Now showing items 1-20 of 20

    • Adaptive Cross-Project Bug Localization with Graph Learning 

      Arumugam, Venkatraman (University of Waterloo, 2022-06-07)
      Bug localization is the process of identifying the source code files associated with a bug report. This is important because it allows developers to focus their efforts on fixing the bugs than finding the root cause of ...
    • An Analysis of Human Aspects of Collaborative Group Members in OSS development 

      Sheik Saleem, Sheik Shameer (University of Waterloo, 2021-04-23)
      Open Source Software development is a collective activity that involves different software developers who may differ from each other. Although, previous researchers have focused on technical aspects like code factors, ...
    • Android Access Control Recommendation as a Deep Learning Task 

      Vagavolu, Dheeraj (University of Waterloo, 2023-09-25)
      Android enforces access control checks to protect sensitive framework APIs. If not properly protected, framework APIs can open the door for malicious apps to access sensitive resources without having the necessary privileges. ...
    • API Parameter Recommendation Based on Documentation Analysis 

      Xi, Yuan, 1994- (University of Waterloo, 2020-01-20)
      Application Programming Interfaces (APIs) are widely used in today's software development, as they provide a easy and safe way to build more powerful applications with less code. However, learning how to use an API function ...
    • Classifying Code as Human Authored or GPT-4 Generated 

      Idialu, Oseremen Joy (University of Waterloo, 2024-05-09)
      Artificial intelligence (AI) assistants such as GitHub Copilot and ChatGPT, built on large language models like GPT-4, are revolutionizing how programming tasks are performed, raising questions about whether generative AI ...
    • Detecting Exploitable Vulnerabilities in Android Applications 

      Sankarapandian, Shivasurya (University of Waterloo, 2021-05-27)
      The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ...
    • Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications 

      Volodin, Nikita (University of Waterloo, 2019-02-15)
      Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ...
    • Discovering Play Store Reviews Related to Specific Android App Issues 

      Ghosh, Angshuman (University of Waterloo, 2018-09-20)
      Mobile App reviews may contain information relevant to developers. Developers can investigate these reviews to see what users of their apps are complaining about. However, the huge volume of incoming reviews is impractical ...
    • Effects of Personality Traits and Emotional Factors in Pull Request Acceptance. 

      Iyer, Rahul (University of Waterloo, 2019-08-26)
      Social interactions in the form of discussion are an indispensable part of collaborative software development. The discussions are essential for developers to share their views and to form a strong relationship with other ...
    • Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets 

      Arumugam, Krishna Kanth (University of Waterloo, 2023-05-23)
      The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ...
    • Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same 

      Baron, Kilby (University of Waterloo, 2020-09-21)
      Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ...
    • Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits 

      Keshav Ram, Achyudh Ram (University of Waterloo, 2020-07-15)
      Public vulnerability databases such as CVE and NVD account for only 60% of security vulnerabilities present in open-source projects and are known to suffer from inconsistent quality. Over the last two years, there has been ...
    • The Impact of Code Ownership of DevOps Artefacts on the Outcome of DevOps CI Builds 

      Kola-Olawuyi, Ajiromola (University of Waterloo, 2023-12-22)
      This study focuses on factors that may influence the outcomes of CI builds triggered by commits modifying and/or adding DevOps artefacts to the projects, i.e., DevOps-related CI builds. In particular, code ownership of ...
    • JITGNN: A Deep Graph Neural Network for Just-In-Time Bug Prediction 

      Keshavarz, Hossein (University of Waterloo, 2022-05-10)
      Just-In-Time (JIT) bug prediction is the problem of predicting software failure immediately after a change is submitted to the code base. JIT bug prediction is often preferred to other types of bug prediction (subsystem, ...
    • Measuring the Performance of Code Produced with GitHub Copilot 

      Erhabor, Daniel (University of Waterloo, 2022-12-22)
      GitHub Copilot is an artificially intelligent programming assistant used by many developers. While a few studies have evaluated the security risks of using Copilot, there has not been any study to show if it aids developers ...
    • On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub 

      Nadri, Reza (University of Waterloo, 2020-08-28)
      Context: Open Source Software (OSS) projects are typically the result of collective efforts performed by developers with different backgrounds. Although the quality of developers' contributions should be the only factor ...
    • Parallel Paths Analysis Using Function Call Graphs 

      Naeimian, Arman (University of Waterloo, 2019-09-23)
      Call graphs have been used widely in different software engineering areas. Since call graphs provide us with detailed information about the structure of software elements and components and how they are connected with each ...
    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Semantic code search using Code2Vec: A bag-of-paths model 

      Arumugam, Lakshmanan (University of Waterloo, 2020-05-14)
      The world is moving towards an age centered around digital artifacts created by individuals, not only are the digital artifacts being created at an alarming rate, also the software to manage such artifacts is increasing ...
    • Towards Better Static Analysis Security Testing Methodologies 

      Aloraini, Bushra (University of Waterloo, 2020-09-24)
      Software vulnerabilities have been a significant attack surface used in cyberattacks, which have been escalating recently. Software vulnerabilities have caused substantial damage, and thus there are many techniques to ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages