Sarah Nadi
TitleCited byYear
Mining configuration constraints: Static analyses and empirical results
S Nadi, T Berger, C Kästner, K Czarnecki
Proceedings of the 36th International Conference on Software Engineering …, 2014
1142014
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
S Nadi, S Krüger, M Mezini, E Bodden
Proceedings of the 38th International Conference on Software Engineering …, 2016
902016
The love/hate relationship with the C preprocessor: An interview study
F Medieros, C Kästner, M Ribeiro, S Nadi, R Gheyi
figshare, 2015
702015
Where do configuration constraints stem from? an extraction approach and an empirical study
S Nadi, T Berger, C Kästner, K Czarnecki
IEEE Transactions on Software Engineering 41 (8), 820-841, 2015
612015
The msr cookbook: Mining a decade of research
H Hemmati, S Nadi, O Baysal, O Kononenko, W Wang, R Holmes, ...
Proceedings of the 10th Working Conference on Mining Software Repositories …, 2013
532013
Mining Kbuild to detect variability anomalies in Linux
S Nadi, R Holt
Software Maintenance and Reengineering (CSMR), 2012 16th European Conference …, 2012
442012
A study of visual studio usage in practice
S Amann, S Proksch, S Nadi, M Mezini
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
322016
Linux variability anomalies: What causes them and how do they get fixed?
S Nadi, C Dietrich, R Tartler, RC Holt, D Lohmann
Proceedings of the 10th Working Conference on Mining Software Repositories …, 2013
312013
MUBench: a benchmark for API-misuse detectors
S Amann, S Nadi, HA Nguyen, TN Nguyen, M Mezini
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR …, 2016
282016
The Linux Kernel: A Case Study of Build System Variability
S Nadi, R Holt
272012
Make it or break it: Mining anomalies from linux kbuild
S Nadi, R Holt
Reverse Engineering (WCRE), 2011 18th Working Conference on, 315-324, 2011
242011
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
232017
Towards secure integration of cryptographic software
S Arzt, S Nadi, K Ali, E Bodden, S Erdweg, M Mezini
2015 ACM International Symposium on New Ideas, New Paradigms, and …, 2015
222015
Enriched event streams: a general dataset for empirical studies on in-IDE activities of software developers
S Proksch, S Amann, S Nadi
2018 IEEE/ACM 15th International Conference on Mining Software Repositories …, 2018
172018
On the positive effect of reactive programming on software comprehension: An empirical study
G Salvaneschi, S Proksch, S Amann, S Nadi, M Mezini
IEEE Transactions on Software Engineering 43 (12), 1125-1143, 2017
172017
Enriching in-IDE process information with fine-grained source code history
S Proksch, S Nadi, S Amann, M Mezini
2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017
152017
Extracting configuration knowledge from build files with symbolic analysis
S Zhou, J Al-Kofahi, TN Nguyen, C Kästner, S Nadi
2015 IEEE/ACM 3rd International Workshop on Release Engineering, 20-23, 2015
152015
Evaluating the evaluations of code recommender systems: A reality check
S Proksch, S Amann, S Nadi, M Mezini
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
132016
A systematic evaluation of static api-misuse detectors
S Amann, HA Nguyen, S Nadi, TN Nguyen, M Mezini
IEEE Transactions on Software Engineering, 2018
122018
A dataset of simplified syntax trees for C
S Proksch, S Amann, S Nadi, M Mezini
Proceedings of the 13th International Conference on Mining Software …, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20