default search action
Huzefa H. Kagdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c38]Haoren Wang, Huzefa H. Kagdi:
A Conceptual Replication Study on Bugs that Get Fixed in Open Source Software. ICSME 2018: 299-310 - [c37]Janani Raghunathan, Lifei Liu, Huzefa H. Kagdi:
Feedback Topics in Modern Code Review: Automatic Identification and Impact on Changes. SEKE 2018: 598-597 - 2017
- [j7]Bonita Sharif, John Meinken, Timothy Shaffer, Huzefa H. Kagdi:
Eye movements in software traceability link recovery. Empir. Softw. Eng. 22(3): 1063-1102 (2017) - 2016
- [j6]Motahareh Bahrami Zanjani, Huzefa H. Kagdi, Christian Bird:
Automatically Recommending Peer Reviewers in Modern Code Review. IEEE Trans. Software Eng. 42(6): 530-543 (2016) - [c36]Md Yasser Karim, Huzefa H. Kagdi, Massimiliano Di Penta:
Mining Android Apps to Recommend Permissions. SANER 2016: 427-437 - 2015
- [c35]Joseph F. Shobe, Md Yasser Karim, Huzefa H. Kagdi:
How Often does a Source Code Unit Change within a Release Window? ISEC 2015: 166-175 - [c34]Motahareh Bahrami Zanjani, Huzefa H. Kagdi, Christian Bird:
Using Developer-Interaction Trails to Triage Change Requests. MSR 2015: 88-98 - 2014
- [c33]Bogdan Dit, Michael Wagner, Shasha Wen, Weilin Wang, Mario Linares Vásquez, Denys Poshyvanyk, Huzefa H. Kagdi:
ImpactMiner: a tool for change impact analysis. ICSE Companion 2014: 540-543 - [c32]Joe F. Shobe, Md Yasser Karim, Motahareh Bahrami Zanjani, Huzefa H. Kagdi:
On mapping releases to commits in open source systems. ICPC 2014: 68-71 - [c31]Denis Delimarschi, George Swartzendruber, Huzefa H. Kagdi:
Enabling integrated development environments with natural user interface interactions. ICPC 2014: 126-129 - [c30]Kamal Hossen, Huzefa H. Kagdi, Denys Poshyvanyk:
Amalgamating source code authors, maintainers, and change proneness to triage change requests. ICPC 2014: 130-141 - [c29]Braden Walters, Timothy Shaffer, Bonita Sharif, Huzefa H. Kagdi:
Capturing software traceability links from developers' eye gazes. ICPC 2014: 201-204 - [c28]Motahareh Bahrami Zanjani, George Swartzendruber, Huzefa H. Kagdi:
Impact analysis of change requests on source code based on interaction and commit histories. MSR 2014: 162-171 - 2013
- [j5]Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk:
Integrating conceptual and logical couplings for change impact analysis in software. Empir. Softw. Eng. 18(5): 933-969 (2013) - [c27]Bogdan Dit, Andrew Holtzhauer, Denys Poshyvanyk, Huzefa H. Kagdi:
A dataset from change history to support evaluation of software maintenance tasks. MSR 2013: 131-134 - [c26]Fasil Bantelay, Motahareh Bahrami Zanjani, Huzefa H. Kagdi:
Comparing and combining evolutionary couplings from interactions and commits. WCRE 2013: 311-320 - 2012
- [j4]Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk, Maen Hammad:
Assigning change requests to software developers. J. Softw. Maintenance Res. Pract. 24(1): 3-33 (2012) - [c25]Malcom Gethers, Bogdan Dit, Huzefa H. Kagdi, Denys Poshyvanyk:
Integrated impact analysis for managing software changes. ICSE 2012: 430-440 - [c24]Mario Linares Vásquez, Kamal Hossen, Hoang Dang, Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk:
Triaging incoming change requests: Bug or commit history, or code authorship? ICSM 2012: 451-460 - 2011
- [c23]Bonita Sharif, Huzefa H. Kagdi:
On the use of eye tracking in software traceability. EFSE@ICSE 2011: 67-70 - [c22]Denys Poshyvanyk, Massimiliano Di Penta, Huzefa H. Kagdi:
Sixth international workshop on traceability in emerging forms of software engineering: (TEFSE 2011). ICSE 2011: 1214-1215 - [c21]Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk:
SE2 model to support software evolution. ICSM 2011: 512-515 - [c20]Malcom Gethers, Huzefa H. Kagdi, Bogdan Dit, Denys Poshyvanyk:
An adaptive approach to impact analysis from change requests to source code. ASE 2011: 540-543 - [e1]Denys Poshyvanyk, Massimiliano Di Penta, Huzefa H. Kagdi:
TEFSE'11, Proceedings of the 6th International Workshop on Traceability in Emerging Forms of Software Engineering, May 23, 2011, Waikiki, Honolulu, HI, USA. ACM 2011, ISBN 978-1-4503-0589-1 [contents] - 2010
- [c19]Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk, Michael L. Collard:
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code. WCRE 2010: 119-128
2000 – 2009
- 2009
- [c18]Huzefa H. Kagdi, Denys Poshyvanyk:
Who can help me with this change request? ICPC 2009: 273-277 - [c17]Yann-Gaël Guéhéneuc, Huzefa H. Kagdi, Jonathan I. Maletic:
Working session: Using eye-tracking to understand program comprehension. ICPC 2009: 278-279 - 2008
- [c16]Huzefa H. Kagdi, Maen Hammad, Jonathan I. Maletic:
Who can help me with this source code change? ICSM 2008: 157-166 - [c15]Abdulkareem Alali, Huzefa H. Kagdi, Jonathan I. Maletic:
What's a Typical Commit? A Characterization of Open Source Software Repositories. ICPC 2008: 182-191 - 2007
- [j3]Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:
A survey and taxonomy of approaches for mining software repositories in the context of software evolution. J. Softw. Maintenance Res. Pract. 19(2): 77-131 (2007) - [j2]Huzefa H. Kagdi, Jonathan I. Maletic:
Mining evolutionary dependencies from web-localization repositories. J. Softw. Maintenance Res. Pract. 19(5): 315-337 (2007) - [c14]Shehnaaz Yusuf, Huzefa H. Kagdi, Jonathan I. Maletic:
Assessing the Comprehension of UML Class Diagrams via Eye Tracking. ICPC 2007: 113-122 - [c13]Huzefa H. Kagdi, Jonathan I. Maletic, Bonita Sharif:
Mining Software Repositories for Traceability Links. ICPC 2007: 145-154 - [c12]Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:
An approach to mining call-usage patternswith syntactic context. ASE 2007: 457-460 - [c11]Huzefa H. Kagdi:
Improving change prediction with fine-grained source code mining. ASE 2007: 559-562 - [c10]Huzefa H. Kagdi, Jonathan I. Maletic:
Combining Single-Version and Evolutionary Dependencies for Software-Change Prediction. MSR 2007: 17 - [c9]Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:
Comparing Approaches to Mining Source Code for Call-Usage Patterns. MSR 2007: 20 - [c8]Huzefa H. Kagdi, Jonathan I. Maletic:
Onion Graphs for Focus+Context Views of UML Class Diagrams. VISSOFT 2007: 80-87 - 2006
- [c7]Huzefa H. Kagdi, Shehnaaz Yusuf, Jonathan I. Maletic:
Mining sequences of changed-files from version histories. MSR 2006: 47-53 - [c6]Michael L. Collard, Huzefa H. Kagdi, Jonathan I. Maletic:
Factoring Differences for Iterative Change Management. SCAM 2006: 217-226 - [c5]Huzefa H. Kagdi, Jonathan I. Maletic:
Mining for Co-Changes in the Context of Web Localization. WSE 2006: 50-57 - 2005
- [j1]Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:
Towards a taxonomy of approaches for mining of source code repositories. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [c4]Andrew M. Sutton, Huzefa H. Kagdi, Jonathan I. Maletic, L. Gwenn Volkert:
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones. GECCO 2005: 1079-1080 - [c3]Huzefa H. Kagdi, Jonathan I. Maletic, Andrew M. Sutton:
Context-Free Slicing of UML Class Models. ICSM 2005: 635-638 - [c2]Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:
Towards a taxonomy of approaches for mining of source code repositories. MSR 2005 - 2003
- [c1]Michael L. Collard, Huzefa H. Kagdi, Jonathan I. Maletic:
An XML-Based Lightweight C++ Fact Extractor. IWPC 2003: 134-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint