Sarah Nadi
Title
Cited by
Cited by
Year
Mining configuration constraints: Static analyses and empirical results
S Nadi, T Berger, C Kästner, K Czarnecki
Proceedings of the 36th International Conference on Software Engineering …, 2014
1222014
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
S Nadi, S Krüger, M Mezini, E Bodden
Proceedings of the 38th International Conference on Software Engineering …, 2016
1112016
The love/hate relationship with the C preprocessor: An interview study
F Medeiros, C Kästner, M Ribeiro, S Nadi, R Gheyi
29th European Conference on Object-Oriented Programming (ECOOP 2015), 2015
732015
Where do configuration constraints stem from? an extraction approach and an empirical study
S Nadi, T Berger, C Kästner, K Czarnecki
IEEE Transactions on Software Engineering 41 (8), 820-841, 2015
692015
The msr cookbook: Mining a decade of research
H Hemmati, S Nadi, O Baysal, O Kononenko, W Wang, R Holmes, ...
2013 10th Working Conference on Mining Software Repositories (MSR), 343-352, 2013
602013
Mining Kbuild to detect variability anomalies in Linux
S Nadi, R Holt
Software Maintenance and Reengineering (CSMR), 2012 16th European Conference …, 2012
452012
MUBench: a benchmark for API-misuse detectors
S Amann, S Nadi, HA Nguyen, TN Nguyen, M Mezini
Proceedings of the 13th International Conference on Mining Software …, 2016
412016
A study of visual studio usage in practice
S Amann, S Proksch, S Nadi, M Mezini
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
402016
CogniCrypt: supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
382017
The Linux Kernel: A Case Study of Build System Variability
S Nadi, R Holt
322012
Linux variability anomalies: What causes them and how do they get fixed?
S Nadi, C Dietrich, R Tartler, RC Holt, D Lohmann
2013 10th Working Conference on Mining Software Repositories (MSR), 111-120, 2013
312013
A systematic evaluation of static api-misuse detectors
S Amann, HA Nguyen, S Nadi, TN Nguyen, M Mezini
IEEE Transactions on Software Engineering 45 (12), 1170-1188, 2018
302018
On the positive effect of reactive programming on software comprehension: An empirical study
G Salvaneschi, S Proksch, S Amann, S Nadi, M Mezini
IEEE Transactions on Software Engineering 43 (12), 1125-1143, 2017
262017
Towards secure integration of cryptographic software
S Arzt, S Nadi, K Ali, E Bodden, S Erdweg, M Mezini
2015 ACM International Symposium on New Ideas, New Paradigms, and …, 2015
262015
Make it or break it: Mining anomalies from linux kbuild
S Nadi, R Holt
Reverse Engineering (WCRE), 2011 18th Working Conference on, 315-324, 2011
242011
Clone-based variability management in the android ecosystem
J Businge, M Openja, S Nadi, E Bainomugisha, T Berger
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
202018
Enriched event streams: a general dataset for empirical studies on in-IDE activities of software developers
S Proksch, S Amann, S Nadi
Proceedings of the 15th International Conference on Mining Software …, 2018
202018
Extracting configuration knowledge from build files with symbolic analysis
S Zhou, J Al-Kofahi, TN Nguyen, C Kästner, S Nadi
2015 IEEE/ACM 3rd International Workshop on Release Engineering, 20-23, 2015
192015
Enriching in-IDE process information with fine-grained source code history
S Proksch, S Nadi, S Amann, M Mezini
2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017
172017
Evaluating the evaluations of code recommender systems: A reality check
S Proksch, S Amann, S Nadi, M Mezini
2016 31st IEEE/ACM International Conference on Automated Software …, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20