaire adapted from the Ferreira et al. [2015] study. There was an average agreement of 87\% per item between the two raters. Spearman's Rho correlations were used to compare email characteristics over time. During the five year period under consideration (2010--2015), the persuasion principles of commitment/consistency and scarcity have increased over time, while the principles of reciprocation and social proof have decreased over time. Authority and liking/similarity revealed mixed results with certain characteristics increasing and others decreasing. The commitment/consistency principle could be seen in the increase of emails referring to elements outside the email to look more reliable, such as Google Docs or Adobe Reader (rs(850) = .12, p =.001), while the scarcity principle could be seen in urgent elements that could encourage users to act quickly and may have had success in eliciting a response from users (rs(850) = .09, p =.01). Reciprocation elements, such as a requested reply, decreased over time (rs(850) = -.12, p =.001). Additionally, the social proof principle present in emails by referring to actions performed by other users also decreased (rs(850) = -.10, p =.01). Two persuasion principles exhibited both an increase and decrease in their presence in emails over time: authority and liking/similarity. These principles could increase phishing rate success if used appropriately, but could also raise suspicions in users and decrease compliance if used incorrectly. Specifically, the source of the email, which corresponds to the authority principle, displayed an increase over time in educational institutes (rs(850) = .21, p <.001), but a decrease in financial institutions (rs(850) = -.18, p <.001). Similarly, the liking/similarity principle revealed an increase over time of logos present in emails (rs(850) = .18, p <.001) and decrease in service details, such as payment information (rs(850) = -.16, p <.001). The results from this study offer a different perspective regarding phishing. Previous research has focused on the user aspect; however, few studies have examined the phisher perspective and the social psychological techniques they are implementing. Additionally, they have yet to look at the success of the social psychology techniques. Results from this study can be used to help to predict future trends and inform training programs, as well as machine learning programs used to identify phishing messages.}},
address = {New York, NY, USA},
author = {Zielinska, Olga and Welk, Allaire and Mayhorn, Christopher B. and Murphy-Hill, Emerson},
booktitle = {Proceedings of the Symposium and Bootcamp on the Science of Security},
citeulike-article-id = {14104185},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2898375.2898382},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2898375.2898382},
doi = {10.1145/2898375.2898382},
isbn = {978-1-4503-4277-3},
keywords = {phishing},
location = {Pittsburgh, Pennsylvania},
pages = {126},
posted-at = {2016-07-29 18:23:06},
priority = {2},
publisher = {ACM},
series = {HotSos '16},
title = {{The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails}},
url = {http://dx.doi.org/10.1145/2898375.2898382},
year = {2016},
howpublished = {2. Conference},
}
@inproceedings{Smith2016Identifying,
abstract = {{Although static analysis tools detect potential code defects early in the development process, they do not fully support developers in resolving those defects. To accurately and efficiently resolve defects, developers must orchestrate several complex tasks, such as determining whether the defect is a false positive and updating the source code without introducing new defects. Without good defect resolution strategies developers may resolve defects erroneously or inefficiently. In this work, I perform a preliminary analysis of the successful and unsuccessful strategies developers use to resolve defects. Based on the successful strategies identified, I then outline a tool to support developers throughout the defect resolution process.}},
address = {New York, NY, USA},
author = {Smith, Justin},
booktitle = {Proceedings of the 38th International Conference on Software Engineering Companion},
citeulike-article-id = {14104182},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2889160.2891034},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2889160.2891034},
doi = {10.1145/2889160.2891034},
howpublished = {6. Poster},
isbn = {978-1-4503-4205-6},
keywords = {security, self},
location = {Austin, Texas},
pages = {662--664},
posted-at = {2016-07-29 18:08:36},
priority = {2},
publisher = {ACM},
series = {ICSE '16},
title = {{Identifying Successful Strategies for Resolving Static Analysis Notifications}},
url = {http://dx.doi.org/10.1145/2889160.2891034},
year = {2016}
}
@inproceedings{Theisen2016Software,
author = {Theisen, Christopher and Williams, Laurie and Murphy-Hill, Emerson and Oliver, Kevin},
booktitle = {International Conference on Software Engineering, Software Engineering Education and Training Track},
citeulike-article-id = {13991766},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2889160.2889186},
doi = {10.1145/2889160.2889186},
keywords = {security},
posted-at = {2016-03-31 16:49:32},
priority = {2},
title = {{Software Security Education at Scale}},
url = {http://dx.doi.org/10.1145/2889160.2889186},
year = {2016},
howpublished = {2. Conference},
}
@article{welk2015will,
author = {Welk, Allaire K. and Hong, Kyung W. and Zielinska, Olga A. and Tembe, Rucha and Murphy-Hill, Emerson and Mayhorn, Christopher B.},
citeulike-article-id = {13933980},
citeulike-linkout-0 = {http://dx.doi.org/10.4018/IJCBPL.2015100101},
doi = {10.4018/IJCBPL.2015100101},
journal = {International Journal of Cyber Behavior, Psychology and Learning (IJCBPL)},
keywords = {phishing},
number = {4},
pages = {1--17},
posted-at = {2016-02-16 20:42:30},
priority = {0},
publisher = {IGI Global},
title = {{Will the ``Phisher-Men'' Reel You In?: Assessing Individual Differences in a Phishing Detection Task}},
url = {http://dx.doi.org/10.4018/IJCBPL.2015100101},
volume = {5},
year = {2015},
howpublished = {1. Journal},
}
@inproceedings{Thomas2015Study,
author = {Thomas, Tyler and Smith, Justin and Murphy-Hill, Emerson and Chu, Bei-Tseng and Lipford, Heather},
booktitle = {Proceedings of Visual Languages and Human Centric Computing},
citeulike-article-id = {13703567},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/VLHCC.2015.7357200},
doi = {10.1109/VLHCC.2015.7357200},
keywords = {program\_analysis, security},
posted-at = {2015-08-15 19:08:17},
priority = {0},
title = {{A Study of Interactive Code Annotation for Access Control Vulnerabilities}},
url = {http://dx.doi.org/10.1109/VLHCC.2015.7357200},
year = {2015},
howpublished = {2. Conference},
}
@article{MurphyHill2015How,
author = {Murphy-Hill, Emerson and Lee, Da Y. and Murphy, Gail C. and McGrenere, Joanna},
citeulike-article-id = {13679697},
citeulike-linkout-0 = {http://dx.doi.org/10.1007/s10606-015-9230-9},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/jcscw15.pdf},
doi = {10.1007/s10606-015-9230-9},
journal = {Computer Supported Cooperative Work},
keywords = {adoption},
posted-at = {2015-07-21 20:42:17},
priority = {0},
title = {{How Do Users Discover New Tools in Software Development and Beyond?}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/jcscw15.pdf},
year = {2015},
howpublished = {1. Journal},
}
@inbook{Snipes2015Practical,
author = {Snipes, Will and Murphy-Hill, Emerson and Fritz, Thomas and Vakilian, Mohsen and Damevski, Kosta and Nair, Anil and Shepherd, David},
booktitle = {The Art and Science of Analyzing Software Data},
citeulike-article-id = {13679693},
citeulike-linkout-0 = {http://dx.doi.org/10.1016/B978-0-12-411519-4.00005-7},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/asd15.pdf},
doi = {10.1016/B978-0-12-411519-4.00005-7},
keywords = {adoption},
posted-at = {2015-07-21 20:39:08},
priority = {0},
title = {{A Practical Guide to Analyzing IDE Usage Data}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/asd15.pdf},
year = {2015},
howpublished = {3. Book Chapter},
}
@inproceedings{Johnson2015Bespoke,
author = {Johnson, Brittany and Pandita, Rahul and Murphy-Hill, Emerson and Heckman, Sarah},
booktitle = {Proceedings of Foundations of Software Engineering, New and Emerging Results Track},
citeulike-article-id = {13674458},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2786805.2803197},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-nier-brittany.pdf},
doi = {10.1145/2786805.2803197},
keywords = {fse15, program\_analysis},
posted-at = {2015-07-16 12:09:37},
priority = {0},
title = {{Bespoke Tools: Adapted to the Concepts Developers Know}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-nier-brittany.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Barik2015I,
author = {Barik, Titus and Johnson, Brittany and Murphy-Hill, Emerson},
booktitle = {Proceedings of Foundations of Software Engineering, New and Emerging Results Track},
citeulike-article-id = {13674455},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2786805.2803200},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-nier-titus.pdf},
doi = {10.1145/2786805.2803200},
keywords = {discovery, fse15, program\_analysis},
posted-at = {2015-07-16 12:07:04},
priority = {0},
title = {{I Heart Hacker News: Expanding Qualitative Research Findings by Analyzing Social News Websites}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-nier-titus.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Smith2015Questions,
author = {Smith, Justin and Johnson, Brittany and Murphy-Hill, Emerson and Chu, Bill and Lipford, Heather R.},
booktitle = {Proceedings of Foundations of Software Engineering},
citeulike-article-id = {13674446},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2786805.2786812},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-main-justin.pdf},
doi = {10.1145/2786805.2786812},
keywords = {fse15, security},
posted-at = {2015-07-16 12:01:45},
priority = {0},
title = {{Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-main-justin.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Witschey2015Quantifying,
author = {Witschey, Jim and Zielinska, Olga and Welk, Allaire and Murphy-Hill, Emerson and Mayhorn, Chris and Zimmermann, Thomas},
booktitle = {Proceedings of Foundations of Software Engineering},
citeulike-article-id = {13674443},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2786805.2786816},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-main-jim.pdf},
doi = {10.1145/2786805.2786816},
keywords = {fse15, security},
posted-at = {2015-07-16 11:58:19},
priority = {0},
title = {{Quantifying Developers' Adoption of Security Tools}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/fse15-main-jim.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Zielinska2015Exploring,
author = {Zielinska, Olga A. and Welk, Allaire K. and Mayhorn, Christopher B. and Murphy-Hill, Emerson},
booktitle = {Proceedings of the Annual Meeting of the Human Factors and Ergonomics Society},
citeulike-article-id = {13651019},
citeulike-linkout-0 = {http://dx.doi.org/10.1177/1541931215591165},
doi = {10.1177/1541931215591165},
keywords = {phishing},
posted-at = {2015-06-18 16:36:51},
priority = {2},
title = {{Exploring Expert and Novice Mental Models of Phishing}},
url = {http://dx.doi.org/10.1177/1541931215591165},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Barik2015Fuse,
author = {Barik, Titus and Lubick, Kevin and Smith, Justin and Slankas, John and Murphy-Hill, Emerson},
booktitle = {Proceedings of the 12th Working Conference on Mining Software Repositories, Data Showcase},
citeulike-article-id = {13568453},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/MSR.2015.70},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/icse-msr-15.pdf},
doi = {10.1109/MSR.2015.70},
keywords = {adoption, discovery, icse2015, spreadsheets, tool\_adoption},
posted-at = {2015-04-02 13:38:49},
priority = {2},
title = {{Fuse: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/icse-msr-15.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Lubick2015Can,
author = {Lubick, Kevin and Barik, Titus and Murphy-Hill, Emerson},
booktitle = {Proceedings of the 8th International Workshop on Cooperative and Human Aspects of Software Engineering},
citeulike-article-id = {13568449},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/CHASE.2015.18},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/icse-chase-15.pdf},
doi = {10.1109/CHASE.2015.18},
howpublished = {4. Workshop},
keywords = {adoption, discovery, icse2015, tool\_adoption},
posted-at = {2015-04-02 13:31:25},
priority = {2},
title = {{Can Social Screencasting Help Developers Learn New Tools?}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/icse-chase-15.pdf},
year = {2015},
}
@inproceedings{Hermans2015Enrons,
author = {Hermans, Felienne and Murphy-Hill, Emerson},
booktitle = {Proceedings of the International Conference on Software Engineering, Software Engineering in Practice Track},
citeulike-article-id = {13501892},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/ICSE.2015.129},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/icse-seip-15.pdf},
doi = {10.1109/ICSE.2015.129},
keywords = {adoption, icse2015, nsa, tool\_adoption, spreadsheets},
posted-at = {2015-01-27 02:04:52},
priority = {2},
title = {Enron's Spreadsheets and Related Emails: A Dataset and Analysis},
url = {http://people.engr.ncsu.edu/ermurph3/papers/icse-seip-15.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Barik2015Commit,
author = {Barik, Titus and Lubick, Kevin and Murphy-Hill, Emerson},
booktitle = {Proceedings of the International Conference on Software Engineering, New Ideas and Emerging Results Track},
citeulike-article-id = {13501890},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/ICSE.2015.210},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/icse-nier-15.pdf},
doi = {10.1109/ICSE.2015.210},
keywords = {icse2015, program\_analysis},
posted-at = {2015-01-27 01:57:56},
priority = {2},
title = {{Commit Bubbles}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/icse-nier-15.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Mushi2015Human,
author = {Mushi, Magreth and Murphy-Hill, Emerson and Dutta, Rudra},
booktitle = {Proceedings of the International Conference on Design of Reliable Communication Networks},
citeulike-article-id = {13501806},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/DRCN.2015.7149000},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/drcn15.pdf},
doi = {10.1109/DRCN.2015.7149000},
howpublished = {4. Workshop},
posted-at = {2015-01-26 22:00:20},
priority = {2},
title = {{The Human Factor: a Challenge for Network Reliability Design}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/drcn15.pdf},
year = {2015},
howpublished = {2. Conference},
}
@inproceedings{Barik2014Improving,
author = {Barik, T.},
booktitle = {Visual Languages and Human-Centric Computing (VL/HCC), 2014 IEEE Symposium on},
citeulike-article-id = {13479977},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/vlhcc.2014.6883043},
citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6883043},
doi = {10.1109/vlhcc.2014.6883043},
howpublished = {6. Poster},
institution = {North Carolina State Univ., Raleigh, NC, USA},
keywords = {program\_analysis},
month = jul,
pages = {177--178},
posted-at = {2015-01-11 18:14:08},
priority = {2},
publisher = {IEEE},
title = {{Improving error notification comprehension through visual overlays in IDEs}},
url = {http://dx.doi.org/10.1109/vlhcc.2014.6883043},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Johnson2014Enhancing,
author = {Johnson, B.},
booktitle = {Visual Languages and Human-Centric Computing (VL/HCC), 2014 IEEE Symposium on},
citeulike-article-id = {13479976},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/vlhcc.2014.6883050},
citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6883050},
doi = {10.1109/vlhcc.2014.6883050},
howpublished = {6. Poster},
institution = {Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA},
keywords = {program\_analysis},
month = jul,
pages = {191--192},
posted-at = {2015-01-11 18:11:36},
priority = {2},
publisher = {IEEE},
title = {{Enhancing tools' intelligence for improved program analysis tool usability}},
url = {http://dx.doi.org/10.1109/vlhcc.2014.6883050},
year = {2014}
}
@misc{Bates2014Recommending,
author = {Bates, Dylan},
booktitle = {Proceedings of the Systems, Programming, Languages and Applications: Software for Humanity (SPLASH) Student Research Competition},
citeulike-article-id = {13445998},
howpublished = {6. Poster},
keywords = {adoption, discovery, tool\_adoption},
posted-at = {2014-11-26 19:13:14},
priority = {2},
title = {{Recommending More Efficient Workflows to Software Developers}},
year = {2014}
}
@inproceedings{Jordan2014Designing,
author = {Jordan, Brooke and Johnson, Brittany and Witschey, Jim and Murphy-Hill, Emerson},
booktitle = {Proceedings of the CCS Workshop on Security Information Workers},
citeulike-article-id = {13366838},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2663887.2663900},
doi = {10.1145/2663887.2663900},
howpublished = {4. Workshop},
keywords = {adoption, security, tool\_adoption},
posted-at = {2014-09-18 14:39:30},
priority = {2},
title = {{Designing Interventions to Persuade Software Developers to Adopt
Security Tools}},
url = {http://dx.doi.org/10.1145/2663887.2663900},
year = {2014}
}
@inproceedings{Witschey2014Technical,
author = {Witschey, Jim and Xiao, Shundan and Murphy-Hill, Emerson},
booktitle = {Proceedings of the CCS Workshop on Security Information Workers},
citeulike-article-id = {13366827},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2663887.2663898},
doi = {10.1145/2663887.2663898},
howpublished = {4. Workshop},
keywords = {adoption, security, tool\_adoption},
posted-at = {2014-09-18 14:36:46},
priority = {2},
title = {{Technical and Personal Factors Influencing Developers' Adoption of Security Tools}},
url = {http://dx.doi.org/10.1145/2663887.2663898},
year = {2014}
}
@inproceedings{Lipford2014Interactive,
author = {Lipford, Heather and Thomas, Tyler and Chu, Bill and Murphy-Hill, Emerson},
booktitle = {Proceedings of the CCS Workshop on Security Information Workers},
citeulike-article-id = {13366816},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2663887.2663901},
doi = {10.1145/2663887.2663901},
howpublished = {4. Workshop},
keywords = {security},
posted-at = {2014-09-18 14:31:00},
priority = {2},
title = {{Interactive Code Annotation for Security Vulnerability Detection}},
url = {http://dx.doi.org/10.1145/2663887.2663901},
year = {2014}
}
@article{MurphyHill2014Design,
author = {Murphy-Hill, Emerson and Zimmermann, Thomas and Bird, Christian and Nagappan, Nachiappan},
citeulike-article-id = {13350008},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/TSE.2014.2357438},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/Design\_of\_Bug\_Fixes\_TSE.pdf},
doi = {10.1109/TSE.2014.2357438},
journal = {Transactions on Software Engineering},
keywords = {bugs},
posted-at = {2014-09-07 18:25:45},
priority = {2},
title = {{The Design Space of Bug Fixes and How Developers Navigate It}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/Design\_of\_Bug\_Fixes\_TSE.pdf},
year = {2014},
howpublished = {1. Journal},
}
@inproceedings{Ge2014How,
author = {Ge, Xi and Shepherd, David and Damevski, Kostadin and Murphy-Hill, Emerson},
booktitle = {Conference on Visual Language and Human-Centric Computing},
citeulike-article-id = {13313131},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/VLHCC.2014.6883025},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc14.pdf},
doi = {10.1109/VLHCC.2014.6883025},
keywords = {award\_best-paper, self},
posted-at = {2014-08-01 05:18:08},
priority = {2},
title = {{How Developers Use Multi-Recommendation System in Local Code Search}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/vlhcc14.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Barik2014How,
author = {Barik, Titus and Lubick, Kevin and Christie, Samuel and Murphy-Hill, Emerson},
booktitle = {2nd IEEE Working Conference on Software Visualization},
citeulike-article-id = {13240168},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/VISSOFT.2014.24},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/vissoft14.pdf},
doi = {10.1109/VISSOFT.2014.24},
keywords = {program\_analysis, self},
posted-at = {2014-06-23 15:12:34},
priority = {2},
title = {{How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/vissoft14.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Ge2014How,
author = {Ge, Xi and Shepherd, D. and Damevski, K. and Murphy-Hill, Emerson},
booktitle = {IEEE Conference on Software Maintenance},
citeulike-article-id = {13119864},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/csmr-wcre.2014.6747210},
citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6747210},
doi = {10.1109/csmr-wcre.2014.6747210},
howpublished = {6. Poster},
institution = {NC State Univ., Raleigh, NC, USA},
keywords = {self},
month = feb,
pages = {425--428},
posted-at = {2014-03-28 21:00:59},
priority = {2},
publisher = {IEEE},
title = {{How the Sando search tool recommends queries}},
url = {http://dx.doi.org/10.1109/csmr-wcre.2014.6747210},
year = {2014}
}
@article{MurphyHill2014Future,
abstract = {{Building on time-honored strengths of person-to-person social learning, new technologies can help software developers learn from one another more efficiently and productively. In particular, continuous social screencasting is a promising technique for sharing and learning about new software development tools.}},
author = {Murphy-Hill, Emerson},
citeulike-article-id = {13119857},
citeulike-linkout-0 = {http://doi.ieeecomputersociety.org/10.1109/MC.2013.406},
citeulike-linkout-1 = {http://dx.doi.org/10.1109/mc.2013.406},
day = {01},
doi = {10.1109/mc.2013.406},
journal = {Computer},
keywords = {discovery, self, social\_networks},
month = jan,
number = {1},
pages = {48--54},
posted-at = {2014-03-28 20:54:22},
priority = {2},
publisher = {IEEE},
title = {{The Future of Social Learning in Software Engineering}},
url = {http://dx.doi.org/10.1109/mc.2013.406},
volume = {47},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Tembe2014Phishing,
author = {Tembe, Rucha and Zielinska, Olga and Liu, Yuqi and Hong, Kyung W. and Murphy-Hill, Emerson and Mayhorn, Chris and Ge, Xi},
booktitle = {Symposium and Bootcamp on the Science of Security},
citeulike-article-id = {13119502},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2600176.2600178},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/hotsos14.pdf},
doi = {10.1145/2600176.2600178},
keywords = {phishing},
posted-at = {2014-03-28 19:00:03},
priority = {2},
title = {{Phishing in International Waters: Exploring Cross-National Differences in Phishing Conceptualizations between Chinese, Indian and American Samples}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/hotsos14.pdf},
year = {2014},
howpublished = {2. Conference},
}
@article{Fritz2014DegreeofKnowledge,
author = {Fritz, Thomas and Murphy, Gail C. and Murphy-Hill, Emerson and Ou, Jingwen and Hill, Emily},
citeulike-article-id = {13110302},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2512207},
doi = {10.1145/2512207},
journal = {Transactions on Software Engineering and Methodology},
keywords = {self},
posted-at = {2014-03-18 21:15:05},
priority = {2},
title = {{Degree-of-Knowledge: Modeling a Developer's Knowledge of Code}},
url = {http://dx.doi.org/10.1145/2512207},
year = {2014},
howpublished = {1. Journal},
}
@inproceedings{Barik2014Compiler,
author = {Barik, Titus and Witschey, Jim and Johnson, Brittany and Murphy-Hill, Emerson},
booktitle = {International Conference on Software Engineering, New Ideas and Emerging Results},
citeulike-article-id = {13110242},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2591062.2591124},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_NIER.pdf},
doi = {10.1145/2591062.2591124},
keywords = {icse14, program\_analysis, self},
posted-at = {2014-03-18 19:42:09},
priority = {2},
title = {{Compiler Error Notifications Revisited: An Interaction-First Approach for Helping Developers more Effectively Comprehend and Resolve Error Notifications}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_NIER.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Snipes2014Experiences,
author = {Snipes, Will and Nair, Anil R. and Murphy-Hill, Emerson},
booktitle = {International Conference on Software Engineering, Software Engineering in Practice Track},
citeulike-article-id = {13110236},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2591062.2591171},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_SEIP.pdf},
doi = {10.1145/2591062.2591171},
keywords = {adoption, icse14, self},
posted-at = {2014-03-18 19:29:33},
priority = {2},
title = {{Experiences Gamifying Developer Adoption of Practices and Tools}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_SEIP.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Ge2014Towards,
author = {Ge, Xi and Sarkar, Saurabh and Murphy-Hill, Emerson},
booktitle = {Computer-Human Aspects of Software Engineering (CHASE), at the International Conference on Software Engineering},
citeulike-article-id = {13104986},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2593702.2593706},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_CHASE.pdf},
doi = {10.1145/2593702.2593706},
howpublished = {4. Workshop},
keywords = {icse14, refactoring, self},
posted-at = {2014-03-12 18:29:44},
priority = {2},
title = {{Towards Refactoring-Aware Code Review}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_CHASE.pdf},
year = {2014}
}
@inproceedings{MurphyHill2014How,
author = {Murphy-Hill, Emerson and Grossman, Dan},
booktitle = {Future of Software Engineering, International Conference on Software Engineering},
citeulike-article-id = {13097815},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2593882.2593898},
citeulike-linkout-1 = {https://onedrive.live.com/redir?resid=DD9F9EB62184AD3B!182798\&\#38;authkey=!AOX661D4wwC8Vmc\&\#38;ithint=file\%2c.pptx},
citeulike-linkout-2 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_FoSE.pdf},
doi = {10.1145/2593882.2593898},
keywords = {discovery, icse14, programming\_languages, self},
posted-at = {2014-03-09 22:09:09},
priority = {2},
title = {{How Programming Languages Will Co-evolve with Software Engineering: A Bright Decade Ahead}},
url = {https://onedrive.live.com/redir?resid=DD9F9EB62184AD3B!182798\&\#38;authkey=!AOX661D4wwC8Vmc\&\#38;ithint=file\%2c.pptx},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Ge2014Manual,
author = {Ge, Xi and Murphy-Hill, Emerson},
booktitle = {Proceedings of the International Conference on Software Engineering},
citeulike-article-id = {13075926},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2568225.2568280},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_GhostFactor.pdf},
doi = {10.1145/2568225.2568280},
keywords = {icse14, refactoring, self},
posted-at = {2014-03-01 17:48:55},
priority = {2},
title = {{Manual Refactoring Changes with Automated
Refactoring Validation}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_GhostFactor.pdf},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{MurphyHill2014Cowboys,
author = {Murphy-Hill, Emerson and Zimmermann, Thomas and Nagappan, Nachiappan},
booktitle = {Proceedings of the International Conference on Software Engineering},
citeulike-article-id = {13075923},
citeulike-linkout-0 = {http://dx.doi.org/10.1145/2568225.2568226},
citeulike-linkout-1 = {https://onedrive.live.com/redir?resid=DD9F9EB62184AD3B!182709\&\#38;authkey=!AOX661D4wwC8Vmc\&\#38;ithint=file\%2c.pptx},
citeulike-linkout-2 = {http://people.engr.ncsu.edu/ermurph3/papers/ICSE14\_games.pdf},
doi = {10.1145/2568225.2568226},
keywords = {icse14, self},
posted-at = {2014-03-01 17:45:04},
priority = {2},
title = {{Cowboys, Ankle Sprains, and Keepers of Quality: How Is Video Game Development Different from Software Development?}},
url = {https://onedrive.live.com/redir?resid=DD9F9EB62184AD3B!182709\&\#38;authkey=!AOX661D4wwC8Vmc\&\#38;ithint=file\%2c.pptx},
year = {2014},
howpublished = {2. Conference},
}
@inproceedings{Bazik2013Investigation,
abstract = {{Program analysis tools often output error notifications that novice and industry programmers both have trouble understanding. The lack of expressive, scalable error notifications makes programming difficult to novice developers and hinders the progress of industry developers. Here, I propose a taxonomy of error notifications containing categories each with a model syntax for error notifications of similar type. By categorizing error notifications into 39 categories, and developing a questionnaire to aid in the categorization process, error notification creators can edit and refine existing error notifications as well as use the categories to create expressive, scalable error notifications that offer developers a better opportunity to resolve errors.}},
address = {New York, NY, USA},
author = {Bazik, Michael},
booktitle = {Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications Companion},
citeulike-article-id = {12738926},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2514883},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2508075.2514883},
doi = {10.1145/2508075.2514883},
howpublished = {6. Poster},
isbn = {978-1-4503-1995-9},
keywords = {program\_analysis},
location = {Indianapolis, Indiana, USA},
pages = {127--128},
posted-at = {2013-10-29 13:00:12},
priority = {2},
publisher = {ACM},
series = {SPLASH '13},
title = {{Investigation of Error Notifications Through Categorization}},
url = {http://dx.doi.org/10.1145/2508075.2514883},
year = {2013}
}
@inproceedings{Ge2013Dictionarybased,
abstract = {{Local code search tools help developers efficiently find code snippets in the code base under development. The quality of the retrieved code largely depends on the quality of queries provided by developers. Manually synthesizing high-quality queries is a non-trivial task, partially because it places a cognitive burden on developers by requiring them memorize words used in the code base under search. To help developers synthesize better queries, this paper proposes a recommendation technique called MultiD that uses multiple dictionaries. We also report an ongoing study to evaluate the effectiveness of MultiD.}},
address = {New York, NY, USA},
author = {Ge, Xi},
booktitle = {Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications Companion},
citeulike-article-id = {12738920},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2508089},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2508075.2508089},
doi = {10.1145/2508075.2508089},
howpublished = {6. Poster},
isbn = {978-1-4503-1995-9},
location = {Indianapolis, Indiana, USA},
pages = {77--78},
posted-at = {2013-10-29 12:57:20},
priority = {2},
publisher = {ACM},
series = {SPLASH '13},
title = {{Dictionary-based query recommendation for local code search}},
url = {http://dx.doi.org/10.1145/2508075.2508089},
year = {2013}
}
@inproceedings{Witschey2013Secure,
abstract = {{Although the use of secure software development tools can help developers build more secure software, many developers do not use these tools. In previous work, a colleague conducted interviews with professional developers to develop a qualitative model of factors that influence developers' decisions to use or not use security tools. In the work described in this abstract, I conducted interviews with open-source software developers to evaluate how our findings generalize outside of corporate software development populations. With the data from these interviews, I aim to gain insight into open-source software developers' behavior and values. I aim to refine, expand, and generalize our security tool adoption model so it may be used to foster wider adoption of security tools.}},
address = {New York, NY, USA},
author = {Witschey, Jim},
booktitle = {Proceedings of the 2013 Companion for the Conference on Systems, Programming, \& Applications: Software for Humanity},
citeulike-article-id = {12738914},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=2514872},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/2508075.2514872},
doi = {10.1145/2508075.2514872},
howpublished = {6. Poster},
isbn = {978-1-4503-1995-9},
keywords = {adoption},
location = {Indianapolis, Indiana, USA},
pages = {105--106},
posted-at = {2013-10-29 12:55:25},
priority = {2},
publisher = {ACM},
series = {SPLASH '13},
title = {{Secure development tool adoption in open-source}},
url = {http://dx.doi.org/10.1145/2508075.2514872},
year = {2013}
}
@inproceedings{Majikes2013Literature,
author = {Majikes, John J. and Pandita, Rahul and Xie, Tao},
booktitle = {Proceedings of the Medical Cyber Physical Systems Workshop},
citeulike-article-id = {12736009},
citeulike-linkout-0 = {http://www4.ncsu.edu/\~{}jjmajike/ResearchPapers/LiteratureReviewOfTestingTechniquesForMedicalDeviceSoftware.pdf},
howpublished = {4. Workshop},
posted-at = {2013-10-25 18:41:59},
priority = {2},
title = {{Literature Review of Testing Techniques for Medical Device Software}},
url = {http://www4.ncsu.edu/\~{}jjmajike/ResearchPapers/LiteratureReviewOfTestingTechniquesForMedicalDeviceSoftware.pdf},
year = {2013}
}
@misc{MurphyHill2012Adoption,
author = {Murphy-Hill, Emerson and Xiao, Shundan and Witschey, Jim},
booktitle = {Science of Security Lablet, Community Meeting},
citeulike-article-id = {12717000},
howpublished = {6. Poster},
keywords = {adoption, self},
pages = {February},
posted-at = {2013-10-16 17:50:16},
priority = {2},
title = {{An Adoption Model of Secure Software Development Tools}},
year = {2012}
}
@inproceedings{Murphy_Hill2005Can,
abstract = {{Infopipes are building blocks for creating data streaming applications, and it is claimed that Infopipes facilitate code reuse. To evaluate this claim, we have built a significant traffic application in Smalltalk using Infopipes. In this paper and accompanying poster, we present a short introduction to Infopipes, a traffic problem and algorithmic solution, and the types of reuse Infopipes facilitate in our implementation of said traffic algorithm.}},
address = {New York, NY, USA},
author = {Murphy\_Hill, Emerson and Lin, Chuan K. and Black, Andrew P. and Walpole, Jonathan},
booktitle = {Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)},
citeulike-article-id = {12716647},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/oopsla05.pdf},
citeulike-linkout-1 = {http://people.engr.ncsu.edu/ermurph3/posters/oopsla05poster.pdf},
citeulike-linkout-2 = {http://portal.acm.org/citation.cfm?id=1094883},
citeulike-linkout-3 = {http://dx.doi.org/10.1145/1094855.1094883},
doi = {10.1145/1094855.1094883},
howpublished = {6. Poster},
isbn = {1-59593-193-7},
keywords = {self},
location = {San Diego, CA, USA},
pages = {100--101},
posted-at = {2013-10-16 17:47:14},
priority = {2},
publisher = {ACM},
series = {OOPSLA '05},
title = {{Can Infopipes Facilitate Reuse in a Traffic Application?}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/oopsla05.pdf},
year = {2005}
}
@misc{MurphyHill2005What,
author = {Murphy-Hill, Emerson},
booktitle = {Panel: Life After Evergreen},
citeulike-article-id = {12716703},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/presentations/evergreen05.pdf},
day = {22},
howpublished = {7. Presentation},
keywords = {self},
month = sep,
posted-at = {2013-10-16 17:44:52},
priority = {2},
title = {{What a Guy Who's Still In School Thinks}},
url = {http://people.engr.ncsu.edu/ermurph3/presentations/evergreen05.pdf},
year = {2005}
}
@inproceedings{Ge2011BeneFactor,
abstract = {{Although broadly available in major software development environments, refactoring tools are still underused. One of the reasons for this underuse is that existing refactoring tools assume that a developer recognizes that she is going to refactor before she even begins. In this paper, we present a flexible refactoring tool called BeneFactor that can be invoked after refactoring begins to safely complete a refactoring change.}},
address = {New York, NY, USA},
author = {Ge, Xi and Murphy-Hill, Emerson},
booktitle = {Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications Companion},
citeulike-article-id = {11237171},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/SPLASH11Demo.pdf},
citeulike-linkout-1 = {http://portal.acm.org/citation.cfm?id=2048157},
citeulike-linkout-2 = {http://dx.doi.org/10.1145/2048147.2048157},
doi = {10.1145/2048147.2048157},
howpublished = {5. Demonstration},
isbn = {978-1-4503-0942-4},
keywords = {refactoring, self},
location = {Portland, Oregon, USA},
pages = {19--20},
posted-at = {2013-10-16 17:44:11},
priority = {2},
publisher = {ACM},
series = {SPLASH '11},
title = {{BeneFactor: a Flexible Refactoring Tool for Eclipse}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/SPLASH11Demo.pdf},
year = {2011}
}
@misc{MurphyHill2004LegalTransform,
author = {Murphy-Hill, Emerson},
booktitle = {Olympia Microcomputer Users Group},
citeulike-article-id = {471636},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/presentations/omug.pdf},
howpublished = {7. Presentation},
keywords = {self},
posted-at = {2013-10-16 17:42:57},
priority = {0},
title = {{LegalTransform: a Framework for Making Legal Documents Accessible to Humans}},
url = {http://people.engr.ncsu.edu/ermurph3/presentations/omug.pdf},
year = {2004}
}
@inproceedings{MurphyHill2004Traits,
abstract = {{This paper reports our experiences using traits, collections of pure methods designed to promote reuse and understandability in object-oriented programs. Traits had previously been used to refactor the Smalltalk collection hierarchy, but only by the creators of traits themselves. This experience report represents the first independent test of these language features. Murphy-Hill implemented a substantialmulti-class data structure called ropes that makes significant use of traits. We found that traits improved understandability and reduced the number of methods that needed to be written by 46\%.}},
address = {New York, NY, USA},
author = {Murphy-Hill, Emerson and Black, Andrew P.},
booktitle = {Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), Practitioner Report},
citeulike-article-id = {471629},
citeulike-linkout-0 = {http://people.engr.ncsu.edu/ermurph3/papers/oopsla04.pdf},
citeulike-linkout-1 = {http://portal.acm.org/citation.cfm?id=1028771},
citeulike-linkout-2 = {http://dx.doi.org/10.1145/1028664.1028771},
doi = {10.1145/1028664.1028771},
isbn = {1-58113-833-4},
keywords = {self},
location = {Vancouver, BC, CANADA},
pages = {275--282},
posted-at = {2013-10-16 17:37:55},
priority = {0},
publisher = {ACM},
series = {OOPSLA '04},
title = {{Traits: Experience with a Language Feature}},
url = {http://people.engr.ncsu.edu/ermurph3/papers/oopsla04.pdf},
year = {2004},
howpublished = {2. Conference},
}
@inproceedings{Quitslund2004Supporting,
abstract = {{Traits are a language technology that complements inheritance as a means for code reuse and class structuring. Traits encapsulate collections of methods so that they can be used and reused anywhere in the inheritance hierarchy. An important property of traits is that classes structured with traits have the same semantics as classes structured without them. With environment support, a programmer can move freely between views of the system with or without its component traits. In this paper we describe an environment for programming with traits for Java implemented in Eclipse.}},