Raula Gaikovina Kula

ORCID: 0000-0003-2324-0608
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Open Source Software Innovations
  • Software Engineering Techniques and Practices
  • Scientific Computing and Data Management
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Wikis in Education and Collaboration
  • Computational Physics and Python Applications
  • Natural Language Processing Techniques
  • Web Data Mining and Analysis
  • Security and Verification in Computing
  • Web Application Security Vulnerabilities
  • Topic Modeling
  • Mobile Crowdsensing and Crowdsourcing
  • Expert finding and Q&A systems
  • Information and Cyber Security
  • Cloud Computing and Resource Management
  • Data Visualization and Analytics
  • Parallel Computing and Optimization Techniques
  • Complex Network Analysis Techniques
  • Peer-to-Peer Network Technologies
  • Innovative Approaches in Technology and Social Development
  • Privacy, Security, and Data Protection

Osaka University
2013-2025

Nara Institute of Science and Technology
2010-2024

Singapore Management University
2024

University of L'Aquila
2023

Mahidol University
2019-2022

University of Waterloo
2021

Shinshu University
2021

Vrije Universiteit Brussel
2018

University of Victoria
2018

Software code review is an inspection of a change by independent third-party developer in order to identify and fix defects before integration. Effectively performing can improve the overall software quality. In recent years, Modern Code Review (MCR), lightweight tool-based inspection, has been widely adopted both proprietary open-source systems. Finding appropriate code-reviewers MCR necessary step reviewing change. However, little research known difficulty finding distributed development...

10.1109/saner.2015.7081824 article EN 2015-03-01

Code review is of primary importance in modern software development. It widely recognized that peer an efficient and effective practice for improving quality reducing defect proneness. For successful process, reviewers should have a deep experience knowledge with the code being reviewed, familiar to work collaborate together. However, one main challenging tasks find most appropriate submitted changes. So far, assignment still manual, costly time-consuming task. In this paper, we introduce...

10.1109/icsme.2016.65 article EN 2016-10-01

Links are an essential feature of the World Wide Web, and source code repositories no exception. However, despite their many undisputed benefits, links can suffer from decay, insufficient versioning, lack bidirectional traceability. In this paper, we investigate role contained in comments these perspectives. We conducted a large-scale study around 9.6 million to establish prevalence, used mixed-methods approach identify links' targets, purposes, evolutionary aspects. found that prevalent...

10.1109/icse.2019.00123 preprint EN 2019-05-01

Although peer code review is widely adopted in both commercial and open source development, existing studies suggest that such reviews often contain a significant amount of non-useful comments. Unfortunately, to date, no tools or techniques exist can provide automatic support improving those In this paper, we first report comparative study between useful comments where contrast them using their textual characteristics, reviewers' experience. Then, based on the findings from study, develop...

10.1109/msr.2017.17 article EN 2017-05-01

Service-Oriented Architecture (SOA) is an emerging paradigm that has radically changed the way software applications are architected, designed and implemented. SOA allows developers to structure their systems as a set of ready-made, reusable compostable services. The leading technology used today for implementing Web Services. Indeed, like all software, services prone change constantly add new user requirements or adapt environment changes. Poorly planned changes may risk introducing...

10.1145/2739480.2754724 article EN 2015-07-07

Abstract Security vulnerability in third-party dependencies is a growing concern not only for developers of the affected software, but risks it poses to an entire software ecosystem, e.g., Heartbleed vulnerability. Recent studies show that are slow respond threat vulnerability, sometimes taking four eleven months act. To ensure quick adoption and propagation release contains fix ( fixing ), we conduct empirical investigation identify lags may occur between vulnerable its package-side )....

10.1007/s10664-021-09951-x article EN cc-by Empirical Software Engineering 2021-03-30

Effectively performing code review increases the quality of software and reduces occurrence defects. However, this requires reviewers with experiences deep understandings system code. Manual selection such can be a costly time-consuming task. To reduce cost, we propose reviewer recommendation algorithm determining file path similarity called FPS algorithm. Using three OSS projects as case studies, was accurate up to 77.97%, which significantly outperformed previous approach.

10.1145/2593702.2593705 article EN 2014-05-20

In this paper, we present a collection of Modern Code Review data for five open source projects. The showcases mined from both an integrated peer review system and code repositories. We easy-to-use richer structure to retrieve the (a) People, (b) Process, (c) Product aspects review. This paper presents extraction methodology, dataset structure, database dumps.

10.1145/2901739.2903504 article EN 2016-05-14

It has become common practice for software projects to adopt third-party libraries, allowing developers full access functions that otherwise will take time and effort create them-selves. Regardless of migration involved, are encouraged maintain their library dependencies by updating any outdated dependency, so as remain safe from potential threats such vulnerabilities. Through a manual inspection total 60 client three cases high severity vulnerabilities, we investigate whether or not clients...

10.1109/icsme.2018.00067 article EN 2018-09-01

We present four datasets that are focused on the general roles of OSS peer review members. With data mined from both an integrated system and code source repositories, our rich comprise was automatically recorded. Using Android project as a case study, we describe extraction methodology, their application used for three separate studies. Our available online at http://sdlab.naist.jp/reviewmining/.

10.1109/msr.2013.6624003 article EN 2013-05-01

System maintainers face several challenges stemming from a system and its library dependencies evolving separately. Novice may lack the historical knowledge required to efficiently manage an inherited system. While some libraries are regularly updated, systems keep dependency on older versions. On other hand, be unaware that have settled different version of library. In this paper, we visualize how relation between evolves two perspectives. Our system-centric plots (SDP) successive versions...

10.1109/vissoft.2014.29 article EN 2014-09-01

With the popularity of open source library (re)use in both industrial and settings, `trust' plays vital role third-party adoption. Trust involves assumption functional non-functional correctness. Even with aid dependency management build tools such as Maven Gradle, research have still found a latency to trust latest release library. In this paper, we investigate OSS libraries. Our study 6,374 systems Super Repository suggests that 82% are more trusting adopting existing systems. We uncover...

10.1109/saner.2015.7081869 article EN 2015-03-01

Abstract Discussions is a new feature of GitHub for asking questions or discussing topics outside specific Issues Pull Requests. Before being available to all projects in December 2020, it had been tested on selected open source software projects. To understand how developers use this novel feature, they perceive it, and impacts the development processes, we conducted mixed-methods study based early adopters discussions from January until July 2020. We found that: (1) errors, unexpected...

10.1007/s10664-021-10058-6 article EN cc-by Empirical Software Engineering 2021-10-22

Modern code review (MCR) is now broadly adopted as an established and effective software quality assurance practice, with increasing number of open-source well commercial projects identifying a crucial practice. During the MCR process, developers review, provide constructive feedback, and/or critique each others' patches before change merged into codebase. Nevertheless, basically human task that involves technical, personal social aspects. Existing literature hint existence poor reviewing...

10.1109/saner50967.2021.00060 article EN 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 2021-03-01

Papua New Guinea (PNG) is an emerging tech society with opportunity to overcome geographic and social boundaries, in order engage the global market. However, current landscape, dominated by Big Tech Silicon Valley other multinational companies Global North, tends overlook requirements of economies such as PNG. This becoming more obvious issues algorithmic bias (in product deployments) digital divide (as case non-affordable commercial software) are affecting PNG users. The Open Source...

10.48550/arxiv.2501.09482 preprint EN arXiv (Cornell University) 2025-01-16

The increasing complexity of software dependencies has led to the emergence automated dependency management tools, such as Dependabot. However, these tools often overwhelm developers with a high volume alerts and notifications, leading alert fatigue. This paper presents position on using Artificial Intelligence (AI) agents negotiators reduce We then examine specific use cases where AI can facilitate negotiations, when working external or managing complex, multi-component systems. Our...

10.48550/arxiv.2502.06175 preprint EN arXiv (Cornell University) 2025-02-10

Open-source projects are essential to software development, but publicly disclosing vulnerabilities without fixes increases the risk of exploitation. The Open Source Security Foundation (OpenSSF) addresses this issue by promoting robust security policies enhance project security. Current research reveals that many perform poorly on OpenSSF criteria, indicating a need for stronger practices and underscoring value SECURITY.md files structured vulnerability reporting. This study aims provide...

10.48550/arxiv.2502.07395 preprint EN arXiv (Cornell University) 2025-02-11
Coming Soon ...