Sarah Nadi
Cited by
Cited by
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
S Nadi, S Krüger, M Mezini, E Bodden
Proceedings of the 38th International Conference on Software Engineering …, 2016
Mining configuration constraints: Static analyses and empirical results
S Nadi, T Berger, C Kästner, K Czarnecki
Proceedings of the 36th international conference on software engineering …, 2014
Where do configuration constraints stem from? an extraction approach and an empirical study
S Nadi, T Berger, C Kästner, K Czarnecki
IEEE Transactions on Software Engineering 41 (8), 820-841, 2015
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
A systematic evaluation of static api-misuse detectors
S Amann, HA Nguyen, S Nadi, TN Nguyen, M Mezini
IEEE Transactions on Software Engineering 45 (12), 1170-1188, 2018
The love/hate relationship with the C preprocessor: An interview study
F Medeiros, C Kästner, M Ribeiro, S Nadi, R Gheyi
29th European Conference on Object-Oriented Programming (ECOOP 2015), 2015
The msr cookbook: Mining a decade of research
H Hemmati, S Nadi, O Baysal, O Kononenko, W Wang, R Holmes, ...
2013 10th Working Conference on Mining Software Repositories (MSR), 343-352, 2013
MUBench: A benchmark for API-misuse detectors
S Amann, S Nadi, HA Nguyen, TN Nguyen, M Mezini
Proceedings of the 13th international conference on mining software …, 2016
A study of visual studio usage in practice
S Amann, S Proksch, S Nadi, M Mezini
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
Mining Kbuild to detect variability anomalies in Linux
S Nadi, R Holt
Software Maintenance and Reengineering (CSMR), 2012 16th European Conference …, 2012
On the positive effect of reactive programming on software comprehension: An empirical study
G Salvaneschi, S Proksch, S Amann, S Nadi, M Mezini
IEEE Transactions on Software Engineering 43 (12), 1125-1143, 2017
The Linux Kernel: A Case Study of Build System Variability
S Nadi, R Holt
Clone-based variability management in the android ecosystem
J Businge, M Openja, S Nadi, E Bainomugisha, T Berger
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
Investigating next steps in static API-misuse detection
A Sven, HA Nguyen, S Nadi, TN Nguyen, M Mezini
2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019
Linux variability anomalies: What causes them and how do they get fixed?
S Nadi, C Dietrich, R Tartler, RC Holt, D Lohmann
2013 10th Working Conference on Mining Software Repositories (MSR), 111-120, 2013
Towards secure integration of cryptographic software
S Arzt, S Nadi, K Ali, E Bodden, S Erdweg, M Mezini
2015 ACM International Symposium on New Ideas, New Paradigms, and …, 2015
Are refactorings to blame? an empirical study of refactorings in merge conflicts
M Mahmoudi, S Nadi, N Tsantalis
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
Predicting merge conflicts in collaborative software development
M Owhadi-Kareshk, S Nadi, J Rubin
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
Enriched event streams: a general dataset for empirical studies on in-IDE activities of software developers
S Proksch, S Amann, S Nadi
Proceedings of the 15th International Conference on Mining Software …, 2018
Make it or break it: Mining anomalies from linux kbuild
S Nadi, R Holt
Reverse Engineering (WCRE), 2011 18th Working Conference on, 315-324, 2011
The system can't perform the operation now. Try again later.
Articles 1–20