4.4 Article

Discovering community patterns in open-source: a systematic approach and its evaluation

Journal

EMPIRICAL SOFTWARE ENGINEERING
Volume 24, Issue 3, Pages 1369-1417

Publisher

SPRINGER
DOI: 10.1007/s10664-018-9659-9

Keywords

Community patterns; Community types; Open source systems and community analysis; Empirical software engineering

Funding

  1. Swiss National Science Foundation through the SNF [PP00P2_170529]

Ask authors/readers for more resources

There can be no vulnerability without risk; there can be no community without vulnerability; there can be no peace, and ultimately no life, without community. - [M. Scott Peck]The open-source phenomenon has reached the point in which it is virtually impossible to find large applications that do not rely on it. Such grand adoption may turn into a risk if the community regulatory aspects behind open-source work (e.g., contribution guidelines or release schemas) are left implicit and their effect untracked. We advocate the explicit study and automated support of such aspects and propose Yoshi (Y ielding O pen-S ource H ealth I nformation), a tool able to map open-source communities onto community patterns, sets of known organisational and social structure types and characteristics with measurable core attributes. This mapping is beneficial since it allows, for example, (a) further investigation of community health measuring established characteristics from organisations research, (b) reuse of pattern-specific best-practices from the same literature, and (c) diagnosis of organisational anti-patterns specific to open-source, if any. We evaluate the tool in a quantitative empirical study involving 25 open-source communities from GitHub, finding that the tool offers a valuable basis to monitor key community traits behind open-source development and may form an effective combination with web-portals such as OpenHub or Bitergia. We made the proposed tool open source and publicly available.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study

Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba

Summary: Software vulnerabilities are weaknesses in source code that can be exploited to cause harm. However, there is a lack of knowledge on how vulnerabilities are introduced and removed during the software engineering life cycle. This study investigates the life cycle of known vulnerabilities in open-source software projects, finding that vulnerabilities often require multiple contributions before being introduced and remain unfixed for significant periods of time. The study provides practical implications for vulnerability detectors to assist developers in identifying and addressing these issues in a timely manner.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Computer Science, Software Engineering

Continuous Integration and Delivery Practices for Cyber-Physical Systems: An Interview-Based Study

Fiorella Zampetti, Damian Tamburri, Sebastiano Panichella, Annibale Panichella, Gerardo Canfora, Massimiliano Di Penta

Summary: CI/CD practices have benefits for software development and operations, but applying them to CPS development can be challenging. This study investigates the challenges and barriers of applying CI/CD to CPS development in 10 organizations across eight domains. The study reveals peculiarities in the application of CI/CD to CPSs and suggests the need for balancing continuous and periodic builds, addressing difficulties in software deployment, considering behavior differences in simulators and Hardware-in-the-Loop, and combining hardware/software expertise in the development team. The findings can inform the development of CI/CD pipelines and interdisciplinary university curricula.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2023)

Editorial Material Computer Science, Software Engineering

Infrastructure as Code

Giovanni Quattrocchi, Damian A. Tamburri

Summary: This special issue demonstrates the maturity of infrastructure code and its plethora of off-the-shelf approaches to continuous software engineering, as seen through a scientific lens.

IEEE SOFTWARE (2023)

Article Computer Science, Software Engineering

Through the looking-glass ... An empirical study on blob infrastructure blueprints in the Topology and Orchestration Specification for Cloud Applications

Stefano Dalla Palma, Chiel van Asseldonk, Gemma Catolino, Dario Di Nucci, Fabio Palomba, Damian A. Tamburri

Summary: Infrastructure-as-code (IaC) is crucial for providing and managing infrastructures through configuration files, but these files may suffer from code smells that impact quality and maintenance. This paper investigates the application of a traditional implementation code smell, Large Class or Blob Blueprint, in the context of TOSCA, and compares metrics-based and unsupervised learning-based detectors on a large dataset. The results suggest a new research direction for dealing with this problem and highlight the effectiveness of metrics-based detectors in detecting Blob Blueprints.

JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS (2023)

Review Computer Science, Theory & Methods

A Systematic Literature Review on the Code Smells Datasets and Validation Mechanisms

Morteza Zakeri-Nasrabadi, Saeed Parsa, Ehsan Esmaili, Fabio Palomba

Summary: The accuracy of code smell-detecting tools varies depending on the dataset used for evaluation. The adequacy of a dataset highly depends on relevant properties such as size, severity level, project types, and the number of each type of smell. Existing datasets often suffer from imbalanced samples, lack of severity level support, and restriction to Java language.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Artificial Intelligence

From '1 subgradient to projection: A compact neural network for '1-regularized logistic regression

Majid Mohammadi, Amir Ahooye Atashin, Damian A. Tamburri

Summary: This paper proposes a simple projection neural network for '1-regularized logistic regression. Unlike other available solvers, the proposed network does not require any extra auxiliary variable or smooth approximation, and its complexity is almost the same as that of gradient descent for logistic regression without '1 regularization, thanks to the projection operator. The paper also demonstrates the convergence of the proposed neural network using Lyapunov theory and shows its superior performance in terms of execution time compared to state-of-the-art methods, while remaining competitive in accuracy and AUROC.

NEUROCOMPUTING (2023)

Article Computer Science, Software Engineering

Making service continuity smarter with artificial intelligence: An approach and its evaluation

Giovanni Quattrocchi, Damian Andrew Tamburri, Willem-Jan Van Den Heuvel

Summary: Service continuity requires establishing a visible and understandable connection between customer experience and service operations. Manual methods for establishing this connection, such as service incident management, are time-consuming, inefficient, and prone to errors. On the other hand, artificial intelligence (AI) is emerging as an automated solution for handling the discontinuities in critical business tasks. This article introduces AI-driven incident management and proposes ACQUA, an AI approach for automatically assessing the quality of ticket descriptions, leading to improved resolution times and service continuity.

SOFTWARE-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Information Systems

Big Data for the Social Good: The Drought Early-Warning Experience Report

Damian A. Tamburri, Vincent R. van Mierlo, Willem-Jan van den Heuvel

Summary: The amount of data is increasing rapidly, but its consumption is not keeping up. DataOps is a new family of techniques and tools that utilize complex cloud systems orchestration techniques to continuously harness the potential of data. This paper presents a proof-of-concept implementation of a DataOps pipeline for mitigating the effects of droughts in high-risk areas. The study focuses on a game reserve in the Waterberg area of Limpopo province, South Africa. The objectives of the paper include developing and studying a proof of concept for DataOps, exploring the applicability of individual software components in a large-scale continuous pipeline, and discussing the spatial classification of these components in a new Drought Early-Warning System (DEWS). The findings suggest that a combined model of local, regional, and global data performs the best within an acceptable timeframe for stakeholders.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Management

Unveiling and Unraveling Aggregation and Dispersion Fallacies in Group MCDM

Majid Mohammadi, Damian A. Tamburri, Jafar Rezaei

Summary: This article examines three common fallacies in group multi-criteria decision-making and proposes solutions based on compositional data analysis to prevent misapplication of statistical operations.

GROUP DECISION AND NEGOTIATION (2023)

Article Computer Science, Software Engineering

The anatomy of a vulnerability database: A systematic mapping study?

Xiaozhou Li, Sergio Moreschini, Zheying Zhang, Fabio Palomba, Davide Taibi

Summary: Software vulnerabilities pose significant risks, such as the loss and manipulation of private data. The software engineering research community has conducted empirical studies and proposed automated techniques to detect and remove vulnerabilities. In this paper, a systematic mapping study is conducted to analyze popular vulnerability databases, adoption goals, other information sources, methods and techniques, and proposed tools. Understanding these aspects can help researchers make informed decisions and practitioners establish reliable sources of information for security policies and standards.

JOURNAL OF SYSTEMS AND SOFTWARE (2023)

Article Computer Science, Software Engineering

RADF: Architecture decomposition for function as a service

Lulai Zhu, Damian Andrew Tamburri, Giuliano Casale

Summary: This paper proposes a semi-automatic approach called RADF to migrate monolithic applications to serverless architecture by decomposing them into serverless functions based on business logic analysis. The approach adopts a two-stage refactoring strategy and can generate solutions at either microservice or function level. Evaluation experiments show that RADF achieves lower coupling and relatively balanced cohesion compared to previous approaches.

SOFTWARE-PRACTICE & EXPERIENCE (2023)

Proceedings Paper Computer Science, Software Engineering

Architecting MLOps in the Cloud: From Theory to Practice

Indika Kumara, Fabiano Pecorelli, Gemma Catolino, Rick Kazman, Damian Andrew Tamburri, Willem-Jan van den Heuvel

Summary: MLOps refers to a set of practices and tools that automate and combine model development and model operation, enabling organizations to successfully deploy and manage their ML models in production.

2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION, ICSA-C (2023)

Article Computer Science, Software Engineering

An Empirical Investigation Into the Influence of Software Communities' Cultural and on

Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci

Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

No Data Available