1 code implementation • 12 Apr 2024 • Idan Amit, Dror G. Feitelson
In addition, improvement analysis shows that an increase in most motivators predicts an increase in general motivation.
1 code implementation • 22 Dec 2021 • Idan Amit
End to end learning is machine learning starting in raw data and predicting a desired concept, with all steps done automatically.
1 code implementation • 23 Aug 2021 • Leshem Choshen, Idan Amit
We present ComSum, a data set of 7 million commit messages for text summarization.
4 code implementations • 2 Mar 2021 • Idan Amit, Nili Ben Ezra, Dror G. Feitelson
Out of 151 code smells computed by the CheckStyle smell detector, less than 20% were found to be potentially causal, and only a handful are rather robust.
1 code implementation • 12 Nov 2020 • Steffen Herbold, Alexander Trautsch, Benjamin Ledel, Alireza Aghamohammadi, Taher Ahmed Ghaleb, Kuljit Kaur Chahal, Tim Bossenmaier, Bhaveet Nagaria, Philip Makedonski, Matin Nili Ahmadabadi, Kristof Szabados, Helge Spieker, Matej Madeja, Nathaniel Hoy, Valentina Lenarduzzi, Shangwen Wang, Gema Rodríguez-Pérez, Ricardo Colomo-Palacios, Roberto Verdecchia, Paramvir Singh, Yihao Qin, Debasish Chakroborti, Willard Davis, Vijay Walunj, Hongjun Wu, Diego Marcilio, Omar Alam, Abdullah Aldaeej, Idan Amit, Burak Turhan, Simon Eismann, Anna-Katharina Wickert, Ivano Malavolta, Matus Sulir, Fatemeh Fard, Austin Z. Henley, Stratos Kourtzanidis, Eray Tuzun, Christoph Treude, Simin Maleki Shamasbi, Ivan Pashchenko, Marvin Wyrich, James Davis, Alexander Serebrenik, Ella Albrecht, Ethem Utku Aktas, Daniel Strüber, Johannes Erbel
Methods: We use a crowd sourcing approach for manual labeling to validate which changes contribute to bug fixes for each line in bug fixing commits.
Software Engineering
3 code implementations • 21 Jul 2020 • Idan Amit, Dror G. Feitelson
We present a code quality metric, Corrective Commit Probability (CCP), measuring the probability that a commit reflects corrective maintenance.
no code implementations • 19 Dec 2018 • Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger
We present cyber-security problems of high importance.