Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Sajnani, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.05055  [pdf, other

    cs.SE

    A Case Study of Onboarding in Software Teams: Tasks and Strategies

    Authors: An Ju, Hitesh Sajnani, Scot Kelly, Kim Herzig

    Abstract: Developers frequently move into new teams or environments across software companies. Their onboarding experience is correlated with productivity, job satisfaction, and other short-term and long-term outcomes. The majority of the onboarding process comprises engineering tasks such as fixing bugs or implementing small features. Nevertheless, we do not have a systematic view of how tasks influence on… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: to be published in ICSE'21

  2. arXiv:1901.07142  [pdf, ps, other

    cs.SE

    Towards Predicting the Impact of Software Changes on Building Activities

    Authors: Michele Tufano, Hitesh Sajnani, Kim Herzig

    Abstract: The pervasive adoption of Continuous Integration practices -- both in industry and open source projects -- has led software building to become a daily activity for thousands of developers around the world. Companies such as Microsoft have invested in in-house infrastructures with the goal of optimizing the build process. CloudBuild, a distributed and caching build service developed internally by M… ▽ More

    Submitted 25 January, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: Accepted to the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), New Ideas and Emerging Results - Montreal, QC, Canada, May 25-31, 2019, to appear 4 pages

  3. Towards Automating Precision Studies of Clone Detectors

    Authors: Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Di Yang, Pedro Martins, Hitesh Sajnani, Pierre Baldi, Cristina Lopes

    Abstract: Current research in clone detection suffers from poor ecosystems for evaluating precision of clone detection tools. Corpora of labeled clones are scarce and incomplete, making evaluation labor intensive and idiosyncratic, and limiting inter tool comparison. Precision-assessment tools are simply lacking. We present a semi-automated approach to facilitate precision studies of clone detection tools.… ▽ More

    Submitted 13 December, 2018; v1 submitted 12 December, 2018; originally announced December 2018.

    Comments: Accepted to be published in the 41st ACM/IEEE International Conference on Software Engineering

    ACM Class: D.2.13

    Journal ref: Proceeding 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)

  4. SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development

    Authors: Vaibhav Saini, Hitesh Sajnani, Jaewoo Kim, Cristina Lopes

    Abstract: Given the availability of large source-code repositories, there has been a large number of applications for large-scale clone detection. Unfortunately, despite a decade of active research, there is a marked lack in clone detectors that scale to big software systems or large repositories, specifically for detecting near-miss (Type 3) clones where significant editing activities may take place in the… ▽ More

    Submitted 4 March, 2016; originally announced March 2016.

    Comments: ICSE 2016 pre-print. arXiv admin note: substantial text overlap with arXiv:1512.06448

    Journal ref: Proceedings of the 38th International Conference on Software Engineering Companion Pages 597-600 , 2016

  5. SourcererCC: Scaling Code Clone Detection to Big Code

    Authors: Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes

    Abstract: Despite a decade of active research, there is a marked lack in clone detectors that scale to very large repositories of source code, in particular for detecting near-miss clones where significant editing activities may take place in the cloned code. We present SourcererCC, a token-based clone detector that targets three clone types, and exploits an index to achieve scalability to large inter-proje… ▽ More

    Submitted 20 December, 2015; originally announced December 2015.

    Comments: Accepted for publication at ICSE'16 (preprint, unrevised)