• 7Digital, Ltd. 7digital development team statistical analysis report april 2011-2012. blog article, July 2012. http://www.7digital.com.
  • Joshua T. Abbott, Joseph L. Austerweil, and Thomas L. Griffiths. Random walks on semantic networks can resemble optimal foraging. Psychological Review, 122(3):558–569, July 2015.
  • Tarek Abdel-Hamid and Stuart E. Madnick. Software Project Dynamics: An Integrated Approach. Prentice-Hall, Inc, 1991.
  • David Aboody and Baruch Lev. The value relevance of intangibles: The case of software capitalization. Journal of Accounting Research, 36:161–191, 1998.
  • ACAA Technical Agent. Ada conformity assessment test suite (ACATS). organization website, January 2018. http://www.ada-auth.org/acats.html.
  • Andrew Adamatzky. A brief history of liquid computers. Philosophical Transactions of The Royal Society B, 374(1774), June 2019.
  • Edward N. Adams. Optimizing preventive service of software products. IBM Journal of Research and Development, 28(1):2–14, January 1984.
  • John Adams. Risk and Freedom: The record of road safety regulation. Transport Publishing Projects, 1985.
  • Beth Adelson. Problem solving and the development of abstract categories in programming languages. Memory & Cognition, 9(4):422–433, July 1981.
  • Joseph Adler. R In a Nutshell. O'Reilly, 2009.
  • ADPE Selection Office. Federal COBOL compiler testing service compiler validation request information. Report No FCCTS/TR-77/05, Department of the Navy, USA, May 1977.
  • Jon Agar. The Government Machine A Revolutionary History of the Computer. The MIT Press, 2003.
  • Rajshree Agarwal and Michael Gort. The evolution of markets and entry, exit and survival of firms. The Review of Economics and Statistics, 78(3):489–498, August 1996.
  • Pär J. Ågerfalk. Insufficient theoretical contribution: a conclusive rationale for rejection?. European Journal of Information Systems, 23(6):593–599, November 2014.
  • Abutalib Aghayev and Peter Desnoyers. Skylight-A window on shingled disk operation. In 13th USENIX Conference on File and Storage Technologies, FAST'15, pages 135–149, February 2015.
  • Orna Agmon Ben-Yehuda, Muli Ben-Yehuda, Assaf Schuster, and Dan Tsafrir. Deconstructing Amazon EC2 spot instance pricing. ACM Transactions on Economics and Computation, 1(3), September 2013.
  • Nitin Agrawal, William J. Bolosky, John R. Douceur, and Jacob R. Lorch. A five-year study of file-system metadata. ACM Transactions on Storage, 3(3):31–45, October 2007.
  • Nitin Agrawal, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Generating realistic impressions for file-system benchmarking. ACM Transactions on Storage, 5(4):125–138, December 2009.
  • Nitin Agrawal. Representative, reproducible, and practical benchmarking of file and storage systems. PhD thesis, University of Wisconsin-Madison, 2009.
  • Md Ahasanuzzaman, Safwat Hassan, Cor-Paul Bezemer, and Ahmed E. Hassan. A longitudinal study of popular ad libraries in the Google Play Store. Empirical Software Engineering, 25(1):824–858, January 2020.
  • Nadim Ahmad, Charles Aspden, and OECD Task Force on R&D and Other Intellectual Property Products. Handbook on Deriving Capital Measures of Intellectual Property Products. OECD Publishing, 2010.
  • Nadim Ahmad. Measuring investment in software. OECD Science, Technology and Industry Working Papers 2003/06, OECD, May 2003.
  • Jarmo J. Ahonen and Paula Savolainen. Software engineering projects may fail before they are started: Post-mortem analysis of five cancelled projects. Journal of Systems and Software, 83(11):2175–2187, November 2010.
  • Jarmo J. Ahonen, Paula Savolainen, Helena Merikoski, and Jaana Nevalainen. Reported project management effort, project size, and contract type. The Journal of Systems and Software, 109(C):205–213, November 2015.
  • Shulamyt Ajami, Yonatan Woodbridge, and Dror G. Feitelson. Syntax, predicates, idioms – What really affects code complexity?. Empirical Software Engineering, 24(1):287–328, February 2019.
  • Fahri Akdemir and Farooq Ahmad Kirmani. Synergy: A synthetic study on teams. Thesis (m.s.), Umeo̊ School of Business, July-September 2008.
  • George A. Akerlof. The market for "Lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3):488–500, August 1970.
  • Kimio Akita, Shogo Itagaki, Yasushi Masawa, Makoto Nonaka, Takanori Hatani, Katsumi Hattori, Shuzo Morisaki, Yukihiro Yanagida, Tsutomu Takaya, Tsuneo Furuyama, and Ogura Takashi. Software Development Data White paper 2012-2013. SEC BOOKS, 2012.
  • Amogh Akshintala, Bhushan Jain, Chia-Che Tsai, Michael Ferdman, and Donald E. Porter. x86-64 instruction usage among C/C++ applications. In 12th ACM International Systems and Storage Conference, SYSTOR '19, pages 68–79, June 2019.
  • Hussain Abdullah A. Al-Mutawa. On the classification of cyclic dependencies in Java programs. Thesis (m.s.), Massey University, New Zealand, 2013.
  • Homa Alemzadeh, Ravishankar K. Iyer, Zbigniew Kalbarczyk, and Jai Raman. Analysis of safety-critical computer failures in medical devices. IEEE Security & Privacy, 11(4):14–26, July 2013.
  • Nasir Ali, Zohreh Sharafi, Yann-Gaël Guéhéneuc, and Giuliano Antoniol. An empirical study on requirements traceability using eye-tracking. In 28th IEEE International Conference on Software Maintenance, ICSM'12, pages 191–200, September 2012.
  • Todd Allee and Manfred Elsig. Are the contents of international treaties copied-and-pasted? Evidence from preferential trade agreements. Working Paper No. 8, World Trade Institute, August 2016.
  • Thomas J. Allen and Ralph Katz. The dual ladder: Motivational solution or managerial delusion?. Working Paper 1692-85, Massachusetts Institute of Technology, Sloan School of Management, August 1985.
  • Randy Allen and Ken Kennedy. Optimizing Compilers for Modern Architecture. Morgan Kaufmann Publishers, March 2002.
  • Eric J. Allen, Patricia M. Dechow, Devin G. Pope, and George Wu. Reference-dependent preferences: Evidence from marathon runners. Management Science, 63(6):1657–1672, June 2017.
  • Robert C. Allen. The British industrial revolution in global perspective: How commerce created the industrial revolution and modern economic growth. Nuffield College, Oxford, 2006.
  • Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. AndroZoo: Collecting millions of Android apps for the research community. In Proceedings of the 13th International Conference on Mining Software Repositories, MSR'16, pages 468–471, May 2016.
  • Luca Allodi and Fabio Massacci. A preliminary analysis of vulnerability scores for attacks in wild: The EKITS and SYM datasets. In Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, DABGERS'12, pages 17–24, October 2012.
  • Luca Allodi. Economic factors of vulnerability trade and exploitation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS'17, pages 1483–1499, October-November 2017.
  • Daniel A. Almeida, Gail C. Murphy, Greg Wilson, and Mike Hoye. Do software developers understand open source licenses?. In 25th IEEE International Conference on Program Comprehension, ICPC'17, pages 1–11, May 2017.
  • M. G. Almiron, E. S. Almeida, and M. N. Miranda. The reliability of statistical functions in four software packages freely used in numerical computation. Brazilian Journal of Probability and Statistics, 23(2):107–119, 2009.
  • Marcelo G. Almiron, Bruno Lopes, Alyson L. C. Oliveira, Antonio C. Medeiros, and Alejandro C. Frery. On the numerical accuracy of spreadsheets. Journal of Statistics, 34(4):1–29, April 2010.
  • Ali Almossawi. How maintainable is the Firefox codebase?. personal website, May 2013. http://almossawi.com/firefox/prose.
  • William H. Alsup. ORACLE AMERICA, INC., plaintiff-appellant v. GOOGLE LLC, defendant-cross-appellant. Decision 3:10-cv-03561-WHA, United States District Court for the Northern District of California, March 2018.
  • Louise E. Alteneder. The learning curve in solving a jig-saw puzzle: A teaching device. Journal of Educational Psychology, 26(3):231–232, March 1935.
  • Erik M. Altmann, J. Gregory Trafton, and David Z. Hambrick. Effects of interruption length on procedural errors. Journal of Experimental Psychology: Applied, 23(2):216–229, June 2017.
  • Erik M. Altmann. Episodic Memory for External Information. PhD thesis, Carnegie Mellon University, August 1996.
  • Erik M. Altmann. Functional decay of memory for tasks. Psychological Research, 66(4):287–297, 2002.
  • Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara. A survival analysis of source files modified by new developers. In International Conference on Product-Focused Software Process Improvement, PROFES 2017, pages 80–88, November-December 2017.
  • Amazon, Inc. Amazon ec2 service level agreement. https://aws.amazon.com/ec2/sla, June 2013.
  • Scott Ambler. IT project success survey results. http://www.ambysoft.com/surveys, 2017.
  • Javad Mohammadian Amiri and Venkata Vinod Kumar Padmanabhuni. A comprehensive evaluation of conversion approaches for different function points. Thesis (m.s.), Blekinge Institute of Technology, Sweden, September 2011.
  • Le An, Ons Mlouki, Foutse Khomh, and Giuliano Antoniol. Stack Overflow: A code laundering platform?. In eprint arXiv:cs.SE/1703.03897, March 2017.
  • Bente C. D. Anda, Dag I. K. Sjøberg, and Audris Mockus. Variability and reproducibility in software engineering: A study of four companies that developed the same system. IEEE Transactions on Software Engineering, 35(3):407–429, May 2009.
  • John R. Anderson and Robert Milson. Human memory: An adaptive perspective. Psychological Review, 96(4):703–719, October 1989.
  • John R. Anderson, Daniel Bothell, Michael D. Byrne, Scott Douglass, Christian Lebiere, and Yulin Qin. An integrated theory of the mind. Psychological Review, 111(4):1036–1060, October 2007.
  • Cameron Anderson, John Angus D. Hildreth, and Laura Howland. Is the desire for status a fundamental human motive? A review of the empirical literature. Psychological Bulletin, 141(3):574–601, May 2015.
  • John R. Anderson. Learning and Memory: An Integrated Approach. John Wiley & Sons, Inc, second edition, 2000.
  • Michael L. Anderson. Neural reuse: A fundamental organizational principle of the brain. Behavioral and Brain Sciences, 33(4):245–313, April 2010.
  • David Anderson. Modeling and analysis of SQL queries in PHP systems. Thesis (m.s.), Department of Computer Science, East Carolina University, April 2018.
  • Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. An in-depth analysis of disassembly on full-scale x86/x64 binaries. In Proceedings of the 25th USENIX Security Symposium, SEC'16, pages 583–600, August 2016.
  • John Annett. Subjective rating scales: science or art?. Ergonomics, 45(12):966–987, 2002.
  • Azeem Ansar. 'AppStore secrets' (What we've learned from 30,000,000 downloads). Presentation, pinch media, 2009.
  • F. J. Anscombe. Graphs in statistical analysis. The American Statistician, 27(1):17–21, February 1973.
  • ANSI X3.9. American National Standard programming language FORTRAN. American National Standards Institute, inc., November 1978.
  • Z Antolić. Fault slip through measurement process implementation in CPP software verification. In International Conference on Business Intelligence Systems, miproBIS 2007, May 2007.
  • Kenichi Aoki and Marcus W. Feldman. Evolution of learning strategies in temporally and spatially variable environments: A review of theory. Theoretical Population Biology, 91:3–19, February 2014.
  • Jorge Aranda. Anchoring and adjustment in software estimation. Thesis (m.s.), Graduate Department of Computer Science, University of Toronto, 2005.
  • Linda Argote, Chester A. Insko, Nancy Yovetich, and Anna A. Romero. Group learning curves: The effects of turnover and task complexity on group performance. Journal of Applied Social Psychology, 25(6):512–529, March 1995.
  • Hal R. Arkes, Robyn M. Dawes, and Caryn Christensen. Factors influencing the use of a decision rule in a probabilistic task. Organizational Behavior and Human Decision Processes, 37:93–110, 1986.
  • Paul Armer. SHARE – A eulogy to cooperative effort. Technical Report P-969, The RAND Corporation, October 1956.
  • J. Scott Armstrong. The seer-sucker theory: The value of experts in forecasting. Technology Review, pages 16–24, June-July 1980.
  • Venera Arnaoudova, Laleh M. Eshkevari, Massimiliano Di Penta, Rocco Oliveto, Giuliano Antoniol, and Yann-Gaël Guéhéneuc. REPENT: Analyzing the nature of identifier renamings. IEEE Transactions on Software Engineering, 40(5):502–532, May 2014.
  • Jörg Arndt. Matters Computational: Ideas, Algorithms, Source Code. Springer, 2010.
  • Taylor B. Arnold and John W. Emerson. Nonparametric goodness-of-fit tests for discrete null distributions. The R Journal, 3(2):34–39, December 2011.
  • Ashish Arora and Alfonso Gambardella. From Underdogs to Tigers: The Rise and Growth of the Software Industry in Brazil, China, India, Ireland, and Israel. Oxford University Press, March 2005.
  • Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang. An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure. Information Systems Research, 21(1):115–132, March 2010.
  • Ashish Arora, Sharon Belenzon, Andrea Patacconi, and Jungkyu Suh. The changing structure of American innovation: Some cautionary remarks for economic growth. Working Paper No. 25893, National Bureau of Economic Research, August 2019.
  • W. Brian Arthur. Competing technologies, increasing returns, and lock-in by historical events. The Economic Journal, 99(394):116–131, March 1989.
  • W. Brian Arthur. Increasing Returns and Path Dependency in the Economy. The University of Michigan Press, 1994.
  • Solomon E. Asch. Studies of independence and conformity: A minority of one against a unanimous majority. Psychological Monographs: General and Applied, 70(9):1–70, 1956.
  • Amir H. Ashouri, William Killian, John Cavazos, Gianluca Palermo, and Cristina Silvano. A survey on compiler autotuning using machine learning. In eprint arXiv:cs.PL/1801.04405, March 2018.
  • Thomas A. Åstebro, Scott A. Jeffrey, and Gordon K. Adomdza. Inventor perseverance after being told to quit: The role of cognitive biases. Journal of Behavioral Decision Making, 20(3):253–272, April 2007.
  • Susan Atkinson and Gabrielle Benefield. Software development: Why the traditional contract model is not fit for purpose. In 46th Hawaii International Conference on System Sciences, HICSS, pages 4842–4851, January 2013.
  • Vaggelis Atlidakis, Jeremy Andrus, Roxana Geambasu, Dimitris Mitropoulos, and Jason Nieh. POSIX abstractions in modern operating systems: The old, the new, and the missing. In Proceedings of the Eleventh European Conference on Computer Systems, EuroSys'16, page 19, April 2016.
  • Audit Scotland. i6: a review. Report, Audit Scotland, March 2017.
  • Auerbach. Auerbach guide to time sharing. Computer technology report, Auerbach Publishers Inc., January 1973.
  • Norman R. Augustine. Augustine's Laws. American Institute of Aeronautics and Astronautics, Inc, sixth edition, 1997.
  • Rafael Auler and Edson Borin. A LLVM just-in-time compilation cost analysis. Technical Report IC-13-13, Instituto de Computação Universidade Estadual de Campinas, May 2013.
  • Robert D. Austin. The effects of time pressure on quality in software development: An agency model. Information Systems Research, 12(2):195–207, June 2001.
  • Peter C. Austin. A tutorial on multilevel survival analysis: Methods, models and applications. International Statistical Review, 85(2):185–203, August 2017.
  • AUTOSAR. Guidelines for the use of the C++14 language in critical and safety-related systems. AUTOSAR, 839 edition, March 2017.
  • Jean-Luc Autran, Sergey Semikh, Daniela Munteanu, Sébastien Serre, Gilles Gasiot, and Philippe Roche. Soft-error rate of advanced SRAM memories: Modeling and monte carlo simulation. In Mykhaylo Andriychuk, editor, Numerical Simulation – From Theory to Industry, chapter 15, pages 309–336. InTech, September 2012.
  • J. L. Autran, D. Munteanu, P. Roche, and G. Gasiot. Real-time soft-error rate measurements: A review. Microelectronics Reliability, 54(8):1455–1476, August 2014.
  • Guilherme Avelino, Leonardo Passos, Andre Hora, and Marco Tulio Valente. Measuring and analyzing code authorship in 1+118 open source projects. Science of Computer Programming, 176:14–32, May 2019.
  • Eran Avidan. The significance of method parameters and local variables as beacons for comprehension: An empirical study. Thesis (m.s.), The Hebrew University of Jerusalem, November 2016.
  • Awio Web Services. Global web stats. http://www.w3counter.com, 2014.
  • Pierre Azoulay, Christian Fons-Rosen, and Joshua S. Graff Zivin. Does science advance one funeral at a time?. Working Paper No. 21788, National Bureau of Economic Research, USA, December 2015.
  • R. Harald Baayen, Petar Milin, and Michael Ramscar. Frequency in lexical processing. Aphasiology, 30(11):1174–1220, March 2016.
  • Charles Babbage, ESQ. Reflections on the Decline of Science in England, and on Some of its Causes. B. Fellows, Ludgate Street; and J. Booth, Duke Street, 1830.
  • Charles Babbage, ESQ. On the Economy of Machinery and Manufactures. Charles Knight, Pall Mall East, 1832.
  • Vlastimil Babka and Petr Tůma. Investigating cache parameters of x86 family processors. In Proceedings of the 2009 SPEC Benchmark Workshop on Computer Performance Evaluation and Benchmarking, pages 77–96, January 2009.
  • Vlastimil Babka. Improving Accuracy of Software Performance Models on Multicore Platforms with Shared Caches. PhD thesis, Faculty of Mathematics and Physics, Charles University in Prague, October 2012.
  • David Baccarini, Geoff Salm, and Peter E. D. Love. Management of risks in information technology projects. Industrial Management & Data Systems, 104(4):286–295, 2004.
  • Alberto Bacchelli and Christian Bird. Expectations, outcomes, and challenges of modern code review. In Proceedings of the 2013 International Conference on Software Engineering, ICSE'13, pages 712–721, May 2013.
  • Adrian Bachmann, Christian Bird, Foyzur Rahman, Premkumar Devanbu, and Abraham Bernstein. The missing links: Bugs and bug-fix commits. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2010, pages 97–106, November 2010.
  • Alexandra Back and Emma Westman. Comparing programming languages in Google code jam. Thesis (m.s.), Department of Computer Science and Engineering, Chalmers University of Technology, 2017.
  • J. W. Backus, R. J. Beeber, S. Best, R. Goldberg, H. L. Herrick, R. A. Hughes, L. B. Mitchell, R. A. Nelson, R. Nutt, D. Sayre, P. B. Sheridan, H. Stern, and I. Ziller. The FORTRAN Automatic Coding System for the IBM 704 EDPM: Programmer's Reference Manual. International Business Machines Corporation, 590 Madison Avenue, New York 22, N.Y., October 1956.
  • John Backus. The history of FORTRAN I, II, and III. SIGPLAN Notices, 13(8):165–180, 1978.
  • John Backus. Programming in America in the 1950s– some personal impressions. In N. Metropolis, J. Howlett, and Gian-Carlo Rota, editors, A History of Computing in the Twentieth Century, pages 125–135. Academic Press, February 1981.
  • Alison Bacon, Simon Handley, and Stephen Newstead. Individual differences in strategies for syllogistic reasoning. Thinking & Reasoning, 9(2):133–168, 2003.
  • Alan D. Baddeley, Neil Thomson, and Mary Buchanan. Word length and the structure of short-term memory. Journal of Verbal Learning and Verbal Behavior, 14(6):575–589, December 1975.
  • Alan Baddeley. Working memory. In Alan Baddeley, Michael W. Eysenck, and Michael Anderson, editors, Memory, chapter 3, pages 41–69. Psychology Press, February 2009.
  • Alan Baddeley. Working memory: Theories, models, and controversies. Annual Review of Psychology, 63:1–29, September 2012.
  • Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, and James R. Cordy. Analyzing a decade of Linux system calls. Empirical Software Engineering, 23(3):1519–1551, June 2018.
  • Jeremy N. Bailenson, Michael S. Shum, Scott Atran, Douglas L. Medin, and John D. Coley. A bird's eye view: biological categorization and reasoning within and across cultures. Cognition, 84:1–53, 2002.
  • David H. Bailey. Misleading performance reporting in the supercomputer field. Technical Report RNR-92-005, Numerical Aerodynamic Simulation Division, NASA Ames Research Center, December 1992.
  • S. Baily, R. Gilbertson, and E. Straub. Modular multimode radar (CMMR) software acquisition study. Technical Report 2302-01-1-2291, ARINC Research Corporation, March 1981.
  • Engineer Bainomugisha, Andoni Lombide Carreton, Tom van Cutsem, Stijn Mostinckx, and Wolfgang de Meuter. A survey on reactive programming. ACM Computing Surveys, 45(4):52, August 2013.
  • Patrick Bajari, Steven Tadelis, and Stephanie Houghton. Bidding for incomplete contracts: An empirical analysis of adaptation costs. American Economic Review, 104(4):1288–1319, October 2011.
  • Sohaib Shahid Bajwa, Xiaofeng Wang, Anh Nguyen Duc, and Pekka Abrahamsson. Failures to be celebrated: an analysis of major pivots of software startups. In eprint arXiv:cs.SE/1710.04037, October 2017.
  • A. H. Baker, D. M. Hammerling, M. N. Levy, H. Xu, J. M. Dennis, B. E. Eaton, J. Edwards, C. Hannay, S. A. Mickelson, R. B. Neale, D. Nychka, J. Shollenberger, J. Tribbia, M. Vertenstein, and D. Williamson. A new ensemble-based consistency test for the Community Earth System Model (pyCECT v1.0). Geoscientific Model Development, 8:2829–2840, September 2015.
  • F. T. Baker. Chief programmer team management of production programming. IBM Systems Journal, 11(1):56–73, 1972.
  • Mehmet Bakkaloglu, Jay J. Wylie, Chenxi Wang, and Gregory R. Ganger. On correlated failures in survivable storage systems. Technical Report CMU-CS-02-129, Carnegie Mellon University, May 2002.
  • Bharathan Balaji, John McCullough, Rajesh K. Gupta, and Yuvraj Agarwal. Accurate characterization of the variability in power consumption in modern mobile processors. In Proceedings of the 2012 USENIX conference on Power-Aware Computing and Systems, HotPower'12, October 2012.
  • Melinda Baldwin. Scientific autonomy, public accountability, and the rise of "peer review" in the Cold war United States. Isis, 109(3):538–558, September 2018.
  • Thomas Ball and James R. Larus. Branch prediction for free. Technical Report #1137, Computer Sciences Department, University of Wisconsin–Madison, February 1993.
  • Sebastian Baltes and Stephan Diehl. Usage and attribution of Stack Overflow code snippets in GitHub projects. In eprint arXiv:cs.SE/1802.02938, February 2018.
  • Sebastian Baltes and Paul Ralph. Sampling in software engineering research: A critical review and guidelines. ACM Transactions on Software Engineering and Methodology, ???(???):???, April 2020.
  • Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner, Sami Rollins, and Lin Zhong. Users and batteries: Interactions and adaptive energy management in mobile systems. In International Conference on Ubiquitous Computing, UbiComp 2007, pages 217–237, September 2007.
  • Philip Banyard and Nigel Hunt. Something missing?. The Psychologist, 13(2):68–71, 2000.
  • Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, and Shanping Li. Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report. In Proceedings of the 14th International Conference on Mining Software Repositories, MSR'17, pages 170–181, May 2017.
  • Jerome H. Barkow, Leda Cosmides, and John Tooby. The Adapted Mind: Evolutionary Psychology and the Generation of Culture. Oxford University Press, 1992.
  • William P. Barnett. The Red Queen among Organizations: How competitiveness evolves. Princeton University Press, 2008.
  • Andrea Baronchelli, Vittorio Loreto, and Andrea Puglisi. Individual biases, cultural evolution, and the statistical nature of language universals: The case of colour naming systems. PLoS ONE, 10(5):e0125019, May 2015.
  • Louise Barrett, Robin Dunbar, and John Lycett. Human Evolutionary Psychology. Palgrave Macmillan, 2002.
  • Edd Barrett, Carl Friedrich Bolz-Tereick, Rebecca Killick, Sarah Mount, and Laurence Tratt. Virtual machine warmup blows hot and cold. In eprint arXiv:cs.PL/1602.00602v4, July 2017.
  • David R. Barrett. World Christian Encyclopedia: A Comparative Survey of Churches and Religions in the Modern World AD 1900-2000. Oxford University Press, 1982.
  • Luiz André Barroso and Urs Hölzle. The datacenter as a computer: An introduction to the design of warehouse-scale machines. Report, Morgan & Claypool, 2009.
  • Victor R. Basili and John Beane. Can the Parr curve help with manpower distribution and resource estimation problems?. The Journal of Systems and Software, 2(1):59–69, February 1981.
  • Victor R. Basili and Albert J. Turner. Iterative enhancement: A practical technique for software development. IEEE Transactions on Software Engineering, SE-1(4):390–396, December 1975.
  • Victor R. Basili, Nora Monina Panlilio-Yap, Connie Loggia Ramsey, Chang Shih, and Elizabeth E. Katz. A quantitative analysis of software developed in Ada. Technical Report TR-1403, Department of Computer Science, University of Maryland, May 1984.
  • Victor R. Basili, Scott Green, Oliver Laitenberger, Filippo Lanubile, Forrest Shull, Sivert Sørumgård, and Marvin V. Zelkowitz. The empirical investigation of perspective-based reading. In Proceedings of the Twentieth Annual Software Engineering Workshop, pages 21–69, December 1995.
  • Portia Isaacson Bass and Frank M. Bass. Diffusion of technology generations: A model of adoption and repeat sales. company website, 2001. www.bassbasement.org/F/N/FMB/Pubs/Bass and Bass 2001.pdf.
  • Frank M. Bass. A new product growth model for consumer durables. Management Science, 15(5):215–227, January 1969.
  • Harald A. Bastiaanse. Very, Many, Small, Penguins: Vaguely Related Topics. PhD thesis, Institute for Logic, Language and Computation, Universiteit van Amsterdam, March 2014.
  • Benoit Baudry, Simon Allier, and Martin Monperrus. Tailored source code transformations to synthesize computationally diverse program variants. In eprint arXiv:cs.SE/1401.7635v1, January 2014.
  • F. L. Bauer and H. Wössner. The "Plankalkül" of Konrad Zuse: a forerunner of today's programming languages. Communications of the ACM, 15(7):678–685, July 1972.
  • Jennifer Bauer, Janet Siegmund, Norman Peitek, Johannes C. Hofmeister, and Sven Apel. Indentation: Simply a matter of style or support for program comprehension?. In Proceedings of the 27th International Conference on Program Comprehension, ICPC'19, pages 154–164, May 2019.
  • Andrew Baumann. Hardware is the new software. In Proceedings of the 16th Workshop on Hot Topics in Operating Systems, HotOS'17, pages 132–137, May 2016.
  • Roy F. Baumeister. Is There Anything Good About Men?. Oxford University Press, 2010.
  • Roger T. Baust. Computer Characteristics Quarterly: Volume 7, Number 4-Volume 8, Number 1. adams associates, 1968.
  • Gabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, and Sebastiano Panichella. The evolution of project inter-dependencies in a software ecosystem: the case of Apache. In Proceedings of the 2013 IEEE International Conference on Software Maintenance, ICSM'13, pages 280–289, September 2013.
  • Gabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, and Sebastiano Panichella. How the Apache community upgrades dependencies: An evolutionary study?. Empirical Software Engineering, 20(5):1275–1317, October 2015.
  • Olga Baysal, Oleksii Kononenko, Reid Holmes, and Michael W. Godfrey. The influence of non-technical factors on code review. In 20th Working Conference on Reverse Engineering, WCRE'13, pages 122–131, October 2013.
  • Barry L. Bayus, Sanjay Jain, and Ambar G. Rao. Truth or consequences: An analysis of vaporware and new product announcements. Journal of Marketing Research, 38(1):3–13, February 2001.
  • A. Alexander Beaujean. Latent Variable Modeling Using R. Routledge, 2014.
  • Bernd Beber and Alexandra Scacco. What the numbers say: A digit-based test for election fraud. Political Analysis, 20(2):211–234, April 2012.
  • Richard A. Becker and William S. Cleveland. Trellis Graphics User's Manual. AT&T Bell Laboratories, Murray Hill, December 1995.
  • Christoph Becker, Fabian Fagerholm, Rahul Mohanani, and Alexander Chatzigeorgiou. Temporal discounting in technical debt: How do software practitioners discount the future?. In eprint arXiv:cs.SE/1901.07024, January 2019.
  • Gary S. Becker. Investment in human capital: A theoretical analysis. Journal of Political Economy, 70(5):9–49, October 1962.
  • Julia Beckhusen. Occupations in information technology. American Community Survey Report ACS-35, U.S. Census Bureau, August 2016.
  • Marc Bekoff, Colin Allen, and Gordon M. Burghardt. The Cognitive Animal: Empirical and Theoretical Perspectives on Animal Cognition. The MIT Press, 2002.
  • Russell W. Belk and Gülnur Tumbat. The cult of Macintosh. Consumption, Markets and Culture, 8(3):205–217, September 2005.
  • Victoria A. Bell and P. N. Johnson-Laird. A model theory of modal reasoning. Cognitive Science, 22(1):25–51, 1998.
  • C. Gordon Bell. Fundamentals of time shared computers. Computer Design, 7(2):44–59, February 1968.
  • C. Gordon Bell. The mini and micro industries. Computer, 17(10):14–30, October 1984.
  • Gordon Bell. Bell's law for the birth and death of computer classes: A theory of the computer's evolution. MSR-TR 2007-146, Microsoft Research, Silicon Valley, November 2007.
  • Gordon Bell. Supercomputers: The amazing race (A history of supercomputing, 1960-2020). Technical Report MSR-TR-2015-2, Microsoft Research, November 2014.
  • Moritz Beller, Andy Zaidman, Andrey Karpov, and Rolf A. Zwaan. The last line effect explained. Empirical Software Engineering, 22(3):1508–1536, June 2017.
  • Daryl J. Bem. Feeling the future: Experimental evidence for anomalous retroactive influences on cognition and affect. Journal of Personality and Social Psychology, 100(3):407–425, March 2011.
  • R. W. Bemer. a view of the history of COBOL. Honeywell Computer Journal, 5(3):130–135, November 1959.
  • Gal Beniamini, Sarah Gingichashvili, Alon Klein Orbach, and Dror G. Feitelson. Meaningful identifier names: The case of single-letter variables. In 25th IEEE International Conference on Program Comprehension, ICPC'17, pages 45–54, May 2017.
  • James R. Beniger. The Control Revolution: Technological and Economic Origins of the Information Society. Hardvard University Press, 1986.
  • Yochai Benkler. Coase's Penguin, or, Linux and the nature of the firm. The Yale Law Journal, 112(3), December 2002.
  • Alan Benson, Danielle Li, and Kelly Shue. Promotions and the Peter principle. Working Paper n. 3047193, US universities, February 2018.
  • R. Alexander Bentley, Carl P. Lipo, Harold A. Herzog, and Matthew W. Hahn. Regular rates of popular culture change reflect random copying. Evolution and Human Behavior, 28(3):151–158, May 2007.
  • Fabien C. Y. Benureau and Nicolas P. Rougier. Re-run, repeat, reproduce, reuse, replicate: Transforming code into scientific contributions. In eprint arXiv:cs.GL/1708.08205, August 2017.
  • Thorsten Berger, Steven She, Krzysztof Czarnecki, and Andrzej W k asowski. Feature-to-code mapping in two large product lines. In Jan Bosch and Jaejoon Lee, editors, Software Product Lines: Going Beyond, volume 6287 of Lecture Notes in Computer Science, pages 498–499. Springer Berlin Heidelberg, 2010.
  • Thorsten Berger, Steven She, Rafael Lotufo, Andrzej W k asowski, and Krzysztof Czarnecki. Variability modeling in the systems software domain. Technical Report GSDLAB-TR 2012-07-06, Generative Software Development Laboratory, University of Waterloo, July 2012.
  • Emery D. Berger, Celeste Hollenbeck, Petr Maj, Olga Vitek, and Jan Vitek. On the impact of programming languages on code quality: A reproduction study. ACM Transactions on Programming Languages and Systems, 41(4):21, November 2019.
  • Egon Berghout, Menno Nijland, and Kevin Grant. Seven ways to get your favoured IT project accepted – politics in IT evaluation. The Electronic Journal of Information Systems Evaluation, 8(1):31–40, 2005.
  • Martin Berglund, Willem Bester, and Brink van der Merwe. Formalising Boost POSIX regular expression matching. In International Colloquium on Theoretical Aspects of Computing, ICTAC 2018, pages 99–115, October 2018.
  • Brent Berlin and Paul Kay. Basic Color Terms: Their Universality and Evolution. Berkeley: University of California Press, 1969.
  • Ron Berman, Leonid Pekelis, Aisling Scott, and Christophe Van den Bulte. p-hacking and false discovery in A/B testing. Working Paper n. 3204791, US universities, December 2018.
  • David Bermbach and Erik Wittern. Benchmarking web API quality. In International Conference on Web Engineering, ICWE'16, pages 188–206, June 2016.
  • Antonio Bernardo and Ivo Welch. On the evolution of overconfidence and entrepreneurs. Journal of Economics & Management Strategy, 10(3):301–330, 2001.
  • K. Bernstein, D. J. Frank, A. E. Gattiker, W. Haensch, B. L. Ji, S. R. Nassif, E. J. Nowak, D. J. Pearson, and N. J. Rohrer. High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development, 50(4/5):433–449, July 2006.
  • Daniel M. Berry, Erik Kamsties, and Micheal M. Krieger. From contract drafting to software specification: Linguistic sources of ambiguity. November 2003.
  • Daniel M. Berry, Khuzaima Daudjee, Jing Dong, Igor Fainchtein, Maria Augusta Nelson, Torsten Nelson, and Lihua Ou. User's manual as a requirements specification: Case studies. Requirements Engineering, 9(1):67–82, February 2004.
  • Luís M. A. Bettencourt, Ariel Cintrón-Arias, David I. Kaiserd, and Carlos Castillo-Chávez. The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models. Physica A, 364:513–536, May 2006.
  • Kevin Beyer, Jonathan Goldstein, Raghu Ramakrishnan, and Uri Shaft. When is "nearest neighbor" meaningful?. In Catriel Beeri and Peter Buneman, editors, Database Theory: 7th International Conference, ICDT'99, pages 217–235. Springer-Verlag, January 1999.
  • Douglas Biber, Stig Johansson, Geoffrey Leech, Susan Conrad, and Edward Finegan. Longman Grammar of Spoken and Written English. Pearson Education, 1999.
  • Cristina Bicchieri. The Grammar of Society: The Nature and Dynamics of Social Norms. Cambridge University Press, March 2006.
  • Brad Biddle, Andrew White, and Sean Woods. How many standards in a laptop? (and other empirical questions). Working Paper n. 1619440, Arizona State University (ASU) - College of Law, September 2010.
  • Sam Biddle. Like everyone else, Twitter hides from U.S. taxes in Ireland. Gawker news site, October 2013. http://valleywag.gawker.com/like-everyone-else-twitter-hides-from-u-s-taxes-in-ir-1447085830.
  • Benjamin Biegel, Fabian Beck, Willi Hornig, and Stephan Diehl. The order of things: How developers sort fields and methods. In 28th IEEE International Conference on Software Maintenance, ICSM'12, pages 88–97, September 2012.
  • Sushil Bikhchandani, David Hirshleifer, and Ivo Welch. A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of Political Economy, 100(5):992–1026, October 1992.
  • Paul Bilton, Paul Dodimead, Elizabeth Livingstone, Inna Rayner, Gary Turner, Mark Wynniatt, and Sally Howes. Managing the risks of legacy ICT to public service delivery. HC 539 SESSION 2013-14, National Audit Office, UK, September 2013.
  • William Lloyd Bircher. Predictive Power Management for Multi-Core Processors. PhD thesis, The University of Texas at Austin, December 2010.
  • Christian Bird, Adrian Bachmann, Eirik Aune, John Duffy, Abraham Bernstein, Vladimir Filkov, and Premkumar Devanbu. Fair and balanced? Bias in bug-fix datasets. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, FSE 2009, pages 121–130, August 2009.
  • Sarah Bird. Software knows best: A case for hardware transparency and measurability. Thesis (m.s.), Department of Electrical Engineering and Computer Science, University of California at Berkeley, May 2010.
  • Peter G. Bishop and Robin E. Bloomfield. Worst case reliability prediction based on a prior estimate of residual defects. In Proceedings 13th International Symposium on Software Reliability Engineering, ISSRE'02, pages 295–303, November 2002.
  • Tegawendé F. Bissyandé, Ferdian Thung, David Lo, Lingxiao Jiang, and Laurent Réveillère. Popularity, interoperability, and impact of programming languages in 100,000 open source projects. In 37th Annual International Computer Software & Applications Conference, COMPSAC 2013, pages 303–312, July 2013.
  • Bitsavers' pdf document archive. organization website, July 2019. http:bitsavers.trailing-edge.com/pdf.
  • Eyal Biyalagorsky, William Boulding, and Richard Staelin. Stuck in the past: Why managers persist with new product failures. Journal of Marketing, 70(2):108–121, April 2006.
  • N. M. Blachman. A survey of automatic digital computers. Survey 111293, Office of Naval Research, Washington, D.C., 1953.
  • Stephen M. Blackburn, Robin Garner, Chris Hoffmann, Asjad M. Khan, Kathryn S. McKinley, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony Hosking, Maria Jump, Han Lee, J. Eliot B. Moss, Aashish Phansalkar, Darko Stefanović, Thomas VanDrunen, Daniel von Dincklage, and Ben Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis (extended version). Technical Report TR-CS-06-01, Department of Computer Science, Australian National University, August 2006.
  • Ann-Renée Blais and Elke U. Weber. A domain-specific risk-taking (DOSPERT) scale for adult populations. Judgment and Decision Making, 1(1):33–47, April 2006.
  • David M. Blank and George J. Stigler. The Demand and Supply of Scientific Personnel. National Bureau of Economic Research, Inc., 1957.
  • Maija S. Blaubergs and Martin D. S. Braine. Short-term memory limitations on decoding self-embedded sentences. Journal of Experimental Psychology, 102(4):745–748, 1974.
  • Deborah S. Blinder and Daniel M. Oppenheimer. Beliefs about what types of mechanisms produce random sequences. Journal of Behavioral Decision Making, 21(4):414–427, October 2008.
  • Nick Bloom, Tobias Kretschmer, and John van Reenen. Are family-friendly workplace practices a valuable firm resource?. Strategic Management Journal, 32(4):343–367, April 2011.
  • Bruce I. Blum. Improving software maintenance by learning from the past: A case study. Proceedings of the IEEE, 77(4):596–606, April 1989.
  • Jonathan Boccara. Good news: strong types are (mostly) free in C++. blog: Fluent C++, May 2017. http://www.fluentcpp.com/2017/05/05/news-strong-types-are-free.
  • Barry W. Boehm and Phillip N. Papaccio. A value-chain analysis or software productivity. Technical Report USC-CSE-86-500, Center for Systems and Software Engineering, University of Southern California, 1986.
  • Barry W. Boehm. Software Engineering Economics. Prentice-Hall, Inc, 1981.
  • Gary D. Boetticher. Improving credibility of machine learner models in software engineering. In Du Zhang and Jeffrey J. P. Tsai, editors, Advances in Machine Learning Applications in Software Engineering, chapter 3, pages 52–73. Idea Group Publishing, October 2006.
  • Joseph G. Bolten, Robert S. Leonard, Mark V. Arena, Obaid Younossi, and Jerry M. Sollinger. Sources of weapon system cost growth: Analysis of 35 major defense acquisition programs. Monograph series, RAND Corporation, 2008.
  • Rod Bond and Peter B. Smith. Culture and conformity: A meta-analysis of studies using Asch's (1952b, 1956) line judgment task. Psychological Bulletin, 119(1):111–137, January 1996.
  • Charles F. Bond, Jr. and Linda J. Titus. Social facilitation: A meta-analysis of 241 studies. Psychological Bulletin, 94(2):265–292, September 1983.
  • Jérémy Bonvoisin, Robert Mies, Jean-François Boujut, and Rainer Stark. What is the "source" of open source hardware?. Journal of open hardware, 1(1):5, September 2017.
  • Carlos F. Borges. An improved algorithm for HYPOT(A,B). In eprint arXiv:math.NA/1904.09481, June 2019.
  • Richard Bornat, Saeed Dehnadi, and Simon. Mental models, consistency and programming aptitude. In Tenth Australasian Computing Education Conference, ACE'08, pages 53–61, January 2008.
  • Lera Boroditsky. Metaphoric structuring: understanding time through spatial metaphors. Cognition, 75:1–28, 2000.
  • Axel Börsch-Supan and Matthias Weiss. Productivity and age: Evidence from work teams at the assembly line. Technical Report 148-2007, Manheim Research Institute for the Economics of Aging, 2007.
  • Laurent Bossavit. The Leprechauns of Software Engineering: How folklore turns into fact and what to do about it. Leanpub, 2016.
  • Nick Bostrom and Anders Sandberg. The wisdom of nature: An evolutionary heuristic for human enhancement. In Julian Savulescu and Nick Bostrom, editors, Human Enhancement, chapter 18, pages 375–416. Oxford University Press, January 2011.
  • Alexei Botchkarev. Estimating the accuracy of the return on investment (ROI) performance evaluations. Interdisciplinary Journal of Information, Knowledge, and Management, 10:217–233, 2015.
  • Laurent Boué. Real numbers, data science and chaos: How to fit any dataset with a single parameter. In eprint arXiv:cs.LG/1904.12320, April 2019.
  • Kamal Boukhetala and Arsalane Guidoum. Sim.DiffProc: A package for simulation of diffusion processes in R. HAL Id: hal-00629841, HAL archives-ouvertes.fr, October 2011.
  • John Bourn. New IT systems for Magistrates' courts: the Libra project. Report by the Comptroller and Auditor General HC 327 Session 2002-2003, National Audit Office, UK, January 2003.
  • Edward M. Bowden and Mark Jung-Beeman. Normative data for 144 compound remote associate problems. Behavior Research Methods, Instruments, & Computers, 35(4):634–639, December 2003.
  • Gordon H. Bower, John B. Black, and Terrence J. Turner. Scripts in memory for text. Cognitive Psychology, 11(2):177–220, April 1979.
  • Jeffrey S. Bowers and Colin J. Davis. Bayesian just-so stories in psychology and neuroscience. Psychological Bulletin, 138(3):389–414, 2012.
  • Robert Boyd and Peter J. Richerson. Why does culture increase human adaptability. Ethology and Sociobiology, 16(2):125–143, March 1995.
  • Robert Boyd and Peter J. Richerson. Why culture is common, but cultural evolution is rare. Proceedings of the British Academy, 88:77–93, April 1996.
  • Mark G. Bradac, Dewayne E. Perry, and Lawrence G. Votta. Prototyping a process monitoring experiment. IEEE Transactions on Software Engineering, 20(10):774–784, 1994.
  • Timothy F. Brady, Talia Konkle, George A. Alvarez, and Aude Oliva. Visual long-term memory has a massive storage capacity for object details. PNAS, 105(38):14325–14329, September 2008.
  • Dan Braha and Yaneer Bar-Yam. The statistical mechanics of complex product development: Empirical and analytical results. Management Science, 53(7):1127–1145, July 2007.
  • Tychonis Brahe. Tychonis Brahe Dani Scripta Astronomica. Glydendaliana, 1915. Edited by I. L. E. Dreyer.
  • David W. Braithwaite and Robert L. Goldstone. Flexibility in data interpretation: effects of representational format. frontiers in Psychology, 4(980):1–16, December 2013.
  • Neil Robert Bramley. Constructing the world: Active causal learning in cognition. PhD thesis, University College London, February 2017.
  • Moisés Castelo Branco, Yingfei Xiong, Krzysztof Czarnecki, Jochen Küster, and Hagen Völzer. An empirical study on consistency management of business and IT process models. Technical Report GSDLAB-TR 2012-03-02, Generative Software Development Laboratory, University of Waterloo, March 2012.
  • Stewart Brand. How buildings Learn: What happens after they're built. Viking, 1994.
  • John D. Bransford and Jeffery J. Franks. The abstraction of linguistic ideas. Cognitive Psychology, 2(4):331–350, October 1971.
  • John D. Bransford and Marcia K. Johnson. Contextual prerequisites for understanding: Some investigations of comprehension and recall. Journal of Verbal Learning and Verbal Behavior, 11(6):717–726, December 1972.
  • Gwern Branwen. Laws of tech: Commoditize your complement. blog: Gwern, March 2018. http://www.gwern.net/Complement.
  • Stefan Brass and Christian Goldberg. Semantic errors in SQL queries: A quite complete list. Journal of Systems and Software, 79(5):630–644, May 2006.
  • Harry Braverman. Labor and Monopoly Capital: The Degradation of Work in the Twentieth Century. Monthly Review Press, January 1974.
  • Richard A. Brealey, Stewart C. Myers, and Franklin Allen. Principles of Corporate Finance. McGraw-Hill Irwin, 10th edition, 2011.
  • Björn Brembs, Katherine Button, and Marcus Munafò. Deep impact: Unintended consequences of journal rank. Frontiers in Human Neuroscience, 7(291), June 2013. (doi:10.3389/fnhum.2013.00291)
  • Silvia Breu, Rahul Premraj, Jonathan Sillito, and Thomas Zimmermann. Information needs in bug reports: Improving cooperation between developers and users. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, CSCW'10, pages 301–310, February 2010.
  • Eric Brewer, Lawrence Ying, Lawrence Greenfield, Robert Cypher, and Theodore Ts'o. Disks for data centers. Technical report, Google, Inc, February 2016.
  • Cynthia A. Brewer. Color use guidelines for mapping and visualization. In Alan M. Maceachren and D. R. Fraser Taylor, editors, Visualization in Modern Cartography, chapter 7, pages 123–147. Pergamon, November 1994.
  • Brigham Young trace repository. No longer available: website, 201? Copy kindly supplied by Dror G. Feitelson.
  • Per Brinch Hansen and Roger House. The COBOL compiler for the Siemens 3003. BIT, 6(1):1–23, March 1966.
  • Felicia Brittman. The most common habits from more than 200 English papers written by graduate Chinese engineering students. January 2007.
  • Stefana Broadbent. Font requirements for next generation air traffic management systems. Technical Report HRS/HSP-006-REP-01, European Organisation for the Safety of Air Navigation, 2000.
  • L. D. Brock and H. A. Goodman. Reliability analysis of the F-8 digital fly-by-wire system. NASA Contractor Report 163110, Dryden Flight Research Center, October 1981.
  • Gerald W. Brock. The U.S. Computer Industry: A Study of Market Power. Ballinger Publishing Company, 1975.
  • Anna D. Broido and Aaron Clauset. Scale-free networks are rare. In eprint arXiv:physics.soc-ph/1801.03400, January 2018.
  • Greg Bronevetsky and Bronis R. de Supinski. Soft error vulnerability of iterative linear algebra methods. In Proceedings of the 22nd Annual International Conference on Supercomputing, ICS'08, pages 155–164, June 2008.
  • John Brooke. SUS: A 'quick' and 'dirty' usability scale. In Patrick W. Jordan, Bruce Thomas, Bernard A. Weerdmeester, and Ian Lyall McClelland, editors, Usability Evaluation in Industry, chapter 21, pages 189–194. Taylor and Francis, June 1996.
  • John Brooke. SUS: A retrospective. Journal of Usability Studies, 8(2):29–40, February 2013.
  • Frederick P. Brooks, Jr. The Mythical Man-Month. Addison–Wesley, anniversary edition, 1995.
  • Ruven Brooks. A model of human cognitive behavior in writing code for computer programs, vol I. Report AFOSR-TR-75-1084, Carnegie Mellon University, May 1975.
  • Neil C. C. Brown and Amjad Altadmri. Novice Java programming mistakes: Large-scale data vs. educator beliefs. ACM Transactions on Computing Education, 17(2):7, June 2017.
  • Gordon D. A. Brown, Ian Neath, and Nick Chater. A temporal ratio model of memory. Psychological Review, 114(3):539–576, July 2007.
  • Jerry Brunner and Peter C. Austin. Inflation of Type I error rate in multiple regression when independent variables are measured with error. The Canadian Journal of Statistics, 37(1):33–46, March 2009.
  • Marc Brysbaert, Wim Fias, and Marie-Pascale Noël. The Whorfian hypothesis and numerical cognition: is 'twenty-four' processed in the same way as 'four-and-twenty'?. Cognition, 66(1):51–77, April 1998.
  • Isidor Buchmann. Batteries in a Portable World: A Handbook on rechargeable Batteries for Non-engineers. Cadex Electronix Inc, third edition, 2011.
  • Jonathan B. Buckheit and David L. Donoho. WaveLab and reproducible research. In Anestis Antoniadis and Georges Oppenheim, editors, Wavelets and Statistics, chapter 5, pages 55–81. Springer-Verlag, 1995.
  • Mark Budden, Paul Hadavas, Lorrie Hoffman, and Chris Pretz. Generating valid 4 times 4 correlation matrices. Applied Mathematics E-Notes, 7:53–59, 2007.
  • David V. Budescu, Han-Hui Por, Stephen B. Broomell, and Michael Smithson. The interpretation of IPCC probabilistic statements around the world. Nature Climate Change, 4:508–512, April 2014.
  • Douglas John Buettner. Designing an Optimal Software Intensive System Acquisition: A Game Theoretic Approach. PhD thesis, University of Southern California, September 2008.
  • Edouard Bugnion, Scott Devine, Mendel Rosenblum, Jeremy Sugerman, and Edward Y. Wang. Bringing virtualization to the x86 architecture with the original VMware workstation. ACM Transactions on Computer Systems, 30(4):12, November 2012.
  • Maarten Bullynck. What is an operating system? A historical investigation (1954–1964). HAL Id: halshs-01541602, HAL archives-ouvertes.fr, August 2017.
  • Necdet Bulnet and Maurice H. Halstead. Impurities found in algorithm implementations. Technical Report CSD-TR 111, Purdue University, March 1974.
  • J. Stuart Bunderson and Kathleen M. Sutcliffe. Management team learning orientation and business unit performance. Journal of Applied Psychology, 88(3):552–560, June 2003.
  • Bureau of labor statistics. BLS website, July 2019. https://www.bls.gov/ces.
  • K. P. Burnham and D. R. Anderson. Multimodel inference: Understanding AIC and BIC in model selection. Sociological Methods and Research, 33(2):261–304, November 2004.
  • J. Christopher Burns. The evolving market for word processing and typesetting systems. In Proceedings of the National Computer Conference and Exposition, AFIPS'76, pages 617–623, June 1976.
  • Quentin L. Burrell. A note on ageing in a library circulation model. Journal of Documentation, 41(2):100–115, 1985.
  • Raymond P. L. Buse and Westley R. Weimer. Learning a metric for code readability. IEEE Transactions on Software Engineering, 36(4):546–558, July 2010.
  • John Businge. Co-evolution of the Eclipse Framework and its Third-party Plug-ins. PhD thesis, Eindhoven University of Technology, September 2013.
  • Ricky W. Butler and George B. Finelli. The infeasibility of quantifying the reliability of life-critical real-time software. IEEE Transactions on Software Engineering, 19(1):3–12, 1993.
  • Glenn Butts and Kent Linton. The joint confidence level paradox: A history of denial. In NASA 2009 Cost Estimating Symposium. NASA Center for Aerospace Information, April 2009.
  • David Byrne and Carol Corrado. ICT prices and ICT services: What do they tell us about productivity and technology?. Finance and Economics Discussion series 2017-015, Federal Reserve Board, Washington, D.C., February 2017.
  • Brad Calder, Dirk Grunwald, and Benjamin Zorn. Quantifying behavioral differences between C and C++ programs. Journal of Programming Languages, 2(4):313–351, 1995.
  • E. G. Cale, L. L. Gremillion, and J. L. McKenney. Price/performance patterns of U.S. computer systems. Communications of the ACM, 22(4):225–233, April 1979.
  • Jessica Calhoun, Chris Savoie, Mary Randolph-Gips, and Ipek Bozkurt. Human reliability analysis in spaceflight applications. Quality and Reliability Engineering International, 29(6):869–882, August 2013.
  • Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. De-anonymizing programmers via code stylometry. In Proceedings of the 24th USENIX Conference on Security Symposium, SEC'15, pages 255–270, August 2015.
  • C. F. Camerer and E. F. Johnson. The process-performance paradox in expert judgment: How can the experts know so much and predict so badly?. In K. A. Ericsson and J. Smith, editors, Towards a general theory of expertise: Prospects and limits. Cambridge University Press, 1991.
  • Martin Campbell-Kelly and Daniel D. Garcia-Swartz. Economic perspectives on the history of the computer time-sharing industry, 1965–1985. IEEE Annals of the History of Computing, 30(1):16–36, January-March 2008.
  • Martin Campbell-Kelly and Daniel D. Garcia-Swartz. Pragmatism not ideology: IBM's love affair with open source software. Working Paper n. 1081613, UK universities, January 2008.
  • Martin Campbell-Kelly. Foundations of Computer Programming in Britain (1945 - 1955). PhD thesis, Department of Mathematics and Computer Studies, Sunderland Polytechnic, June 1980.
  • Martin Campbell-Kelly. From Airline Reservations to Sonic the Hedgehog: A History of the Software Industry. The MIT Press, April 2004.
  • Jamie I. D. Campbell. On the relation between skilled performance of simple division and multiplication. Journal of Experimental Psychology: Learning, Memory, & Cognition, 23(5):1140–1159, 1997.
  • Matthieu Caneill and Stefano Zacchiroli. Debsources: Live and historical views on macro-level software evolution. In Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'14, pages 28:1–28:10, September 2014.
  • Gerardo Canfora, Luigi Cerulo, Marta Cimitile, and Massimiliano Di Penta. Social interactions around cross-system bug fixings: the case of FreeBSD and OpenBSD. In Proceedings of the 8th Working Conference on Mining Software Repositories, MSR'11, pages 143–152, May 2011.
  • Luiz Fernando Capretz, Pradeep Waychal, and Jingdong Jia. Comparing popularity of testing careers among Canadian, Chinese, Indian students. In IEEE/ACM 41st International Conference on Software Engineering, ICSE-SEET, pages 258–259, May 2019.
  • Bruno Caprile and Paolo Tonella. Nomen est omen: Analyzing the language of function identifiers. In Proceedings of the 6th Working Conference on Reverse Engineering, WCRE'99, pages 112–122, October 1999.
  • James R. Carlberg. Scientific/engineering work stations: A market survey. Departmental Report DTNSRDC/CMLD-83/07, David W. Taylor Naval Ship Research and Development Center, May 1983.
  • Shirley Carter-Thomas and Elizabeth Rowley-Jolivet. If-conditionals in medical discourse: From theory to disciplinary practice. Journal of English for Academic Purposes, 7(3):191–205, July 2008.
  • Eylon Caspi. Empirical study of opportunities for bit-level specialization in word-based programs. Thesis (m.s.), University of California, Berkeley, 2000.
  • Davide Castelvecchi. The biggest mystery in mathematics: Shinichi Mochizuki and the impenetrable proof. Nature, 526(7572):178–181, October 2015.
  • M. P. Catherwood. Manpower impacts of electronic data processing. Publication B-171, New York State Department of Labor, Division of Research and Statistics, September 1968.
  • Adnan Causević, Rakesh Shukla, Sasikumar Punnekkat, and Daniel Sundmark. Effects of negative testing on TDD: An industrial experiment. In Hubert Baumeister and Barbara Weber, editors, Agile Processes in Software Engineering and Extreme Programming, volume 149 of Lecture Notes in Business Information Processing, pages 91–105. Springer Berlin Heidelberg, 2013.
  • J. Patrick Cavanagh. Relation between the immediate memory span and the memory search rate. Psychological Review, 79(6):525–530, November 1972.
  • Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, and Paolo Tonella. A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical Software Engineering, 19(4):1040–1074, 2014.
  • Caroline Cecot and W. Kip Viscusi. Judicial review of agency benefit-cost analysis. George Mason Law Review, 22(3):575–617, November 2015.
  • Carl Cederström and Peter Fleming. Dead Man Working. Zero books, 2012.
  • Ahmet Celik, Karl Palmskog, Marinela Parovic, Emilio Jesús Gallego Arias, and Milos Gligoric. Mutation analysis for Coq. In 34th IEEE/ACM International Conference on Automated Software Engineering, ASE'19, pages 539–551, November 2019.
  • Damon Centola and Andrea Baronchelli. The spontaneous emergence of conventions: An experimental study of cultural evolution. PNAS, 112(7):1989–1994, February 2015.
  • Damon Centola, Joshua Becker, Devon Brackbill, and Andrea Baronchelli. Experimental evidence for tipping points in social convention. Science, 360(6393):1116–1119, June 2018.
  • Paul E. Ceruzzi. The early computers of Konrad Zuse, 1935 to 1945. Annals of the History of Computing, 3(3):241–262, July 1981.
  • Hoon Sang Cha. Disrupting the Management Supply Chain: An Organizational Learning Model of IT Offshore Outsourcing. PhD thesis, Faculty of the Committee on Business Administration, The University of Arizona, July 2007.
  • Faith T. Chandler, Y. H. James Chang, Ali Mosleh, Julie L. Marble, Ron L. Boring, and David I. Gertman. Human reliability analysis methods: Selection guidance for NASA. Nasa/osma technical report, NASA Headquarters Office of Safety and Mission Assurance, July 2006.
  • Faith Chandler, I. Addison Heard, Mary Presley, Alexander Burg, Ed Midden, and Phil Mongan. NASA human error analysis. Technical report, NASA Office of Safety and Mission Assurance, September 2010.
  • Dana Chandlera and Adam Kapelner. Breaking monotony with meaning: Motivation in crowdsourcing markets. In eprint arXiv:stat.OT/1210.0962, October 2012.
  • Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection–A survey. ACM Computing Surveys, 41(3):1–58, July 2009.
  • Karthik Chandrasekar. High-Level Power Estimation and Optimization of DRAMs. PhD thesis, Technische Universiteit Delft, October 2014.
  • Andrew C. Chang and Phillip Li. Is economics research replicable? Sixty published papers from thirteen journals say "usually not". Finance and Economics Discussion Series 2015-083, Washington: Board of Governors of the Federal Reserve System, September 2015.
  • Pohua P. Chang, Scott A. Mahlke, William Y. Chen, and Wen mei W. Hwu. Profile-guided automatic inline expansion for C programs. Software–Practice and Experience, 22(5):349–369, May 1992.
  • Winston Chang. R Graphics Cookbook. O'Reilly, 2012.
  • Anne Chao and Chih-Wei Lin. Nonparametric lower bounds for species richness and shared species richness under sampling without replacement. Biometrics, 68(3):912–921, September 2012.
  • Anne Chao and Mark C. K. Yang. Stopping rules and estimation for recapture debugging with unequal failure rates. Biometrika, 80(1):193–201, March 1993.
  • Anne Chao, S-M Lee, and S-L Jeng. Estimating population size for capture–recapture data when capture probabilities vary by time and individual animal. Biometrics, 48(1):201–216, March 1992.
  • Anne Chao, Robert K. Colwell, Chih-Wei Lin, and Nicholas J. Gotelli. Sufficient sampling for asymptotic minimum species richness estimators. Ecology, 90(4):1125–1133, April 2009.
  • Anne Chao, Chun-Huo Chiu, and Lou Jost. Unifying species diversity, phylogenetic diversity, functional diversity, and related similarity and differentiation measures through Hill numbers. Annual Review of Ecology, Evolution and Systematics, 45(1):297–324, November 2014.
  • Anne Chao. Estimating population size for sparse data in capture–recapture experiments. Biometrics, 45(2):427–438, June 1989.
  • Merrill R. Chapman and Randal J. Hujar. The softletter financial handbook 2011: Metrics and benchmarks mergers, IPOs, and venture finance compensation operations. company website, September 2011. https://softletter.com/wp-content/uploads/2017/02/FINHANDBOOK_A0055E.pdf.
  • Carl Chapman, Peipei Wang, and Kathryn T. Stolee. Exploring regular expression comprehension. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE'17, pages 405–416, November 2017.
  • Merrill R. Chapman. In Search of Stupidity: Over 20 years of High-Tech Marketing Disasters. Apress, second edition, 2006.
  • Carl Allen Chapman. Usage and refactoring studies of python regular expressions. Thesis (m.s.), Iowa State University, 2016.
  • Peter Charbachi, Linus Eklund, and Eduard Enoiu. Can pairwise testing perform comparably to manually handcrafted testing carried out by industrial engineers?. In eprint arXiv:cs.SE/1706.01636, June 2017.
  • Gary Charness and Uri Gneezy. Strong evidence for gender differences in risk taking. Journal of Economic Behavior & Organization, 83(1):50–58, June 2012.
  • William G. Chase and K. Anders Ericsson. Skill and working memory. In G. H. Bower, editor, The Psychology of Learning and Motivation, Vol. 15, pages 1–58. Academic Press, 1982.
  • Nick Chater. The Mind is Flat: The Illusion of Mental Depth and the Improvised Mind. Allen Lane, March 2018.
  • Prodromos D. Chatzoglou and Linda A. Macaulay. Requirements capture and analysis : A survey of current practice. Requirements Engineering, 1(2):75–87, June 1996.
  • Mustapha Chekaf, Nicolas Gauvrit, Alessandro Guida, and Fabien Mathy. Compression in working memory and its relationship with fluid intelligence. Cognitive Science, 42(53):904–922, June 2018.
  • Daming D. Chen and Gail-Joon Ahn. Security analysis of x86 processor microcode. Thesis (b.sc.), Arizona State University, December 2014.
  • Tianshi Chen, Yunji Chen, Qi Guo, Olivier Temam, Tue Wu, and Weiwu Hu. Statistical performance comparisons of computers. In 18th International Symposium on High Performance Computer Architecture, HPCA'12, pages 1–12, February 2012.
  • Yang Chen, Alex Groce, Xiaoli Fern, Chaoqiang Zhang, Weng-Keen Wong, Eric Eide, and John Regehr. Taming compiler fuzzers. In Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'13, pages 197–208, June 2013.
  • Lin Chen, Di Wu, Wanwangying Ma, Yuming Zhou, Baowen Xu, and Hareton Leung. How C++ templates are used for generic programming: An empirical study on 50 open source systems. ACM Transactions on Software Engineering and Methodology, 29(1):3, February 2020.
  • Patricia W. Cheng, Keith J. Holyoak, Richard E. Nisbett, and Lindsay M. Oliver. Pragmatic versus syntactic approaches to training deductive reasoning. Cognitive Psychology, 18(3):293–328, July 1986.
  • Adrian Chesson and Graeme Chamberlin. Survey-based measures of software investment in the UK. Economic Trends 627, Office for National Statistics, UK, February 2006.
  • Richard N. Chesterman. Report of Queensland health payroll system commission of inquiry. Report, Queensland Government, Australia, July 2013.
  • Hintat Cheung and Susan Kemper. Competing complexity metrics and adults' production of complex sentences. Applied Psycholinguistics, 13:53–76, 1992.
  • Roger C. Cheung. A user-oriented software reliability model. IEEE Transactions on Software Engineering, 6(2):118–125, 1980.
  • Joan Y. Chiao, Andrew R. Bordeaux, and Nalini Ambady. Mental representations of social status. Cognition, 93(2):B49–B57, September 2004.
  • John Joseph Chilenski and Steven P. Miller. Applicability of modified condition/decision coverage to software testing. Software Engineering Journal, 9(5):193–200, September 1994.
  • John Joseph Chilenski. An investigation of three forms of the modified condition decision coverage (MCDC) criterion. Final Report DOT/FAA/AR-01/18, U.S. Department of Transportation, Federal Aviation Administration, April 2001.
  • Susan Chilton, Judith Covey, Michael Jones-Lee, Graham Loomes, and Hugh Metcalf. Valuation of health benefits associated with reductions in air pollution. Technical report, Department for Environment, Food and Rural Affairs, May 2004.
  • Chun-Huo Chiu, Yi-Ting Wang, Bruno A. Walther, and Anne Chao. An improved nonparametric lower bound of species richness via a modified Good–Turing frequency formula. Biometrics, 70(3):671–682, September 2014.
  • Hyungmin Cho. System-Level Effects of Soft Errors. PhD thesis, Department of Electrical Engineering, Stanford University, August 2015.
  • Noam Chomsky. Syntactic Structures. Walter de Gruyter & Co, 13th edition, 1975.
  • Ken Ramshøj Christensen. Negative and affirmative sentences increase activation in different areas in the brain. Journal of Neurolinguistics, 22(1):1–17, January 2009.
  • Steve Christey and Brian Martin. Buying into the bias: Why vulnerability statistics suck. blackhat USA 2013, July-August 2013.
  • Thony Christie. The widespread and persistent myth that it is easier to multiply and divide with Hindu-Arabic numerals than with Roman ones. blog: Tony Christie, February 2017. https://thonyc.wordpress.com/2017/02/10/the-widespread-and-persistent-myth-that-it-is-easier-to-multiply-and-divide-with-hindu-arabic-numerals-than-with-roman-ones.
  • Robert A. Chubon and Mischele R. Hester. An enhanced standard computer keyboard system for single-finger and typing-stick typing. Journal of Rehabilitation Research and Development, 25(4):17–24, October-December 1988.
  • Anon CIA. Analytic thinking and presentation for intelligence producers: Analysis training handbook. Technical report, Office of Training and Education, Central Intelligence Agency, August 199?
  • Z. J. Ciechanowicz and A. C. De Weever. The 'completeness' of the Pascal test suite. Software–Practice and Experience, 14(5):463–471, 1984.
  • Jürgen Cito, Gerald Schermann, John Erik Wittern, Philipp Leitner, Sali Zumberi, and Harald C. Gall. An empirical analysis of the Docker container ecosystem on GitHub. In Proceedings of the 14th International Conference on Mining Software Repositories, MSR'17, pages 323–333, May 2017.
  • Daniel Citron and Dror G. Feitelson. "look it up" or "do the math": An energy, area, and timing analysis of instruction resuse and memoization. Technical Report H-0196, International Business Machines Corporation, October 2003.
  • Daniel Citron. MisSPECulation: Partial and misleading use of SPEC CPU2000 in computer architecture conferences. In Proceedings of the 30th annual International Symposium on Computer Architecture, ISCA'03, pages 52–61, June 2003.
  • I. Ciupa, A. Pretschner, M. Oriol, A. Leitner, and B. Meyer. On the number and nature of faults found by random testing. Software Testing, Verification and Reliability, 21(1):3–28, March 2011.
  • Civil Service Department, UK. Computers in Central Government Ten years ahead. Her Majesty's Stationery Office, January 1971.
  • Herbert H. Clark and Deanna Wilkes-Gibbs. Referring as a collaborative process. Cognition, 22:1–39, 1986.
  • Herbert H. Clark. Understanding language. Cambridge University Press, 1996.
  • Aaron Clauset, Cosma Rohilla Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Review, 51(4):661–703, 2009.
  • William S. Cleveland and Robert McGill. Graphical perception: Theory, experimentation, and application to the development of graphical methods. Journal of the American Statistical Association, 79(387):531–554, September 1984.
  • William S. Cleveland. The Elements of Graphing Data. Wadsworth Advanced Book Program, 1985.
  • Jeff Clune, Jean-Baptiste Mouret, and Hod Lipson. The evolutionary origins of modularity. Proceedings of the Royal Society B: Biological Sciences, 280(1755):20122863, January 2013.
  • Alex Coad. Investigating the exponential age distribution of firms. Economics: The Open-Access, Open-Assessment E-Journal, 4(2010-17):1–30, March 2010.
  • Neil Martin Coe. The growth and locational dynamics of the UK computer services industry, 1981-1996. PhD thesis, Department of Geography, University of Durham, 1996.
  • Jailton Coelho and Marco Tulio Valente. Why modern open source projects fail. In Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'17, pages 186–196, September 2017.
  • Jason Cohen, Steven Teleki, and Eric Brown. Best Kept Secrets of Peer Code Review. SmartBear Software, 2012.
  • Jacob Cohen. Statistical Power Analysis for the Behavioural Sciences. Routledge, second edition, 1988.
  • Jacob Cohen. The Earth is round (p < 0.05). American Psychologist, 49(12):997–1003, 1994.
  • Zack Coker, Samir Hasan, Jeffrey Overbey, Munawar Hafiz, and Christian Kästner. Integers in C: An open invitation to security attacks?. Technical Report CSSE14-01, Auburn University, February 2014.
  • Murat Cokol, Ivan Iossifov, Raul Rodriguez-Esteban, and Andrey Rzhetsky. How many scientific papers should be retracted?. European Molecular Biology Organization, 8(5):422–423, April 2007.
  • Robert E. Cole. Managing Quality Fads: How American Business Learned to Play the Quality Game. Oxford University Press, February 1999.
  • E. Gabriella Coleman. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press, December 2012.
  • Mark Collard, April Ruttle, Briggs Buchanan, and Michael J. O'Brien. Population size and cultural evolution in nonindustrial food-producing societies. PLoS ONE, 8(9):e72628, September 2013.
  • Christian Collberg, Todd Proebsting, and Alex M. Warren. Repeatability and benefaction in computer systems research-A study and a modest proposal. Technical Report TR 14-014, Department of Computer Science, University of Arizona, February 2015.
  • D. Comin and B. Hobijn. Cross-country technology adoption: making the theories face the facts. Journal of Monetary Economics, 51(1):39–83, 2004.
  • Christophe Commeyne, Alain Abran, and Rachida Djouab. Effort estimation with story points and cosmic function points - an industry case study. Software Measurement News, 21(1):25–36, 2016.
  • Comptroller General of the United States. Multiyear leasing and government-wide purchasing of automatic data processing equipment should result in significant savings. Technical Report B-115369, U.S. General Accounting Office, April 1971.
  • Comptroller General of the United States. Federal agencies' maintenance of computer programs: Expensive and undermanaged. Technical Report AFMD-81-25, U.S. General Accounting Office, February 1981.
  • Computing Technology Industry Association, The. Cyberstates 2019: The definitive guide to the U.S. tech industry and tech workforce. Research report, The Computing Technology Industry Association, March 2019.
  • Steve Condon, Myrna Regardie, Mike Stark, and Sharon Waligora. Cost and schedule estimation study report. Technical Report SEL-93-002, Goddard Space Flight Center, November 1993.
  • Foundations for evidence-based policymaking Act of 2018 H.R.4175, January 2018. 115th Congress of the United States of America, 2nd session.
  • Marco Conoscenti, Veronika Besner, Antonio Vetrò, and Daniel Méndez Fernández. Combining data analytics and developers feedback for identifying reasons of inaccurate estimations in agile software development. The Journal of Systems and Software, 156:126–135, October 2019.
  • Brian Conrad and Michael Mitzenmacher. Power laws for monkeys typing randomly: The case of unequal probabilities. IEEE Transactions on Information Theory, 50(7):1403–1414, July 2004.
  • Jeffrey J. Cook and Craig Zilles. A characterization of instruction-level error derating and its implications for error detection. In IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, DSN 2008, pages 482–491, June 2008.
  • Kees Cook. Ubuntu security hardening statistics (amd64). personal website, July 2019.
  • Paul Coombs. IT Project Estimation: A Practical Guide to the Costing of Software. Cambridge University Press, 2003.
  • Tom Copeland and Vladimir Antikarov. Real Options A Practitioner's Guide. Texere Publishing Limited, April 2001.
  • Anna Corazza, Valerio Maggio, and Giuseppe Scanniello. Coherence of comments and method implementations: a dataset and an empirical investigation. Software Quality Journal, 26(2):751–777, June 2018.
  • Jonathan Corbet, Greg Kroah-Hartman, and Amanda McPherson. Linux kernel development: How fast it is going, who is doing it, what they are doing, and who is sponsoring it?. Technical report, The Linux Foundation, December 2010.
  • Jonathan Corbet, Greg Kroah-Hartman, and Amanda McPherson. Linux kernel development: How fast it is going, who is doing it, what they are doing, and who is sponsoring it. Technical report, The Linux Foundation, March 2012.
  • Michael Correll and Michael Gleicher. Error bars considered harmful: Exploring alternate encodings for mean and error. IEEE Transactions on Visualization and Computer Graphics, 20(12):2142–2151, December 2014.
  • James W. Cortada. The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe and Asia. Oxford University Press, September 2012.
  • Michael J. Cortese and Maya M. Khanna. Age of acquisition predicts naming and lexical-decision performance above and beyond 22 other predictor variables: An analysis of 2,342 words. The Quarterly Journal of Experimental Psychology, 60(8):1072–1082, August 2007.
  • Leda Cosmides and John Tooby. Evolutionary psychology: A primer. Technical report, Center for Evolutionary Psychology, University of California, Santa Barbara, 1998.
  • Dora L. Costa and Matthew E. Kahn. Changes in the value of life, 1940-1980. Working Paper No. 9396, National Bureau of Economic Research, USA, December 2002.
  • Diego Elias Costa, Suhaib Mujahid, Rabe Abdalkareem, and Emad Shihab. Breaking type-safety in Go: An empirical study on the usage of the unsafe package. In eprint arXiv:cs.SE/2006.09973, June 2020.
  • Victor Costan and Srinivas Devadas. Intel SGX explained. In Cryptology ePrint Archive: Report 2016/086, January 2016.
  • Domenico Cotroneo, Roberto Pietrantuono, Stefano Russo, and Kishor Trivedi. How do bugs surface? A comprehensive study on the characteristics of software bugs manifestation. The Journal of Systems and Software, 113(C):27–43, March 2016.
  • Domenico Cotroneo, Antonio Ken Iannillo, Roberto Natella, and Roberto Pietrantuono. A comprehensive study on software aging across Android versions and vendors. In eprint arXiv:cs.SE/2005.11523, May 2020.
  • J. Daniel Couger and Mel A. Colter. Maintenance Programming: Improving Productivity Through Motivation. Prentice-Hall, Inc, 1985.
  • Nelson Cowan. The magical number 4 in short-term memory: A reconsideration of mental storage capacity. Behavioral and Brain Sciences, 24(1):87–185, 2001.
  • Michael F. Cowlishaw. Decimal floating-point: Algorism for computers. In Proceedings of the 16th IEEE Symposium on Computer Arithmetic, pages 104–111, June 2003.
  • John F. Coyle and Gregg D. Polsky. Acqui-hiring. Duke Law Journal, 63(2):281–346, November 2013.
  • Michael J. Crawley. The R Book. John Wiley & Sons, Inc, second edition, 2013.
  • Cray Research. M Series Site Planning Reference Manual. Cray Research, Inc, April 1983.
  • Wesley Crooymans, Priyanka Pradhan, and Slinger Jansen. Exploring network modelling and strategy in the Dutch software business ecosystem. In Proceedings of the International Conference on Software Business, ICSOB 2015, pages 45–59, June 2015.
  • Frederick E. Croxton and Roy E. Stryker. Bar charts versus circle diagrams. Journal of the American Statistical Association, 22(160):473–482, December 1927.
  • John Culver. The life cycle of a CPU. blog: The cpushack, 2010. http://www.cpushack.com/life-cycle-of-cpu.html.
  • Geoff Cumming and Robert Maillardet. Confidence intervals and replication: Where will the next mean fall?. Psychological Methods, 11(3):217–227, 2006.
  • Christopher Raymond Cummins. The interpretation and use of numerically-quantified expressions. PhD thesis, Research Centre for English and Applied Linguistics, University of Cambridge, November 2011.
  • Paul G. Curran and Kelsey A. Hauser. I'm paid biweekly, just not by leprechauns: Evaluating valid-but-incorrect response rates to attention check items. Journal of Research in Personality, 82(103849), October 2019.
  • Bill Curtis, Sylvia B. Sheppard, and Elizabeth Kruesi. Evaluation of software life cycle data from the PAVE PAWS project. Technical Report RADC-TR-80-28, Rome Air Development Center, Griffiss Air Force Base, March 1980.
  • Bill Curtis, Herb Krasner, and Neil Iscoe. A field study of the software design process for large systems. Communications of the ACM, 31(11):1268–1287, November 1988.
  • Michael A. Cusumano, Annabelle Gawer, and David B. Yoffie. The Business of Platforms: Strategy in the Age of Digital Competition, Innovation, and Power. Harper Business, June 2019.
  • Michael A. Cusumano. Factory concepts and practices in software development: An historical overview. Working Paper #3095-89 BPS, Alfred P. Sloan School of Management, December 1989.
  • Michael A. Cusumano. Shifting economies: From craft production to flexible systems and software factories. Working Paper #3325-91/BPS, Alfred P. Sloan School of Management, August 1991.
  • Krzysztof Cwalina and Brad Abrams. Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries. Addison–Wesley, 2006.
  • Jacek Czerwonka. On use of coverage metrics in assessing effectiveness of combinatorial test designs. In Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, ICST 2013, pages 257–266, March 2013.
  • J. T. Daly. A higher order estimate of the optimum checkpoint interval for restart dumps. Future Generation Computer Systems, 22(3):303–312, February 2006.
  • Antonio Damasio. Self Comes to Mind: Constructing the Conscious Brain. Vintage books, 2012.
  • Meredyth Daneman and Patricia A. Carpenter. Individual differences in working memory and reading. Journal of Verbal Learning and Verbal Behavior, 19(4):450–466, August 1980.
  • Meredyth Daneman and Patricia A. Carpenter. Individual differences in integrating information between and within sentences. Journal of Experimental Psychology: Learning, Memory, & Cognition, 9(4):561–584, 1983.
  • Cristian Danescu-Niculescu-Mizil, Robert West, Dan Jurafsky, Jure Leskovec, and Christopher Potts. No country for old members: User lifecycle and linguistic change in online communities. In Proceedings of the 22nd International Conference on World Wide Web, WWW 2013, pages 307–318, May 2013.
  • Benjamin Danglot, Philippe Preux, Benoit Baudry, and Martin Monperrus. Correctness attraction: A study of stability of software behavior under runtime perturbation. Empirical Software Engineering, 23(4):2086–2119, August 2018.
  • Andrew Danowitz, Kyle Kelley, James Mao, John P. Stevenson, and Mark Horowitz. CPU DB: Recording microprocessor history. Communications of the ACM, 55(4):55–63, April 2012.
  • John Darley and C. Daniel Batson. "from Jerusalem to Jericho": A study of situational and dispositional variables in helping behavior. Journal of Personality and Social Psychology, 27(1):100–108, 1973.
  • Paul A. David. Clio and the economics of QWERTY. The American Economic Review, 75(2):332–337, May 1985.
  • Paul A. David. Computer and dynamo: The modern productivity paradox in a not-too distant mirror. No. 339, Department of Economics, Stanford University, July 1989.
  • Jack W. Davidson, John R. Rabung, and David B. Whalley. Relating static and dynamic machine code measurements. Technical Report CS-89-03, Department of Computer Science, University of Virginia, July 1989.
  • Steven J. Davis and Brenda Samaniego de la Parra. Application flows. Working paper, University of Chicago Booth School of Business, March 2017.
  • Steven J. Davis, Jack MacCrisken, and Kevin M. Murphy. Economic perspectives on software design: PC operating systems and platforms. Working Paper No. 8411, National Bureau of Economic Research, USA, August 2001.
  • James C. Davis, Christy A. Coghlan, Francisco Servant, and Dongyoon Lee. The impact of regular expression denial of service (ReDoS) in practice: An empirical study at the ecosystem scale. In Proceedings of the 26th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'18, pages 246–256, November 2018.
  • James C. Davis, Louis G. Michael, Francisco Servant, Christy A. Coghlan, and Dongyoon Lee. Why aren't regular expressions a lingua franca? An empirical study on the re-use and portability of regular expressions. In Proceedings of the 27th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'19, pages 443–454, August 2019.
  • James C. Davis, Daniel Moyer, Ayaan M. Kazerouni, and Dongyoon Lee. Testing regex generalizability and its implications A large-scale many-language measurement study. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, ASE'19, pages 427–439, November 2019.
  • Colin J. Davis. The spatial coding model of visual word identification. Psychological Review, 117(3):713–758, July 2010.
  • Shobhit Dayal. Characterizing HEC storage systems at rest. Technical Report CMU-PDL-08-109, Parallel Data Laboratory, Carnegie Mellon University, July 2008.
  • Ruben de Bliek. Empirical studies on the economic impact of trust. PhD thesis, Erasmus Research Institute of Management, Rotterdam, May 2015.
  • Simon De Deyne, Steven Verheyen, Eef Ameel, Wolf Vanpaemel, Matthew J. Dry, Wouter Voorspoels, and Gert Storms. Exemplar by feature applicability matrices and other Dutch normative data for semantic concepts. Behavior Research Methods, 40(4):1030–1048, November 2008.
  • Adriaan D. de Groot. Thought and Choice in Chess. Amsterdam University Press, 2008.
  • Jose Luis de la Vara, Markus Borg, Krzysztof Wnuk, and Leon Moonen. An industrial survey of safety evidence change impact analysis practice. IEEE Transactions on Software Engineering, 42(12):1095–1117, December 2016.
  • Bruce Bueno de Mesquita, Alastair Smith, Randolph M. Siverson, and James D. Morrow. The Logic of Political Survival. The MIT Press, 2005.
  • Richard A. De Millo, Richard J. Lipton, and Alan J. Perlis. Social processes and proofs of theorems and programs. Communications of the ACM, 22(5):271–280, May 1979.
  • Augusto Born de Oliveira, Jean-Christophe Petkovich, Thomas Reidemeister, and Sebastian Fischmeister. DataMill: Rigorous performance evaluation made easy. In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering, ICPE'13, pages 137–148, April 2013.
  • Francisco Gomes de Oliveira Neto, Richard Torkar, Robert Feldt, Lucas Gren, Carlo A. Furia, and Ziwei Huang. Evolution of statistical analysis in empirical software engineering research: Current state and steps forward. In eprint arXiv:cs.SE/1706.00933, June 2017.
  • Guilherme B. de Pádua and Weiyi Shang. Revisiting exception handling practices with exception flow analysis. In International Conference on Source Code Analysis and Manipulation, SCAM'17, pages 11–20, September 2017.
  • Clinton B. De Soto, Marvin London, and Stephen Handel. Social reasoning and spatial paralogic. Journal of Personality and Social Psychologs, 2(4):513–521, 1965.
  • Karel De Vogeleer, Gerard Memmi, and Pierre Jouvelot. Parameter sensitivity analysis of the energy/frequency convexity rule for nanometer-scale application processors. In eprint arXiv:cs.DS/1508.07740, August 2015.
  • Karel De Vogeleer. La loi de convexité énergie-fréquence de la consommation des programmes : modélisation, thermosensibilité et applications. PhD thesis, Informatique [cs] Telecom ParisTech, September 2015.
  • Isabelle De Voldere, Jean-François Romainville, Steven Knotter, Eveline Durinck, Evrim Engin, Arthur Le Gall, Philippe Kern, Elisabetta Airaghi, Teodora Pletosu, Heritiana Ranaivoson, and Katharina Hoelck. Mapping the creative value chains: A study on the economy of culture in the digital age. Final report, Directorate-General for Education and Culture Directorate D, European Commission, 2017.
  • Gerrit de Wit. Firm size distributions: An overview of steady-state distributions resulting from firm dynamics models. Technical Report N200418, EIM Business and Policy Research, January 2005.
  • James Dearden, Barry W. Ickes, and Larry Samuelson. To innovate or not to innovate: Incentives and innovation in hierarchies. The American Economic Review, 80(5):1105–1124, December 1990.
  • Ian J. Deary. Intelligence: A Very Short Introduction. Oxford University Press, 2001.
  • Biplob K. Debnath, Mohamed F. Mokbel, and David J. Lilja. Exploiting the impact of database system configuration parameters: A design of experiments approach. IEEE Data Engineering Bulletin, 31(1):3–10, March 2008.
  • Debsources developers, The. Statistics | Debian sources. organization website, June 2019. https://sources.debian.org/stats.
  • Alexandre Decan and Tom Mens. What do package dependencies tell us about semantic versioning?. IEEE Transactions on Software Engineering, ???(???):???, November 2019.
  • Alexandre Decan, Tom Mens, Maelick Claes, and Philippe Grosjean. On the development and distribution of R packages: An empirical analysis of the R ecosystem. In Proceedings of the 2015 European Conference on Software Architecture Workshops, ECSAW'15, page 41, September 2015.
  • Alexandre Decan, Tom Mens, Maëlick Claes, and Philippe Grosjean. When GitHub meets CRAN: An analysis of inter-repository package dependency problems. In 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER'16, pages 493–504, March 2016.
  • Alexandre Decan, Tom Mens, and Maälick Claes. An empirical comparison of dependency issues in OSS packaging ecosystems. In IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, pages 2–12, February 2017.
  • Alexandre Decan, Tom Mens, and Eleni Constantinou. On the impact of security vulnerabilities in the npm package dependency network. In Proceedings of the 15th International Conference on Mining Software Repositories, MSR'18, pages 181–191, May 2018.
  • Leslie A. DeChurch and Jessica R. Mesmer-Magnus. Maintaining shared mental models over long-duration exploration missions: Literature review & operational assessment. Technical Memorandum TM-2015-218590, National Aeronautics and Space Administration, September 2015.
  • Defence technical information center. Search page for DTIC reports, July 2016. http://dsearch.dtic.mil.
  • Defense, Department of. Military standard DOD-STD-2167 defense system software development. Standard DOD-STD-2167, U.S. Department of Defense, 1985.
  • Defense, Department of. Standard practice system safety. Standard MIL-STD-882E, U.S. Department of Defense, May 2012.
  • Stanislas Dehaene, Emmanuel Dupoux, and Jacques Mehler. Is numerical comparison digits? Analogical and symbolic effects in two-digit number comparisons. Journal of Experimental Psychology: Human Perception and Performance, 16(3):626–641, 1990.
  • Stanislas Dehaene, Serge Bossini, and Pascal Giraux. The mental representation of parity and number magnitude. Journal of Experimental Psychology: General, 122(3):371–396, September 1993.
  • Stanislas Dehaene, Véronique Izard, Elizabeth Spelke, and Pierre Pica. Log or linear? Distinct intuitions of the number scale in Western and Amazonian indigene cultures. Science, 320(5880):1217–1220, May 2008.
  • Stanislas Dehaene. Symbols and quantities in parietal cortex: elements of a mathematical theory of number representation and manipulation. In Patrick Haggard, Yves Rossetti, and Mitsuo Kawato, editors, Sensorimotor Foundations of Higher Cognition (Attention and Performance) XXII, chapter 24, pages 527–574. Oxford University Press, November 2007.
  • Stanislas Dehaene. Reading in the Brain: The Science and evolution of a human invention. Viking, 2009.
  • Stanislas Dehaene. The Number Sense. Oxford University Press, revised and updated edition, 2011.
  • Sasa M. Dekleva. The influence of the information systems development approach on maintenance. MIS Quarterly, 16(3):355–372, September 1992.
  • Richard Thomas DeLamarter. Big Blue: IBM's Use and Abuse of Power. Pan Books, 1988.
  • Stefano DellaVigna. Psychology and economics: Evidence from the field. Working Paper No. 13420, National Bureau of Economic Research, USA, September 2007.
  • James Demmel and Yozo Hilda. Accurate floating point summation. Technical Report UCB/CSD-02-1180, University of California, Berkeley, May 2002.
  • Maxime Derex, Jean-François Bonnefon, Robert Boyd, and Alex Mesoudi. Causal understanding is not necessary for the improvement of culturally evolving technology. Nature Human Behaviour, 3(5):446–452, May 2019.
  • Giuseppe Destefanis. Which programming language should a company use? A Twitter-based analysis. Technical Report CRIM-14/10-23-MODL, Computer Research Institute of Montréal, October 2014.
  • Sarah Deutsch and Mie Hørlykke Jørgensen. Studying the hidden costs of offshoring – the effect of psychic distance. Thesis (m.s.), Copenhagen Business School, August 2014.
  • John Peter DeVale. High Performance Robust Computer Systems. PhD thesis, Electrical and Computer Engineering, Pittsburgh, October 2001.
  • Tapajit Dey and Audris Mockus. Deriving a usage-independent software quality metric. In eprint arXiv:cs.SE/2002.09989, February 2020.
  • Anthony Di Franco, Hui Guo, and Cindy Rubio-González. A comprehensive study of real-world numerical bug characteristics. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE'17, pages 509–519, November 2017.
  • Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, and William Kramer. Lessons learned from the analysis of system failures at petascale: The case of Blue Waters. In 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, pages 610–621, June 2014.
  • Massimiliano Di Penta, Luigi Cerulo, and Lerina Aversano. The life and death of statically detected vulnerabilities: an empirical study. Information and Software Technology, 51(10):1469–1484, October 2009.
  • Andrea Di Sorbo, Josef Spillner, Gerardo Canfora, and Sebastiano Panichella. "won't we fix this issue?" Qualitative characterization and automated identification of wontfix issues on GitHub. In eprint arXiv:cs.SE/1904.02414, April 2019.
  • Thomas F. Dickey. Programmer variability. Proceedings of the IEEE, 69(7):844–845, July 1981.
  • Louis S. Dickstein. The effect of figure on syllogistic reasoning. Memory & Cognition, 6(1):76–83, 1978.
  • Andreas Diekmann. Not the first digit! Using Benford's law to detect fraudulent scientific data. Journal of Applied Statistics, 34(3):321–329, October 2007.
  • Susanne Dietrich, Ingo Hertrich, and Hermann Ackermann. Training of ultra-fast speech comprehension induces functional reorganization of the central-visual system in late-blind humans. Frontiers in Human Neuroscience, 7(701), October 2013.
  • Jens Dietrich, Kamil Jezek, and Premek Brada. What Java developers know about compatibility, and why this matters. In eprint arXiv:cs.SE/1408.2607v1, August 2014.
  • Edsger W. Dijkstra. Go to statement considered harmful. Communications of the ACM, 11(3):147–148, March 1968.
  • Chrysanne DiMarco, Graeme Hirst, and Manfred Stede. The semantic and stylistic differentiation of synonyms and near-synonyms. In AAAI Spring Symposium on Building Lexicons for Machine Translation, pages 114–121, March 1993.
  • Artem Dinaburg. Bitsquatting: DNS hijacking without exploitation. Reference 2011-307, Raytheon Company, July 2011.
  • David K. Dirlam. Most efficient chunk sizes. Cognitive Psychology, 3(2):355–359, April 1972.
  • Avinash K. Dixit and Robert S. Pindyck. Investment under Uncertainty. Princeton University Press, 1994.
  • Hyunsook Do, Siavash Mirarab, Ladan Tahvildari, and Gregg Rothermel. An empirical study of the effect of time constraints on the cost-benefits of regression testing. In Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2008, pages 71–82, November 2008.
  • Christopher Domas. Breaking the x86 ISA. blackhat USA 2017, July 2017.
  • D. James Dooling and Robert E. Christiaansen. Episodic and semantic aspects of memory for prose. Journal of Experimental Psychology: Human Learning and Memory, 3(4):428–436, 1977.
  • John R. Douceur and William J. Bolosky. A large-scale study of file-system contents. In Proceedings of the 1999 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS'99, pages 59–70, July 1999.
  • John Downer. Watching the watchmaker: On regulating the social in lieu of the technical. Discussion Paper 54, London School of Economics and Political Science, June 2009.
  • John R. Doyle. Survey of time preference, delay discounting models. Judgment and Decision Making, 8(2):116–135, March 2013.
  • Gérard Dréan. The Computer Industry: Structure, economics, perspectives. Gérard Dréan, english edition, 2012.
  • Sébastien Drobisz, Tom Mens, and Roberto Di Cosmo. A historical analysis of Debian package conflicts. In Proceedings of the 12th Working Conference on Mining Software Repositories, MSR'15, pages 212–223, June 2015.
  • Sean Duffy, Janellen Huttenlocher, Larry V. Hedges, and L. Elizabeth Crawford. Category effects on stimulus estimation: Shifting and skewed frequency distributions. Psychonomic Bulletin & Review, 17(2):224–230, April 2010.
  • Jim Duggan. Implementing a metapopulation Bass diffusion model using the R package deSolve. The R Journal, 9(1):153–163, June 2017.
  • Robin I. M. Dunbar and Richard Sosis. Optimising human community sizes. Evolution and Human Behavior, 39(1):106–111, January 2018.
  • J. R. Dunham and L. A. Lauterbach. An experiment in software reliability additional analyses using data from automated replications. NASA Contractor Report 178395, Research Triangle Institute, North Carolina, January 1988.
  • Janet R. Dunham and John L. Pierce. An experiment in software reliability. NASA Contractor Report 172553, NASA Langley Research Center, March 1986.
  • Laurence Michael Dunn. An Investigation of the Factors Affecting the Lifecycle Costs of COTS-Based Systems. PhD thesis, School of Computing, University of Portsmouth, June 2011.
  • David Dunning, Chip Heath, and Jerry M. Suls. Flawed self-assessment: Implications for health, education, and the workplace. Psychological Science in the Public Interest, 5(3):69–106, April 2004.
  • Scott Duplichan. Intel overstates FPU accuracy. personal website, June 2013. http://notabs.org/fpuaccuracy.
  • Vinicius H. S. Durelli, Jeff Offutt, Nan Li, Marcio E. Delamaro, Jin Guo, Zengshu Shi, and Xinge Ai. What to expect of predicates: An empirical analysis of predicates in real world programs. The Journal of Systems and Software, 113:324–336, March 2016.
  • Christophe Dutang. CRAN task view: Probability distributions. website, June 2016. http://CRAN.R-project.org/view=Distributions.
  • Gilles Dutilh, Jeffrey Annis, Scott D. Brown, Peter Cassey, Nathan J. Evans, Raoul P. P. P. Grasman, Guy E. Hawkins, Andrew Heathcote, William R. Holmes, Angelos-Miltiadis Krypotos, Colin N. Kupitz, Fábio P. Leite, Veronika Lerche, Yi-Shin Lin, Gordon D. Logan, Thomas J. Palmeri, Jeffrey J. Starns, Jennifer S. Trueblood, Leendert van Maanen, Don van Ravenzwaaij, Joachim Vandekerckhove, Ingmar Visser, Andreas Voss, Corey N. White, Thomas V. Wiecki, Jörg Rieskamp, and Chris Donkin. The quality of response time data inference: A blinded, collaborative assessment of the validity of cognitive models. Psychonomic Bulletin & Review, 26(4):1051–1069, August 2019.
  • Tore Dybå, Vigdis By Kampenes, and Dag I. K. Sjøberg. A systematic review of statistical power in software engineering experiments. Information and Software Technology, 48(8):745–755, August 2006.
  • Robert Dyer, Hridesh Rajan, Hoan Anh Nguyen, and Tien N. Nguyen. Mining billions of AST nodes to study actual and potential usage of Java language features. In Proceedings of the 36th International Conference on Software Engineering, ICSE'14, pages 779–790, May-June 2014.
  • P. Christopher Earley. Social loafing and collectivism: A comparison of the United States and the People's Republic of China. Administrative Science Quarterly, 34(4):565–581, December 1989.
  • Hermann Ebbinghaus. Über das Gedächtnis. Untersuchungen zur experimentellen Psychologie. Teachers College, Columbia University, 1885. English translation by Henry A. Ruger and Clara E. Bussenius as Memory: A Contribution to Experimental Psychology (Teachers College, Columbia University, 1913).
  • Alan Eckbreth, Charles Saff, Kevin Connolly, Natalie Crawford, Chris Eick, Mark Goorsky, Neil Kacena, David Miller, Robert Schafrik, Douglas Schmidt, Daniel Stein, Michael Stroscio, Gregory Washington, and John Zolper. Sustaining Air Force aging aircraft into the 21st century. Technical Report SAB-TR-11-01, United States Air Force Scientific Advisory Board, August 2011.
  • Economist Data team. The changing US technology sector: Daily chart for april 21 2015. The Economist website, April 2015. As of Q1 2015, Sources: Thomson Reuters; awk scripts+R converted the data embedded in Javascript.
  • EDB. Offensive security's exploit database archive. https://www.exploit-db.com, March 2018.
  • Sebastian Eder, Maximilian Junker, Elmar Jürgens, Benedikt Hauptmann, Rudolf Vaas, and Karl-Heinz Prommer. How much does unused code matter for maintenance?. In 34th International Conference on Software Engineering, ICSE'12, pages 1102–1111, June 2012.
  • Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, and David Wagner. An empirical study on the effectiveness of security code review. In Proceedings of the 5th International Conference on Engineering Secure Software and Systems, ESSoS'13, pages 197–212, February 2013.
  • Marc A. Edwards and Siddhartha Roy. Academic research in the 21st century: Maintaining scientific integrity in a climate of perverse incentives and hypercompetition. Environmental Engineering Science, 34(1):51–61, January 2017.
  • Kate Ehrlich and P. N. Johnson-Laird. Spatial descriptions and referential continuity. Journal of Verbal Learning and Verbal Behavior, 21(3):296–306, June 1982.
  • Stephen G. Eick, Clive R. Loader, M. David Long, Lawrence G. Votta, and Scott Vander Wiel. Estimating software fault content before coding. In Proceedings of the 14th International Conference on Software engineering, ICSE'92, pages 59–65, May 1992.
  • Phillip Ein-Dor. Grosch's law re-revisited: CPU power and the cost of computation. Communications of the ACM, 28(2):142–151, February 1985.
  • Thomas Eisensee and David Strömberg. News droughts, news floods, and U.S. disaster relief. The Quarterly Journal of Economics, 122(2):693–728, May 2007.
  • Khaled El Emam and A. Günes Koru. A replicated survey of IT software project failures. IEEE Software, 25(5):84–90, April 2008.
  • Khaled El Emam, Saïda Benlarbi, Nishith Goel, Walcelio Melo, Hakim Lounis, and Shesh N. Rai. The optimal class size for object-oriented software. IEEE Transactions on Software Engineering, 28(5):494–509, March 2002.
  • Atilla Elci. The dependence of operating system size upon allocatable resources. Technical Report 75-172, Department of Computer Science, Purdue University, December 1975.
  • James Elliott, Mark Hoemmen, and Frank Mueller. Exploiting data representation for fault tolerance. In eprint arXiv:cs.NA/1312.2333v1, December 2013.
  • I. R. Elliott. Life cycle planning for a large mix of commercial systems. In Bryce Elkins and Lois Hunt, editors, Software Phenomenology – Working Papers of the Software Life Cycle Management Workshop, chapter 10, pages 203–215. Computer Systems Command, United States Army, August 1977.
  • N. C. Ellis and R. A. Hennelly. A bilingual word-length effect: Implications for intelligence testing and the relative ease of mental calculation in Welsh and English. British Journal of Psychology, 71:43–51, 1980.
  • Paul D. Ellis. The Essential Guide to Effect Sizes: Statistical Power, Meta-Analysis, and the Interpretation of Research Results. Cambridge University Press, 2010.
  • Ralf Engbert, Antje Nuthmann, Eike M. Richter, and Reinhold Kliegl. SWIFT: A dynamical model of saccade generation during reading. Psychological Review, 112(4):777–813, October 2005.
  • Jakob Engblom. Why SpecInt95 should not be used to benchmark embedded systems tools. ACM SIGPLAN Notices, 34(7):96–103, July 1999.
  • Benjamin Enke and Florian Zimmermann. Correlation neglect in belief formation. The Review of Economic Studies, 86(1):313–332, January 2019.
  • John Ensign and Daniel K. Akaka. Defense acquisitions: DOD has paid billions in award and incentive fees regardless of acquisition outcomes. Technical Report GAO-06-66, United States Government Accountability Office, December 2005.
  • Nathan L. Ensmenger. Letting the "computer boys" take over: Technology and the politics of organizational transformation. International Review of Social History, 48(S11):153–180, December 2003.
  • Young-Ho Eom and Hang-Hyun Jo. Generalized friendship paradox in complex networks: The case of scientific collaboration. In eprint arXiv:cs.SI/1401.1458, April 2014.
  • David M. Erceg-Hurn and Vikki M. Mirosevich. Modern robust statistical methods. American Psychologist, 63(7):591–601, October 2008.
  • K. Anders Ericsson and Neil Charness. Expert performance. American Psychologist, 49(8):725–747, August 1994.
  • K. Anders Ericsson and Kyle W. Harwell. Deliberate practice and proposed limits on the effects of practice on the acquisition of expert performance: Why the original definition matters and recommendations for future research. frontiers in Psychology, 10:2396, October 2019.
  • K. A. Ericsson and A. C. Lehmann. Expert and exceptional performance: Evidence of maximal adaption to task constraints. Annual Review of Psychology, 47:273–305, 1996.
  • K. Anders Ericsson, Ralf Th. Krampe, and Clemens Tesch-Römer. The role of deliberate practice in the acquisition of expert performance. Psychological Review, 100(3):363–406, July 1993. also University of Colorado, Technical Report #91-06.
  • Kimmo Eriksson, Drew H. Bailey, and David C. Geary. The grammar of approximating number pairs. Memory & Cognition, 38(3):333–343, April 2010.
  • Kimmo Eriksson, Fredrik Jansson, and Jonas Sjöstrand. Bentley's conjecture on popularity toplist turnover under random copying. The Ramanujan Journal, 23(1-3):371–396, December 2010.
  • Neil A. Ernst, Jeffrey C. Carver, Daniel Mendez, and Marco Torchiano. Understanding peer review of software engineering papers. In eprint arXiv:cs.SE/2009.01209, September 2020.
  • Laleh M. Eshkevari, Venera Arnaoudova, Massimiliano Di Penta, Rocco Oliveto, Yann-Gaël Guéhéneuc, and Giuliano Antoniol. An exploratory study of identifier renamings. In Proceedings of the 8th Working Conference on Mining Software Repositories, MSR'11, pages 33–42, May 2011.
  • Laleh Eshkevari, Fabien Dos Santos, James R. Cordy, and Giuliano Antoniol. Are PHP applications ready for Hack?. In IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering, SANER 2015, pages 63–72, March 2015.
  • Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn, and Kathryn S. McKinley. Looking back on the language and hardware revolutions: Measured power, performance, and scaling. In Proceedings of the sixteenth International Conference on Architectural support for Programming Languages and Operating Systems, ASPLOS XVI, pages 319–332, March 2011.
  • W. K. Estes. Classification and Cognition. Oxford University Press, 1994.
  • Joset A. Etzel, Jeffrey M. Zacks, and Todd S. Braver. Searchlight analysis: promise, pitfalls, and potential. NeuroImage, 78:261–269, September 2013.
  • Kylie M. Evans and Geoffrey H. Kuenning. A study of irregularities in file-size distributions. In International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS'02, July 2002.
  • J. St. B. T. Evans, Julie L. Barston, and Paul Pollard. On the conflict between logic and belief in syllogistic reasoning. Memory & Cognition, 11(3):295–306, 1983.
  • Ana Nora Evans, Bradford Campbell, and Mary Lou Soffa. Is Rust used safely by software developers?. In Proceedings of the 42nd International Conference on Software Engineering, ICSE'20, pages 246–257, July 2020.
  • J. Laurenz Eveleens and Chris Verhoef. The rise and fall of the Chaos report figures. IEEE Software, 27(1):30–36, January 2010.
  • Jon Eyolfson, Lin Tan, and Patrick Lam. Do time of day and developer experience affect commit bugginess?. In Proceedings of the 8th Working Conference on Mining Software Repositories, MSR'11, pages 153–162, May 2011.
  • Jon Eyolfson, Lin Tan, and Patrick Lam. Correlations between bugginess and time-based commit characteristics. Empirical Software Engineering, 19(4):1009–1039, August 2014.
  • Facebook. Facebook Inc. 2013 Form 10-K. SEC website, 2014. https://www.sec.gov/Archives/edgar/data/1326801/000132680114000007/fb-12312013x10k.htm.
  • Facebook. Facebook Inc. 2015 Form 10-K. SEC website, 2016. https://www.sec.gov/Archives/edgar/data/1326801/000132680116000043/fb-12312015x10k.htm.
  • Ruma Falk and Clifford Konold. Making sense of randomness: Implicit encoding as a basis for judgment. Psychological Review, 104(2):301–318, April 1997.
  • Daniele Fanelli. How many scientists fabricate and falsify research? A systematic review and meta-analysis of survey data. PLoS ONE, 4(5):e5738, May 2009.
  • Daniele Fanelli. "Positive" results increase down the hierarchy of the sciences. PLoS ONE, 5(4):e10068, April 2010.
  • Ming Fang and Munawar Hafiz. Discovering buffer overflow vulnerabilities in the wild: An empirical study. In Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'14, pages 23:1–23:10, September 2014.
  • Ferric C. Fang, R. Grant Steen, and Arturo Casadevall. Misconduct accounts for the majority of retracted scientific papers. PNAS, 109(42):17028–17033, October 2012.
  • L. Farr and B. Nanus. Factors that affect the cost of computer programming, volume I. Technical Documentary Report ESD-TDR-64-448, United States Air Force, L. G. Hanscom Field, Bedford, Massachusetts, July 1964.
  • L. Farr and H. J. Zagorski. Factors that affect the cost of computer programming, volume II: A quantitative analysis. Technical Documentary Report ESD-TDR-64-448, United States Air Force, L. G. Hanscom Field, Bedford, Massachusetts, September 1964.
  • Joseph Farrell and Paul Klemperer. Coordination and lock-in: Competition with switching costs and network effects. In Mark Armstrong and Robert H. Porter, editors, Handbook of Industrial Organization, Volume 3, chapter 31, pages 1967–2072. North-Holland, October 2007.
  • Joseph Farrell and Carl Shapiro. Dynamic competition with switching costs. RAND Journal of Economics, 19(1):123–137, 1988.
  • Simon Farrell, Mark J. Hurlstone, and Stephan Lewandowsky. Sequential dependencies in recall of sequences: Filling in the blanks. Memory & Cognition, 41(6):938–52, August 2013.
  • Simon Farrell, Klaus Oberauer, Martin Greaves, Kazimir Pasiecznik, Stephan Lewandowsky, and Christopher Jarrold. A test of interference versus decay in working memory: Varying distraction within lists in a complex span task. Journal of Memory and Language, 90:66–87, October 2016.
  • FDA. General principles of software validation. Final guidance for industry and FDA staff, U.S. Food and Drug Administration, January 2002.
  • Federal Food and Drug Administration. PMA approvals. FDA website, July 2019. https://www.fda.gov/medical-devices/device-approvals-denials-and-clearances/pma-approvals.
  • Federal Register. United States v. Adobe Systems, Inc., et al.; Proposed Final Judgment and Competitive Impact Statement, 2010. 75 (No. 190; October 1), 24624.
  • Federal Trade Commission. DELL COMPUTER CORPORATION CONSENT ORDER, ETC., IN REGARD TO ALLEGED VIOLATION OF SEC. 5 OF THE FEDERAL TRADE COMMISSION ACT, Docket C-3658. In Patricia C. Epperson, editor, Federal Trade Commission decisions: Findings, opinions and orders volume 121, pages 616–643. U.S. Government Printing Office, May 1996.
  • Dror G. Feitelson and Bill Nitzberg. Job characteristics of a production parallel scientific workload on the NASA Ames iPSC/860. In D. G. Feitelson and L. Rudolph, editors, Job Scheduling Strategies for Parallel Processing, volume 949 of Lecture Notes in Computer Science, chapter 19, pages 337–360. Springer-Verlag, June 1995.
  • Dror G. Feitelson. Workload Modeling for Computer Systems Performance Evaluation. Cambridge University Press, 2014.
  • Scott L. Feld. Why your friends have more friends than you do. The American Journal of Sociology, 96(6):1464–1477, May 1991.
  • Jacob Feldman. Minimization of boolean complexity in human concept learning. Nature, 407:630–633, October 2000.
  • Jacob Feldman. An algebra of human concept learning. Journal of Mathematical Psychology, 50(4):339–368, August 2006.
  • Alan Feldstein and Peter Turner. Overflow, underflow, and severe loss of significance in floating-point addition and subtraction. IMA Journal of Numerical Analysis, 6(2):241–251, April 1986.
  • Massimo Felici. Observational Models of Requirements Evolution. PhD thesis, School of Informatics, University of Edinburgh, 2004.
  • William Feller. An Introduction to Probability Theory and its Applications. John Wiley & Sons, Inc, third edition, 1968.
  • Shuguang Feng, Shantanu Gupta, Amin Ansari, and Scott Mahlke. Shoestring: Probabilistic soft error reliability on the cheap. In Proceedings of the fifteenth edition of ASPLOS on Architectural support for programming languages and operating systems, ASPLOS'10, pages 385–396, March 2010.
  • Norman Fenton, Martin Neil, William Marsh, Peter Hearty, Łukasz Radliński, and Paul Krause. On the effectiveness of early life cycle defect prediction with Bayesian nets. Empirical Software Engineering, 13(5):499–537, October 2008.
  • Daniel V. Ferens and David S. Christensen. Calibrating software cost models to Department of Defense databases-A review of ten studies. ISPA Journal of Parametrics, XVIII(2):55–74, November 1998.
  • Christopher J. Ferguson and Moritz Heene. A vast graveyard of undead theories: Publication bias and psychological science's aversion to the Null. Perspectives on Psychological Science, 7(6):555–561, November 2012.
  • Pablo Fernández. Valuing real options: Frequently made errors. Working Paper n. 274855, Instituto de Estudios Superiores de la Empresa, Madrid, June 2001.
  • Ludovic Ferrand, Marc Brysbaert, Emmanuel Keuleers, Boris New, Patrick Bonin, Alain Méot, Maria Augustinova, and Christophe Pallier. Comparing word processing times in naming, lexical decision, and progressive demasking: evidence from Chronolex. frontiers in Psychology, 2(306), November 2011.
  • Scott Ferson, Jason O'Rawe, Andrei Antonenko, Jack Siegrist, James Mickley, Christian C. Luhmann, Kari Sentz, and Adam M. Finkel. Natural language of uncertainty: numeric hedge words. International Journal of Approximate Reasoning, 57:19–39, February 2015.
  • Robert G. Fichman and Chris F. Kemerer. Incentive compatibility and systematic software reuse. Journal of Systems and Software, 57(1):45–60, April 2001.
  • Antonio Filippin and Paolo Crosetto. A reconsideration of gender differences in risk attitudes. IZA DP No. 8184, The Institute for the Study of Labor, Bonn, May 2014.
  • Charles J. Fillmore. Topics in lexical semantics. In Roger W. Cole, editor, Current Issues in Linguistic Theory, pages 76–138. Indiana University Press, 1977.
  • Financial Accounting Standards Board. Statement of financial accounting standards no. 86. Technical report, Financial Accounting Foundation, August 1985.
  • Matthew Finifter. Towards evidence-based assessment of factors contributing to the introduction and detection of software vulnerabilities. Technical Report UCB/EECS-2013-49, Electrical Engineering and Computer Sciences, University of California at Berkeley, May 2013.
  • Eric Fischer. The evolution of character codes, 1874-1968. November 2002.
  • James Fisher and R. A. Hinde. The opening of milk bottles by birds. British Birds, 42(11):347–357, 1949.
  • J. C. Fisher and R. H. Pry. A simple substitution model of technological change. Technological Forecasting & Social Change, 3:75–88, April 1971-1972.
  • D. A. Fisher. A common programming language for the Department of Defense – background and technical requirements. Paper P-1191, Institute for Defense Analyses, Science and Technology Division, June 1976.
  • Philippe Flajolet and Robert Sedgewick. Analytic Combinatorics. Cambridge University Press, 2008.
  • Philippe Flajolet, Philippe Dumas, and Vincent Puyhaubert. Some exactly solvable models of urn process theory. In P. Chassaing, editor, Proceedings of Fourth Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities, pages 59–118, 2006.
  • Kenneth Flamm. Targeting the Computer. The Brookings Institution, Washington, D.C., 1987.
  • Kenneth Flamm. Creating the Computer. The Brookings Institution, Washington, D.C., 1988.
  • Kenneth Flamm. Measuring Moore's law: Evidence from price, cost, and quality indexes. Working Paper No. 24553, National Bureau of Economic Research, USA, April 2018.
  • David Flater and William F. Guthrie. A case study of performance degradation attributable to run-time bounds checks on C++ vector access. Journal of Research of the National Institute of Standards and Technology, 118(012):260–279, May 2013.
  • David Flater. Estimation of uncertainty in application profiles. NIST TN.1826, National Institute of Standards and Technology, April 2014.
  • David Flater. Screening for factors affecting application performance in profiling measurements. NIST Technical Note 1855, National Institute of Standards and Technology, October 2014.
  • Philip J. Fleming and John J. Wallace. How not to lie with statistics: The correct way to summarize benchmark results. Communications of the ACM, 29(3):218–221, March 1986.
  • Jonathan I. Flombaum, Justin A. Junge, and Marc D. Hauser. Rhesus monkeys (Macaca mulatta) spontaneously compute addition operations over large numbers. Cognition, 97(3):315–325, October 2005.
  • Benjamin Floyd, Tyler Santander, and Westley Weimer. Decoding the representation of code in the brain: An fMRI study of code review and expertise. In Proceedings of the 39th International Conference on Software Engineering, ICSE'17, pages 175–186, May 2017.
  • Bent Flyvbjerg, Mette Skamris Holm, and Søren L. Buhl. Underestimating costs in public works projects: Error or lie?. Journal of the American Planning Association, 68(3):279–295, June 2002.
  • Bent Flyvbjerg. How planners deal with uncomfortable knowledge: The dubious ethics of the American Planning Association. Cities, 32:157–163, June 2013.
  • Jerry Fodor. The Modularity of Mind: An Essay on Faculty Psychology. The MIT Press, 1983.
  • Robert A. Foley. An evolutionary and chronological framework for human social behaviour. Proceedings of the British Academy, 88:95–117, 1996.
  • Pedro Fonseca, Kaiyuan Zhang, Xi Wang, and Arvind Krishnamurthy. An empirical study on the correctness of formally verified distributed systems. In Proceedings of the Twelfth European Conference on Computer Systems, EuroSys'17, pages 328–343, April 2017.
  • Robert E. Fontana Jr. and Gary M. Decad. Moore's law realities for recording systems and memory storage components: HDD, tape, NAND, and optical. AIP Advances, 8(5):056506, May 2018.
  • Cecilia E. Ford and Sandra A. Thompson. Conditionals in discourse: A text-based study from English. In Elizabeth C. Traugott, Alice T. Meulen, Judy S. Reilly, and Charles A. Furguson, editors, On Conditionals, chapter 18, pages 353–372. Cambridge University Press, 1986.
  • Cirrus Foroughi and Ariel Dora Stern. Digital innovation with high costs of entry: Evidence from software-driven medical devices. HBS Working Paper #18-094, Harvard Business School, March 2018.
  • Jens Förster, E. Tory Higgins, and Amy Taylor Bianco. Speed/accuracy decisions in task performance: Built-in trade-off or separate strategic concerns?. Organizational Behavior and Human Decision Processes, 90(1):148–164, January 2003.
  • Jaroslav Fowkes and Charles Sutton. Parameter-free probabilistic API mining across GitHub. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2016, pages 254–265, November 2016.
  • Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts. Refactoring: Improving the Design of Existing Code. Addison–Wesley, 1999.
  • William B. Frakes, Christopher J. Fox, and Brian A. Nejmeh. Software Engineering in the Unix/C Environment. Prentice-Hall, Inc, 1991.
  • Shane Frederick, George Loewenstein, and Ted O'Donoghue. Time discounting: A critical review. Journal of Economic Literature, 40(2):351–401, June 2002.
  • Daniel P. Freedman and Gerald M. Weinberg. Handbook of Walkthroughs, Inspections, and Technical Reviews. Dorset House Publishing, 1990.
  • Philipp Alexander Freund and Nadine Kasten. How smart do you think you are? A meta-analysis on the validity of self-estimates of cognitive ability. Psychological Bulletin, 138(2):296–321, March 2011.
  • Andrei Frumusanu. The Samsung Exynos 7420 deep dive - Inside a modern 14nm SoC. Anantech news site, June 2015. http://www.anandtech.com/show/9330/exynos-7420-deep-dive/5.
  • Zachary P. Fry and Westley Weimer. A human study of fault localization accuracy. In Proceedings of the 2010 IEEE International Conference on Software Maintenance, ICSM'10, pages 1–10, April 2010.
  • Wai-Tat Fu and Wayne D. Gray. Memory versus perceptual-motor tradeoffs in a blocks world task. In Proceedings of the Twenty-second Annual Conference of the Cognitive Science Society, pages 154–159. Erlbaum, 2000.
  • Yasao Funami and M. H. Halstead. A software physics analysis of akiyama's debugging data. Technical Report CSD-TR 144, Purdue University, May 1975.
  • Benjamin M. Fung, Ke Wang, Rui Chen, and Philip S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4):1–53, June 2010.
  • Carlo A. Furia. Bayesian statistics in software engineering: Practical guide and case studies. In eprint arXiv:cs.SE/1608.06865, August 2016.
  • G. W. Furnas, T. K. Landauer, L. M. Gomez, and S. T. Dumais. Statistical semantics: Analysis of the potential performance of key-word information systems. The Bell System Technical Journal, 62(6):1753–1805, July-August 1983.
  • G. W. Furnas, T. K. Landauer, L. M. Gomez, and S. T. Dumais. The vocabulary problem in human-system communication. Communications of the ACM, 30(11):964–971, November 1987.
  • Takao Futagami, Masako Itoh, Yukihiro Mihara, Fusako Mitsuhashi, Hiroyasu Nishiyama, Masahiro Shukuguchi, Nobuyuki Tachi, Keisuke Toyama, Hiromi Obata, Yuga Ooizumi, Tatsuo Shimizu, and Sachie Takeichi. ESCR Embedded System development Coding Reference guide [C Language Edition]. Information-technology Promotion Agency, Japan, 2.0 edition, 2017.
  • Richard Futrell, Kyle Mahowald, and Edward Gibson. Large-scale evidence of dependency length minimization in 37 languages. PNAS, 112(33):10336–10341, August 2015.
  • Matthew T. Gailliot and Roy F. Baumeister. The physiology of willpower: Linking blood glucose to self-control. Personality and Social Psychology Review, 11(4):303–327, November 2007.
  • William A. Gale. Good-Turing smoothing without tears. Technical Report 94.5, AT&T Bell Laboratories, August 1994.
  • Keheliya Gallaba, Ali Mesbah, and Ivan Beschastnikh. Don't call us, we'll call you: Characterizing callbacks in JavaScript. In International Symposium on Empirical Software Engineering and Measurement, ESEM'15, pages 247–256, October 2015.
  • Keheliya Gallaba, Christian Macho, Martin Pinzger, and Shane McIntosh. Noise and heterogeneity in historical build data: An empirical study of Travis CI. In Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering, ASE'18, pages 87–97, September 2018.
  • Charles R. Gallistel, Stephen Fairhurst, and Peter Balsam. The learning curve: Implications of a quantitative analysis. PNAS, 101(36):13124–13131, September 2004.
  • C. R. Gallistel, Monika Krishan, Ye Liu, Reilly Miller, and Peter E. Latham. The perception of probability. Psychological Review, 121(1):96–123, January 2014.
  • Taghi Javdani Gandomani, Koh Tieng Wei, and Abdulelah Khaled Binhamid. A case study research on software cost estimation using experts' estimates, Wideband Delphi, and Planning Poker technique. International Journal of Software Engineering and Its Applications, 8(11):173–182, April 2014.
  • Anthony Gandy. The entry of established electronics companies into the early computer industry in the UK and USA. PhD thesis, London School of Economics and Political Science, 1992.
  • J. D. Gannon. An experimental evaluation of data type conversions. Communications of the ACM, 20(8):584–595, August 1977.
  • Zebao Gao, Yalan Liang, Myra B. Cohen, Atif M. Memon, and Zhen Wang. Making system user interactive tests repeatable: When and what should we control?. In Proceedings of the 37th International Conference on Software Engineering, ICSE'15, pages 55–65, May 2015.
  • Michael K. Gardner, E. Z. Rothkopf, Richard Lapan, and Toby Laferty. The word frequency effect in lexical decision: Finding a frequency-based component. Memory & Cognition, 15(1):24–28, 1987.
  • Michael R. Garman. The generalizability of private sector research on software project management in two USAF organizations: An exploratory study. Thesis (m.s.), Air Force Institute of Technology, USA, March 2003.
  • Robert Garner and Frederick (Rick) Dill. The legendary IBM 1401 data processing system. IEEE Solid-State Circuits Magazine, 2(1):28–39, January 2010.
  • Vahid Garousi, Markus Borg, and Markku Oivo. Cut to the chase: Revisiting the relevance of software engineering research. In eprint arXiv:cs.SE/1812.01395, December 2018.
  • Gartner. Worldwide smartphone sales. https://en.wikipedia.org/wiki/Mobile_operating_system, July 2017.
  • Joel Gascoigne. Introducing open salaries at buffer our transparent formula and all individual salaries buffer. company website, December 2013. https://open.buffer.com/introducing-open-salaries-at-buffer-including-our-transparent-formula-and-all-individual-salaries.
  • Bill Gates. Shell plans - iShellBrowser. Plaintiff's Exhibit 2151, JOE COMES, RILEY PAINT, INC., SKEFFINGON'S FORMAL WEAR, INC., PATRICIA ANNE LARSEN vs. MICROSOFT CORPORATION; IOWA District Court for Polk County, October 1994.
  • Donald C. Gause and Gerald M. Weinberg. Exploring Requirements: Quality before design. Dorset House Publishing, 1989.
  • Gregory Gay, Ajitha Rajan, Matt Staats, Michael Whalen, and Mats P. E. Heimdahl. The effect of program and model structure on the effectiveness of MC/DC test adequacy coverage. ACM Transactions on Software Engineering and Methodology, 25(3):25, August 2016.
  • Jonathan E. Gayek, Lutrell G. Long, Kim D. Bell, Rosemary M. Hsu, and Ronald K. Larson. Software cost and productivity model. Technical Report ATR-2004(8311)-1, Aerospace Corporation, February 2004.
  • Gcc releases. organization website, July 2019. https://gcc.gnu.org/releases.html.
  • Yujia Ge and Bin Xu. Dynamic staffing and rescheduling in software project management: A hybrid approach. PLoS ONE, 11(6):e0157104, June 2016.
  • Yorai Geffen and Shahar Maoz. On method ordering. In IEEE 24th International Conference on Program Comprehension, ICPC'16, pages 1–10, May 2016.
  • Wolfgang Gellerich, Markus Kosiol, and Erhard Ploedereder. Where does GOTO go to?. In Reliable Software Technology – Ada-Europe 1996, volume 1088 of LNCS, pages 385–395. Springer, 1996.
  • Susan A. Gelman and Ellen M. Markman. Categories and induction in young children. Cognition, 23:183–209, 1986.
  • Dedre Gentner and Susan Goldin-Meadow. Language In Mind: Advances in the Study of Language and Thought. The MIT Press, 2003.
  • Susan L. Gerhart and Lawrence Yelowitz. Observations of fallibility in applications of modern programming methodologies. IEEE Transactions on Software Engineering, SE-2(3):195–207, September 1976.
  • Martin Gerlach, Beatrice Farb, William Revelle, and Luís A. Nunes Amaral. A robust data-driven approach identifies four personality types across four large data sets. Nature Human Behaviour, 2(10):735–742, September 2018.
  • Daniel M. German and Jesús M. González-Barahona. An empirical study of the reuse of software licensed under the GNU general public license. In The 5th International Conference on Open Source Systems, OSS 2009, pages 185–198, June 2009.
  • Daniel M. German, Yuki Manabe, and Katsuro Inoue. A sentence-matching method for automatic license identification of source code files. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE'10, pages 437–446, April 2010.
  • Daniel M. German, Bram Adams, and Ahmed E. Hassan. Continuously mining distributed version control systems: An empirical study of how Linux uses git. Empirical Software Engineering, 21(1):260–299, February 2016.
  • Eric H. Gibbs, Geoffrey A. Munroe, Amy M. Zeman, and C. Tucker Cottingham. JANET SKOLD and DAVID DOSSANTOS, on behalf of themselves and all others similarly situated and the general public, v. INTEL CORPORATION, HEWLETT PACKARD COMPANY and DOES 1-50, case no. 1-05-CV-039231, filing #g-43414. Opinion, Superior court of the state of California for the county of Santa Clara, 2012.
  • Edward Gibson and James Thomas. Memory limitations and structured forgetting: The perception of complex ungrammatical sentences as grammatical. Language and Cognitive Processes, 14(3):225–248, 1999.
  • Edward Gibson. Linguistic complexity: locality of syntactic dependencies. Cognition, 68(1):1–76, August 1998.
  • Gerd Gigerenzer, Peter M. Todd, and The ABC Research Group. Simple Heuristics That Make Us Smart. Oxford University Press, 1999.
  • Gerd Gigerenzer, Stefan Krauss, and Oliver Vitouch. The null ritual: What you always wanted to know about significance testing but were afraid to ask. In D. Kaplan, editor, The Sage handbook of quantitative methodology for the social sciences, chapter 21, pages 391–408. Sage Publications, Inc, 2004.
  • Gerd Gigerenzer, Wolfgang Gaissmaier, Elke Kurz-Milcke, Lisa M. Schwartz, and Steven Woloshin. Helping doctors and patients make sense of health statistics. Psychological Science in the Public Interest, 8(2):53–96, April 2008.
  • Gerd Gigerenzer. Striking a blow for sanity in theories of rationality. In Mie Augier and James G. March, editors, Models of a man: Essays in memory of Herbert A. Simon, pages 389–409. The MIT Press, May 2004.
  • Gerd Gigerenzer. Rationality for Mortals-How People cope with Uncertainty. Oxford University Press, 2008.
  • Bruce Gilchrist and Richard E. Weber. Employment of trained computer personnel–A quantitative survey. In Proceedings of the Spring Joint Computer Conference, AFIPS'72, pages 641–648, May 1972.
  • James Gimpel. Software that checks software: The impact of PC-lint. IEEE Software, 31(1):15–19, January-February 2014.
  • Vittorio Girotto, Alberto Mazzocco, and Alessandra Tasso. The effect of premise order on conditional reasoning: a test of the mental model theory. Cognition, 63:1–28, 1997.
  • Moshe Givon, Vijay Mahajan, and Eitan Muller. Software piracy: Estimation of lost sales and the impact on software diffusion. Journal of Marketing, 59(1):29–37, January 1995.
  • T. James Glauthier. Computer time sharing: Its origins and development. Computers and Automation, 16(10):23–27, October 1967.
  • Arthur Glenberg. Few believe the world is flat: How embodiment is changing the scientific understanding of cognition. Canadian Journal of Experimental Psychology, 69(2):165–171, June 2015.
  • Fernand Gobet. Understanding Expertise: A Multi-disciplinary Approach. Palgrave, 2016.
  • D. R. Godden and A. D. Baddeley. Context-dependent memory in two natural environments: On land and underwater. British Journal of Psychology, 66(3):325–331, 1975.
  • M. W. Godfrey and Q. Tu. Evolution in open source software: A case study. In 16th International Conference on Software Maintenance, ICSM'00, pages 131–142, October 2000.
  • Michael W. Godfrey and Lijie Zou. Using origin analysis to detect merging and splitting of source code entities. IEEE Transactions on Software Engineering, 31(2):166–181, February 2005.
  • Amrit L. Goel. An experimental investigation into software reliability. Final Technical Report RADC-TR-88-213, CASE Center, Syracuse University, October 1988.
  • Mathieu Goeminne and Tom Mens. Towards a survival analysis of database framework usage in Java projects. In 31st International Conference on Software Maintenance and Evolution, ICSME 2015, pages 551–556, September-October 2015.
  • Swapna S. Gokhale and Robert E. Mullen. The marginal value of increased testing: An empirical analysis using four code coverage measures. Journal of the Brazilian Computer Society, 12(3):13–30, December 2006.
  • Michael M. Gold. A methodology for evaluating time-shared computer system usage. Technical report, Carnegie Mellon University, August 1967.
  • Matthew S. Goldberg and Anduin Touw. Statistical methods for learning curves and cost analysis. Technical Report CIMD0006870.A3/1Rev, The CNA Corporation, March 2003.
  • Ken Goldberg, Theresa Roeder, Dhruv Gupta, and Chris Perkins. Eigentaste: A constant time collaborative filtering algorithm. In Information Retrieval, 4, pages 133–151, July 2001.
  • Lewis R. Goldberg, John A. Johnson, Herbert W. Eber, Robert Hogan, Michael C. Ashton, C. Robert Cloninger, and Harrison G. Gough. The international personality item pool and the future of public-domain personality measures. Journal of Research in Personality, 40(1):84–96, 2006.
  • Lewis R. Goldberg. An alternative "description of personality": The big-five factor structure. Journal of Personality and Social Psychologs, 59(6):1216–12297, 1990.
  • Herman H. Goldstine and John von Neumann. Planning and coding of problems for an electronic computing instrument. Technical Report Part II, Volume 1-3, Institute for Advanced Study, Princeton, April 1947.
  • Philippe Golle. Revisiting the uniqueness of simple demographics in the US population. In Proceedings of the 5th ACM workshop on Privacy in electronic society, WPES'06, pages 77–80, October 2006.
  • Robert W. Gomulkiewicz. Enforcement of open source software licenses: The MDY trio's inconvenient compliations. Yale Journal of Law & Technology, 14:106–137, 2011.
  • Iran Rodrigues Gonzaga, Jr. Empirical studies on fine-grained feature dependencies. Thesis (m.s.), Universidade Federal de Alagoas, Instituto de Computação, August 2015.
  • Richard Gonzalez and George Wu. On the shape of the probability weighting function. Cognitive Psychology, 38(1):129–166, February 1999.
  • Jesús M. González-Barahona, Gregorio Robles, Israel Herraiz, and Felipe Ortega. Studying the laws of software evolution in a long-lived FLOSS project. Journal of Software: Evolution and Process, 26(7):589–612, July 2014.
  • Benjamin H. Good, Yves-Alexandre de Montjoye, and Aaron Clauset. The performance of modularity maximization in practical contexts. In eprint arXiv:physics.data-an/0910.0165v2, April 2010.
  • John Goodman. Lessons learned from seven Space Shuttle missions. NASA Contractor Report CR-2007-213697, Lyndon B. Johnson Space Center, January 2007.
  • Peter Goodridge, Jonathan Haskel, and Gavin Wallis. Estimating UK investment in intangible assets and intellectual property rights. Technical Report No. 2014/36, Intellectual Property Office, UK government, September 2014.
  • Google books ngram dataset. corporate website, 2015. http://storage.googleapis.com/books/ngrams/books/datasetsv2.html.
  • Anandasivam Gopal and Balaji R. Koka. The role of contracts on quality and returns to quality in offshore software development outsourcing. Decision Sciences, 41(3):491–516, August 2010.
  • Rahul Gopinath, Carlos Jensen, and Alex Groce. Code coverage for suite evaluation by developers. In Proceedings of the 36th International Conference on Software Engineering, ICSE'14, pages 72–82, June 2014.
  • Rahul Gopinath, Carlos Jensen, and Alex Groce. Mutations: How close are they to real faults?. In IEEE 25th International Symposium on Software Reliability Engineering, ISSRE'14, pages 189–200, November 2014.
  • Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, and Alex Groce. How hard does mutation analysis have to be, anyway?. In IEEE 26th International Symposium on Software Reliability Engineering, ISSRE'15, pages 216–227, November 2015.
  • Rahul Gopinath. On the Limits of Mutation Analysis. PhD thesis, Oregon State University, June 2017.
  • R. D. Gordon and M. H. Halstead. An experiment comparing Fortran programming times with the software physics hypothesis. Technical Report TR 167, Purdue University, October 1975.
  • Robert J. Gordon. The postwar evolution of computer prices. Working Paper No. 2227, National Bureau of Economic Research, USA, April 1987.
  • Katerina Goševa-Popstojanova, Margaret Hamill, and Ranganath Perugupalli. Large empirical case study of architecture-based software reliability. In Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering, ISSRE'05, pages 43–52, November 2005.
  • Mark Gottscho, Abde Ali Kagalwalla, and Puneet Gupta. Power variability in contemporary DRAMs. IEEE Embedded Systems Letters, 4(12):37–40, June 2012.
  • Mark Gottscho. ViPZonE: Exploiting DRAM power variability for energy savings in Linux x86-64. Thesis (m.s.), Electrical Engineering, UCLA, March 2014.
  • Sebastian Götz, Thomas Ilsche, Jorge Cardoso, Josef Spillner, Uwe Aßmann, Wolfgang Nagel, and Alexander Schill. Energy-efficient data processing at sweet spot frequencies. In OTM Workshops, 2014, pages 154–171, April 2014.
  • Georgios Gousios and Andy Zaidman. A dataset for pull-based development research. In Proceedings of the 11th Working Conference on Mining Software Repositories, MSR'14, pages 368–371, May 2014.
  • Georgios Gousios, Andy Zaidman, Margaret-Anne Storey, and Arie van Deursen. Work practices and challenges in pull-based development: The integrator's perspective. In Proceedings of the 37th International Conference on Software Engineering, ICSE'15, pages 358–368, May 2015.
  • Eugene M. Grabbe, Simon Ramo, and Dean E. Wooldridge. Handbook of Automation, Computation, and Control, Volume 2: Computers and Data Processing. John Wiley & Sons, Inc, 1959.
  • Robert B. Grady and Deborah L. Caswell. Software Metrics: Establishing a company-wide program. Prentice-Hall, Inc, 1987.
  • Paul Grady. Termination of the SIREN ICT project. Grant Thornton UK LLP, June 2014.
  • Arthur C. Graesser, Stanley B. Woll, Daniel J. Kowalski, and Donald A. Smith. Memory for typical and atypical actions in scripted activities. Journal of Experimental Psychology: Human Learning and Memory, 6(5):503–515, June 1980.
  • Stef Graillat, Fabienne Jézéquel, Romain Picot, François Févotte, and Bruno Lathuilière. Auto-tuning for floating-point precision with discrete stochastic arithmetic. HAL Id: hal-01331917, HAL archives-ouvertes.fr, June 2016.
  • E. Eugene Grant and Harold Sackman. An exploratory investigation of programmer performance under on-line and off-line conditions. IEEE Transactions on Human Factors in Electronics, 8(1):33–48, March 1967.
  • Graphviz-graph visualization software. organization website, 2015. http://www.graphviz.org.
  • C. A. Graver, W. M. Carriere, E. E. Balkovich, and R. Thibodeau. Cost reporting elements and activity cost tradeoffs for defense system software (study results). Technical Report ESD-TR-77-262, Vol. 1, General Research Corporation, May 1977.
  • Wayne D. Gray, Chris R. Sims, Wai-Tat Fu, and Michael J. Schoelles. The soft constraints hypothesis: A rational analysis approach to resource allocation for interactive behavior. Psychological Review, 113(3):461–482, July 2006.
  • David Gray, David Bowes, Neil Davey, Yi Sun, and Bruce Christianson. The misuse of the NASA metrics data program data sets for automated software defect prediction. In 15th Annual Conference on Evaluation & Assessment in Software Engineering 2011, EASE 2011, pages 96–103, April 2011.
  • Kurt Gray, David G. Rand, Eyal Ert, Kevin Lewis, Steve Hershman, and Michael I. Norton. The emergence of "us and them" in 80 lines of code: Modeling group genesis in homogeneous populations. Association for Psychological Science, 25(4):982–990, April 2014.
  • Jim Gray, Chris Nyberg, Mehul Shah, and Naga Govindaraju. Sort benchmark. http://sortbenchmark.org, July 2014.
  • Mark Grechanik, Collin McMillan, Luca DeFerrari, Marco Comi, Stefano Crespi, Denys Poshyvanyk, Chen Fu, Qing Xie, and Carlo Ghezzi. An empirical investigation into a large-scale Java open source code repository. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'10, pages 11:1–11:10, September 2010.
  • Joseph H. Greenberg. Some universals of grammar with particular reference to the order of meaningful elements. In Joseph H. Greenberg, editor, Universals of Language, chapter 5, pages 58–90. The MIT Press, 1963.
  • Harry I. Greenfield. An economist looks at data processing. Computers and Automation, 6(10):18–23, October 1957.
  • Shane Greenstein. Did computer technology diffuse quickly?: Best and average practice in mainframe computers, 1968-1983. Working Paper No. 4647, National Bureau of Economic Research, USA, February 1994.
  • Chris Gregg and Kim Hazelwood. Where is the data? Why you cannot debate CPU vs. GPU performance without the answer. In IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS, pages 134–144, April 2011.
  • Paul Grice. Studies in the Way of Words. Harvard University Press, 1989.
  • David Alan Grier. The ENIAC, the verb "to program" and the emergence of digital computers. IEEE Annals of the History of Computing, 18(I):51–55, 1996.
  • David Alan Grier. When Computers were Human. Princeton University Press, 2005.
  • Stein Grimstad and Magne Jørgensen. Inconsistency of expert judgement-based estimates of software development effort. Journal of Systems and Software, 80(11):1770–1777, November 2007.
  • Charles M. Grinstead and J. Laurie Snell. Introduction to Probability. American Mathematical Society, second revised edition, 2006.
  • R. E. Griswold, J. F. Poage, and I. P. Polonsky. The SNOBOL 4 Programming Language. Prentice-Hall, Inc, second edition, 1968.
  • Edward Grochowski and Robert E. Fontana, Jr. Future technology challenges for NAND flash and HDD products. Flash Memory Summit 2012, Santa Clara, CA, July 2012.
  • Ulrike Grömping. Relative importance for linear regression in R: The package relaimpo. Journal of Statistical Software, 17(1):1–27, September 2006.
  • Ed H. B. M. Gronenschild, Petra Habets, Heidi I. L. Jacobs, Ron Mengelers, Nico Rozendaal, Jim van Os, and Machteld Marcelis. The effects of FreeSurfer version, workstation type, and Macintosh operating system version on anatomical volume and cortical thickness measurements. PLoS ONE, 7(6):e38234, June 2012.
  • H. R. J. Grosch. High speed arithmetic: The digital computer as a research tool. Journal of the Optical Society of America, 43(4):306–310, April 1953.
  • Andrew S. Grove. Only the Paranoid Survive: How to Exploit the Crisis Points That Challenge Every Company and Career. HarperCollinsBusines, April 1988.
  • Arnulf Grübler and Nebojsa Nakićenović. Long waves, technology diffusion, and substitution. Technical Report RP-91-17, International Institute for Applied Systems Analysis Laxenburg, Austria, October 1991.
  • Werner Gruhl. Lessons learned cost/schedule assessment guide. Slides of talk, July 199?
  • Martin Gubler. Protean and boundaryless career orientations - an empirical study of IT professionals in Europe. PhD thesis, Loughborough University, July 2011.
  • Theresa Gue. Triggering infection: Distribution and derivative works under the GNU general public license. Journal of Law, Technology & Policy, 2012(1):95–140, 2012.
  • Latifa Guerrouj, Massimiliano Di Penta, Yann-Gaël Guéhéneuc, and Giuliano Antoniol. An experimental investigation on the effects of context on source code identifiers splitting and expansion. Empirical Software Engineering, 19(6):1706–1753, December 2014.
  • A. Gunasekaran, E. W. T. Ngai, and R. E. McGaughey. Information technology and systems justification: A review for research and applications. European Journal of Operational Research, 173(3):957–983, September 2006.
  • Haryadi S. Gunawi, Cindy Rubio-González, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Ben L. Liblit. EIO: underline Error handling underline is underline Occasionally correct. In Proceedings of the 6th USENIX Conference on File and Storage Technologies, FAST'08, pages 207–222, February 2008.
  • Haryadi S. Gunawi, Mingzhe Hao, Tanakorn Leesatapornwongsa, Tiratat Patana-anake, Thanh Do, Jeffry Adityatama, Kurnia J. Eliazar, Agung Laksono, Jeffrey F. Lukman, Vincentius Martin, and Anang D. Satria. What bugs live in the cloud? A study of 3000+ issues in cloud systems. In Proceedings of the 5th ACM Symposium on Cloud Computing, SOCC'14, pages 1–14, November 2014.
  • Neil J. Gunther. A simple capacity model of massively parallel transaction systems. In Proceedings of the 19th International CMG Conference, pages 1035–1044, December 1993.
  • Neil J. Gunther. Analysing Computer System Performance with Perl::PDQ. Springer-Verlag, 2005.
  • Jianmei Guo, Krzysztof Czarnecki, Sven Apel, Norbert Siegmund, and Andrzej W k asowski. Variability-aware performance prediction: A statistical learning approach. In IEEE/ACM 28th International Conference on Automated Software Engineering, ASE'13, pages 301–311, November 2013.
  • Olga Gurevich, Matthew A. Johnson, and Adele E. Goldberg. Incidental verbatim memory for language. Language and Cognition, 2(1):45–78, May 2010.
  • Richard K. Guy. The strong law of small numbers. American Mathematical Monthly, 95(8):697–712, October 1988.
  • Elsayed A. E. Habib. Geometric mean for negative and zero values. International Journal of Research & Reviews in Applied Sciences, 11(3):419–432, June 2012.
  • Daniel Hackenberg, Robert Schöne, Thomas Ilsche, Daniel Molka, Joseph Schuchart, and Robin Geyer. An energy efficiency feature survey of the Intel Haswell processor. In International Parallel and Distributed Processing Symposium Workshop, IPDPSW 2015, pages 896–904, May 2015.
  • Hackerone. The 2018 hacker report. Technical report, hackerone, December 2017.
  • Jonathan Haidt. The Righteous Mind. Vintage books, 2012.
  • Steven Haine. As low as reasonably practicable (ALARP) risk-informed decision framework applied to public utility safety. Staff white paper, California Public Utilities Commission, December 2015.
  • Andrew G. Haldane and Richard Davies. The short long. Speech, May 2011. 29th Société Universitaire Européene de Recherches Financiéres Colloquium.
  • Axel Halin, Alexandre Nuttinck, Mathieu Acher, Xavier Devroey, Gilles Perrouin, and Benoit Baudry. Test them all, is it worth it? A ground truth comparison of configuration sampling strategies. In eprint arXiv:cs.SE/1710.07980, October 2017.
  • Torleif Halkjelsvik and Magne Jørgensen. Time Predictions: Understanding and Avoiding Unrealism in Project Planning and Everyday Life. Springer International Publishing AG, April 2018.
  • Bronwyn H. Hall and Megan MacGarvie. The private value of software patents. Research Policy, 39(7):994–1009, September 2010.
  • Tracy Hall, Sarah Beecham, David Bowes, David Gray, and Steve Counsell. A systematic literature review on fault prediction performance in software engineering. IEEE Transactions on Software Engineering, 38(6):1276–1304, November 2012.
  • M. H. Halstead and P. M. Zislis. Experimental verification of two theorems of software physics. Technical Report TR 97, Purdue University, June 1973.
  • M. H. Halstead. A theoretical relationship between mental work and machine language programming. Technical Report CSD-TR 67, Purdue University, February 1972.
  • David Z. Hambrick, Frederick L. Oswald, Erik M. Altmann, Elizabeth J. Meinz, Fernand Gobet, and Guillermo Campitelli. Deliberate practice: Is that all it takes to become an expert?. Intelligence, 45(1):34–45, July-August 2014.
  • Maggie Hamill and Katerina Goševa-Popstojanova. Exploring the missing link: an empirical study of software fixes. Software Testing, Verification and Reliability, 24(8):684–705, December 2014.
  • Michael T. Hannan and Glenn R. Carroll. Dynamics of Organizational Populations: Density, Legitimation, and Competition. Oxford University Press, January 1992.
  • Jo E. Hannay, Dag I. K. Sjøberg, and Tore Dybå. A systematic review of theory use in software engineering experiments. IEEE Transactions on Software Engineering, 33(2):87–107, February 2007.
  • Mor Harchol-Balter and Allen B. Downey. Exploiting process lifetime distributions for dynamic load balancing. Report No. UCB/CSD-95-887, Computer Science Division, University of California Berkeley, November 1995.
  • Dietmar Harhoff, Bronwyn H. Hall, Georg von Graevenitz, Karin Hoisl, Stefan Wagner, Alfonso Gambardella, and Paola Giuri. The strategic use of patents and its implications for enterprise and competition policies. Final Report ENTR/05/82, DG Enterprise, European Commission, July 2007.
  • Bruce R. Harmon and Neang I. Om. Schedule assessment methods for ballistic missile defense ground-based software development. IDA Paper P-3600, Institute for Defense Analyses, August 2003.
  • Nicolas Harrand, Simon Allier, Marcelino Rodriguez-Cancio, Martin Monperrus, and Benoit Baudry. A journey among Java neutral program variants. In eprint arXiv:cs.SE/1901.02533, January 2019.
  • Andrew Hart, Laura Maxim, Michael Siegrist, Natalie Von Goetz, Cristina da Cruz, Caroline Merten, Olaf Mosbach-Schulz, Majlinda Lahaniatis, Anthony Smith, and Anthony Hardy. Guidance on communication of uncertainty in scientific assessments. EFSA Journal, 17(1):5520, January 2019.
  • Tyler Harter, Chris Dragga, Michael Vaughn, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. A file is not a file: Understanding the I/O behavior of Apple desktop applications. ACM Transactions on Computer Systems, 30(3):10, August 2012.
  • Jonathan Haskel and Stian Westlake. Capitalism without Capital: The Rise of the Intangible Economy. Princeton University Press, 2018.
  • Hideaki Hata, Christoph Treude, Raula Gaikovina Kula, and Takashi Ishio. 9.6 million links in source code comments: Purpose, evolution, and decay. In eprint arXiv:cs.SE/1901.07440, January 2019.
  • Les Hatton. Safer C : Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill, 1995.
  • Les Hatton. Reexamining the fault density-component size connection. IEEE Software, 14(2):89–97, March 1997.
  • Les Hatton. How accurately do engineers predict software maintenance tasks?. Computer, 40(2):64–69, February 2007.
  • Marc D. Hauser, Susan Carey, and Lilan B. Hauser. Spontaneous number representation in semi-free-ranging rhesus monkeys. Proceedings of the Royal Society B: Biological Sciences, 267(1445):829–833, April 2000.
  • J. P. Haverty and R. L. Patrick. Programming languages and standardization in command and control. Research Memorandum RM-3447-PR, The RAND Corporation, January 1963.
  • Guy Hawkins, Scott D. Brown, Mark Steyvers, and Eric-Jan Wagenmakers. Context effects in multi-alternative decision making: Empirical data and a Bayesian model. Cognitive Science, 36(3):498–516, April 2012.
  • Guy E. Hawkins, Scott D. Brown, Mark Steyvers, and Eric-Jan Wagenmakers. An optimal adjustment procedure to minimize experiment time in decisions with multiple alternatives. Psychonomic Bulletin & Review, 19(2):339–348, April 2012.
  • D. M. Hawkins. Identification of Outliers. Springer, 1980.
  • John A. Hawkins. Efficiency and Complexity in Grammars. Oxford University Press, 2007.
  • Brian Hayes. Third base. American Scientist, 89(6):490–494, 2001.
  • Scott Hazelhurst. Truth in advertising: Reporting performance of computer programs, algorithms and the impact of architecture and systems environment. South African Computer Journal, 46:24–37, December 2010.
  • Stephany Head and Julianne Nelson. Data rights valuation in software acquisitions. Technical Report DRM-2012-001825-Final, CNA Analysis & Solutions, September 2012.
  • Megan L. Head, Luke Holman, Rob Lanfear, Andrew T. Kahn, and Michael D. Jennions. The extent and consequences of p-hacking in science. PLoS Biology, 13(3):e1002106, March 2015.
  • Andrew Heathcote, Scott Brown, and D. J. K. Mewhort. The power law repealed: The case for an exponential law of practice. Psychonomic Bulletin & Review, 7(2):185–207, April 2000.
  • Richard Heeks. The uneven profile of Indian software exports. Working Paper No. 3, University of Manchester, October 1998.
  • Jeffrey Heer and Michael Bostock. Crowdsourcing graphical perception: Using Mechanical Turk to assess visualization design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pages 203–212, April 2010.
  • K. Heinze, N. Claussen, and V. LaBolle. Management of computer programming for command and control systems: A survey. Technical Memorandum TM-903/000/02, System Development Corporation, Santa Monica, May 1963.
  • David H. Helmer, Scott Mackay, Katie Selvey-Clinton, Robert Yoon, and Hideaki Furukawa. Worldwide capital and fixed assets guide 2016. Technical Report EYG no. DL1528, EYGM Limited, 2016.
  • Dennis R. Helsel. Statistics for Censored Environmental Data using Minitab and R. John Wiley & Sons, second edition, 2012.
  • Armijn Hemel and Rainer Koschke. Reverse engineering variability in source code using clone detection-A case study for Linux variants of consumer electronic devices. In 19th Working Conference on Reverse Engineering, WCRE'12, pages 357–366, October 2012.
  • Mike Hendrickson. 2010 state of the computer book market. company website, February 2011. http://radar.oreilly.com/2011/02/2010-book-market-1.html.
  • Avishai Henik and Joseph Tzelgov. Is three greater than five: The relation between physical and semantic size in comparison tasks. Memory & Cognition, 10(4):389–395, 1982.
  • Joseph Henrich and Francisco J. Gil-White. The evolution of prestige: Freely conferred deference as a mechanism for enhancing the benefits of cultural transmission. Evolution and Human Behavior, 22(3):165–196, May 2001.
  • Joseph Henrich and Richard McElreath. Are peasants risk-averse decision makers?. Current Anthropology, 43(1):172–181, February 2002.
  • Joseph Henrich, Steven J. Heine, and Ara Norenzayan. The weirdest people in the world?. Working Paper No. 139, German Data Forum (RatSWD), April 2010.
  • Joseph Henrich, Maciej Chudek, and Robert Boyd. The big man mechanism: how prestige fosters cooperation and creates prosocial leaders. Philosophical Transactions of The Royal Society B, 370(1683), December 2015.
  • Joseph Henrich. How adaptive cultural processes can produce maladaptive losses–The Tasmanian case. American Antiquity, 69(2):197–214, April 2004.
  • Joseph Henrich. The evolution of costly displays, cooperation and religion: credibility enhancing displays and their implications for cultural evolution. Evolution and Human Behavior, 30(4):244–260, July 2009.
  • Joseph Henrich. The Weirdest People in the World: How the West Became Psychologically Peculiar and Particularly Prosperous. Allen Lane, September 2020.
  • Iñaki Heras-Saizarbitoria and Olivier Boiral. Symbolic adoption of ISO 9000 in small and medium-sized enterprises: The role of internal contingencies. International Small Business Journal, 33(3):299–320, May 2015.
  • Suzana Herculano-Houzel. The remarkable, yet not extraordinary, human brain as a scaled-up primate brain and its associated cost. PNAS, 109(1):10661–10668, June 2012.
  • Felienne Hermans and Emerson Murphy-Hill. Enron's spreadsheets and related emails: A dataset and analysis. In Proceedings of the 37th International Conference on Software Engineering-Volume 2, ICSE'15, pages 7–16, May 2015.
  • Trey Herr, Bruce Schneier, and Christopher Morris. Taking stock: Estimating vulnerability rediscovery. Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School, October 2017.
  • Israel Herraiz Tabernero. A statistical examination of the properties and evolution of libre software. PhD thesis, Universidad Rey Juan Carlos, October 2008.
  • Esther Herrmann, Josep Call, María Victoria Hernández-Lloreda, Brian Hare, and Michael Tomasello. Humans have evolved specialized skills of social cognition: The cultural intelligence hypothesis. Science, 317(5843):1360–1366, September 2007.
  • Reuben Hersh. 18 Unconventional Essays on the Nature of Mathematics. Springer, 2006.
  • Kim Herzig and Andreas Zeller. The impact of tangled code changes. In Proceedings of the 10th Working Conference on Mining Software Repositories, MSR'13, pages 121–130, May 2013.
  • Kim Herzig, Sascha Just, and Andreas Zeller. It's not a bug, it's a feature: How misclassification impacts bug prediction. In Proceedings of the 2013 International Conference on Software Engineering, ICSE'13, pages 392–401, May 2013.
  • Tim Hesterberg. What teachers should know about the bootstrap: Resampling in the undergraduate statistics curriculum. In eprint arXiv:stat.OT/1411.5279, November 2014.
  • Richards J. Heuer, Jr. Psychology of Intelligence Analysis. Central Intelligence Agency, 1999.
  • Martin Hicks, Claire O'Malley, Sarah Nichols, and Ben Anderson. Comparison of 2D and 3D representations for visualising telecommunication usage. Behaviour & Information Technology, 22(3):185–201, May 2003.
  • E. Tory Higgins. Value from regulatory fit. Current Directions in Psychological Science, 14(4):209–213, 2005.
  • Nicholas J. Higham. Accuracy and Stability of Numerical Algorithms. SIAM, 1996.
  • Martin Hilbert and Priscila López. Supporting online material for: The world's technological capacity to store, communicate, and compute information. Science, 332(6025):60–65, April 2011.
  • Benjamin Mako Hill and Andrés Monroy-Hernández. A longitudinal dataset of five years of public activity in the Scratch online community. Scientific Data, 4(170002), January 2017.
  • Theodore P. Hill. An evolutionary theory for the variability hypothesis. In eprint arXiv:q-bio.PE/1703.04184, August 2018.
  • Thomas T. Hills, Peter M. Todd, and Michael N. Jones. Foraging in semantic fields: How we search through memory. Topics in Cognitive Science, 7(3):513–534, July 2015.
  • Denis J. Hilton. The social context of reasoning: Conversational inference and rational judgment. Psychological Bulletin, 118(2):248–271, 1995.
  • Abram Hindle, Michael W. Godfrey, and Richard C. Holt. Reading beside the lines: Indentation as a proxy for complexity metrics. In The 16th IEEE International Conference on Program Comprehension, ICPC 2008, pages 133–142, June 2008.
  • Toshiki Hirao, Akinori Ihara, Yuki Ueda, Passakorn Phannachitta, and Ken ichi Matsumoto. The impact of a low level of agreement among reviewers in a code review process. In IFIP International Conference on Open Source Systems, OSS 2016, pages 97–110, May-June 2016.
  • Stephen C. Hirtle and John Jonides. Evidence for hierarchies in cognitive maps. Memory & Cognition, 13(3):208–217, 1985.
  • C. A. R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 12(10):576–583, October 1969.
  • Michal Hocko and Tomás Kalibera. Reducing performance non-determinism via cache-aware page allocation strategies. In Proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering, WOSP/SIPEW'10, pages 223–234, January 2010.
  • Andreas Höfer. Exploratory comparison of expert and novice pair programmers. Computing and Informatics, 29(1):73–91, 2010.
  • Eric Hoffer. The True Believer: Thoughts on the Nature of Mass Movements. HarperPerennial, 1951.
  • Donald D. Hoffman. Visual Intelligence: How We Create What We See. W. W. Norton, 2000.
  • Radosław Hofman. Behavioral Products Quality Assessment Model on the Software Market. PhD thesis, Poznan University of Economics, October 2011.
  • Johannes Hofmeister, Janet Siegmund, and Daniel V. Holt. Shorter identifier names take longer to comprehend. In 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, pages 217–227, February 2017.
  • Geert Hofstede. Culture's Consequences: International Differences in Work-Related Values. Sage Publications, abridged edition, 1984.
  • Robin M. Hogarth and Hillel J. Einhorn. Order effects in belief updating: The belief-adjustment model. Cognitive Psychology, 24(1):1–55, January 1992.
  • Robin M. Hogarth, Craig R. M. McKenzie, Brian J. Gibbs, and Margaret A. Marquis. Learning from feedback: Exactness and incentives. Journal of Experimental Psychology: Learning, Memory, & Cognition, 17(4):734–752, 1991.
  • Bernard D. Holbrook and W. Stanley Brown. A history of computing research at Bell Laboratories (1937-1975). Computing Science Technical Report No. 99, AT&T Bell Laboratories, 1982.
  • Mike Holdway. An alternative methodology: Valuing quality change for microprocessors in the PPI. In Issues in Measuring Price Change and Consumption. Bureau of Labor Statistics, June 2000.
  • Wade B. Holland. Soviet cybernetics technology: viii. Report on the algorithmic language ALGEC (final version). Research Memorandum RM-5136-PR, The RAND Corporation, December 1966.
  • John K. Hollmann. Estimate accuracy: Dealing with reality. Cost Engineering Journal, 54(6):17–27, November-December 2012.
  • Hood & Strong. Mozilla foundation and subsidiary december 31, 2015 and 2014. Independent auditors' report and consolidated financial statements, Hood & Strong LLC, November 2016.
  • Audrey A. Hook, Bill Brykczynski, Catherine W. McDonald, Sarah H. Nash, and Christine Youngblut. A survey of computer programming languages currently used in the Department of Defense. IDA Paper P-3054, Institute for Defense Analyses, January 1995.
  • R. Hoosain and F. Salili. Language differences, working memory, and mathematical ability. In M. M. Grunberg, P. E. Morris, and R. N. Sykes, editors, Practical aspects of memory: Current research and issues, volume 2, pages 512–517. John Wiley & Sons, Inc, 1988.
  • Rumjahn Hoosain. Correlation between pronunciation speed and digit span size. Perception and Motor Skills, 55:1128–1128, 1982.
  • Michael Hoppe and Stefan Hanenberg. Do developers benefit from generic types? An empirical comparison of generic and raw types in Java. In Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, OOPSLA'13, pages 457–474, October 2013.
  • William Hoppitt and Kevin N. Laland. Social Learning: An Introduction to Mechanisms, Methods, and Models. Princeton University Press, July 2013.
  • Wiebe Hordijk, Maria Laura Ponisio, and Roel Wieringa. Harmfulness of code duplication a structured review of the evidence. In 13th International Conference on Evaluation and Assessment in Software Engineering, EASE'09, pages 88–97, April 2009.
  • Vojtěch Horký. Performance Awareness in Agile Software Development. PhD thesis, Charles University, Faculty of Mathematics and Physics, March 2018.
  • Zachary Horne, Melis Muradoglu, and Andrei Cimpian. Explanation as a cognitive process. Trends in Cognitive Sciences, 23(3):187–199, March 2019.
  • Mark R. Horton. Portable C Software. Prentice-Hall, Inc, Upper Saddle River, NJ 07458, USA, 1990.
  • Sabine Hossenfelder. Lost in Math: How Beauty Leads Physics Astray. Basic Books, June 2018.
  • David A. Hounshell. From the American System to Mass Production 1800-1932: The Development of Manufacturing Technology in the United States. The Johns Hopkins University Press, 1984.
  • Allen D. Householder and Jonathan M. Foote. Probability-based parameter selection for black-box fuzz testing. Technical Note CMU/SEI-2012-TN-019, Software Engineering Institute, Carnegie Mellon University, August 2012.
  • Marc W. Howard and Michael J. Kahana. Context variability and serial position effects in free recall. Journal of Experimental Psychology: Learning, Memory, & Cognition, 25(4):923–941, 1999.
  • James Howison and James B. Herbsleb. Incentives and integration in scientific software production. In Proceedings of the 2013 conference on Computer supported cooperative work, CSCW'13, pages 459–470, March 2013.
  • Lovre Hribar, Sanja Bogovac, and Zdenko Marinčić. Implementation of fault slip through in design phase of the project. In miproBIS 2008: International Conference on Business Intelligence Systems, May 2008.
  • Hansen Hsu. The Appsmiths: Community, Identity, Affect and Ideology Among Cocoa Developers From NeXT to Iphone. PhD thesis, Graduate School of Cornell University, May 2015.
  • http archive. https:httparchive.org, July 2018.
  • Xunhe Huang, Jieru Xie, Newton O. Otecko, and Minsheng Peng. Accessibility and update status of published software: Benefits and missed opportunities. Frontiers in Research Metrics and Analytics, 2(doi.org/10.3389/frma.2017.00001), February 2017.
  • Bernardo A. Huberman. The dynamics of organizational learning. Computational & Mathematical Organization Theory, 7(2):145–153, August 2001.
  • Hennie Huijgens and Rini van Solingen. Measuring best-in-class software releases. In Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement, pages 137–146, October 2013.
  • Hennie Huijgens and Frank Vogelezang. Do estimators learn? On the effect of a positively skewed distribution of effort data on software portfolio productivity. Technical Report TUD-SERG-2016-004, Delft University of Technology, 2016.
  • John C. Hull. Options, Futures, and other Derivatives. Pearson, seventh edition, October 2010.
  • Charles Hulme, Sarah Maughan, and Gordon D. A. Brown. Memory for familiar and unfamiliar words: Evidence for a long-term memory contribution to short-term memory span. Journal of Memory and Language, 30(6):685–701, 1991.
  • Charles R. Hulten. Decoding Microsoft: Intangible capital as a source of company growth. Working Paper 15799, National Bureau of Economic Research, USA, March 2010.
  • Robert Hundt, Easwaran Raman, Martin Thuresson, and Neil Vachharajani. MAO-an extensible micro-architectural optimizer. In Proceedings of the 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization, CGO'11, pages 1–10, April 2011.
  • Sascha Hunold and Alexandra Carpen-Amarie. MPI benchmarking revisited: Experimental design and reproducibility. In eprint arXiv:cs.DC/1505.07734v3, September 2015.
  • Sascha Hunold, Alexandra Carpen-Amarie, and Jesper Larsson Träff. Reproducible MPI micro-benchmarking isn't as easy as you think. In Proceedings of the 21st European MPI Users' Group Meeting, EuroMPI/ASIA'14, pages 69–76, September 2014.
  • Earl Hunt. The Whorfian hypothesis: A cognitive psychology perspective. Psychological Review, 98(3):377–389, July 1991.
  • John E. Hunter, Frank L. Schmidt, and Michael K. Judiesch. Individual differences in output variability as a function of job complexity. Journal of Applied Psychology, 75(1):28–42, February 1990.
  • Mark J. Hurlstone, Graham J. Hitch, and Alan D. Baddeley. Memory for serial order across domains: An overview of the literature and directions for future research. Psychonomic Bulletin & Review, 140(2):229–373, March 2014.
  • Andy A. Hwang, Ioan A. Stefanovici, and Bianca Schroeder. Cosmic rays don't strike twice: Understanding the nature of DRAM errors and the implications for system design. In Proceedings of the seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVII, pages 111–122, March 2012.
  • Jinsang Hwang. The Social Shaping of ICTs Standards: A Case of National Coded Character Set Standards Controversy in Korea. PhD thesis, The University of Edinburgh, 2005.
  • Simona Ibba, Filippo Eros Pani, John Gregory Stockton, Giulio Barabino, Michele Marchesi, and Danilo Tigano. Incidence of predatory journals in computer science literature. Library Review, 66(6-7):505–522, September 2017.
  • IBM. Specifications for the IBM mathematical FORmula TRANSlating system, FORTRAN. Programming Research Group, Applied Science Division, International Business Machines Corporation, November 1954.
  • Roberto Ierusalimschy, Luiz Henrique de Figueiredo, and Waldemar Celes. The evolution of Lua. In Proceedings of the Third ACM SIGPLAN conference on History of Programming Languages, HOPL III, pages 1–26, June 2007.
  • Joonas Iivonen. Identifying and characterizing highly performing testers-A case study in three software product companies. Thesis (m.s.), Helsinki University of Technology, Department of Computer Science and Engineering, October 2009.
  • Shohei Ikeda, Akinori Ihara, Raula Gaikovina Kula, and Kenichi Matsumoto. An empirical study of README contents for JavaScript packages. IEICE Transactions on Information & Systems, E102-D(2):280–288, February 2019.
  • Yoshiharu Ikutani, Takatomi Kubo, Satoshi Nishida, Hideaki Hata, Kenichi Matsumoto, Kazushi Ikeda, and Shinji Nishimoto. Expert programmers have fine-tuned cortical representations of source code. In bioRxiv doi: 10.1101/2020.01.28.923953, January 2020.
  • Ineke Imbo and Jo-Anne LeFevre. Cultural differences in complex addition: Efficient Chinese versus adaptive Belgians and Canadians. Journal of Experimental Psychology: Learning, Memory, & Cognition, 35(6):1465–1476, November 2009.
  • Ineke Imbo, André Vandierendonck, and Evie Vergauwe. The role of working memory in carrying and borrowing. Psychological Research, 71(4):467–483, July 2007.
  • Information Technology Laboratory. National vulnerability database. https://nvd.nist.gov, December 2014.
  • Laura Inozemtseva and Reid Holmes. Coverage is not strongly correlated with test suite effectiveness. In Proceedings of the 36th International Conference on Software Engineering, ICSE'14, pages 435–445, June 2014.
  • Intel. 6th generation Intel processor family. Specification update 332689-010EN, Intel Corporation, April 2017.
  • International telecommunication union. corporate website, July 2012. http://www.itu.int.
  • John P. A. Ioannidis. Contradicted and initially stronger effects in highly cited clinical research. JAMA, 294(2):218–228, July 2005.
  • John P. A. Ioannidis. Why most published research findings are false. PLoS Medicine, 2(8):e124, August 2005.
  • Alexandru Iosup, Mathieu Jan, Ozan Sonmez, and Dick H. J. Epema. On the dynamic resource availability in grids. Rapport de recherche no 6172, Institut National de Recherche en Informatique et en Automatique, April 2007.
  • Gordon Irlam. Unix file size survey-1993. http://www.base.com/gordoni/ufs93.html, September 1993.
  • Francis Irving. Github users since service started. https://classic.scraperwiki.com/scrapers/github_users_each_year, March 2016.
  • ISO SC22. ISO/IEC 18009:1999 Information technology – Programming languages – Ada: Conformity assessment of a language processor. International Organization for Standardization, 1990. Last reviewed and confirmed in 2015.
  • ISO SC22. ISO/IEC 13210:1999 Information technology – Requirements and guidelines for test methods specifications and test method implementation for measuring conformance to POSIX standards. International Organization for Standardization, 1999.
  • ISO. ISO/IEC Guide 25:1990 General requirements for the competence of calibration and testing laboratories. International Organization for Standardization, 1990.
  • ISO. ISO/IEC 9945:2008 Information technology – Portable Operating System Interface (POSIX®). International Organization for Standardization, 2008.
  • Ayelet Israeli and Dror G. Feitelson. The Linux kernel as a case study in software evolution. Journal of Systems and Software, 83(3):485–501, March 2010.
  • Ravishankar Krishnan Iyer, Steven E. Butner, and Edward J. McCluskey. An exponential failure/load relationship: Results of a multi-computer statistical study. Technical Report #CRC-81-6, Computer Systems Laboratory, Stanford University, August 1981.
  • Javier Luis Cánovas Izquierdo and Jordi Cabot. A survey of software foundations in Open Source. In eprint arXiv:cs.SE/2005.10063.pdf, May 2020.
  • Mohamad Y. Jaber. Learning and forgetting models and their applications. In Adedeji B. Badiru, editor, Handbook of Industrial and Systems Engineering, chapter 30. CRC Press-Taylor & Francis Group, December 2005.
  • Peter Jackson. Opus Development Postmortem: JOE COMES, RILEY PAINT, INC., SKEFFINGON'S FORMAL WEAR, INC., PATRICIA ANNE LARSEN vs. MICROSOFT CORPORATION. Plaintiff's Exhibit 8875, IOWA District Court for Polk County, December 1989.
  • Andrew N. Jackson. Formats over time: Exploring UK web history. In eprint arXiv:cs.DL/1210.1714v1, October 2012.
  • Jay Jacobs and Bob Rudis. Data-Driven Security: Analysis, Visualization and Dashboards. John Wiley & Sons, Inc, 2014.
  • Rex Jaeschke. Portability and the C Language. Hayden Books, 4300 West 62nd Street, Indianapolis, IN 46268, USA, 1989.
  • Leah R. Jager and Jeffrey T. Leek. Empirical estimates suggest most published research is true. Biostatistics, 15(1):1–12, 2014.
  • Bjørn Jamtveit, Espen Jettestuen, and Joachim Mathiesen. Scaling properties of European research units. PNAS, 106(32):13160–13163, August 2009.
  • Yvonne Jansen and Kasper Hornbæk. A psychophysical investigation of size as a physical variable. IEEE Transactions on Visualization and Computer Graphics, 22(1):479–488, January 2016.
  • C. J. M. Jansen and M. M. W. Pollmann. On round numbers: Pragmatic aspects of numerical expressions. Journal of Quantitative Linguistics, 8(3):187–201, 2001.
  • Anthony R. Jansen, Kim Marriott, and Greg W. Yelland. Parsing of algebraic expressions by experienced users of mathematics. European Journal of Cognitive Psychology, 19(2):286–320, 2007.
  • Anthony Robert Jansen. Encoding and Parsing of Algebraic Expressions by Experienced Users of Mathematics. PhD thesis, School of Computer Science and Software Engineering, Monash University, January 2002.
  • J. J. Jenkins. Remember that old theory of memory? Well, forget it!. American Psychologist, 29(11):785–795, 1974.
  • Yujuan Jiang, Bram Adams, and Daniel M. German. Will my patch make it? And how fast? Case study on the Linux kernel. In Proceedings of the 10th Working Conference on Mining Software Repositories, MSR'13, pages 101–110, May 2013.
  • Jing Jiang, David Lo, Jiahuan He, Xin Xia, Pavneet Singh Kochhar, and Li Zhang. Why and how developers fork what from whom in GitHub. Empirical Software Engineering, 22(1):547–578, February 2017.
  • Philip M. Johnson and Anne M. Disney. A critical analysis of PSP data quality: Results from a case study. Empirical Software Engineering, 4(4):317–349, December 1999.
  • Dominic D. P. Johnson, Nils B. Weidmann, and Lars-Erik Cederman. Fortune favours the bold: An agent-based model reveals adaptive advantages of overconfidence in war. PLoS ONE, 6(6):e20851, April 2011.
  • W. Lewis Johnson. Intention-Based Diagnosis of Novice Programming Errors. Morgan Kaufmann Publishers, Inc, 1986.
  • Luanne Johnson. Applied data research inc. (ADR). Technical report, Computer History Museum, February 2010.
  • John A. Johnson. Measuring thirty facets of the Five Factor model with a 120-item public domain inventory: Development of the IPIP-NEO-120. Journal of Research in Personality, 51:78–89, August 2014.
  • Derek M. Jones and Renzo Borgatti. The Renzo Pomodoro dataset: a conversation. http://www.github.com/Derek-Jones/renzo-pomodoro, December 2019.
  • Derek M. Jones and Stephen Cullum. A conversation around the analysis of the SiP effort estimation dataset. In eprint arXiv:cs.SE/1901.01621, January 2019.
  • Michael N. Jones and D. J. K. Mewhort. Case-sensitive letter and bigram frequency counts from large-scale English corpora. Behavior Research Methods, Instruments, & Computers, 36(3):388–396, 2004.
  • Derek M. Jones. Who guards the guardians?. www.knosof.co.uk/whoguard.html, 1992.
  • Derek M. Jones. The Open Systems Portability Checker Reference Manual. Knowledge Software Ltd, ??? edition, May 1999.
  • Derek M. Jones. The 7±2 urban legend. MISRA C 2002 conference http://www.knosof.co.uk/cbook/misart.pdf, October 2002.
  • Derek M. Jones. Memory for a short sequence of assignment statements (part 2 of 2). C Vu, 17(1):34–37, February 2005.
  • Derek M. Jones. The new C Standard: An economic and cultural commentary. Knowledge Software, Ltd, 2005.
  • Dave Jones. Why userspace sucks–or 101 really dumb things your app shouldn't do. In Proceedings of the Linux Symposium, Volume One, pages 441–450, July 2006.
  • Derek M. Jones. Developer beliefs about binary operator precedence. C Vu, 18(4):14–21, August 2006.
  • Derek M. Jones. Operand names influence operator precedence decisions. C Vu, 20(1):5–11, February 2008.
  • Derek M. Jones. Developer characterization of data structure fields decisions. C Vu, 20(6):14–18, January 2009.
  • Derek M. Jones. Deciding between if and switch when writing code. C Vu, 21(5):14–20, November 2009.
  • Derek M. Jones. Effects of risk attitude on recall of assignment statements. C Vu, 23(6):19–22, January 2012.
  • Derek M. Jones. Birth month of compiler writers. blog: The Shape of Code, February 2012. http://shape-of-code.coding-guidelines.com.
  • Derek M. Jones. Amount of end-user usage of code in Firefox. blog: The Shape of Code, July 2013. http://shape-of-code.coding-guidelines.com/2013/07/26/amount-of-end-user-usage-of-code-in-firefox.
  • C. I. Jones. The facts of economic growth. In John B. Taylor and Harald Uhlig, editors, Handbook of Macroeconomics, Volume 2A, chapter 1, pages 3–69. Elsevier B. V., November 2016.
  • Derek M. Jones. Tag data extracted from stack overflow website. urlhttps://stackoverflow.com, July 2019.
  • Derek M. Jones. Evidence-based Software Engineering: based on the publicly available data. Self, October 2020.
  • Derek M. Jones. Code & data used in: Evidence-based software engineering: based on the publicly available data. http://www.github.com/Derek-Jones/ESEUR, 2020.
  • Robbert Jongeling, Proshanta Sarkar, Subhajit Datta, and Alexander Serebrenik. On negative results when using sentiment analysis tools for software engineering research. Empirical Software Engineering, 22(5):2543–2584, October 2017.
  • Marijn Remco Jongerden. Model-based energy analysis of battery powered systems. PhD thesis, Centre for Telematics and Information Technology, University of Twente, December 2010.
  • Magne Jørgensen and Gunnar J. Carelius. An empirical study of software project bidding. IEEE Transactions on Software Engineering, 30(12):953–969, December 2004.
  • Magne Jørgensen and Stein Grimstad. Software development estimation biases: The role of interdependence. IEEE Transactions on Software Engineering, 38(3):677–693, May 2012.
  • Magne Jørgensen and Kjetil Moløkken. Eliminating over-confidence in software development effort estimates. In Frank Bomarius and Hajimu Iida, editors, Product Focused Software Process Improvement, volume 3009 of Lecture Notes in Computer Science, pages 174–184. Springer Berlin Heidelberg, April 2004.
  • Magne Jørgensen and Kjetil Moløkken. Reasons for software effort estimation error: Impact of respondent role, information collection approach, and data analysis method. IEEE Transactions on Software Engineering, 30(12):993–1007, December 2004.
  • Magne Jørgensen and Kjetil Moløkken. How large are software cost overruns? A review of the 1994 CHAOS report. Journal Information and Software Technology, 48(4):297–301, April 2006.
  • Magne Jørgensen and Dag I. K. Sjøberg. The impact of customer expectation on software development effort estimates. International Journal of Project Management, 22(4):317–325, May 2004.
  • Magne Jørgensen and Dag I. K. Sjøberg. Learning from experience in a software maintenance environment. Journal of Computer Science, 1(4):538–542, April 2005.
  • Magne Jørgensen, Ulf Indahl, and Dag I. K. Sjøberg. Software effort estimation by analogy and "regression toward the mean". Journal of Systems and Software, 68(3):253–262, December 2003.
  • Magne Jørgensen, Tore Dybå, Knut Liestøl, and Dag I. K. Sjøberg. Incorrect results in software engineering experiments: How to improve research practices. Journal of Systems and Software, 116:133–145, June 2016.
  • Magne Jørgensen. An empirical study of software maintenance tasks. Software Maintenance: Research and Practice, 7(1):27–48, January 1995.
  • Magne Jørgensen. Regression models of software development effort estimation accuracy and bias. Empirical Software Engineering, 9(4):297–394, December 2004.
  • Magne Jørgensen. Unit effects in software project effort estimation: Work-hours gives lower effort estimates than workdays. Journal of Systems and Software, 117:274–281, July 2016.
  • Magne Jørgensen. Better selection of software providers through trialsourcing. IEEE Software, 33(5):48–53, September-October 2016.
  • Magne Jørgensen. A survey on the characteristics of projects with success in delivering client benefits. Information and Software Technology, 78:83–94, October 2016.
  • Damien Joseph, Wai Fong Boh, Soon Ang, and Sandra A. Slaughter. The career paths less (or more) travelled: A sequence analysis of IT career histories, mobility patterns, and career success. MIS Quarterly, 36(2):427–452, June 2012.
  • Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, and Taesoo Kim. Fuzzification: Anti-fuzzing techniques. In 28th USENIX Security Symposium, SEC'19, pages 1913–1930, August 2019.
  • Stefan Kahrs. Mistakes and ambiguities in the definition of standard ML. LFCS report ECS-LFCS-93-257, University of Edinburgh, Scotland, April 1993.
  • James W. Kalat. Biological Psychology. Wadsworth, seventh edition, 2001.
  • Tomás Kalibera, Lubomír Bulej, and Petr T ru ma. Benchmark precision and random initial state. In International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS'05, pages 853–862. Society for Modeling and Simulation (SCS), July 2005.
  • Andreas Kaltenbrunner, Vicenç Gómez, Ayman Moghnieh, Rodrigo Meza, Josep Blat, and Vicente López. Homogeneous temporal activity patterns in a large online communication space. In eprint arXiv:cs.NI/0708.1579, August 2007.
  • Christian Kaltenecker, Alexander Grebhahn, Norbert Siegmund, Jianmei Guo, and Sven Apel. Distance-based sampling of software configuration spaces. In Proceedings of the 41st International Conference on Software Engineering, ICSE'19, pages 1084–1094, May 2019.
  • Dan Kaminsky, Michael Eddington, and Adam Cecchetti. Showing how security has (and hasn't) improved, after ten years of trying. CanSecWest Applied Security Conference, December 2011.
  • Toshihiro Kamiya. How code skips over revisions. In Proceedings of the 5th International Workshop on Software Clones, IWSC 2011, pages 69–70, May 2011.
  • Vigdis By Kampenes, Tore Dybå, Jo E. Hannay, and Dag I. K. Sjøberg. A systematic review of effect size in software engineering experiments. Information and Software Technology, 49(11-12):1073–1086, April 2007.
  • P. Kampstra and C. Verhoef. Benchmarking the expected loss of a federal IT portfolio. July 2009.
  • P. Kampstra and C. Verhoef. Reliability of function point counts. http://www.cs.vu.nl/ x/rofpc/rofpc.pdf, 2009.
  • Tetsuya Kanda, Takashi Ishio, and Katsuro Inoue. Approximating the evolution history of software from source code. IEICE Transactions on Information & Systems, E98-D(6):1185–1193, June 2015.
  • Cem Kaner and David Pels. Bad Software: What To Do When Software Fails. John Wiley & Sons, Inc, 1998.
  • Cem Kaner. Liability for defective documentation. In Proceedings of the 21st annual International Conference on Documentation, SIGDOC'03, pages 192–197, October 2003.
  • Yuan Kang, Baishakhi Ray, and Suman Jana. APEx: Automated inference of error specifications for C APIs. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ASE'16, pages 472–482, September 2016.
  • Steven J. Karau and Kipling D. Williams. Social loafing: A meta-analytic review and theoretical integration. Journal of Personality and Social Psychologs, 65(4):681–706, October 1993.
  • Dimitris Karlis and Evdokia Xekalaki. Mixed Poisson distributions. International Statistical Review, 73(1):35–58, April 2005.
  • Joachim Karlsson and Kevin Ryan. A cost-value approach for prioritizing requirements. IEEE Software, 14(5):67–74, September 1997.
  • Daniel S. Katz, Kenton McHenry, Caleb Reinking, and Robert Haines. Research software development & management in universities: Case studies from Manchester's RSDS group, Illinois' NCSA, and Notre Dame's CRC. In eprint arXiv:cs.SE/1903.00732, March 2019.
  • Guy Kawasaki. Selling the Dream: How to Promote Your Product, Company, or Ideas–and Make a Difference–Using Everyday Evangelism. HarperBusiness, January 1991.
  • David Kawrykow and Martin P. Robillard. Non-essential changes in version histories. In Proceedings of the 33rd International Conference on Software Engineering, ICSE'11, pages 351–360, May 2011.
  • Maria Kazandjieva, Brandon Heller, Omprakash Gnawali, Philip Levis, and Christos Kozyrakis. Green enterprise computing data: Assumptions and realities. In Proceedings of the 2012 International Green Computing Conference, IGCC'12, pages 1–10, June 2012.
  • Mark Keil and Daniel Robey. Blowing the whistle on troubled software projects. Communications of the ACM, 44(4):87–93, April 2001.
  • Petr Keil, Joanne M. Bennett, Bérenger Bourgeois, Gabriel E. Garcá-Peña, A. Andrew M. MacDonald, Carsten Meyer, Kelly S. Ramirez, and Benjamin Yguel. From computer operating systems to biodiversity: co-emergence of ecological and evolutionary patterns. PNAS, 4:e2367, August 2016.
  • Frank C. Keil. Explanation and understanding. Annual Review of Psychology, 57:227–254, January 2006.
  • Chris F. Kemerer. An empirical validation of software cost estimation models. Communications of the ACM, 30(5):416–429, May 1987.
  • Zoltan Kenessey. The primary, secondary, tertiary and quaternary sectors of the economy. The Review of Income and Wealth, 33(4):359–385, December 1987.
  • David O. Kennedy and Andrew B. Scholey. Glucose administration, heart rate and cognitive performance: effects of increasing mental effort. Psychopharmacology, 149(1):63–71, May 2000.
  • Eamonn Keogh and Abdullah Mueen. Time series data mining using the matrix profile: A unifying view of motif discovery, anomaly detection, segmentation, classification, clustering and similarity joins. Tutorial at KDD 2017, August 2017.
  • Brian W. Kernighan and Rob Pike. The Practice of Programming. Addison–Wesley, 1999.
  • G. Jay Kerns. Introduction to Probability and Statistics Using R, second edition, May 2014.
  • Norbert L. Kerr. HARKing: Hypothesizing After the Results are Known. Personality and Social Psychology Review, 2(3):196–217, August 1998.
  • Emmanuel Keuleers, Paula Lacey, Kathleen Rastle, and Marc Brysbaert. The British lexicon project: Lexical decision data for 28,730 monosyllabic and disyllabic English words. Behavior and Research Methods, 44(1):287–304, March 2012.
  • Hammad Khalid, Meiyappan Nagappan, Emad Shihab, and Ahmed E. Hassan. Prioritizing the devices to test your app on: A case study of Android game apps. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pages 610–620, November 2014.
  • Lina M. Khan. Amazon's antitrust paradox. The Yale Law Journal, 126(3):710–805, January 2017.
  • Mel Win Khaw, Luminita Stevens, and Michael Woodford. Discrete adjustment to a changing environment: Experimental evidence. Journal of Monetary Economics, 91(C):88–103, 2017.
  • Paul-Virak Khuong and Pat Morin. Array layouts for comparison-based searching. In eprint arXiv:cs.DS/1509.05053, March 2017.
  • Peter D. Killworth and H. Russell Bernard. Informant accuracy in social network data. Human Organization, 35(3):269–286, September-November 1976.
  • Donghoon Kim, Emerson Murphy-Hill, Chris Parnin, Christian Bird, and Ronald Garciad. The reaction of open-source projects to new language features: An empirical study of C# generics. The Journal of Object Technology, 12(4):1–26, November 2013.
  • Jae Yun Kim, Steven Shepherd, Troy H. Campbell, and Aaron C. Kay. Understanding contemporary forms of exploitation: Attributions of passion serve to legitimize the poor treatment of workers. Journal of Personality and Social Psychology: Interpersonal Relations and Group Processes, 118(1):121–148, January 2020.
  • Hyojun Kim. Informed Storage Management for Mobile Platforms. PhD thesis, College of Computing, Georgia Institute of Technology, December 2012.
  • Sereyvuth Kim. The classification of information and communication technology investment in financial accounting. Thesis (m.s.), School of Information Technologies, University of Sydney, 2013.
  • J. Daniel Kim. Startup acquisitions as a hiring strategy: Worker choice and turnover. SSRN Working Paper 3252784, Wharton School, University of Pennsylvania, March 2020.
  • Kanako Kina, Masateru Tsunoda, Hideaki Hata, Haruaki Tamada, and Hiroshi Igaki. Analyzing the decision criteria of software developers based on prospect theory. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER'16, pages 644–648, March 2016.
  • Dan King and Chris Janiszewski. The sources and consequences of the fluent processing of numbers. Journal of Marketing Research, XLVIII(2):327–341, 2011.
  • Jonathan King and Marcel Adam Just. Individual differences in syntactic processing: The role of working memory. Journal of Memory and Language, 30:580–602, 1991.
  • Walter Kintsch and Janice Keenan. Reading rate and retention as a function of the number of propositions in the base structure of sentences. Cognitive Psychology, 5(3):257–274, November 1973.
  • W. Kintsch, E. Kozminsky, W. J. Streby, G. McKoon, and J. M. Keenan. Comprehension and recall of text as a function of content variables. Journal of Verbal Learning and Verbal Behavior, 14(2):196–214, April 1975.
  • Walter Kintsch, Theodore S. Mandel, and Ely Kozminsky. Summarizing scrambled stories. Memory & Cognition, 5(5):547–552, 1977.
  • Walter Kintsch. Comprehension: A paradigm for cognition. Cambridge University Press, 1998.
  • Kris N. Kirby and R. J. Herrnstein. Preference reversals due to myopic discounting of delayed reward. Psychological Science, 6(2):83–89, March 1995.
  • David Kirsh and Paul Maglio. On distinguishing epistemic from pragmatic action. Cognitive Science, 18(4):513–549, October 1994.
  • L. B. Kish. Moore's law and the energy requirement of computing versus performance. IEE Proceedings-Circuits, Devices and Systems, 151(2):190–194, April 2004.
  • Jóakim V. Kistowski, Hansfried Block, John Beckett, Klaus-Dieter Lange, Jeremy A. Arnold, and Samuel Kounev. Analysis of the influences on server power consumption and energy efficiency for CPU-intensive workloads. In Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, ICPE'15, pages 223–234, January 2015.
  • Shinobu Kitayama and Mayumi Karasawa. Implicit self-esteem in Japan: Name-letters and birthday numbers. Personality & Social Psychology Bulletin, 23(7):736–742, 1997.
  • Barbara A. Kitchenham and N. R. Taylor. Software project development cost estimation. The Journal of Systems and Software, 5(4):267–278, November 1985.
  • Barbara Kitchenham, Shari Lawrence Pfleeger, Beth McColl, and Suzanne Eagan. An empirical study of maintenance and development estimation accuracy. The Journal of Systems and Software, 64(1):57–77, October 2002.
  • Antero Kivi, Timo Smura, and Juuso Töyli. Technology product evolution and the diffusion of new product features. Technological Forecasting & Social Change, 79(1):107–126, January 2012.
  • David Klahr, William G. Chase, and Eugene A. Lovelace. Structure and process in alphabetic retrieval. Journal of Experimental Psychology: Learning, Memory, & Cognition, 9(3):462–477, 1983.
  • Karl Christoph Klauer, Jochen Musch, and Birgit Naumer. On belief bias in syllogistic reasoning. Psychological Review, 107(4):852–884, October 2000.
  • Joshua Klayman and Young-Won Ha. Confirmation, disconfirmation, and information in hypothesis testing. Psychological Review, 94(2):211–228, April 1987.
  • Stanley B. Klein, Leda Cosmides, John Tooby, and Sarah Chance. Decisions and the evolution of memory: Multiple systems, multiple functions. Psychological Review, 109(2):306–329, April 2002.
  • Burton Klein. The decision making problem in development. In Universities-National Bureau Committee for Economic Research, Committee on Economic Growth of the Social Science Research Council, editor, The Rate and Direction of Inventive Activity: Economic and Social Factors, chapter 19, pages 477–508. Princeton University Press, 1962.
  • Jon Kleinberg and Maithra Raghu. Team performance with test scores. In eprint arXiv:cs.DS/1506.00147v2, March 2018.
  • Sebastian Kleinschmager, Romain Robbes, Andreas Stefik, Stefan Hanenberg, and Éric Tanter. Do static type systems improve the maintainability of software systems? An empirical study. In 20th International Conference on Program Comprehension, ICPC'12, pages 153–162, June 2012.
  • Steven Klepper and Kenneth L. Simons. Technological extinctions of industrial firms: An inquiry into their nature and causes. Industrial and Corporate Change, 6(2):379–460, March 1997.
  • Paul Klint, Davy Landman, and Jurgen Vinju. Exploring the limits of domain model recovery. In 29th IEEE International Conference on Software Maintenance, ICSM'13, pages 120–129, September 2013.
  • Kenneth E. Knight. Changes in computer performance. Datamation, 12(9):40–54, September 1966.
  • Kenneth E. Knight. Evolving computer performance 1963-1967. Datamation, 14(1):31–35, January 1968.
  • Donald E. Knuth. The Art of Computer Programming: Sorting and Searching, volume 3. Addison–Wesley, first edition, 1973.
  • Donald E. Knuth. Structure programming with go to statements. Computing Surveys, 6(4):261–301, December 1974.
  • Donald E. Knuth. The errors of TeX . Software–Practice and Experience, 19(7):607–685, 1989.
  • Dmitry Kobak, Sergey Shpilkin, and Maxim S. Pshenichnikov. Integer percentages as electoral falsification fingerprints. In eprint arXiv:stat.AP/1410.6059v4, June 2016.
  • Andrew Koenig. C Traps and Pitfalls. Addison–Wesley, 1989.
  • Paul A. Kolers and David N. Perkins. Spatial and ordinal components of form perception and literacy. Cognitive Psychology, 7(2):228–267, April 1975.
  • Paul A. Kolers. Reading A year later. Journal of Experimental Psychology: Human Learning and Memory, 2(3):554–565, 1976.
  • Jonathan G. Koomey, Stephen Berard, Marla Sanchez, and Henry Wong. Implications of historical trends in the electrical efficiency of computing. IEEE Annals of the History of Computing, 33(3):46–54, July-September 2011.
  • Asher Koriat. How do we know that we know? The accessibility model of the feeling of knowing. Psychological Review, 100(4):609–639, October 1993.
  • A. Günes Koru, Khaled El Emam, Dongsong Zhang, Hongfang Liu, and Divya Mathew. Theory of relative defect proneness: Replicated studies on the functional form of the size-defect relationship. Empirical Software Engineering, 13(5):473–498, October 2008.
  • John Kossik. Clark's sector model for US economy 1850-2009. personal website, 2011. http://www.63alfred.com/whomakesit/clarksmodel.htm.
  • Stephen M. Kosslyn and Steven P. Shwartz. Empirical constraints on theories of visual imagery. In J. Long and A. D. Baddeley, editors, Attention and Performance IX, pages 241–260. Lawrence Erlbaum Associates, 1981.
  • Stephen M. Kosslyn. Graph Design for the Eye and Mind. Oxford University Press, 2006.
  • KPMG. Project Tesla due diligence assistance. submitted as evidence in Autonomy/HP court case, August 2011.
  • Philip Kraft. Programmers and Managers: The Routinization of Computer Programming in the United States. Springer-Verlag, July 1977.
  • Michael Kremer. The O-ring theory of economic development. The Quarterly Journal of Economics, 108(3):551–575, August 1993.
  • Elie Krevat, Joseph Tucek, and Gregory R. Ganger. Disks are like snowflakes: No two are alike. In Proceedings of the 13th USENIX conference on Hot topics in operating systems, HotOS'13, May 2013.
  • Filip Křikava, Heather Miller, and Jan Vitek. Scala implicits are everywhere: A large-scale study of the use of implicits in the wild. In eprint arXiv:cs.PL/1908.07883, August 2019.
  • Greg Kroah-Hartman. Linux kernel statistics. Github account, June 2016. https://www.github.com/gregkh/kernel-history.
  • John K. Kruschke. Human category learning: Implications for backpropagation models. Connection Science, 5(1):3–36, 1993.
  • John K. Kruschke. Dimensional relevance shifts in category learning. Connection Science, 8(2):225–247, June 1996.
  • Elmer C. Kubie. Recollections of the first software company. IEEE Annals of the History of Computing, 16(2):65–71, June 1994.
  • Michael Kubovy and Martin van den Berg. The whole is equal to the sum of its parts: A probabilistic model of grouping by proximity and similarity in regular patterns. Psychological Review, 115(1):131–154, January 2008.
  • Tomasz Kuchta, Thibaud Lutellier, Edmund Wong, Lin Tan, and Cristian Cadar. On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files. Empirical Software Engineering, 23(6):3187–3220, December 2018.
  • Max Kuhn and Kjell Johnson. Applied Predictive Modeling. Springer, 2013.
  • D. Richard Kuhn, Raghu N. Kacker, and Yu Lei. A model for t-way fault profile evolution during testing. In IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2017, pages 162–170, March 2017.
  • Bradley M. Kuhn, Free Software Foundation, Inc., Software Freedom Law Center, Anthony K. Sebro, Jr., Denver Gingerich, and Chestek Legal. Copyleft and the GNU General Public License: A Comprehensive Tutorial and Guide. copyleft.org, 2018.
  • Marco Kuhrmann, Claudia Konopka, Peter Nellemann, Philipp Diebold, and Jürgen Münch. Software process improvement: Where is the evidence?. In Proceedings of the 2015 International Conference on Software and System Process, pages 107–116, August 2015.
  • Sapna Kumar. Enforcing the GNU GPL. Journal of Law, Technology & Policy, 2006(1), 2006.
  • Rakesh Kumar. The business of scaling. IEEE Solid-State Circuits Society Newsletter, 12(1):22–26, 2007.
  • Gideon Kunda. Engineering Culture: Control and Commitment in a High-Tech Corporation. Temple University Press, 1992.
  • Peep Küngas, Svitlana Vakulenko, Marlon Dumas, Cristhian Parra, and Fabio Casati. Reverse-engineering conference rankings: What does it take to make a reputable conference?. Scientometrics, 96(2):651–665, August 2013.
  • Gerben Kunst. Language popularity. http://langpop.corger.nl/results, 2013.
  • Robert Kurzban, Angela Duckworth, Joseph W. Kable, and Justus Myers. An opportunity cost model of subjective effort and task performance. Behavioral and Brain Sciences, 36(6):661–679, December 2013.
  • Dana S. Kusumo, Mark Staples, Liming Zhu, and Ross Jeffery. Analyzing differences in risk perceptions between developers and acquirers in OTS-based custom software projects using stakeholder analysis. In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'12, pages 69–78, September 2012.
  • Amanda Kvarven, Eirik Strømland, and Magnus Johannesson. Comparing meta-analyses and preregistered multiple-laboratory replication projects. Nature Human Behaviour, 4(4):423–434, April 2020.
  • Cyril Labbé and Dominique Labbé. Duplicate and fake publications in the scientific literature: how many SCIgen papers in computer science?. HAL Id: hal-00641906, HAL archives-ouvertes.fr, July 2012.
  • Theodore Labiner. A big decision: Lease or buy?. Computers and Automation, 6(10):6–8, October 1957.
  • William Labov. The boundaries of words and their meaning. In Charles-James N. Bailey and Roger W. Shuy, editors, New ways of analyzing variation of English, pages 340–373. Georgetown Press, 1973.
  • William Labov. Principles of Linguistic Change, volume 3: Cognitive and Cultural Factors. Wiley-Blackwell, 2010.
  • Eva Labro and Lorien Stice-Lawrence. Updating accounting systems: Longitudinal evidence from the health care sector. Management Science, ???(???):???, April 2019.
  • Jeffrey C. Lagarias. The Kepler Conjecture: The Hales-Ferguson Proof by Thomas C. Hales Samuel P. Ferguson. Springer, 2010.
  • Kari Laitinen. Natural naming in software development and maintenance. PhD thesis, University of Oulu, Finland, October 1995.
  • George Lakoff and Mark Johnson. Metaphors We Live By. The University of Chicago Press, 1980.
  • Anthony LaMarca and Richard E. Ladner. The influence of caches on the performance of sorting. Journal of Algorithms, 31(1):66–104, April 1999.
  • Bruce L. Lambert, Ken-Yu Chang, and Prahlad Gupta. Effects of frequency and similarity neighborhoods on pharmacists' visual perception of drug names. Social Science and Medicine, 57(10):1939–1955, November 2003.
  • Oscar Perpiñán Lamigueiro. Displaying Time Series, Spatial, and Space-Time Data with R. CRC Press, 2014.
  • Ralf Lämmel, Ekaterina Pek, and Jürgen Starek. Large-scale, AST-based API-usage analysis of open-source Java projects. In Proceedings of the 2011 ACM Symposium on Applied Computing, SAC'11, pages 1317–1324, March 2011.
  • Butler W. Lampson. A critique of "an exploratory investigation of programmer performance under on-line and off-line conditions". IEEE Transactions on Human Factors in Electronics, 8(1):33–48, March 1967.
  • Thomas K. Landauer. How much do people remember? Some estimates of the quantity of learned information in long-term memory. Cognitive Science, 10:477–493, 1986.
  • Renée M. Landers, James B. Rebitzer, and Lowell J. Taylor. Rat race reduce: Adverse selection in the determination of work hours in law firms. The American Economic Review, 86(3):329–348, June 1996.
  • Davy Landman, Alexander Serebrenik, Eric Bouwers, and Jurgen J. Vinju. Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions. Journal of Software: Evolution and Process, 28(7):589–618, July 2016.
  • David Landy and Robert L. Goldstone. Proximity and precedence in arithmetic. The Quarterly Journal of Experimental Psychology, 63(10):1953–1968, October 2010.
  • David Landy, David Brookes, and Ryan Smout. Abstract numeric relations and the visual structure of algebra. Journal of Experimental Psychology: Learning, Memory, & Cognition, 40(5):1404–1418, September 2014.
  • David Landy, Arthur Charlesworth, and Erin Ottmar. Categories of large numbers in line estimation. Cognitive Science, 41(2):326–353, March 2017.
  • D. Landy, B. Guay, and T. Marghetis. Bias and ignorance in demographic perception. Psychonomic Bulletin & Review, 25(5):1606–1618, October 2018.
  • Ellen J. Langer. The illusion of control. Journal of Personality and Social Psychologs, 32(2):311–328, 1975.
  • Richard N. Langlois. External economies and economic progress: The case of the microcomputer industry. The Business History Review, 66(1):1–50, 1992.
  • LANL. LANL failure data. http://institute.lanl.gov/data/lanldata.shtml, 2006.
  • Liette Lapointe and Suzanne Rivard. A multilevel model of resistance to information technology implementation. MIS Quarterly, 29(3):461–492, September 2005.
  • Ian Larkin. The cost of high-powered incentives: Employee gaming in enterprise software sales. Technical Report 13-073, Harvard Business School, February 2013.
  • Craig Larman and Victor R. Basili. Iterative and incremental development: A brief history. Computer, 36(6):47–56, June 2003.
  • Jan Larres. Performance variance evaluation on Mozilla Firefox. Thesis (m.s.), Victoria University of Wellington, May 2012.
  • Richard H. Larson, John K. Salmon, Ron O. Dror, Martin M. Deneroff, Cliff Young, J.P. Grossman, Yibing Shan, John L. Klepeis, and David E. Shaw. High-throughput pairwise point interactions in Anton, a specialized machine for molecular dynamics simulation. In IEEE 14th International Symposium on High Performance Computer Architecture, HPCA 2008, pages 331–342, February 2008.
  • Bibb Latané and John M. Darley. Bystander "apathy". American Scientist, 57(2):244–269, June-September 1969.
  • Bibb Latané, Kipling Williams, and Stephen Harkins. Many hands make light the work: The causes and consequences of social loafing. Journal of Personality and Social Psychology, 37(6):822–832, 1979.
  • Roberto Latorre. Effects of developer experience on learning and applying unit test-driven development. IEEE Transactions on Software Engineering, 40(4):381–395, April 2014.
  • Patrick R. Laughlin. Group Problem Solving. Princeton University Press, April 2015.
  • Jan Laukemann, Julian Hammer, Johannes Hofmann, Georg Hager, and Gerhard Wellein. Automated instruction stream throughput prediction for Intel and AMD microarchitectures. In IEEE/ACM Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems, PMBS 2018, pages 121–131, November 2018.
  • Eero Laukkanen, Maria Paasivaara, Juha Itkonen, Casper Lassenius, and Teemu Arvonen. Towards continuous delivery by reducing the feature freeze period: A case study. In Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice Track, ICSE-SEIP'17, pages 23–32, May 2017.
  • Sven Laumer, Christian Maier, Andreas Eckhardt, and Tim Weitzel. Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence. European Journal of Information Systems, 25(4):317–343, July 2016.
  • L. Lauterbach. Development of N-version software samples for an experiment in software fault tolerance. NASA Contractor Report 178363, Software Research and Development Center for Digital Systems Research, September 1987.
  • Clifford W. Lazar. Lease/buy decisions for computer acquisition under conditions of uncertain technological change. In Proceedings–1968 ACM National Conference, pages 685–690, January 1968.
  • Edward Lazear and Michael Gibbs. Personnel Economics for Managers. John Wiley & Sons, Inc, second edition, 2007.
  • Christian Lebiere. The Dynamics of Cognition: An ACT-R Model of Cognitive Arithmetic. PhD thesis, Carnegie Mellon University, November 1998.
  • Pierre L'Ecuyer and Richard Simard. TestU01: A C library for empirical testing of random number generators. ACM Transactions on Mathematical Software, 33(4):1–22, August 2007.
  • Albert L. Lederer and Jayesh Prasad. Causes of inaccurate software development cost estimates. Journal of Systems and Software, 31(2):125–134, November 1995.
  • Benjamin C. Lee and David M. Brooks. Regression modeling strategies for microarchitecture performance and power prediction. Technical Report TR-08-06, Division of Engineering and Applied Sciences, Harvard University, March 2006.
  • Donghyuk Lee, Yoongu Kim, Gennady Pekhimenko, Samira Khan, Vivek Seshadri, Kevin Chang, and Onur Mutlu. Adaptive-latency DRAM: Optimizing DRAM timing for the common-case. In Proceedings of the IEEE International Symposium on High Performance Computer Architecture, HPCA'15, pages 489–501, February 2015.
  • Michael D. Lee, Kevin A. Gluck, and Matthew M. Walsh. Understanding the complexity of simple decisions: Modeling multiple behaviors and switching strategies. Decision, 6(4):335–368, October 2019.
  • Geoffrey Leech, Paul Rayson, and Andrew Wilson. Word Frequencies in Written and Spoken English. Pearson Education, 2001.
  • Lawrence M. Leemis and Jacquelyn T. McQueston. Univariate distribution relationships. American Statistical Association, 62(1):45–53, February 2008.
  • L. Lefebvre and N. J. Boogert. Avian social learning. In Michael D. Breed and Janice Moore, editors, Encyclopedia of Animal Behavior: volume 1, pages 124–130. Oxford: Academic Press, July 2010.
  • Jo-Anne LeFevre and Jing Liu. The role of experience in numerical skill: Multiplication performance in adults from Canada and China. Mathematical Cognition, 3(1):31–62, 1997.
  • Gordon E. Legge, Thomas A. Hooven, Timothy S. Klitz, J. Stephen Mansfield, and Bosco S. Tjan. Mr. Chips 2002: New insights from an ideal-observer model of reading. Vision Research, 42(18):2219–2234, August 2002.
  • Christopher Leggett. The Ford Pinto case: The valuation of life as it applies to the negligence-efficiency argument. https://users.wfu.edu/palmitar/Law&Valuation/Papers/1999/Leggett-pinto.html, 1999.
  • Darrin R. Lehman, Richard O. Lempert, and Richard E. Nisbett. The effects of graduate training on reasoning. American Psychologist, 43(6):431–442, 1988.
  • Laurent Lehmann, Kenichi Aoki, and Marcus W. Feldman. On the number of independent cultural traits carried by individuals and populations. Philosophical Transactions of The Royal Society B, 366(1563):424–435, February 2011.
  • Patrick Lemaire and Michel Fayol. When plausibility judgments supersede fact retrieval: The example of the odd-even effect on product verification. Memory & Cognition, 23(1):34–48, February 1995.
  • Peter Lennie. The cost of cortical computation. Current Biology, 13(6):493–497, March 2003.
  • Françoise Lequiller, Nadim Ahmad, Seppo Varjonen, William Cave, and Kil-Hyo Ahn. Report of the OECD task force on software measurement in the national accounts. STD/NA (2002)2, Organisation for Economic Co-operation and Development, September 2002.
  • Kristina Lerman, Xiaoran Yan, and Xin-Zeng Wu. The "majority illusion" in social networks. PLoS ONE, 11(2):e0147617, February 2016.
  • Kåre Letrud and Sigbjørn Hernes. Affirmative citation bias in scientific myth debunking: A three-in-one case study. PLoS ONE, 14(9):e0222213, September 2019.
  • David E. Levari, Daniel T. Gilbert, Timothy D. Wilson, Beau Sievers, David M. Amodio, and Thalia Wheatley. Prevalence-induced concept change in human judgment. Science, 360(6396):1465–1467, June 2018.
  • Bruce W. Leverett, Roderic G. G. Cattell, Steven O. Hobbs, Jospeh M. Newcomer, Andrew H. Reiner, Bruce R. Schatz, and William A. Wulf. An overview of the production-quality compiler-compiler project. Technical Report CMU-CS-79-105, Carnegie Mellon University, February 1979.
  • Pawel Lewicki, Thomas Hill, and Elizabeth Bizot. Acquisition of procedural knowledge about a pattern of stimuli that cannot be articulated. Cognitive Psychology, 20(1):24–37, January 1988.
  • Gregory Lewis and Patrick Bajari. Incentives and adaptation: Evidence from highway procurement in Minnesota. Working Paper 17647, National Bureau of Economic Research, USA, December 2011.
  • Andrew Colby Lewis. A study of idea generation over time. Thesis (m.s.), Georgia Institute of Technology, June 1972.
  • James R. Lewis. Evaluation of procedures for adjusting problem-discovery rates estimated from small samples. International Journal of Human-Computer Interaction, 13(4):445–479, December 2001.
  • Qiuying Li and Hoang Pham. A testing-coverage software reliability model considering fault removal efficiency and error generation. PLoS ONE, 12(7):e0181524, July 2017.
  • Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32(3):176–192, March 2006.
  • Li Li, Tegawendé F. Bissyandé, Yves Le Traon, and Jacques Klein. Accessing inaccessible Android APIs: An empirical study. In International Conference on Software Maintenance and Evolution, ICSME 2016, pages 411–422, October 2016.
  • Kai Li, Erjia Yan, and Yuanyuan Feng. How is R cited in research outputs? Structure, impacts, and citation standard. Journal of Informetrics, 11(4):989–1002, November 2017.
  • Li Li, Tegawendé F. Bissyandé, and Jacques Klein. MoonlightBox: Mining Android API histories for uncovering release-time inconsistencies. In IEEE 29th International Symposium on Software Reliability Engineering, ISSRE'18, pages 212–223, October 2018.
  • Xueheng Li, Lucas Molleman, and Dennie van Dolder. Conditional punishment: descriptive social norms drive negative reciprocity. Working Paper 3571220, Centre for Decision Research and Experimental Economics, University of Nottingham, May 2020.
  • Xiaodong Li. Soft Error Modeling and Analysis for Microprocessors. PhD thesis, University of Illinois at Urbana-Champaign, May 2008.
  • Yu Li. Empirical study of Python call graph. In 34th IEEE/ACM International Conference on Automated Software Engineering, ASE'19, pages 1274–1276, November 2019.
  • Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, Jose Moreira, and Manish Gupta. Filtering failure logs for a BlueGene/L prototype. In Proceedings of the International Conference on Dependable Systems and Networks, DSN'05, pages 476–485, June 2005.
  • Sarah Lichtenstein and Baruch Fischhoff. Do those who know more also know more about how much they know?. Organizational Behavior and Human Performance, 20:159–183, 1977.
  • Yossi Lichtenstein and Alan McDonnell. Pricing software development services. In European Conference on Information Systems, ECIS 2003, 2003.
  • Sarah Lichtenstein, Paul Slovic, Baruch Fischhoff, Mark Layman, and Barbara Combs. Judged frequency of lethal events. Journal of Experimental Psychology: Human Learning and Memory, 4(6):551–578, November 1978.
  • Christopher Lidbury, Andrei Lascu, Nathan Chong, and Alastair F. Donaldson. Many-core compiler fuzzing. In Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'15, pages 65–76, June 2015.
  • Gernot A. Liebchen and Martin Shepperd. Data sets and data quality in software engineering. In Proceedings of the 4th International workshop on Predictor Models in Software Engineering, PROMISE'08, pages 39–44, May 2008.
  • Jörg Liebig, Sven Apel, Chritian Lengauer, Christian Kästner, and Michael Schulze. An analysis of the variability in forty preprocessor-based software product lines. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1, ICSE'10, pages 105–114, May 2010.
  • Jörg Liebig, Alexander von Rhein, Christian Kästner, Sven Apel, Jens Dörre, and Christian Lengauer. Scalable analysis of variable software. In Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'13, pages 81–91, August 2013.
  • Falk Lieder, Thomas L. Griffiths, Quentin J. M. Huys, and Noah D. Goodman. The anchoring bias reflects rational use of cognitive resources. Psychonomic Bulletin & Review, 25(1):322–349, February 2018.
  • John H. Lienhard. How Invention Begins: Echoes of Old Voices in the Rise of New Machines. Oxford University Press, 2006.
  • Jennifer S. Light. When computers were women. Technology and Culture, 40(3):455–483, July 1999.
  • Soo Ling Lim, Peter J. Bentley, Natalie Kanakam, Fuyuki Ishikawa, and Shinichi Honiden. Investigating country differences in mobile app user behavior and challenges for software engineering. IEEE Transactions on Software Engineering, 41(1):40–64, January 2015.
  • Soo Ling Lim. Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation. PhD thesis, School of Computer Science and Engineering, University of New South Wales, August 2010.
  • Dien-Yen Lin and Iulian Neamtiu. Collateral evolution of applications and databases. In Proceedings of the joint International and annual ERCIM workshops on Principles of software evolution and Software Evolution workshops, IWPSE-Evol'09, pages 31–40, August 2009.
  • Lucien C. H. Lin and Navia Shen. GPL-3.0 in the Chinese intellectual property court in Beijing. International Free and Open Source Software Law Review, 10(1):1–7, 2018.
  • Bi Lin, Luca Ponzanelli, Andrea Mocci, Gabriele Bavota, and Michele Lanza. On the uniqueness of code redundancies. In IEEE/ACM 25th International Conference on Program Comprehension, ICPC'17, pages 121–131, May 2017.
  • Bin Lin, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza, and Rocco Oliveto. Sentiment analysis for software engineering: How far can we go?. In Proceedings of the 40th International Conference on Software Engineering, ICSE'18, pages 94–104, May-June 2018.
  • Mario Linares-Vásquez, Gabriele Bavota, Carlos Bernal-Cárdenas, Massimiliano Di Penta, Rocco Oliveto, and Denys Poshyvanyk. API change and fault proneness: A threat to the success of Android apps. In Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'13, pages 477–487, August 2013.
  • Kurt R. Linberg. Software developer perceptions about software project failure: a case study. The Journal of Systems and Software, 49(2–3):177–192, December 1999.
  • Kenneth Lind and Rogardt Heldal. A practical approach to size estimation of embedded software components. IEEE Transactions on Software Engineering, 38(5):993–1007, September-October 2012.
  • Raymond Lister, Elizabeth S. Adams, Sue Fitzgerald, William Fone, John Hamer, Morten Lindholm, Robert McCartney, Jan Erik Moström, Kate Sanders, Otto Seppälä, Beth Simon, and Lynda Thomas. A multi-national study of reading and tracing skills in novice programmers. ACM SIGCSE Bulletin, 36(4):119–150, December 2004.
  • Todd Little. Schedule estimation and uncertainty surrounding the cone of uncertainty. IEEE Software, 23(3):48–54, May 2006.
  • David C. Littman, Jeannine Pinto, Stanley Letovsky, and Elliot Soloway. Mental models and software maintenance. In Elliot Soloway and Sitharama Iyengar, editors, Empirical Studies of Programmers, chapter 6, pages 80–98. Ablex Publishing Corporation, 1986.
  • Simone Livieri, Yoshiki Higo, Makoto Matsushita, and Katsuro Inoue. Analysis of the Linux kernel evolution using code clone coverage. In Fourth International Workshop on Mining Software Repositories, MSR'07, pages 22–25, May 2007.
  • Gordon D. Logan. Shapes of reaction-time distributions and shapes of learning curves: A test of the instance theory of automaticity. Journal of Experimental Psychology: Learning, Memory, & Cognition, 18(5):883–914, 1992.
  • Cristina V. Lopes and Joel Ossher. How scale affects structure in Java programs. In eprint arXiv:cs.SE/1508.00628, August 2015.
  • Cristina V. Lopes, Petr Maj, Pedro Martins, Vaibhav Saini, Di Yang, Jakub Zitny, Hitesh Sajnani, and Jan Vitek. DéjàVu: A map of code duplicates on GitHub. In Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA'17, page 84, October 2017.
  • Irving Lorge and Herbert Solomon. Two models of group behavior in the solution of Eureka-type problems. Psychometrika, 20(2):139–148, June 1955.
  • Matej Lorko, Maroš Servátka, and Le Zhang. Anchoring in project duration estimation. Journal of Economic Behavior & Organization, 162:49–65, June 2019.
  • David D. Loschelder, Malte Friese, Michael Schaerer, and Adam D. Galinsky. The too-much-precision effect: When and why precise anchors backfire with experts. Psychological Science, 27(12):1573–1587, October 2016.
  • Rafael Lotufo, Steven She, Thorsten Berger, Krzysztof Czarnecki, and Andrzej W k asowski. Evolution of the Linux kernel variability model. In Proceedings of the 14th International Conference on Software Product Lines: going beyond, SPLC'10, pages 136–150, September 2010.
  • Panagiotis Louridas, Diomidis Spinellis, and Vasileious Vlachos. Power laws in software. ACM Transactions on Software Engineering and Methodology, 18(1):1–26, September 2008.
  • Lanyue Lu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Shan Lu. A study of Linux file system evolution. In 11th USENIX Conference on File and Storage Technologies, FAST'13, pages 31–44, February 2013.
  • Joseph David Lucente. On the Viability of Quantitative Assessment Methods in Software Engineering and Software Services. PhD thesis, School of Engineering and Computer Science, University of Denver, January 2015.
  • Lucia Lucia, David Lo, Lingxiao Jiang, Ferdian Thung, and Aditya Budi. Extended comprehensive study of association measures for fault localization. Journal of Software: Evolution and Process, 26(2):172–219, February 2014.
  • Lucia Lucia. Ranking-Based Approaches for Localizing Faults. PhD thesis, Singapore Management University, June 2014.
  • Kim Man Lui and Keith C. C. Chan. Pair programming productivity: Novice-novice vs. expert-expert. International Journal of Human-Computer Studies, 64(9):915–925, September 2006.
  • Aaron W. Lukaszewski, Michael Gurven, Christopher R. von Rueden, and David P. Schmitt. What explains personality covariation? A test of the socioecological complexity hypothesis. Social Psychological and Personality Science, 8(8):943–952, November 2017.
  • Paul Lukowicz, Ernst A. Heinz, Lutz Prechelt, and Walter F. Tichy. Experimental evaluation in computer science: A quantitative study. Technical Report 17/94, University of Karlsruhe, Germany, August 1994.
  • Andreas Lundqvist and Donjan Rodic. GNU/Linux distribution timeline. personal website, October 2012. http://futurist.se/gldt.
  • Maria Ilaria Lunesu. Process Software Simulation Model of Lean-Kanban Approach. PhD thesis, Department of Electrical and Electronic Engineering, University of Cagliari, April 2013.
  • Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, and Onur Mutlu. Characterizing application memory error vulnerability to optimize datacenter cost via heterogeneous-reliability memory. In Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 467–478, June 2014.
  • Alexander K. Luria. Towards the problem of the historical nature of psychological processes. International Journal of Psychology, 6(4):259–272, 1971.
  • A. R. Luria. The Mind of a Mnemonist. Penguin Education, 1975.
  • Benno Luthiger and Carola Jungwirth. Pervasive fun. First Monday, 12(1), January 2007.
  • Robyn Lutz. Analyzing software requirements errors in safety-critical, embedded systems. TR 92–27, Department of Computer Science, Iowa State University of Science and Technology, August 1992.
  • William J. Lynn III. A new approach for delivering information technology capabilities in the Department of Defense. Report to Congress, Office of the Secretary of Defense, November 2010.
  • Weiqin Ma, Jyh-Charn (Steve) Liu, and Alessandro Forin. Design and testing of a CPU emulator. Technical Report MSR-TR-2009-155, Microsoft Research, August 2009.
  • Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yuming Zhou, and Baowen Xu. How do developers fix cross-project correlated bugs? A case study on the GitHub scientific Python ecosystem. In IEEE/ACM 39th International Conference on Software Engineering, ICSE'17, pages 381–392, May 2017.
  • Frank MacCrory, Vidyanand Choudhary, and Alain Pinsonneault. Designing promotion ladders to mitigate turnover of IT professionals. Information Systems Research, 27(3):648–660, September 2016.
  • Neil Macdonald. Computing services survey. Computers and Automation, 7(7):9–12, July 1958.
  • Neil Macdonald. Computer Census 1962-74. Computers and People, 1974.
  • James N. MacGregor. Short-term memory capacity: Limitation or optimization?. Psychological Review, 94(1):107–108, January 1987.
  • Aravind Machiry, Rohan Tahiliani, and Mayur Naik. Dynodroid: An input generation system for Android apps. In Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'13, pages 224–234, August 2013.
  • Charles E. Mackenzie. Coded Character Sets, History and Development. Addison–Wesley, 1980.
  • I. Scott MacKenzie. Fitts' law as a research and design tool in human-computer interaction. International Journal of Human-Computer Interaction, 7(1):91–139, March 1992.
  • Donald MacKenzie. Computer-related accidental death: an empirical exploration. Science and Public Policy, 21(4):233–248, August 1994.
  • Raymond J. Madachy. Software Process Dynamics. John Wiley & Sons, Inc, 2008.
  • Angus Maddison. Business cycles, long waves and phases of capital development. In Angus Maddison, editor, Dynamic Forces in Capitalist Development: A Long-run Comparative View, chapter 4, page 85. Oxford University Press, October 1991.
  • W. Todd Maddox and Corey J. Bohil. Costs and benefits in perceptual categorization. Memory & Cognition, 28:597–615, 2000.
  • Mario Magidin and Elisa Viso. On the experiments in algorithm dynamics. Technical Report UAMR0853, Universidad Autónoma Metropolitana-Iztapalapa, México, October 1976.
  • Thomas Maillart, Mingyi Zhao, Jens Grossklags, and John Chuang. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. Journal of Cybersecurity, 3(2):81–90, June 2017.
  • Saman Majd and Robert S. Pindyck. Time to build, option value, and investment decisions. Journal of Financial Economics, 18(1):7–27, March 1987.
  • Valentin Makarov. 2016 Export of Russian software development industry. Annual Survey 13-th, RUSSOFT Association, August 2016.
  • Vladimir N. Makarow. SPEC benchmark page. http://vmakarov.fedorapeople.org/spec/index.html, July 2014.
  • Brian A. Malloy and James F. Power. Quantifying the transition from Python 2 to 3: An empirical study of Python applications. In International Symposium on Empirical Software Engineering and Measurement, ESEM'17, pages 314–323, December 2017.
  • Sayonnha Mandal, Robin Gandhi, and Harvey Siy. Modular norm models: practical representation and analysis of contractual rights and obligations. Requirements Engineering, 25(3):383–412, September 2020.
  • Marc Mangel and Francisco J. Samaniego. Abraham Wald's work on aircraft survivability. Journal of the American Statistical Association, 79(386):259–267, June 1984.
  • Manpower. Computers in offices. Studies No. 4, Manpower Research Unit, Ministry of Labour, G.B., 1965.
  • Marilyn M. Mantei and Toby J. Teorey. Cost/benefit analysis for incorporating human factors in the software lifecycle. Communications of the ACM, 31(4):428–438, April 1988.
  • Mika V. Mäntylä and Juha Itkonen. How are software defects found? The role of implicit defect detection, individual responsibility, documents, and knowledge. Information and Software Technology, 56(12):1597–1612, December 2014.
  • Aniruddha Marathe, Yijia Zhang, Grayson Blanks, Nirmal Kumbhare, Ghaleb Abdulla, and Barry Rountree. An empirical survey of performance and energy efficiency variation on Intel processors. In Proceedings of the 5th International Workshop on Energy Efficient Supercomputing, E2SC'17, pages 1–8, November 2017.
  • André Marchand. The power of an installed base to combat lifecycle decline: The case of video games. International Journal of Research in Marketing, 33(1):140–154, March 2016.
  • Michaël Marcozzi, Qiyi Tang, Alastair F. Donaldson, and Cristian Cadar. Compiler fuzzing: How much does it matter?. ACM Transactions on Programming Languages and Systems, 3:155, October 2019.
  • Julian N. Marewski and Lael J. Schooler. Cognitive niches: An ecological model of strategy selection. Psychological Review, 118(3):292–437, July 2011.
  • B. H. Margolin, R. P. Parmelee, and M. Schatzoff. Analysis of free-storage algorithms. IBM Systems Journal, 10(4):283–304, 1971.
  • Paul Marinescu, Petr Hosek, and Cristian Cadar. COVRIG: A framework for the analysis of code, test, and coverage evolution in real software. In Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA'14, pages 93–104, July 2014.
  • Florencia Marotta-Wurgler. What's in a standard form contract? An empirical analysis of software license agreements. Journal of Empirical Legal Studies, 7(4):677–713, December 2007.
  • Florencia Marotta-Wurgler. Will increased disclosure help? Evaluating the recommendations of the ALI's "principles of the law of software contracts". University of Chicago Law Review, 78(1), 2011.
  • Douglas Martin. An Empirical Analysis of GNU Make Feature Use in Open Source Projects. PhD thesis, School of Computing, Queen's University, Ontario, April 2017.
  • Félix Martineau. PNFG: A framework for computer game narrative analysis. Thesis (m.s.), School of Computer Science, McGill University, June 2006.
  • Matias Martinez and Martin Monperrus. Mining software repair models for reasoning on the search space of automated program fixing. In eprint arXiv:cs.SE/1311.3414v1, November 2013.
  • Antonio García Martínez. Chaos Monkeys: Inside The Silicon Valley Money Machine. Ebury Press, 2016.
  • Masaki Maruyama, Christophe Pallier, Antoinette Jobert, Mariano Sigman, and Stanislas Dehaene. The cortical representation of simple mathematical expressions. NeuroImage, 61(4):1444–1460, July 2012.
  • Eric Masanet, Arman Shehabi, Jiaqi Liang, Lavanya Ramakrishnan, XiaoHui Ma, Valerie Hendrix, Benjamin Walker, and Pradeep Mantha. The energy efficiency potential of cloud-based software: A U.S. case study. LBNL Paper LBNL-6298E, Lawrence Berkeley National Laboratory, June 2013.
  • E. J. Masicampo and Daniel R. Lalande. A peculiar prevalence of p values just below .05. The Quarterly Journal of Experimental Psychology, 65(11):2271–2279, August 2012.
  • Fabio Massacci, Stephen Neuhaus, and Viet Hung Nguyen. After-life vulnerabilities: A study on Firefox evolution, its vulnerabilities, and fixes. In Proceedings of the Third International Conference on Engineering secure software and systems, ESSoS'11, pages 195–208, February 2011.
  • Robert C. Masse, Chaofeng Liu, Yanwei Li, Liqiang Mai, and Guozhong Cao. Energy storage through intercalation reactions: electrodes for rechargeable batteries. National Science Review, 4(1):26–53, 2017.
  • Justin Matejka and George Fitzmaurice. Same stats, different graphs: Generating datasets with varied appearance and identical statistics through simulated annealing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI'17, pages 1290–1294, May 2017.
  • Bruno Gois Mateus and Matias Martinez. On the adoption, usage and evolution of Kotlin features on Android development. In eprint arXiv:cs.CS/1907.09003, July 2019.
  • Fabien Mathy, Mustapha Chekaf, and Nelson Cowan. Simple and complex working memory tasks allow similar benefits of information compression. Journal of Cognition, 1(31):1–12, May 2018.
  • Edgar Matias, I. Scott MacKenzie, and William Buxton. One-handed touch-typing on a QWERTY keyboard. International Journal of Human-Computer Interaction, 11:1–27, 1996.
  • Norman Matloff. R for programmers. http://heather.cs.ucdavis.edu/ matloff/R/RProg.pdf, December 2008.
  • Clemens Mayer, Stefan Hanenberg, Romain Robbes, Éric Tanter, and Andreas Stefik. An empirical study of the influence of static type systems on the usability of undocumented software. In Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA'12, pages 683–702, October 2012.
  • Davood Mazinanian, Ameya Ketkar, Nikolaos Tsantalis, and Danny Dig. Understanding the use of lambda expressions in Java. In Proceedings of the ACM on Programming Languages, OOPSLA'17, page 85, October 2017.
  • Abdelhafid Mazouz, Alexandre Laurent, Benoît Pradelle, and William Jalby. Evaluation of CPU frequency transition latency. Computer Science - Research and Development, 29(3-4):187–195, August 2014.
  • Abdelhafid Mazouz. An Empirical Study of Program Performance of OpenMP Applications on Multicore Platforms. PhD thesis, Université de Versailles-Saint Quentin en Yvelines, December 2013.
  • Mariana Mazzucato. Risk, variety and volatility in the PC industry: New economy or Early life-cycle?. In NY Federal Reserve Bank conference on "Productivity Growth: A New Era?", November 2001.
  • David F. McAllister and Mladen A. Vouk. Experiments in fault tolerant software reliability. Technical Report 5–NAG-1-667, North Carolina State University, April 1989.
  • Thomas J. McCabe. A complexity measure. IEEE Transactions on Software Engineering, SE-2(4):308–320, December 1976.
  • John C. McCallum. Historical cost of computer memory and storage. http://www.jcmit.com, July 2016.
  • Scott McCloud. Understanding Comics. HarperPerennial, 1993.
  • Steve McConnell. Code Complete. Microsoft Press, 1993.
  • Mark H. McCormack. The Terrible Truth about Lawyers. Beech Tree books, William Morrow, 1987.
  • Michael McCracken, Vicki Almstrum, Danny Diaz, Mark Guzdial, Dianne Hagan, Yifat Ben-David Kolikant, Cary Laxer, Lynda Thomas, Ian Utting, and Tadeusz Wilusz. A multi-national, multi-institutional study of assessment of programming skills of first-year CS students. ACM SIGCSE Bulletin, 33(4):125–180, June 2001.
  • Robert R. McCrae and Paul T. Costa, Jr. Reinterpreting the Myers-Briggs type indicator from the perspective of the five-factor model of personality. Journal of Personality, 57(1):17–40, March 1989.
  • B. D. McCullough and David A. Heiser. On the accuracy of statistical procedures in Microsoft Excel 2007. Computational Statistics & Data Analysis, 52:4570–4578, 2008.
  • B. D. McCullough. Microsoft Excel's 'Not The Wichmann-Hill' random number generator. Computational Statistics & Data Analysis, 52:4587–4593, 2008.
  • James Mcdonald. The impact of project planning team experience on software project cost estimates. Empirical Software Engineering, 10(2):219–234, April 2005.
  • Richard McElreath and Robert Boyd. Mathematical Models of Social Evolution: A Guide for the Perplexed. The University of Chicago Press, 2008.
  • Daniel McFadden. Rationality for economists?. Journal of Risk and Uncertainty, 19:73–105, 1999.
  • Robert William McGee. Accounting for Software in the United States. PhD thesis, School of Industrial and Business Studies, University of Warwick, April 1986.
  • Brendan McGonigle, Margaret Chalmers, and Anthony Dickinson. Concurrent disjoint and reciprocal classification by Cebus apella in seriation tasks: evidence for hierarchical organization. Animal Cognition, 6(3):185–197, September 2003.
  • Stephen McJohn. The GPL meets the UCC: Does free software come with a warranty of no infringement?. Journal of High Technology Law, XV(1):1–62, 2014.
  • Katherine B. McKeithen, Judith S. Reitman, Henry H. Rueter, and Stephen C. Hirtle. Knowledge organization and skill differences in computer programmers. Cognitive Psychology, 13(3):307–325, July 1981.
  • John McManus and Trevor Wood-Harper. Understanding the sources of information systems project failure: A study in IS project failure. Management Services, 51(3):38–43, August 2007.
  • Danielle S. McNamara and Joe Magliano. Toward a comprehensive model of comprehension. In Brian Ross, editor, The Psychology of Learning and Motivation, Vol. 51, chapter 9, pages 297–384. Academic Press, November 2009.
  • Timothy P. McNamara, James K. Hardy, and Stephen C. Hirtle. Subjective hierarchies in spatial memory. Journal of Experimental Psychology: Learning, Memory, & Cognition, 15(2):211–227, 1989.
  • James McNerney, J. Doyne Farmer, Sidney Redner, and Jessika E. Trancik. Role of design complexity in technology improvement. Proceedings of the National Academy of Sciences, 108(22):9008–9013, May 2011.
  • David L. McNicol. Influences on the timing and frequency of cancellations and truncations of major defense acquisition programs. IDA Paper P-8280, Institute for Defense Analyses, March 2017.
  • Ian McPhee. Customs' cargo management re-engineering project: Australian customs service. Audit Report No.24 2006-07, Australian National Audit Office, August 2007.
  • John H. McWhorter. The world's simplest grammars are creole grammars. Linguistic Typology, 5(2-3):125–166, 2001.
  • Alan D. Meacham. Data Processing Equipment Encyclopedia: Electronic Devices, volume 2. Gille Associates, Inc., 1962.
  • Francis Mechner. Probability relations within response sequences under ratio reinforcement. Journal of the Experimental Analysis of Behavior, 1(2):109–121, April 1958.
  • Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Sarah Nadi, and Rohit Gheyi. The love/hate relationship with the C preprocessor: An interview study. In Proceedings of the 29th. European Conference on Object-Oriented Programming, ECOOP'15, pages 495–518, July 2015.
  • Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, and Sven Apel. A comparison of 10 sampling algorithms for configurable systems. In eprint arXiv:cs.SE/1602.02052, February 2016.
  • Michael Meeks. German comments in LibreOffice. personal webpage, April 2017. https://people.gnome.org/ michael/data/2015-08-01-5.5-data.ods.
  • M. Meeter, J. M. J. Murre, and S. M. J. Janssen. Remembering the news: Modeling retention data from a study with 14,000 participants. Memory & Cognition, 33(5):793–810, July 2004.
  • Mojtaba Mehrara and Todd Austin. Exploiting selective placement for low-cost memory protection. ACM Transactions on Architecture and Code Optimization, 5(3):1–24, November 2008.
  • Lars Kirkholt Melhus and Rune Erlend Jensen. Measurement bias from address aliasing. In Eleventh International Workshop on Automatic Performance Tuning, iWAPT 2016, pages 1506–1515, May 2016.
  • Rômulo Meloca, Gustavo Pinto, Leonardo Baiser, Marco Mattos, Ivanilton Polato, Igor Scaliante Wiese, and Daniel M. German. Understanding the usage, impact, and adoption of non-OSI approved licenses. In Proceedings of the 15th International Conference on Mining Software Repositories, MSR'18, pages 270–280, May 2018.
  • Marc Mencher. Get in the Game! Careers in the Game Industry. New Riders Publishing, October 2002.
  • Diego Mendez, Benoit Baudry, and Martin Monperrus. Empirical evidence of large-scale diversity in API usage of object-oriented software. In International Conference on Source Code Analysis and Manipulation, SCAM'13, pages 43–52, April 2013.
  • Henok Mengistu, Joost Huizinga, Jean-Baptiste Mouret, and Jeff Clune. The evolutionary origins of hierarchy. PLoS Computational Biology, 12(6):e1004829, June 2016.
  • Hugo Mercier and Dan Sperber. Why do humans reason? Arguments for an argumentative theory. Behavioral and Brain Sciences, 34(2):57–111, April 2011.
  • Hugo Mercier and Dan Sperber. Why do humans reason? Arguments for an argumentative theory. HAL Id: hal-00904097, HAL archives-ouvertes.fr, November 2013.
  • Ralph C. Merkle. Energy limits to the computational power of the human brain. Foresight Update, 6, August 1989.
  • Edward W. Merrow, Lorraine McDonnel, and R. Wilmaz Argüden. Understanding the outcomes of megaprojects: A quantitative analysis of very large civilian projects. Report R-3560-PSSP, The RAND Corporation, March 1988.
  • Stephen Mertens and Christopher Baethge. The virtues of correct citation. Deutsches Ärzteblatt International, 108(33):550–552, April 2011.
  • Alex Mesoudi. Cultural evolution: A review of theory, findings and controversies. Evolutionary Biology, 43(4):481–497, December 2016.
  • Philip W. Metzger. Managing a Programming Project. Prentice-Hall, Inc, second edition, March 1981.
  • André N. Meyer, Laura E. Barton, Gail C. Murphy, Thomas Zimmermann, and Thomas Fritz. The work life of developers: Activities, switches and perceived productivity. IEEE Transactions on Software Engineering, 43(12):1178–1193, December 2017.
  • Leo A. Meyerovich and Ariel Rabkin. How not to survey developers and repositories: Experiences analyzing language adoption. In Proceedings of the Workshop on Evaluation and Usability of Programming Languages and Tools, PLATEAU'12, pages 7–16, October 2012.
  • Xianghang Mi, Ying Zhang, Feng Qian, and XiaoFeng Wang. An empirical characterization of IFTTT: Ecosystem, usage, and performance. In Proceedings of the 2017 Internet Measurement Conference, IMC'17, pages 398–404, November 2017.
  • Theodore Micceri. The unicorn, the normal curve, and other improbable creatures. Psychological Bulletin, 105(1):156–166, April 1989.
  • Sarah E. Michalak, Andrew J. DuBois, Curtis B. Storlie, Heather M. Quinn, William N. Rust, David H. DuBois, David G. Modl, Andrea Manuzzato, and Sean P. Blanchard. Assessment of the impact of cosmic-ray-induced neutrons on hardware in the Roadrunner supercomputer. IEEE Transactions on Device and Materials Reliability, 12(2):445–454, May 2012.
  • Jean-Baptiste Michel, Yuan Kui Shen, Aviva Presser Aiden, Adrian Veres, Matthew K. Gray, The Google Books Team, Joseph P. Pickett, Dale Hoiberg, Dan Clancy, Peter Norvig, Jon Orwant, Steven Pinker, Martin A. Nowak, and Erez Lieberman Aiden. Quantitative analysis of culture using millions of digitized books. Science, 14(6014):176–182, January 2011.
  • Microsoft server protocol documentation. corporate website, 2015. http://www.microsoft.com.
  • Stanley Milgram, Leonard Bickman, and Lawrence Berkowitz. Note on the drawing power of crowds of different size. Journal of Personality and Social Psychologs, 13(2):79–82, 1969.
  • Stanley Milgram. Obedience to Authority. McGraw-Hill, 1974.
  • Ali Mili, Senta Fowler Chmiel, Ravi Gottumukkala, and Lisa Zhang. Managing software reuse economics: An integrated ROI-based model. Annals of Software Engineering, 11(1):175–218, November 2001.
  • Koen Milis. Success factors for ICT projects: Empirical research, utilising qualitative and quantitative approaches (incl. Bayesian networks, Probabilistic feature models). PhD thesis, Toegepaste Economische Wetenschappen, Limburgs Universitair Centrum, December 2002.
  • George A. Miller and Stephen Isard. Free recall of self-embedded English sentences. Information and Control, 7:292–303, 1964.
  • Steven J. Miller and Mark J. Nigrini. Order statistics and Benford's law. International Journal of Mathematics and Mathematical Sciences, 2008, 2008. (doi:10.1155/2008/382948)
  • William R. Miller and Martha Sanchez-Craig. How to have a high success rate in treatment: advice for evaluators of alcoholism programs. Addiction, 91(6):779–785, April 1996.
  • George A. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. The Psychological Review, 63(2):81–97, March 1956.
  • L. A. Miller. Natural language programming: Styles, strategies, and contrasts. IBM Systems Journal, 29(2):184–215, 1981.
  • Douglas R. Miller. Exponential order statistic models of software reliability growth. NASA Contractor Report 3909, NASA Langley Research Center, July 1985.
  • Dennis M. Miller. Application of Halstead's timing model to predict the compilation time of Ada compilers. Thesis (m.s.), School of Engineering of the Air Force Institute of Technology, USA, December 1986.
  • Shusei Minakawa, Tadashi Hirata, Ken Masame, Hitoshi Okada, and Kinya Maruyama. A psychological analysis on the meaning of "reliance". Tohoku Psychologica Folia, 46(1-4):111–117, April 1987.
  • Carlos Hernández Mireles. Marketing Modeling for New Products. PhD thesis, Erasmus University, Rotterdam, June 2010.
  • MISRA. MISRA-C:2004 Guidelines for the Use of the C Language in Vehicle Based Software. Motor Industry Research Association, 2004.
  • MISRA. MISRA-C++:2008 Guidelines for the Use of the C++ Language in Critical Systems. Motor Industry Research Association, June 2008.
  • Ronald K. Mitchell, Bradley R. Agle, and Donna J. Wood. Toward a theory of stakeholder identification and salience: Defining the principle of who and what really counts. The Academy of Management Review, 22(4):853–886, October 1997.
  • Kyle E. Mitchell. The copyleft bust up: loopholes, licenses, and realpolitik in open source. blog: /dev/lawyer blog, November 2018. https://writing.kemitchell.com/2018/11/04/Copyleft-Bust-Up.html.
  • Konstantina Mitropoulou. Performance Optimizations for Compiler-based Error Detection. PhD thesis, School of Informatics, University of Edinburgh, October 2014.
  • Sparsh Mittal. A survey of architectural techniques for managing process variation. ACM Computing Surveys, 48(4), May 2016.
  • Sparsh Mittal. A survey of value prediction techniques for leveraging value locality. Concurrency and Computation: Practice and Experience, 29(21):e4250, November 2017.
  • Sparsh Mittal. A survey of techniques for dynamic branch prediction. In eprint arXiv:cs.AR/1804.00261, April 2018.
  • Michael Mitzenmacher. A brief history of generative models for power law and lognormal distributions. Internet Mathematics, 1(2):226–251, 2003.
  • Michael Mitzenmacher. Dynamic models for file sizes and double Pareto distributions. Internet Mathematics, 1(3):305–333, April 2004.
  • Elena Miu, Ned Gulley, Kevin N. Laland, and Luke Rendel. Innovation and cumulative culture through tweaks and leaps in online programming contests. Nature Communications, 9(2321), June 2018.
  • Ons Mlouki. On the detection of licenses violations in the Android ecosystem. Thesis (m.s.), Université de Montréal, April 2016.
  • Audris Mockus and Lawrence G. Votta. Identifying reasons for software changes using historic databases. In Proceedings of the International Conference on Software Maintenance, ICSM'00, pages 120–130, October 2000.
  • Audris Mockus and David M. Weiss. Predicting risk of software changes. Bell Labs Technical Journal, 5(2), April-June 2000.
  • Siba N. Mohanty. Software cost estimation: Present and future. Software–Practice and Experience, 11(2):103–121, February 1981.
  • Thomas Moher and G. Michael Schneider. Methods for improving controlled experimentation in software engineering. In Proceedings of the 5th International Conference on Software Engineering, ICSE'81, pages 224–233, March 1981.
  • Kjetil Moløkken-Østvold and Kristian Marius Furulund. The relationship between customer collaboration and software project overruns. In 2007 Agile Conference, AGILE'07, pages 72–83, August 2007.
  • Kjetil Moløkken-Østvold, Magne Jørgensen, Sinan S. Tanilkan, Hans Gallis, Anette C. Lien, and Siw E. Hove. A survey on software estimation in the Norwegian industry. In Proceedings 10th International Symposium on Software Metrics, pages 208–219, September 2004.
  • Carlos Montalvo, David Peck, and Elmer Rietveld. A longer lifetime for products: Benefits for consumers and companies. Study IP/A/IMCO/2015-11, Policy Department A: Economic and Scientific Policy, European Parliament, June 2016.
  • Gordon E. Moore. Cramming more components onto integrated circuits. Electronics, 38(8):114–117, April 1965.
  • Samuel K. Moore. The node is nonsense: There are better ways to measure progress than the old Moore's law. IEEE Spectrum, 57(8):25–30, August 2020.
  • T. J. H. Morgan, L. E. Rendell, M. Ehn, W. Hoppitt, and K. N. Laland. The evolutionary basis of human social learning. Proceedings of the Royal Society B: Biological Sciences, 279(1729):653–662, January 2012.
  • Allison C. Morgan, Dimitrios J. Economou, Samuel F. Way, and Aaron Clauset. Prestige drives epistemic inequality in the diffusion of scientific ideas. In eprint arXiv:cs.SI/1805.09966, October 2018.
  • F. L. Morris and C. B. Jones. An early program proof by Alan Turing. Annals of the History of Computing, 6(2):139–143, April 1984.
  • Richard J. Morrison, Robert E. Nolan, and James S. Devlin. Work Measurement in Machine Accounting: Controls, Incentives, Scheduling, and Costing Procedures. The Ronald Press Company, December 1963.
  • Stephen P. Morse, Bruce W Ravenel, Stanley Mazor, and William B. Pohlman. Intel microprocessors: 8008 to 8086. IEEE Computer, 13(10):42–60, October 1980.
  • Thomas Moscibroda and Rotem Oshman. Resilience of mutual exclusion algorithms to transient memory faults. In Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC'11, pages 69–78, June 2011.
  • Frederick Mosteller and Cleo Youtz. Quantifying probabilistic expressions. Statistical Science, 5(1):2–12, February 1990.
  • Corrado Motta. Analysing the evolution of system requirements – A case study of AUTOSAR at Volvo car group. Thesis (m.s.), Department of Computer Science and Engineering, Gothenburg, June 2016.
  • J. Frederick Motz. IN RE MICROSOFT CORPORATION ANTITRUST LITIGATION * SUN MICROSYSTEMS, INC. v. MICROSOFT CORPORATION. Opinion MDL 1332 * Civil No. JFM-02-2739, UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND, 2002.
  • Yannick Moy and Angela Wallenburg. Tokeneer: Beyond formal program verification. In Proceedings of the 5th International Congress on Embedded Real Time Software and Systems, ERTS2 2010, May 2010.
  • Shane T. Mueller and Adam Krawitz. Reconsidering the two-second decay hypothesis in verbal working memory. Journal of Mathematical Psychology, 53(1):14–25, February 2009.
  • Shane T. Mueller and Christoph T. Weidemann. Alphabetic letter identification: Effects of perceivability, similarity, and bias. Acta Psychologica, 139(1):19–37, January 2012.
  • Diane Mulcahy, Bill Weeks, and Harold S. Bradley. "we have met the enemy… and he is us" Lessons from twenty years of the Kauffman Foundation's investments in venture capital funds and the triumph of hope over experience. Report, Ewing Marion Kauffman Foundation, May 2012.
  • Charles W. Mulford and Sarika Misra. Capitalization of software development costs: Accounting practices in the software industry, 2014 and 2015. Technical report, Georgia Tech College of Management, January 2016.
  • Charles W. Mulford and Jack Roberts. Capitalization of software development costs: A survey of accounting practices in the software industry. Technical report, Georgia Tech College of Management, May 2006.
  • Matthias M. Müller and Andreas Höfer. The effect of experience on the test-driven development process. Empirical Software Engineering, 12(6):593–615, 2007.
  • Jessica Mulligan and Bridgette Patrovsky. Developing Online Games: An Insider's Guide. New Riders Publishing, 2003.
  • Enid Mumford. Job Satisfaction: A study of computer specialists. Longman Group Limited, October 1972.
  • Albert M. Munñiz Jr. and Hope Jensen Schau. Religiosity in the abandoned Apple Newton brand community. Journal of Consumer Research, 31(4):737–747, March 2005.
  • Demitri Muna, Michael Alexander, Alice Allen, Richard Ashley, Daniel Asmus, Ruyman Azzollini, Michele Bannister, Rachael Beaton, Andrew Benson, G. Bruce Berriman, Maciej Bilicki, Peter Boyce, Joanna Bridge, Jan Cami, Eryn Cangi, Xian Chen, Nicholas Christiny, Christopher Clark, Michelle Collins, Johan Comparat, Neil Cook, Darren Croton, Isak Delberth Davids, Éric Depagne, John Donor, Leonardo A. dos Santos, Stephanie Douglas, Alan Du, Meredith Durbin, Dawn Erb, Daniel Faes, J. G. Fernández-Trincado, Anthony Foley, Sotiria Fotopoulou, Søren Frimann, Peter Frinchaboy, Rafael Garcia-Dias, Artur Gawryszczak, Elizabeth George, Sebastian Gonzalez, Karl Gordon, Nicholas Gorgone, Catherine Gosmeyer, Katie Grasha, Perry Greenfield, Rebekka Grellmann, James Guillochon, Mark Gurwell, Marcel Haas, Alex Hagen, Daryl Haggard, Tim Haines, Patrick Hall, Wojciech Hellwing, Edmund Christian Herenz, Samuel Hinton, Renee Hlozek, John Hoffman, Derek Holman, Benne Willem Holwerda, Anthony Horton, Cameron Hummels, Daniel Jacobs, Jens Juel Jensen, David Jones, Arna Karick, Luke Kelley, Matthew Kenworthy, Ben Kitchener, Dominik Klaes, Saul Kohn, Piotr Konorski, Coleman Krawczyk, Kyler Kuehn, Teet Kuutma, Michael T. Lam, Richard Lane, Jochen Liske, Diego Lopez-Camara, Katherine Mack, Sam Mangham, Qingqing Mao, David J. E. Marsh, Cecilia Mateu, Loïc Maurin, James McCormac, Ivelina Momcheva, Hektor Monteiro, Michael Mueller, Roberto Munoz, Rohan Naidu, Nicholas Nelson, Christian Nitschelm, Chris North, Juan Nunez-Iglesias, Sara Ogaz, Russell Owen, John Parejko, Vera Patrıcio, Joshua Pepper, Marshall Perrin, Timothy Pickering, Jennifer Piscionere, Richard Pogge, Radek Poleski, Alkistis Pourtsidou, Adrian M. Price-Whelan, Meredith L. Rawls, Shaun Read, Glen Rees, Hanno Rein, Thomas Rice, Signe Riemer-Sørensen, Naum Rusomarov, Sebastian F. Sanchez, Miguel Santander-Garcıa, Gal Sarid, William Schoenell, Aleks Scholz, Robert L. Schuhmann, William Schuster, Peter Scicluna, Marja Seidel, Lijing Shao, Pranav Sharma, Aleksandar Shulevski, David Shupe, Cristóbal Sifón, Brooke Simmons, Manodeep Sinha, Ian Skillen, Bjoern Soergel, Thomas Spriggs, Sundar Srinivasan, Abigail Stevens, Ole Streicher, Eric Suchyta, Joshua Tan, O. Grace Telford, Romain Thomas, Chiara Tonini, Grant Tremblay, Sarah Tuttle, Tanya Urrutia, Sam Vaughan, Miguel Verdugo, Alexander Wagner, Josh Walawender, Andrew Wetzel, Kyle Willett, Peter K. G. Williams, Guang Yang, Guangtun Zhu, and Andrea Zonca. The Astropy problem. In eprint arXiv:astro-ph.IM/1610.03159, October 2016.
  • Bennet B. Murdoch, Jr. The serial position effect of free recall. Journal of Experimental Psychology, 64(5):482–488, 1962.
  • Emerson Murphy-Hill, Chris Parnin, and Andrew P. Black. How we refactor, and how we know it. In Proceedings of the 31st International Conference on Software Engineering, ICSE'09, pages 287–297, April 2009.
  • Elizabeth M. Murphy. In the matter of Knight Capital Americas LLC respondent. Order instituting administrative and cease-and-desist proceedings, pursuant to sections 15(b) and 21c of the securities exchange Act of 1934, making findings, and imposing remedial sanctions and a cease-and-desist order. Administrative Proceeding File No. 3-15570, Securities and Exchange Commission, October 2013.
  • Jaap M. J. Murre and Antonio G. Chessa. Power laws from individual differences in learning and forgetting: mathematical analyses. Psychonomic Bulletin & Review, 18(3):592–597, June 2011.
  • Jaap M. J. Murre and Joeri Dros. Replication and analysis of Ebbinghaus' forgetting curve. PLoS ONE, 10(7):e0120644, July 2015.
  • Paul Murrell. R Graphics. Chapman & Hall/CRC, 1st edition, 2006.
  • Michael Muthukrishna, Ben W. Shulman, Vlad Vasilescu, and Joseph Henrich. Sociality influences cultural complexity. Proceedings of the Royal Society B: Biological Sciences, 281(1774), November 2013.
  • Michael Muthukrishna, Joseph Henrich, Wataru Toyokawa, Takeshi Hamamura, Tatsuya Kameda, and Steven J. Heine. Overconfidence is universal? Elicitation of genuine overconfidence (EGO) procedure reveals systematic differences across domain, task knowledge, and incentives in four populations. PLoS ONE, 13(8):e0202288, August 2018.
  • L. H. Mutuel. Single event effects mitigation techniques report. Final Report DOT/FAA/TC-15/62, U.S. Department of Transportation, Federal Aviation Administration, February 2016.
  • Glenford J. Myers. A controlled experiment in program testing and code walkthroughs/inspections. Communications of the ACM, 21(9):760–768, September 1978.
  • Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, and Peter F. Sweeney. We have it easy, but do we have it right?. In International Symposium on Parallel and Distributed Processing, IPDPS 2008, pages 1–7, April 2008.
  • Todd Mytkowicz, Peter F. Sweeney, Matthias Hauswirth, and Amer Diwan. Observer effect and measurement bias in performance analysis. Technical Report CU-CS 1042-08, University of Colorado at Boulder, June 2008.
  • Nachiappan Nagappan, Andreas Zeller, Thomas Zimmermann, Kim Herzig, and Brendan Murphy. Change bursts as defect predictors. In IEEE 21st International Symposium on Software Reliability Engineering, ISSRE'10, pages 309–318, November 2010.
  • Meiyappan Nagappan, Thomas Zimmermann, and Christian Bird. Diversity in software engineering research. In Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'13, pages 466–476, August 2013.
  • Meiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus, and Ahmed E. Hassan. An empirical study of goto in C code from GitHub repositories. In Proceedings of the 10th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'15, pages 404–414, August-September 2015.
  • Phyllis M. Nagel and James A. Skrivan. Software reliability: Repetitive run experimentation and modeling. NASA Contractor Report 165836, Boeing Computer Services Company, Space and Military Applications Division, February 1982.
  • P. M. Nagel, F. W. Scholz, and J. A. Skrivan. Software reliability: Additional investigations into modeling with replicated experiments. NASA Contractor Report 172378, Boeing Computer Services Company, Space and Military Applications Division, June 1984.
  • Thomas Nagle, John Hogan, and Joseph Zale. The Strategy and Tactics of Pricing. Pearson, fifth edition, 2015.
  • James S. Nairne. The loss of positional certainty in long-term memory. Psychological Science, 3(2):199–202, May 1992.
  • James S. Nairne. Adaptive memory: Evolutionary constraints on remembering. In Brian H. Ross, editor, Psychology of Learning and Motivation, Volume 53, chapter 1, pages 1–32. Academic Press, June 2010.
  • Joe Nandhakumar and David E. Avison. The fiction of methodological development: a field study of information systems development. Information Technology & People, 12(2):176–191, February 1999.
  • Sebastian Nanz and Carlo A. Furia. A comparative study of programming languages in Rosetta Code. In eprint arXiv:cs.SE/1409.0252v1, August 2014.
  • Emal Nasseri. An Empirical Investigation of Inheritance Trends in Java OSS Evolution. PhD thesis, Department of Information Systems, Computing and Mathematics, Brunel University, June 2009.
  • Melvyn B. Nathanson. Desperately seeking mathematical truth. Notices of the AMS, 55(7):773–773, August 2008.
  • National Research Council. Setting Priorities for Large Research Facility Projects Supported by the National Science Foundation (2004). The National Academies Press, January 2004.
  • National Statistics, UK Office for. GFCF estimates for computer software purchases, own account computer software. ONS website, June 2017. http://www.ons.gov.uk/ons/rel/bus-invest/business-investment/index.html.
  • Peter Naur and Brian Randell. Software engineering report on a conference sponsored by the NATO science committee. Technical report, NATO, January 1969.
  • Anton D. Navarro and Edmund Fantino. The sunk cost effect in pigeons and humans. Journal of the Experimental Analysis of Behavior, 83(1):1–13, January 2005.
  • Daniel J. Navarro and Amy F. Perfors. Hypothesis generation, sparse categories, and the positive test strategy. Psychological Review, 118(1):120–134, January 2011.
  • Iulian Neamtiu, Jeffrey S. Foster, and Michael Hicks. Understanding source code evolution using abstract syntax tree matching. In Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR'05, pages 1–5, May 2005.
  • Iulian Gheorghe Neamtiu. Practical Dynamic Software Updating. PhD thesis, University of Maryland, College Park, August 2008.
  • Stas Negara, Mohsen Vakilian, Nicholas Chen, Ralph E. Johnson, and Danny Dig. Is it dangerous to use version control histories to study source code evolution?. In Proceedings of the 26th European conference on Object-Oriented Programming, ECOOP'12, pages 79–103, June 2012.
  • Douglas L. Nelson, Cathy L. McEvoy, and Thomas A. Schreiber. The university of South Florida word association, rhyme and word fragment norms. w3.usf.edu/FreeAssociation, 1998.
  • E. A. Nelson. Management handbook for the estimation of computer programming costs. Technical Documentary Report ESD-TDR-67-66, United States Air Force, L. G. Hanscom Field, Bedford, Massachusetts, October 1966.
  • David A. Nembhard and Napassavong Osothsilp. An empirical comparison of forgetting models. IEEE Transactions on Engineering Management, 48(3):283–291, August 2001.
  • Robert E. NeSmith II. A study of software maintenance costs of Air Force large scale computer systems. Thesis (m.s.), School of Systems and Logistics, Air Force Institute of Technology, USA, September 1986.
  • Daniel Nettle. Explaining global patterns of language diversity. Journal of Anthropological Archaeology, 17(4):354–374, December 1998.
  • Boris New, Ludovic Ferrand, Christophe Pallier, and Marc Brysbaert. Reexamining the word length effect in visual word recognition: New evidence from the English lexicon project. Psychonomic Bulletin & Review, 13(1):45–52, February 2006.
  • Alan Newell and Paul S. Rosenbloom. Mechanisms of skill acquisition and the power law of practice. Technical report, Carnegie Mellon University, August 1982.
  • Alan Newell. Unified Theories of Cognition. Harvard University Press, 1991.
  • Stephen E. Newstead and Kenny R. Coventry. The role of context and functionality in the interpretation of quantifiers. European Journal of Cognitive Psychology, 12(2):243–259, June 2000.
  • George Nezlek and Gerald DeHondt. An empirical investigation of gender wage differences in information systems occupations: 1991-2008. In Proceedings of the 43rd Hawaii International Conference on System Sciences–2010, HICSS, pages 4059–4068, January 2010.
  • Viet Hung Nguyen and Fabio Massacci. The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS'13, pages 493–498, May 2013.
  • Thanh H. D. Nguyen, Bram Adams, and Ahmed E. Hassan. A case study of bias in bug-fix datasets. In 17th Working Conference on Reverse Engineering, WCRE'10, pages 259–268, October 2010.
  • Tom Nicholas. VC: An American History. Harvard University Press, June 2019.
  • William R. Nichols, James D. McHale, David Sweeney, William Snavely, and Aaron Volkman. Composing effective software security assurance workflows. Technical Report CMU/SEI-2018-TR-004, Software Engineering Institute, Carnegie Mellon University, October 2018.
  • Travis Nichols. A penny saved: Psychological pricing. blog: Gumroad, October 2013. http://blog.gumroad.com/post/64417917582/a-penny-saved-psychological-pricing.
  • William Nichols. The end to the myth of "Individual Programmer Productivity". IEEE Software, 36(5):71–75, September-October 2019.
  • Andreas Nieder. The adaptive value of numerical competence. Trends in Ecology & Evolution, 35(7):605–617, July 2020.
  • Jakob Nielsen and Thomas K. Landauer. A mathematical model of the finding of usability problems. In Proceedings of the conference on Human factors in computing systems, INTERCHI'93, pages 206–213, April 1993.
  • Edmund B. Nightingale, John R. Douceur, and Vince Orgovan. Cycles, cells and platters: An empirical analysis of hardware failures on a million consumer PCs. In Proceedings of the sixth conference on Computer systems, EuroSys'11, pages 343–356, April 2011.
  • Mark J. Nigrini and Steven J. Miller. Data diagnostics using second order tests of Benford's law. Auditing: A Journal of Practice and Theory, 28(2):305–324, June 2009.
  • Dmitri E. Nikonov and Ian A. Young. Overview of beyond-CMOS devices and a uniform methodology for their benchmarking. In eprint arXiv:cond-mat.mes-hall/1302.0244, February 2013.
  • Jacques Ninio and Kent A. Stevens. Variations on the Hermann grid: an extinction illusion. Perception, 29(10):1209–1217, October 2000.
  • Richard E. Nisbett, David H. Krantz, Christopher Jepson, and Ziva Kunda. The use of statistical heuristics in everyday inductive reasoning. Psychological Review, 90(4):339–363, October 1983.
  • Simon Nørby. Why forget? On the adaptive value of memory loss. Perspectives on Psychological Science, 10(5):551–578, September 2015.
  • Peter V. Norden. Resource usage and network planning techniques. In Burton V. Dean, editor, Operations Research in Research and Development, chapter 5, pages 149–169. John Wiley & Sons, Inc, 1963.
  • William D. Nordhaus. The progress of computing. Cowles Foundation Discussion Paper No. 1324, Yale University, September 2001.
  • John A. Norton and Frank M. Bass. A diffusion theory model of adoption and substitution for successive generations of high-technology products. Management Science, 33(9):1069–1086, September 1987.
  • Martin A. Nowak and Karl Sigmund. Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573–577, June 1998.
  • Martin A. Nowak. Evolutionary Dynamics: Exploring the Equations of Life. The Belknap press of Harvard University press, 2006.
  • Damian Nowroth, Ilia Polian, and Bernd Becker. A study of cognitive resilience in a JPEG compressor. In IEEE International Dependable Systems and Networks With FTCS and DCC, DSN 2008, pages 32–41, June 2008.
  • Hans-Christoph Nuerk, Guilherme Wood, and Klaus Willmes. The universal SNARC effect: The association between number magnitude and space is amodal. Experimental Psychology, 52(3):187–194, 2005.
  • Yusuf Sulistyo Nugroho, Hideaki Hata, and Kenichi Matsumoto. How different are different diff algorithms in Git? Use –histogram for code changes. In eprint arXiv:cs.SE/1902.02467, July 2019.
  • Rafael E. Núñez. No innate number line in the human brain. Journal of Cross-Cultural Psychology, 42(4):651–668, 2011.
  • Jozef M. Nuttin, Jr. Affective consequence of mere ownership: The name letter effect in twelve European languages. European Journal of Social Psychology, 17:381–402, 1987.
  • NVIDIA. CUDA CUBLAS Library. NVIDIA Corporation, CA, USA, 3.1 edition, August 2010.
  • Arvid Nyman and Martin Eriksson Stamer. How to attract talented software developers: Developing a culturally differentiated employee value proposition. Thesis (m.s.), Department of Management and Engineering Industrial Economics, Linköpings universitet, 2013.
  • Mike Oaksford and Nick Chater. A rational analysis of the selection task as optimal data selection. Psychological Review, 101(4):608–631, October 1994.
  • Klaus Oberauer, Heinz-Martin Süß, Oliver Wilhelm, and Werner W. Wittmann. The multiple faces of working memory: Storage, processing, supervision, and coordination. Intelligence, 31(2):167–193, March-April 2003.
  • Klaus Oberauer, Stephan Lewandowsky, Edward Awh, Gordon D. A. Brown, Andrew Conway, Nelson Cowan, Christopher Donkin, Simon Farrell, Graham J. Hitch, Mark Hurlstone, Wei Ji Ma, Candice C. Morey, Derek Evan Nee, Judith Schweppe, Evie Vergauwe, and Geoff Ward. Benchmarks for models of short term and working memory. Psychological Bulletin, 144(9):885–958, September 2018.
  • M. Ochodek, J. Nawrocki, and K. Kwarciak. Simplifying effort estimation based on use case points. Information and Software Technology, 53(3):200–213, March 2011.
  • Oluwarotimi O. Odeh, Allen M. Featherstone, and Jason S. Bergtold. Reliability of statistical software. American Journal of Agricultural Economics, 92(5):1472–1489, September 2010.
  • OECD. OECD Digital Economy Outlook 2015. OECD Publishing, 2015.
  • Cody Ogden. Killed by Google. https://killedbygoogle.com, October 2020.
  • Sheilagh Ogilvie. The European Guilds: An Economic Analysis. Princeton University Press, February 2019.
  • Jeho Oh, Don Batory, Marijn Heule, Margaret Myers, and Paul Gazzillo. Uniform sampling from Kconfig feature models. Technical Report 19-02, The University of Texas at Austin, Department of Computer Science, 2019.
  • Stellan Ohlsson. The learning curve for writing books: Evidence from Professor Asimov. Psychological Science, 3(6):380–382, November 1992.
  • Marc Ohm, Henrik Plate, Arnold Sykosch, and Michael Meier. Backstabber's knife collection: A review of open source software supply chain attacks. In eprint arXiv:cs.CR/2005.09535, May 2020.
  • Hisashi Ohtsuki and Yoh Iwasa. How should we define goodness?–reputation dynamics in indirect reciprocity. Journal of Theoretical Biology, 231(1):107–120, November 2004.
  • Hisashi Ohtsuki, Christoph Hauert, Erez Lieberman, and Martin A. Nowak. A simple rule for the evolution of cooperation on graphs and social networks. Nature, 441(7092):502–505, May 2006.
  • Patrick Oladimeji. Devices, errors and improving interaction design-A case study using an infusion pump. Thesis (m.res.), Department of Computer Science, Swansea University, October 2008.
  • Adam Oliner and Jon Stearley. What supercomputers say: A study of five system logs. In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN'07, pages 575–584, June 2007.
  • David J. Olive. Applied robust statistics. http://lagrange.math.siu.edu/Olive/ol-bookp.htm, July 2008.
  • Paul Oliver. Experiences in building and using compiler validation systems. In R. Merwin and J. Zanca, editors, AFIPS Conference Proceedings, Volume 48, pages 1051–1057, June 1979.
  • Seamis O'Mahony. Can Medicine be Cured? The Corruption of a Profession. Head of Zeus Ltd, February 2019.
  • O*NET OnLine. organization website, July 2019. https://www.onetonline.org.
  • Open Group, The. The Austin common standards revision group. http://austingroupbugs.net, July 2017.
  • Open Science Collaboration. Estimating the reproducibility of psychological science. Science, 349(6251):aac4716, August 2015.
  • OpenCorporates. UK registered company data. https://opencorporates.com, March 2015.
  • OpenRefine. organization website, October 2014. http://openrefine.org.
  • OpenSignal. Android fragmentation visualized (august 2015). Technical report, OpenSignal, August 2015.
  • Alon Orlitsky, Ananda Theertha Suresh, and Yihong Wu. Optimal prediction of the number of unseen species. PNAS, 113(47):13283–13288, November 2016.
  • Naoyuki Osaka. Eye fixation and saccade during kana and kanji text reading: Comparison of English and Japanese text processing. Bulletin of the Psychonomic Society, 27(6):548–550, 1989.
  • An T. Oskarsson, Leaf Van Boven, Gary H. McClelland, and Reid Hastie. What's next? Judging sequences of binary events. Psychological Bulletin, 135(2):262–285, 2009.
  • Haidar Osman, Manuel Leuenberger, Mircea Lungu, and Oscar Nierstrasz. Tracking null checks in open-source Java systems. In IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER'16, pages 304–313, March 2016.
  • Elinor Ostrom, James Walker, and Roy Gardner. Covenants with and without a sword: Self-Governance is possible. The American Political Science Review, 86(2):404–417, June 1992.
  • Linda M. Ottenstein, Victor B. Schneider, and Maurice H. Halstead. Predicting the number of bugs expected in a program module. Technical Report CSD-TR 205, Purdue University, October 1976.
  • Mohamed A. Oumaziz, Alan Charpentier, Jean-R'emy Falleri, and Xavier Blanc. Documentation reuse: Hot or not? An empirical study. In 16th International Conference on Software Reuse, ICSR 2017, pages 12–27, May 2017.
  • Gerald L. Ourada. Software cost estimating models: A calibration, validation, and comparison. Thesis (m.s.), Air Force Institute of Technology, USA, December 1991.
  • Cassandra Overney, Jens Meinicke, Christian Kästner, and Bogdan Vasilescu. How to not get rich: An empirical study of donations in Op euro n $our textcent e. In 42nd International Conference on Software Maintenance, ICSE'20, page ???, July 2020.
  • Sidney Owsowitz and Anders Sweetland. Factors affecting coding errors. Research Memorandum RM-4346-PR, The RAND Corporation, April 1965.
  • Daphna Oyserman, Heather M. Coon, and Markus Kemmelmeier. Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1):3–72, January 2002.
  • Sinan Christopher Özbek. Introducing Innovations into Open Source Projects. PhD thesis, Freie Universität Berlin, August 2010.
  • Andy Ozment and Stuart E. Schechter. Milk or wine: Does software security improve with age?. In USENIX Security Symposium, SEC'06, pages 93–104, July-August 2006.
  • Peter Padfield. Battleship. Thistle Publishing, 2015.
  • Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, and Danilo Bruschi. A fistful of red-pills: How to automatically generate procedures to detect CPU emulators. In Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09, pages 2–2, August 2009.
  • Nicolas Palix, Julia Lawall, and Giles Muller. Tracking code patterns over multiple software versions with Herodotus. In Proceedings of the 9th International Conference on Aspect-Oriented Software Development, AOSD'10, pages 169–180, March 2010.
  • Nicolas Palix, Suman Saha, Gaël Thomas, Christophe Calvès, Julia Lawall, and Gilles Muller. Faults in Linux: Ten years later. Technical Report RR-7357, Institut National de Recherche en Informatique et en Automatique, August 2010.
  • James Pallister, Simon Hollis, and Jeremy Bennett. Identifying compiler options to minimise energy consumption for embedded platforms. In eprint arXiv:cs.PF/1303.6485, August 2013.
  • Evan M. Palmer, Todd S. Horowitz, Antonio Torralba, and Jeremy M. Wolfe. What are the shapes of response time distributions in visual search?. Journal of Experimental Psychology: Human Perception and Performance, 37(1):58–71, February 2011.
  • Stephen E. Palmer. Vision Science: Photons to Phenomenology. The MIT Press, 1999.
  • H.-Y. Pan, Anne Chao, and Wilhelm Foissner. A nonparametric lower bound for the number of species shared by multiple communities. Journal of Agricultural, Biological, and Environmental Statistics, 14(4):452–468, December 2009.
  • Kai Pan. Using Evolution Patterns to Find Duplicated Bugs. PhD thesis, Department of Computer Science, University of California at Santa Cruz, October 2006.
  • Thomas Pani. Loop patterns in C programs. Thesis (m.s.), Fakultät für Informatik der Technischen Universität Wien, December 2013.
  • Robert Parker and Bruce Grimm. Recognition of business and government expenditures for software as investment: Methodology and quantitative impacts, 1959-98. In BEA Advisory Committee meeting, May 2000.
  • Alexander Parkhomenko, Anastasia Redkina, and Olga Maslivets. Estimating hedonic price indexes for personal computers in Russia. MPRA Paper No. 5019, Higher School of Economics, January 2007.
  • Chris Parnin, Christian Bird, and Emerson Murphy-Hill. Adoption and use of Java generics. Empirical Software Engineering, 18(6):1047–1089, December 2013.
  • F. N. Parr. An alternative to the Rayleigh curve model for software development effort. IEEE Transactions on Software Engineering, SE-6(3):291–296, May 1980.
  • Harold E. Pashler. The Psychology of Attention. The MIT Press, 1999.
  • Leonardo Passos, Jianmei Guo, Leopoldo Teixeira, Krzysztof Czarnecki, Andrzej W k asowski, and Paulo Borba. Coevolution of variability models and related artefacts: A case study of the Linux kernel. In Proceedings of the 17th International Software Product Line Conference, SPLC'13, pages 91–100, April 2013.
  • Arvind Patel. Auditors' belief revision: Recency effects of contrary and supporting audit evidence and source reliability. Technical Report 2001-1, Department of AFM/SSE, University of South Pacific, June 2001.
  • Mark R. Patterson. Antitrust Law in the New Economy :Google, Yelp, LIBOR, and the Control of Information. Harvard University Press, 2017.
  • Frieder Michel Paulus, Lena Rademacher, Theo Alexander Jose Schäfer, Laura Müller-Pinzler, and Sören Krach. Journal impact factor shapes scientists' reward signal in the prospect of publication. PLoS ONE, 10(11):e0142537, November 2015.
  • Antonella Pavese and Carlo Umiltà. Symbolic distance between numerosity and identity moulates Stroop-like interference. Journal of Experimental Psychology: Human Perception and Performance, 24(5):1535–1545, 1998.
  • Esteban Pavese, Ezekiel Soremekun, Nikolas Havrikov, Lars Grunske, and Andreas Zeller. Inputs from hell: Generating uncommon inputs from common samples. In eprint arXiv:cs.SE/1812.07525, December 2018.
  • John W. Payne, James R. Bettman, and Eric J. Bettman. The Adaptive Decision Maker. Cambridge University Press, 1993.
  • Guillermo Paz-y-Miño C, Alan B. Bond, Alan C. Kamil, and Russell P. Balda. Pinyon jays use transitive inference to predict social dominance. Nature, 430:778–781, August 2004.
  • Roy D. Pea. Language-independent conceptual "bugs" in novice programming. Journal of Educational Computing Research, 2(1):25–36, February 1986.
  • Judea Pearl. Causality: Models, Reasoning, and Inference. Cambridge University Press, 2000.
  • Ronald K. Pearson. The problem of disguised missing data. ACM SIGKDD Explorations Newsletter, 8(1):83–92, June 2006.
  • Yuri Peers. Econometric Advances in Diffusion Models. PhD thesis, Erasmus University, Rotterdam, December 2011.
  • Ekaterina Pek. Corpus-based Empirical Research in Software Engineering. PhD thesis, Department of Computer Science, Universität Koblenz-Landau, October 2013.
  • Denis G. Pelli, Catherine W. Burns, Bart Farell, and Deborah C. Moore-Page. Feature detection and letter identification. Vision Research, 46(28):4646–4674, 2006.
  • Jaakko Peltokorpi and Esko Niemi. Effects of group size and learning on manual assembly performance: an experimental study. International Journal of Production Research, 57(2):452–469, 2019.
  • Ella Peltonen, Eemil Lagerspetz, Petteri Nurmi, and Sasu Tarkoma. Energy modeling of system settings: A crowdsourced approach. In IEEE International Conference on Pervasive Computing and Communications, PerCom'15, pages 37–45, March 2015.
  • Nancy Pennington. Stimulus structures and mental representations in expert comprehension of computer programs. Cognitive Psychology, 19(3):295–341, July 1987.
  • Nancy Pennington. Comprehension strategies in programming. In Gary Olson, Sylvia Shepard, and Elliot Soloway, editors, Empirical Studies of Programmers: Second Workshop, chapter 7, pages 100–113. Ablex Publishing Corporation, 1987.
  • Brian T. Pentland and Henry H. Rueter. Organizational routines as grammars of action. Administrative Science Quarterly, 39(3):484–510, September 1994.
  • Daniel Perez and Ben Livshits. Smart contract vulnerabilities: Does anyone care?. In eprint arXiv:cs.CR/1902.06710, February 2019.
  • Carlota Perez. Technological Revolutions and Financial Capital: The Dynamics of Bubbles and Golden Ages. Edward Elgar Publishing, 2003.
  • Dewayne E. Perry and W. Michael Evangelist. An empirical study of software interface faults – An update. In Proceedings of the Twentieth Annual Hawaii International Conference on Systems Sciences, Vol II, HICSS, pages 113–126, January 1987.
  • Dewayne E. Perry and Carol S. Stieg. Software faults in evolving a large, real-time system: a case study. In Proceedings of the 1993 European Software Engineering Conference, pages 48–67, September 1993.
  • Dewayne E. Perry, Nancy A. Staudenmayer, and Lawrence G. Votta, Jr. Understanding and improving time usage in software development. In Alfonso Fuggetta and Alexander L. Wolf, editors, Trends in Software Process, chapter 5, pages 111–135. John Wiley & Sons, March 1995.
  • Ranganath Perugupalli. Empirical assessment of architecture-based reliability of open-source software. Thesis (m.s.), Department of Computer Science and Electrical Engineering, West Virginia University, May 2004.
  • Henry Petroski. Design Paradigms: Case Histories of Error and Judgment in Engineering. Cambridge University Press, 1994.
  • Christian Peukert. Switching costs and information technology: The case of IT outsourcing. In 1st ICT Conference Munich on ICT and Economic Growth, November 2010.
  • Arthur Pewsey, Markus Neuhäuser, and Graeme D. Ruxton. Circular Statistics in R. Oxford University Press, 2013.
  • Penny M. Pexman and Melvin J. Yap. Individual differences in semantic processing: Insights from the Calgary semantic decision project. Journal of Experimental Psychology: Learning, Memory, & Cognition, 44(7):1091–1112, February 2018.
  • Rolf-Helge Pfeiffer. What constitutes software? An empirical, descriptive study of artifacts. In Proceedings of the 17th International Conference on Mining Software Repositories, MSR'20, page ???, June 2020.
  • Sandeep A. Phatak, Andrew Lovitt, and Jont B. Allen. Consonant confusions in white noise. Journal of the Acoustic Society of America, 124(2):1220–1233, August 2008.
  • Almarin Phillips. Technology and Market Structure: A Study of the Aircraft Industry. Heath Lexington Books, 1972.
  • Colin Phillips. Order and Structure. PhD thesis, M.I.T., August 1996.
  • Montgomery Phister, Jr. Data Processing Technology and Economics. Santa Monica Publishing Company and Digital Press, second edition, 1979.
  • Steven T. Piantadosi. Zipf's word frequency law in natural language: a critical review and future directions. Psychonomic Bulletin & Review, 21(5):1112–1130, October 2014.
  • Steven T. Piantadosi. A rational analysis of the approximate number system. Psychonomic Bulletin & Review, 23(3):877–886, June 2016.
  • Rik Pieters and Luk Warlop. Visual attention during brand choice: The impact of time pressure and task motivation. International Journal of Research in Marketing, 16:1–16, 1999.
  • Diarmuid J. Pigott and Bruce M. Axtens. Online historical encyclopedia of programming languages. http://hopl.info, 2015.
  • Robert S. Pindyck. Investments of uncertain cost. Journal of Financial Economics, 34(1):53–76, August 1993.
  • Jon Pipitone. Software quality in climate modelling. Thesis (m.s.), Department of Computer Science, University of Toronto, 2010.
  • Ana M. Pires and Conceição Amado. Interval estimators for a binomial proportion: Comparison of twenty methods. REVSTAT-Statistical Journal, 6(2):165–197, June 2008.
  • Peter Pirolli. Information Foraging Theory: Adaptive Interaction with Information. Oxford University Press, May 2007.
  • David J. Pittenger. Measuring the MBTI textellipsis And coming up short. Journal of Career Planning and Employment, 54(1):48–52, November 1993.
  • PK. How many developers are there in America, and where do they live?. company website, April 2019. https://dqydj.com/number-of-developers-in-america-and-per-state.
  • James Plamondon. Effective Evangelism: JOE COMES, RILEY PAINT, INC., SKEFFINGON'S FORMAL WEAR, INC., PATRICIA ANNE LARSEN vs. MICROSOFT CORPORATION. Plaintiff's Exhibit 3096, IOWA District Court for Polk County, January 2000.
  • Alessandro Pluchino, Andrea Rapisarda, and Cesare Garofalo. The Peter principle revisited: A computational study. In eprint arXiv:physics.soc-ph/0907.0455v3, October 2009.
  • Thomas Plum. Reliable data structures in C. Plum Hall, 1985.
  • Thomas Plum. C Programming guidelines. Plum Hall, 1989.
  • I. P. L. Png. On the reliability of software piracy statistics. Electronic Commerce Research and Applications, 9(5):365–373, September-October 2010.
  • Anja Pogačnik and Aleš Črnič. iReligion: Religious elements of the Apple phenomenon. The Journal of Religion and Popular Culture, 26(3):353–364, September-November 2014.
  • Christian Poivey, Janet L. Barth, Kenneth A. LaBel, George Gee, and Harvey Safren. In-flight observations of long-term single-event effect (SEE) performance on Orbview-2 solid state recorders (SSR). In 2003 IEEE Radiation Effects Data Workshop, pages 102–107, July 2003.
  • Cristiano Politowski, Fabio Petrillo, Gabriel Cavalheiro Ullmann, Josias de Andrade Werly, and Yann-Gaël Guéhéneuc. Dataset of video game development problems. In eprint arXiv:cs.SE/2001.00491, January 2020.
  • Robert Pollack. How to believe a machine-checked proof. In Giovanni Sambin and Jan M. Smith, editors, Twenty Five Years of Constructive Type Theory, chapter 11, pages 205–220. Oxford University Press, October 1998.
  • Alexander Pollatsek, Erik D. Reichle, and Keith Rayner. Tests of the E-Z reader model: Exploring the interface between cognition and eye-movement control. Cognitive Psychology, 52(1):1–56, February 2006.
  • Germán Poo-Caamaño and Daniel M. German. Software patents: A replication study. In Proceedings of the 11th International Symposium on Open Collaboration, OpenSym'15, pages 5:1–5:4, August 2015.
  • Devin Pope and Uri Simonsohn. Round numbers as goals: Evidence from baseball, SAT takers, and the lab. Psychological Science, 22(1):71–79, January 2011.
  • Karl R. Popper. Conjectures and Refutations. Routledge, 1969.
  • Adam Porter, Harvey Siy, Audris Mockus, and Lawrence Votta. Understanding the sources of variation in software inspections. ACM Transactions on Software Engineering Methodology, 7(1):41–79, January 1998.
  • Michael E. Porter. Competitive Advantage: Creating and Sustaining Superior Performance. First Free Press, 1985.
  • Michael E. Porter. The five competitive forces that shape strategy. Harvard Business Review, 86(1):78–93, January 2008.
  • R. D. Portugal and B. F. Svaiter. Weber-Fechner law and the optimality of the logarithmic scale. Minds & Machines, 21(1):73–81, February 2011.
  • Alfred S. Posamentier and Ingmar Lehmann. Magnificent mistakes in mathematics. Prometheus books, 2013.
  • D. E. Post and R. P. Kendall. Software project management and quality engineering practices for complex, coupled multi-physics, massively parallel computational simulations: Lessons learned from ASCI. Report LA-UR-03-1274 Rev. 2, Los Alamos National Laboratory, March 2004.
  • Alex Potanin, Monique Damitio, and James Noble. Are your incoming aliases really necessary? Counting the cost of object ownership. In Proceedings of the 2013 International Conference on Software, ICSE'13, pages 742–751, May 2013.
  • Emmanuel M. Pothos and Nick Chater. Rational categories. In Proceedings of the Twentieth Annual Conference of the Cognitive Science Society, pages 848–853, 1998.
  • Mary C. Potter, Anita Moryadas, Irene Abrams, and Audra Noel. Word perception and misperception in context. Journal of Experimental Psychology: Learning, Memory, & Cognition, 19(1):3–22, 1993.
  • Jason Potts, John Hartley, Lucy Montgomery, Cameron Neylon, and Ellie Rennie. A journal is a club: A new economic model for scholarly publishing. Working Paper n. 2763975, Australian universities, April 2016.
  • Antony Lee Powell. Right on Time: Measuring, Modelling and Managing Time-Constrained Software Development. PhD thesis, Department of Computer Science, University of York, August 2001.
  • David A. Powner and Keith A. Rhodes. Business systems modernization: IRS needs to complete recent efforts to develop policies and procedures to guide requirements development and management. Technical Report GAO-06-310, United States Government Accountability Office, March 2006.
  • Michael Pradel and Tkoushik Sen. DeepBugs: A learning approach to name-based bug detection. In Proceedings of the ACM on Programming Languages, OOPSLA'18, page 147, November 2018.
  • Michael Pradel. Program Analyses for Automatic and Precise Error Detection. PhD thesis, ETH Zurich, 2012.
  • Vinay Prasad, Andrae Vandross, Caitlin Toomey, Michael Cheung, Jason Rho, Steven Quinn, Satish Jacob Chacko, Durga Borkar, Victor Gall, Senthil Selvaraj, Nancy Ho, and Adam Cifu. A decade of reversal: An analysis of 146 contradicted medical practices. Mayo Clinical Proceedings, 88(8):790–798, August 2013.
  • Lutz Prechelt and Walter F. Tichy. A controlled experiment measuring the effect of procedure argument type checking on programmer productivity. IEEE Transactions on Software Engineering, 24(4):302–312, April 1998.
  • Lutz Prechelt, Franz Zieris, and Holger Schmeisky. Difficulty factors of obtaining access for empirical studies in industry. In Proceedings of the Third International Workshop on Conducting Empirical Studies in Industry, CESI'15, pages 19–25, May 2015.
  • Lutz Prechelt, Daniel Graziotin, and Daniel Méndez Fernández. On the status and future of peer review in software engineering. In eprint arXiv:cs.SE/1706.07196, June 2017.
  • Lutz Prechelt. The 28:1 Grant/Sackman legend is misleading, or: How large is interpersonal variation really?. Technical Report iratr-1999-18, Universität Karlsruhe, 1999.
  • Lutz Prechelt. Plat_Forms 2007: The web development platform comparison – evaluation and results. Technical Report B-07-10, Institut für Informatik, Freie Universität Berlin, June 2007.
  • L. S. Premo and Steven L. Kuhn. Modeling effects of local population extinctions on cultural change and diversity in the paleolithic. PLoS ONE, 5(12):e15582, December 2010.
  • Robert A. Prentice and John H. Langmore. Beware of vaporware: Product hype and the securities fraud liability of high-tech companies. Harvard Journal of Law & Technology, 8(1):1–74, October-December 1994.
  • Clark C. Presson and Daniel R. Montello. Updating after rotational and translational body movements: coordinate structure of perspective space. Perception, 23:1447–1455, 1994.
  • Tom Preston-Werner. Semantic versioning 2.0.0. organization website, July 2019. https://semver.org.
  • David Pritchard. Frequency distribution of error messages. In Proceedings of the 6th Workshop on Evaluation and Usability of Programming Languages and Tools, PLATEAU'15, pages 1–8, October 2015.
  • V. Propp. Morphology of the Folktale. University of Texas Press, second edition, 1968. English translation by Laurence Scott.
  • Jochen Prümper, Dieter Zapf, Felix C. Brodbeck, and Michael Frese. Some surprising differences between novice and expert errors in computerized office work. Behaviour & Information Technology, 11(6):319–328, 1992.
  • Public Accounts, Committee of. HM revenue and customers: ASPIRE–re-competition of outsourced IT services. Technical Report Twenty-eighth Report of Session 2006-07, UK Parliament, June 2007.
  • Dmytro Pukhkaiev. Energy-efficient benchmarking for energy-efficient software. Thesis (m.s.), Technische Universität, Dresden, December 2015.
  • Ranjith Purushothaman and Dewayne E. Perry. Toward understanding the rhetoric of small source code changes. IEEE Transactions on Software Engineering, 31(6):511–526, June 2005.
  • Lawrence H. Putnam and Ware Myers. Measures for Excellence: Reliable software on time, within budget. Prentice-Hall, Inc, 1992.
  • Lawrence H. Putnam. A general empirical solution to the macro software sizing and estimating problem. IEEE Transactions on Software Engineering, SE-4(4):345–361, July 1978.
  • PwC. Converging forces are building that could re-shape the entire industry. Global 100 software leaders, PwC Technology Institute, May 2013.
  • PwC. The growing importance of apps and services. Global 100 software leaders, PwC Technology Institute, March 2014.
  • PwC. IPO review full-year and Q4 2015. Global technology, PwC Technology Institute, February 2016.
  • PwC. Digital intelligence conquers the world below and the cloud above. Global 100 software leaders, PwC Technology Institute, 2016.
  • Zenon Pylyshyn. Is vision continuous with cognition? The case for cognitive impenetrability of visual perception. Behavioral and Brain Sciences, 22(3):341–423, 1999.
  • Xiao Qu. Configuration aware prioritization for regression testing. PhD thesis, The Graduate College at the University of Nebraska, April 2010.
  • Steve Qualline. C Elements of Style. M&T Books, 1992.
  • Rodrigo Queiroz, Leonardo Passos, Marco Tulio Valente, Claus Hunsen, Sven Apel, and Krzysztof Czarnecki. The shape of feature code: an analysis of twenty C-preprocessor-based systems. Journal on Software and Systems Modeling, 16(1):77–96, February 2017.
  • R Core Team. R language definition. Technical Report 3.3.1, R Foundation for Statistical Computing, June 2016.
  • R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2019. ISBN 3-900051-07-0.
  • Henry Rabinowitz and Chaim Schaap. Portable C. Prentice-Hall, Inc, 1990.
  • Jeffrey J. Rachlinski, Andrew J. Wistrich, and Chris Guthrie. Can judges make reliable numeric judgments? Distorted damages and skewed sentences. Indiana Law Journal, 90(2):695–739, April 2015.
  • Jane W. Radatz. Analysis of IV & V data. Technical Report RADC-TR-81-145, Rome Air Development Center, Griffiss Air Force Base, June 1981.
  • Günter Radden and René Dirven. Cognitive English Grammar. John Benjamins Publishing Company, 2007.
  • David Raffo, John Settle, and Warren Harrison. Investigating financial measures for planning software IV&V. Technical Report TR-99-05, Portland State University, 1999.
  • Chaiyong Ragkhitwetsagul, Jens Krinke, and David Clark. A comparison of code similarity analysers. Empirical Software Engineering, 23(4):2464–2519, August 2018.
  • Foyzur Rahman, Christian Bird, and Premkumar Devanbu. Clones: What is that smell?. In Proceedings of the 7th International Workshop on Mining Software Repositories, MSR'10, pages 72–81, May 2010.
  • Md Tajmilur Rahman, Emad Shihab, and Peter C. Rigby. The modular and feature toggle architectures of Google Chrome. Empirical Software Engineering, 24(2):826–853, July 2019.
  • Jay Ranade and Alan Nash. The Elements of C Programming Style. McGraw-Hill, Inc, 1992.
  • Awais Rashid, Howard Chivers, George Danezis, Emil Lupu, and Andrew Martin. CyBOK: The cyber security body of knowledge. Technical Report 1.0, The National Cyber Security Centre, UK, October 2019.
  • Roger Ratcliff, Gail McKoon, and Pablo Gomez. A diffusion model account of the lexical decision task. Psychological Review, 111(1):159–182, January 2004.
  • Roger Ratcliff, Philip L. Smith, Scott D. Brown, and Gail McKoon. Diffusion decision model: Current issues and history. Trends in Cognitive Sciences, 20(4):260–281, April 2016.
  • Bill Ray, Mark Wilcox, and Christina Voskoglou. Developer economics | State of the developer nation q3 2015. State of the Nation 9th edition, VisionMobile, July-September 2015.
  • Baishakhi Ray. Analysis of Cross-System Porting and Porting Errors in Software Projects. PhD thesis, University of Texas at Austin, August 2013.
  • Keith Rayner. Eye movements in reading: Models and data. Journal of Eye Movement Research, 2(5):1–10, April 2009.
  • Keith Rayner. Eye movements and attention in reading, scene perception, and visual search. The Quarterly Journal of Experimental Psychology, 62(8):1457–1506, 2009.
  • Nornadiah Mohd Razali and Yap Bee Wah. Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests. Journal of Statistical Modeling and Analytics, 2(1):21–33, 2011.
  • James Reason. Human Error. Cambridge University Press, 1990.
  • Arthur S. Reber and Saul M. Kassin. On the relationship between implicit and explicit modes in the learning of a complex rule structure. Journal of Experimental Psychology: Human Learning and Memory, 6(5):492–502, 1980.
  • José Luis Recón. Building skyscrapers, and spending on major projects. Github account, October 2018. https://nintil.com/2018/10/07/building-skyscrapers-and-spending-on-major-projects.
  • Björn Regnell, Martin Höst, Johan Natt och Dag, Per Beremark, and Thomas Hjelm. An industrial case study on distributed prioritisation in market-driven requirements engineering for packaged software. Requirements Engineering, 6(1):51–62, April 2001.
  • Pierre Reibel, Haaroon Yousaf, and Sarah Meiklejohn. Why is a Ravencoin like a TokenDesk? An exploration of code diversity in the cryptocurrency landscape. In eprint arXiv:cs.CR/1810.08420, October 2018.
  • Erik D. Reichle, Tessa Warren, and Kerry McConnell. Using E-Z reader to model the effects of higher-level language processing on eye movements during reading. Psychonomic Bulletin & Review, 16(1):1–21, February 2009.
  • Richard J. Reid. The Reid list of the first course language for computer science majors. http://www.csee.wvu.edu/ vanscoy/reid.htm, August 2002.
  • Jeremy Reimer. Computer smartphone and tablet marketshare: 1975-2012. personal website, December 2012. http://jeremyreimer.com/m-item.lsp?i=137.
  • George A. Reis III. Software Modulated Fault Tolerance. PhD thesis, Department of Electrical Engineering, Princeton University, June 2008.
  • Gilbert Remillard. Implicit learning of second-, third-, and fourth-order adjacent and nonadjacent sequential dependencies. The Quarterly Journal of Experimental Psychology, 61(3):400–424, April 2008.
  • Roger W. Remington, Ho Wang Holman Yuen, and Harold Pashler. With practice, keyboard shortcuts become faster than menu selection: A crossover interaction. Journal of Experimental Psychology: Applied, 22(1):95–106, 2016.
  • Research Councils, UK. RCUK policy on open access and supporting guidance. Technical report, RCUK, March 2013.
  • Andrew Rice, Edward Aftandilian, Ciera Jaspan, Emily Johnston, Michael Pradel, and Yulissa Arroyo-Paredes. Detecting argument selection defects. Proceedings of the ACM on Programming Languages, 1(1):104, October 2017.
  • Gregor Richards, Sylvain Lebresne, Brian Burg, and Jan Vitek. An analysis of the dynamic behavior of JavaScript programs. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'10, pages 1–12, June 2010.
  • Gregor Richards, Christian Hammer, Brian Burg, and Jan Vitek. The eval that men do A large-scale study of the use of eval in JavaScript applications. In Proceedings of the 25th European conference on Object-oriented programming, ECOOP'11, pages 52–78, July 2011.
  • Robert Richardson. 2008 CSI computer crime & security survey. Technical report, Computer Security Institute, August 2008.
  • David F. Rico. Short history of software methods. http://davidfrico.com/rico04e.pdf, July 2004.
  • Richard K. Ridgway. Compiling routines. In Proceedings of the 1952 ACM national meeting (Toronto), ACM'52, pages 1–5, September 1952.
  • Rolf Riesen, Kurt Ferreira, Jon Stearley, Ron Oldfield, James H. Laros III, Kevin Pedretti, and Ron Brightwell. Redundant computing for exascale systems. Technical Report SAND2010-8709, Sandia National Laboratories, December 2010.
  • Manuel Rigger, Stefan Marr, Stephen Kell, David Leopoldseder, and Hanspeter Mössenböck. An analysis of x86-64 inline assembly in C programs. In Proceedings of the 14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'18, pages 84–99, March 2018.
  • Manuel Rigger, Stefan Marr, Bram Adams, and Hanspeter Mössenböck. Understanding GCC builtins to develop better tools. In eprint arXiv:cs.PL/1907.00863, July 2019.
  • Martin Rinard, Cristian Cadar, and Huu Hai Nguyen. Exploring the acceptability envelope. In Companion to the 20th annual ACM SIGPLAN conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA'05, pages 21–30, October 2005.
  • Max Ringelmann. Recherches sur les moteurs animés: Travail de l'homme. Annales de l'Institut National Agronomique, 2(XII):1–40, 1913.
  • J. S. Riordon. An evolution dynamics model of software systems development. In Bryce Elkins and Lois Hunt, editors, Software Phenomenology Working Papers of the Software Life Cycle Management Workshop, pages 339–360. US Army Institute for Research in Management Information and Computer SCience, August 1997.
  • Romain Robbes, David Róthlisberger, and Éric Tanter. Object-oriented software extensions in practice. Empirical Software Engineering, 20(3):745–782, June 2015.
  • Seán Roberts and James Winters. Linguistic diversity and traffic accidents: Lessons from statistical studies of cultural traits. PLoS ONE, 8(8):e70902, August 2013.
  • Maxwell J. Roberts, David J. Gilmore, and David J. Wood. Individual differences and strategy selection in reasoning. British Journal of Psychology, 88:473–492, 1997.
  • Dwight E. Robinson. Fashions in shaving and trimming of the beard: The men of the Illustrated London News, 1842-1972. American Journal of Sociology, 81(5):1133–1141, March 1976.
  • Andrew Robinson. icebreakeR. University of Melbourne, Australia, May 2010.
  • Gregorio Robles and Jesús M. González-Barahona. A comprehensive study of software forks: Dates, reasons and outcomes. In The 8th International Conference on Open Source Systems, OSS 2012, pages 1–14, September 2012.
  • Gregorio Robles, Israel Herraiz, Daniel M. Germán, and Daniel Izquierdo-Cortázar. Modification and developer metrics at the function level: Metrics for the study of the evolution of a software project. In 3rd International Workshop on Emerging Trends in Software Metrics, WETSoM'12, pages 49–55, June 2012.
  • Gregorio Robles, Laura Arjona Reina, Alexander Serebrenik, Bogdan Vasilescu, and Jesús M. González-Barahona. FLOSS 2013: A survey dataset about free software contributors: Challenges for curating, sharing, and combining. In Proceedings of the 11th Working Conference on Mining Software Repositories, MSR'14, pages 396–399, May 2014.
  • Elder Rodrigues, Jr. and Ricardo Terra. How do developers use dynamic features? The case of Ruby. Computer Languages, Systems & Structures, 53:73–89, September 2018.
  • William H. Roetzheim. When the software becomes a nightmare: Dealing with failed projects. Business Law Today, 13(6):42–48, July-August 2004.
  • Robert D. Rogers and Stephen Monsell. Costs of a predictable switch between simple cognitive tasks. Journal of Experimental Psychology: General, 124(2):207–231, 1995.
  • Ankit Rohatgi. WebPlotDigitizer. https://automeris.io/WebPlotDigitizer, October 2017.
  • Mikko Rönkkö, Olli-Pekka Mutanen, Nina Koivisto, Jukka Ylitalo, Juhana Peltonen, Anne-Marie Touru, Sami Hyrynsalmi, Pia Poikonen, Olli Junna, Jyrki Ali-Yrkkö, Aku Valtakoski, Ye Huang, and Jussi Kantola. The Finnish software industry in 2007. National Software Industry Survey 2008, Software Business Lab, 2008.
  • Eleanor Rosch, Carolyn B. Mervis, Wayne D. Gray, David M. Johnson, and Penny Boyes-Braem. Basic objects in natural categories. Cognitive Psychology, 8(3):382–439, July 1976.
  • Lawrence Rosen. Open Source Licensing: Software Freedom and Intellectual Property Law. Prentice Hall PTR, July 2004.
  • Mark Rosenfelder. The Language Construction Kit. Yonagu Books, 2010.
  • Brian H. Ross and Gregory L. Murphy. Food for thought: Cross-classification and category organization in a complex real-world domain. Cognitive Psychology, 38(4):495–552, June 1999.
  • Lee Ross, Mark R. Lepper, and Michael Hubbard. Perseverance in self-perception and social perception: Biased attributional processes in the debeliefing paradigm. Journal of Personality and Social Psychologs, 32(5):880–892, 1975.
  • Andrew Ross. No-Collar: The Humane Workplace and its Hidden Costs. Temple University Press, 2003.
  • Sheldon M. Ross. Introduction to Probability Models. Academic Press, 9th edition, 2007.
  • Bruno Rossi, Barbara Russo, and Giancarlo Succi. Path dependent stochastic models to detect planned and actual technology use: A case study of OpenOffice. Information & Software Technology, 53(11):1209–1226, November 2011.
  • Johann Rost and Robert L. Glass. The Dark Side of Software Engineering: Evil on Computing Projects. John Wiley & Sons, Inc, 2011.
  • Valentin Rothberg, Nicolas Dintzner, Andreas Ziegler, and Daniel Lohmann. Feature models in Linux-from symbols to semantics. In Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, VaMoS'16, pages 65–72, January 2016.
  • Boudewijn F. Roukema. A first-digit anomaly in the 2009 Iranian presidential election. In eprint arXiv:stat.AP/0906.2789, June 2013.
  • Guillaume Rousseau, Roberto Di Cosmo, and Stefano Zacchiroli. Software provenance tracking at the scale of public source code. HAL Id: hal-02543794, HAL archives-ouvertes.fr, April 2020.
  • Michael M. Roy, Nicholas J. S. Christenfeld, and Craig R. M. McKenzie. Underestimating the duration of future events: Memory incorrectly used or memory bias?. Psychological Bulletin, 131(5):738–756, 2005.
  • Eduardo G. Roy, Daniel C. Quintero, John R. Hurley, Alec Cierny, and Daniel Norcia. Plaintiffs, vs. SAMSUNG TELECOMMUNICATIONS AMERICA, LLC, a New York Corporation, and SAMSUNG ELECTRONICS AMERICA, INC., a New Jersey Corporation, Defendants. PLAINTIFF'S NOTICE OF UNOPPOSED MOTION AND UNOPPOSED MOTION FOR PRELIMINARY APPROVAL OF CLASS ACTION SETTLEMENT; MEMORANDUM OF POINTS AND AUTHORITIES CASE NO. 3:14-cv-582-JD, UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA, October 2019.
  • Winston W. Royce. Managing the development of large software systems. In Technical Papers of Western Electronic Show and Convention, WesCon, pages 1–9, August 1970.
  • Patrick Royston, Douglas G. Altman, and Willi Sauerbrei. Dichotomizing continuous predictors in multiple regression: a bad idea. Statistics in Medicine, 25(1):127–141, January 2006.
  • David C. Rubin and Amy E. Wenzel. One hundred years of forgetting: A quantitative description of retention. Psychological Review, 103(4):734–760, October 1996.
  • David C. Rubin, Sean Hinton, and Amy Wenzel. The precise time course of retention. Journal of Experimental Psychology: Learning, Memory, & Cognition, 25(5):1161–1176, September 1999.
  • Cindy Rubio-González and Ben Libit. Expect the unexpected: Error code mismatches between documentation and the real world. In Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, PASTE'10, pages 73–80, June 2010.
  • Cindy Rubio-González, Cuong Nguyen, Hong Diep Nguyen, James Demmel, William Kahan, Koushik Sen, David H. Bailey, Costin Iancu, and David Hough. Precimonious: Tuning assistant for floating-point precision. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC'13, November 2013.
  • Jukka Ruohonen and Ville Leppänen. How PHP releases are adopted in the wild?. In eprint arXiv:cs.SE/1710.05570, October 2017.
  • Andrew L. Russell. 'rough consensus and running code' and the internet-OSI standards war. IEEE Annals of the History of Computing, 28(3):48–61, July-September 2006.
  • Rajiv Sabherwal, Anand Jeyaraj, and Charles Chowa. Information systems success: Individual and organizational determinants. Management Science, 52(12):1849–1864, December 2006.
  • Rubén Saborido, Venera Arnaoudova, Giovanni Beltrame, Foutse Khomh, and Giuliano Antoniol. On the impact of sampling frequency on software energy measurements. Peerj PrePrints, 3:e1219, July 2015.
  • H. Sackman, W. J. Erikson, and E. E. Grant. Exploratory experimental studies comparing online and offline programming performance. Communications of the ACM, 11(1):3–11, January 1968.
  • Mefta Sadat, Ayse Basar Bener, and Andriy V. Miranskyy. Rediscovery datasets: Connecting duplicate reports. In eprint arXiv:cs.SE/1703.06337v1, March 2017.
  • Mauricio Sadinle. On the performance of dual system estimators of population size: A simulation study. Documentos de CERAC No. 13, Centro de Recursos parael Análisis de Conflictos, Bogotá, Columbia, December 2008.
  • Devebdra Sahal. Patterns of Technological Innovation. Addison–Wesley, December 1981.
  • Swarup Kumar Sahoo, John Criswell, and Vikram Adve. An empirical study of reported bugs in server software with implications for automated bug diagnosis. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE'10, pages 485–494, May 2010.
  • Jorma Sajaniemi and Raquel Navarro Prieto. Roles of variables in experts' programming knowledge. In 17th Workshop of the Psychology of Programming Interest Group, PPIG'05, pages 145–159, June 2005.
  • Alireza Salahirad, Hussein Almulla, and Gregory Gay. Choosing the fitness function for the job: Automated generation of test suites that detect real faults. Software Testing, Verification and Reliability, 29(4-5):e1701, June-August 2019.
  • Peter H. Salus. A Quarter Century of UNIX. Addison–Wesley, 1994.
  • Peter H. Salus. Duelling UNIXes and the UNIX wars. ;login:, 40(2):66–68, April 2015.
  • Adrian Sampson, Werner Dietl, Emily Fortuna, and Danushen Gnanapragasam. EnerJ: Approximate data types for safe and general low-power computation. In Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation, PLDI'11, pages 164–174, June 2011.
  • David M. Sanbonmatsu, Steven S. Posavac, Arwen A. Behrends, Shannon M. Moore, and Bert N. Uchino. Why a confirmation strategy dominates psychological science. PLoS ONE, page e0138197, September 2015.
  • Deepayan Sarkar. Lattice Multivariate Data Visualization with R. Springer Science+Business Media, 2008.
  • Milos Savić, Mirjana Ivanović, Zoran Budimac, and Milos Radovanović. Do students' programming skills depend on programming language?. In American Institute of Physics Conference Proceedings, page 240006, June 2016.
  • SC22/WG14. Implementation of ISO/IEC 9899:1990 (E) Programming languages – C. British Standards Institution, December 1990.
  • Walt Scacchi. Understanding software productivity. In W. David Hurley, editor, Software Engineering and Knowledge Engineering: Trends for the Next Decade Vol. 4, chapter 10, pages 273–316. World Scientific Press, June 1995.
  • Stephen R. Schach, Bo Jin, Liguo Yu, Gillian Z. Heller, and Jeff Offutt. Determining the distribution of maintenance categories: Survey versus measurement. Empirical Software Engineering, 8(4):351–363, December 2003.
  • Stephen R. Schach, Tokunbo O. S. Adeshiyan, Daniel Balasubramanian, Gabor Madl, Esteban P. Osses, Sameer Singh, Karlkim Suwanmongkol, Minhui Xie, and Dror G. Feitelson. Common coupling and pointer variables, with application to a Linux case study. Software Quality Journal, 15(1):99–113, March 2006.
  • Jörg Schad, Jens Dittrich, and Jorge-Arnulfo Quiané-Ruiz. Runtime measurements in the cloud: Observing, analyzing, and reducing variance. In Proceedings of the VLDB Endowment, pages 460–471, September 2010.
  • K. Warner Schaie. Developmental Influences on Adult Intelligence: The Seattle Longitudinal Study. Oxford University Press, second edition, 2013.
  • Robert R. Schaller. Technological Innovation in the Semiconductor Industry: A Case Study of the International Technology Roadmap for Semiconductors (ITRS). PhD thesis, George Mason University, 2004.
  • Markus Schief. Business Models in the Software Industry: The Impact on Firm and M&A Performance. Springer Gabler, April 2014.
  • Frank L. Schmidt, In-Sue Oh, and Jonathan A. Shaffer. The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 100 years of research findings. Working paper, Tippie College of Business, University of Iowa, October 2016.
  • Elisa Schneider, Masaki Maruyama, Stanislas Dehaene, and Mariano Sigman. Eye gaze reveals a fast, parallel extraction of the syntax of arithmetic formulas. Cognition, 125(3):475–490, December 2012.
  • Stan Schneider. The dirty little secret of software pricing. website, 2012. http://www.rti.com/whitepapers/Dirty_Little_Secret.pdf.
  • Jocelyn Schock, Michael J. Cortese, Maya M. Khanna, and Sean Toppi. Age of acquisition estimates for 3,000 disyllabic words. Behavior and Research Methods, 44(4):971–977, December 2012.
  • Andrew Scholey and Lauren Owen. Effects of chocolate on cognitive function and mood: a systematic review. Nutrition Reviews, 71(10):665–681, April 2013.
  • Robert Schöne, Daniel Hackenberg, and Daniel Molka. Memory performance at reduced CPU clock speeds: An analysis of current x86_64 processors. In Proceedings of the 2012 USENIX conference on Power-Aware Computing and Systems, HotPower'12, October 2012.
  • Matthias Schonlau, William DuMouchel, Wen-Hua Ju, Alan F. Karr, Martin Theus, and Yehuda Vardi. Computer intrusion: Detecting masquerades. Statistical Science, 16(1):58–74, 2001.
  • Lael J. Schooler and Ralph Hertwig. How forgetting aids heuristic inference. Psychological Review, 112(3):610–628, July 2005.
  • Elizabeth R. Schotter, Bernhard Angele, and Keith Rayner. Parafoveal processing in reading. Attention, Perception & Psychophysics, 74(1):5–35, January 2012.
  • Joerg-Peter Schraepler and Gert G. Wagner. Identification of faked interviews in surveys by means of Benford's law?: An analysis by means of genuine fakes in the raw data of SOEP. Technical report, Technische Universiät Berlin, August 2004.
  • Andrew Schulman, Matt Pietrek, and David Maxey. Undocumented Windows: A Programmers Guide to Reserved Microsoft Windows API Functions. Addison–Wesley, July 1992.
  • Marc-André Schulz, Barbara Schmalbach, Peter Brugger, and Karsten Witt. Analysing humanly generated random number sequences: A pattern-based approach. PLoS ONE, 7(7):e41531, July 2012.
  • Jonathan F. Schulz, Duman Bahrami-Rad, Jonathan P. Beauchamp, and Joseph Henrich. The church, intensive kinship, and global psychological variation. Science, 366(6466):eaau5141, November 2019.
  • Peter Schuurman, Egon Berghout, and Philip Powell. Benefits are from Venus, costs are from Mars. CITER WP/010/PSEBPP, University of Groningen Centre for IT Economics Research, June 2008.
  • Eduardo S. Schwartz and Carlos Zozaya-Gorostiza. Investment under uncertainty in information technology: Acquisition and development projects. Management Science, 49(1):57–70, January 2003.
  • P. D. Scott and M. Fasli. Benford's law: An empirical investigation and a novel explanation. CSM Technical Report 349, Department of Computer Science, University of Essex, August 2001.
  • Claude F. Scott, Pam Cole, Renata B. Hesse, and Phillip R. Malone. UNITED STATES OF AMERICA, et al., v. ORACLE CORPORATION. Plaintiff's post-trial brief CASE NO. C 04-0807 VRW, UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION, July 2004.
  • Michael D. Scott. Tort liability for vendors of insecure software: Has the time finally come?. Maryland Law Review, 67(2):425–484, 2008.
  • Colin Scott. Numbers every programmer should know. Github account, October 2016. https://github.com/colin-scott/interactive_latencies.
  • Sylvia Scribner. Modes of thinking and ways of speaking: culture and logic reconsidered. In P. N. Johnson-Laird and P. C. Wason, editors, Thinking: Readings in Cognitive Science, chapter 29, pages 483–500. Cambridge University Press, 1977.
  • Robert C. Seacord. The CERT C Secure Coding Standard. Addison–Wesley, 2009.
  • Robert C. Seamans, Jr. Aiming at Targets: The Autobiography of Robert C. Seamans, Jr.. NASA History Office, 1996.
  • SEC. The world's largest hedge fund is a fraud. SEC MADOFF EXHIBITS-04451, November 2005. November 7, 2005 Submission to the SEC, Madoff Investment Securities, LLC.
  • Priya Sehgal, Vasily Tarasov, and Erez Zadok. Evaluating performance and energy in file system server workloads. In Proceedings of the 8th USENIX conference on File and storage technologies, FAST'10, February 2010.
  • Jaclyn Selby and Kyle Mayer. Startup firm acquisitions as a human resource strategy for innovation: The acqhire phenomenon. Academy of Management Annual Meeting Proceedings, 1:17109–17109, November 2013.
  • Richard W. Selby, Jr., Victor R. Basili, and F. Terry Baker. CLEANROOM software development: An empirical evaluation. Technical Report TR-1415, Department of Computer Science, University of Maryland, February 1985.
  • Lee L. Selwyn. Economies of Scale in Computer Use: Initial Tests and Implications for the Computer Utility. PhD thesis, Alfred P. Sloan School of Management, June 1969.
  • John A. Sexton. Detecting errors in software using a parameter checker: An analysis. Thesis (m.s.), Rochester Institute of Technology, April 1989.
  • Nigel Shadbolt. Shadbolt review of computer sciences degree accreditation and graduate employability. Technical Report IND/16/5, Department for Business, Innovation & Skills, UK, April 2016.
  • Teresa M. Shaft and Iris Vessey. The relevance of application domain knowledge: Characterizing the computer program comprehension process. Journal of Management Information Systems, 15(1):51–78, 1998.
  • Cosma Rohilla Shalizi. g, a statistical myth. blog: Three-Toed Sloth, October 2007. http://bactra.org/weblog/523.html.
  • Jeffrey Shallit. Randomized algorithms in "primitive" cultures or what is the oracle complexity of a dead chicken?. ACM SIGACT News, 23(4):77–80, September-November 1992.
  • Cyrus Shaoul, R. Harald Baayen, and Chris F. Westbury. N-gram probability effects in a cloze task. The Mental Lexicon, 9(3):437–472, 2014.
  • Carl Shapiro and Hal R. Varian. The art of standards wars. California Management Review, 41(2):8–32, January 1999.
  • Rebecca Sharp, Mithun Paul, Ajay Nagesh, Dane Bell, and Mihai Surdeanu. Grounding gradable adjectives through crowdsourcing. In Proceedings of the Eleventh International Conference on Language Resources and Evaluation, LREC 2018, May 2018.
  • William F. Sharpe. The Economics of Computers. Columbia University Press, 1969.
  • Omar Shatnawi. Measuring commercial software operational reliability: an interdisciplinary modelling approach. Eksploatacja i Niezawodnosc – Maintenance and Reliability, 16(4):585–594, 2014.
  • David E. Shaw, Ron O. Dror, John K. Salmon, J. P. Grossman, Kenneth M. Mackenzie, Joseph A. Bank, Cliff Young, Martin M. Deneroff, Brannon Batson, Kevin J. Bowers, Edmond Chow, Michael P. Eastwood, Douglas J. Ierardi, John L. Klepeis, Jeffrey S. Kuskin, Richard H. Larson, Kresten Lindorff-Larsen, Paul Maragakis, Mark A. Moraes, Stefano Piana, Yibing Shan, and Brian Towles. Millisecond-scale molecular dynamics simulations on Anton. In Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, SC'09, page 39, November 2009.
  • Benjamin R. Shear and Bruno D. Zumbo. False positives in multiple regression: Unanticipated consequences of measurement error in the predictor variables. Educational and Psychological Measurement, 73(5):733–756, October 2013.
  • Daniel Shefer. Pricing for software product managers. 2005.
  • B. A. Sheil. The psychological study of programming. ACM Computing Surveys, 13(1):101–120, March 1981.
  • Shashi Shekhar, Michael Dietz, and Dan S. Wallach. AdSplit: Separating smartphone advertising from applications. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, page 28, August 2012.
  • V. Y. Shen, S. D. Conte, and H. E. Dunsmore. Software science revisited: A critical analysis of the theory and its empirical support. Technical Report CSD-TR 375, Purdue University, January 1981.
  • Tsung-Jen Shen, Anne Chao, and Chih-Feng Lin. Predicting the number of new species in further taxonomic sampling. Ecology, 84(3):798–804, March 2003.
  • Amitai Shenhav, Sebastian Musslick, Falk Lieder, Wouter Kool, Thomas L. Griffiths, Jonathan D. Cohen, and Matthew M. Botvinick. Toward a rational and mechanistic account of mental effort. Annual Review of Neuroscience, 40:99–124, July 2017.
  • Roger N. Shepard and Jacqueline Metzler. Mental rotation of three-dimensional objects. Science, 171:701–703, February 1971.
  • Roger N. Shepard, Carl I. Hovland, and Herbert M. Jenkins. Learning and memorization of classifications. Psychological Monographs: General and Applied, 75(15):1–39, 1961.
  • Sylvia B. Sheppard and Elizabeth Kruesi. The effects of the symbology and spatial arrangement of software specifications in a coding task. Technical Report TR-81-388200-3, Information Systems Programs, General Electric, February 1981.
  • Martin Shepperd, Carolyn Mair, and Magne Jørgensen. An experimental evaluation of a de-biasing intervention for professional software developers. In eprint arXiv:cs.SE/1804.03919, April 2018.
  • Lin Shi, Hao Zhong, Tao Xie, and Mingshu Li. An empirical study on evolution of API documentation. In Proceedings of the 14th International Conference on Fundamental approaches to software engineering, FASE'11/ETAPS'11, pages 416–431, April 2011.
  • Emad Shihab, Zhen Ming Jiang, Walid M. Ibrahim, Bram Adams, and Ahmed E. Hassan. Understanding the impact of code and process metrics on post-release defects: A case study on the Eclipse project. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'10, pages 1–4, September 2010.
  • Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, and Ken ichi Matsumoto. Predicting re-opened bugs: A case study on the Eclipse project. In 17th Working Conference on Reverse Engineering, WCRE'10, pages 249–258, October 2010.
  • Masaaki Shimasaki, Shigeru Fukaya, Katsuo Ikeda, and Takeshi Kiyono. An analysis of Pascal programs in compiler writing. Software–Practice and Experience, 10(2):149–157, February 1980.
  • Anand Lal Shimpi and Brian Klug. They're (almost) all dirty: The state of cheating in Android benchmarks. Anantech news site, October 2013. http://www.anandtech.com/show/7384/state-of-cheating-in-android-benchmarks.
  • Thomas C. Shrum. Calibration and validation of the checkpoint model to the Air Force electronic systems center software database. Thesis (m.s.), Graduate School of Logistics and Acquisition Management or the Air Force Institute of Technology, USA, September 1997.
  • Anton Shterenlikht. On quality of implementation of Fortran 2008 complex intrinsic functions on branch cuts. In eprint arXiv:cs.MS/1712.10230, December 2017.
  • Oz Shy. How to Price: A Guide to Pricing Techniques and Yield Management. Cambridge University Press, 2008.
  • Robert M. Siegfried, Jason P. Siegfried, and Gina Alexandro. A longitudinal analysis of the Reid list of first programming languages. Information Systems Education Journal, 14(6):47–54, November 2016.
  • Norbert Siegmund, Marko Rosenmüller, Christian Kästner, Paolo G. Giarrusso, Sven Apel, and Sergiy S. Kolesnikov. Scalable prediction of non-functional properties in software product lines: Footprint and memory consumption. Information and Software Technology, 55(3):491–507, March 2013.
  • István Siket, Árpád Beszédes, and John Taylor. Differences in the definition and calculation of the LOC metric in free tools. Technical Report TR2014-001, Department of Software Engineering, University of Szeged, 2014.
  • R. Silberzahn, E. L. Uhlmann, D. P. Martin, P. Anselmi, F. Aust, E. Awtrey, Š. Bahník, F. Bai, C. Bannard, E. Bonnier, R. Carlsson, F. Cheung, G. Christensen, R. Clay, M. A. Craig, A. Dalla Rosa, L. Dam, M. H. Evans, I. Flores Cervantes, N. Fong, M. Gamez-Djokic, A. Glenz, S. Gordon-McKeon, T. J. Heaton, K. Hederos, M. Heene, A. J. Hofelich Mohr, F. Högden, K. Hui, M. Johannesson, J. Kalodimos, E. Kaszubowski, D. M. Kennedy, R. Lei, T. A. Lindsay, S. Liverani, C. R. Madan, D. Molden, E. Molleman, R. D. Morey, L. B. Mulder, B. R. Nijstad, N. G. Pope, B. Pope, J. M. Prenoveau, F. Rink, E. Robusto, H. Roderique, A. Sandberg, E. Schlüter, F. D. Schönbrodt, M. F. Sherman, S. A. Sommer, K. Sotak, S. Spain, C. Spörlein, T. Stafford, L. Stefanutti, S. Tauber, J. Ullrich, M. Vianello, E.-J. Wagenmakers, M. Witkowiak, S. Yoon, and B. A. Nosek. Many analysts, one data set: Making transparent how variations in analytic choices affect results. Advances in Methods and Practices in Psychological Science, 1(3):337–356, April 2018.
  • Timothy S. Simcoe and Dave M. Waguespack. Status, quality and attention: What's in a (missing) name?. Management Science, 57(2):274–290, September 2011.
  • Timothy Simcoe. Standard setting committees: Consensus governance for shared technology platforms. American Economic Review, 102(1):305–336, February 2013.
  • Timothy Simcoe. Modularity and the evolution of the internet. In Avi Goldfarb, Shane M. Greenstein, and Catherine E. Tucker, editors, Economic Analysis of the Digital Economy, chapter 1, pages 21–47. University of Chicago Press, May 2015.
  • Kevin M. Simmons and Daniel Sutter. False alarms, tornado warnings, and tornado casualties. Weather, Climate, and Society, 1(1):38–53, October 2009.
  • Herbert A. Simon. Models of Bounded Rationality: Behavioral Economics and Business Organization. The MIT Press, 1982.
  • Herbert A. Simon. Making management decisions: the role of intuition and emotion. The Academy of Management Executive (1987-1989), 1(1):57–64, February 1987.
  • Itamar Simonson. Choice based on reasons: The case of attraction and compromise effects. Journal of Consumer Research, 16:158–173, September 1989.
  • Ian C. Simpson, Petroula Mousikou, Juan Manuel Montoya, and Sylvia Defior. A letter visual-similarity matrix for Latin-based alphabets. Behavior and Research Methods, 45(2):431–439, June 2013.
  • Jeremy Singer, Mikel Luján, and Ian Watson. Meaningful type names as a basis for object lifetime prediction. In Proceedings of the 2008 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, OOPSLA'08, page ???, April 2008.
  • Param Vir Singh and Corey Phelps. Networks, social influence, and the choice among competing innovations: Insights from open source software licenses. Information Systems Research, 24(3):539–560, November 2013.
  • Dag I. K. Sjøberg, Bente Anda, Erik Arisholm, Tore Dybå, Magne Jørgensen, Amela Karahasanović, Espen F. Koren, and Marek Vokác. Conducting realistic experiments in software engineering. In Proceedings of the 2002 International Symposium on Empirical Software Engineering, ISESE'02, pages 17–26, October 2002.
  • Dag I. K. Sjøberg, Jo E. Hannay, Ove Hansen, Vigdis By Kampenes, Amela Karahasanović, Nils-Kristian Liborg, and Anette C. Rekdal. A survey of controlled experiments in software engineering. Technical Report 2004-4, SIMULA Research Laboratory, 2004.
  • Drew Skau and Robert Kosara. Arcs, angles, or areas: Individual data encodings in pie and donut charts. In Eurographics Conference on Visualization, EuroVis'16, pages 121–130, June 2016.
  • James Skelley. Open source tactics: Bargaining power for strategic litigation. Chicago-Kent Journal of Intellectual Property, 16(1), 2016.
  • Ioannis Skoulis. Analysis of schema evolution for databases in open-source software. Thesis (m.s.), University of Ioannina, Greece, September 2013.
  • Giles Slade. Made to Break: Technology and Obsolescence in America. Harvard University Press, 2007.
  • Sandra A. Slaughter, Soon Ang, and Wai Fong Boh. Firm-specific human capital and compensation-organizational tenure profiles: An archival analysis of salary data for IT professionals. Human Resource Management, 46(3):373–394, 2007.
  • Steven A. Sloman and David A. Lagnado. Do we "do"?. Cognitive Science, 29(1):5–39, January-February 2005.
  • Steven A. Sloman and David Lagnado. Causality in thought. Annual Review of Psychology, 66:223–247, 2015.
  • Steven A. Sloman, Marianne C. Harrison, and Barbara C. Malt. Recent exposure affects artifact naming. Memory & Cognition, 30(5):687–695, 2002.
  • Steven A. Sloman. The empirical case for two systems of reasoning. Psychological Bulletin, 119(1):3–22, 1996.
  • Steven A. Sloman. Categorical inference is not a tree: The myth of inheritance hierarchies. Cognitive Psychology, 35(1):1–33, February 1998.
  • Paul Slovic. The Perception of Risk. Earthscan Publications Ltd, 2000.
  • Paul E. Smaldino and Richard McElreath. The natural selection of bad science. Royal Society Open Science, 3:160384, August 2016.
  • Darja Smite, Ricardo Britto, and Rini van Solingen. Calculating the extra costs and the bottom-line hourly cost of offshoring. In IEEE 12th International Conference on Global Software Engineering, ICGSE'17, pages 96–105, May 2017.
  • G. K. Smith, A. A. Barbour, T. L. McNaugher, M. D. Rich, and W. L. Stanley. The use of prototypes in weapon system development. Report R-2345-AF, The RAND Corporation, March 1981.
  • Clare M. So. An analysis of mathematical expressions used in practice. Thesis (m.s.), The University of Western Ontario, 2005.
  • Florian Söhnchen and Sönke Albers. Pipeline management for the acquisition of industrial projects. Industrial Marketing Management, 39(8):1356–1364, November 2010.
  • Manuel Sojer, Oliver Alexy, Sven Kleinknecht, and Joachim Henkel. Understanding the drivers of unethical programming behavior: The inappropriate reuse of internet-accessible code. Journal of Management Information Systems, 31(3):287–325, 2014.
  • Solganick & Co. Software M&A update. http://www.solganickco.com/wp-content/uploads/2017/02/Solganick-Software-Q4-2016-final.pdf, April 2016.
  • Martin B. Solomon, Jr. Economies of scale and the IBM System/360. Communications of the ACM, 9(6):435–440, June 1966.
  • Geoffrey S. Sommer. Astronomical Odds A Policy Framework for the Cosmic Impact Hazard. PhD thesis, Pardee RAND Graduate School, USA, June 2004.
  • Joep Sonnemans. Price clustering and natural resistance points in the Dutch stock market: A natural experiment. European Economic Review, 50(8):1937–1950, November 2006.
  • César Soto-Valero, Martin Monperrus, Nicolas Harrand, and Benoit Baudry. A comprehensive study of bloated dependencies in the Maven ecosystem. In eprint arXiv:cs.SE/2001.07808, January 2020.
  • Robert William Soukoreff. Quantifying Text Entry Performance. PhD thesis, York University, Toronto, Canada, April 2010.
  • SPEC. SPEC power_ssj 2008. http://spec.org/power_ssj2008, June 2016.
  • SPEC. Standard performance evaluation corporation. http://spec.org, September 2020.
  • SPECpower Committee. Power and performance benchmark methodology. V 2.2, Standard Performance Evaluation Corporation (SPEC), December 2014.
  • Ian Spence and Stephan Lewandowsky. Displaying proportions and percentages. Applied Cognitive Psychology, 5(1):61–77, April 1991.
  • Michael Spence. Job market signalling. The Quarterly Journal of Economics, 87(3):355–374, August 1973.
  • Ian Spence. Visual psychophysics of simple graphical elements. Journal of Experimental Psychology: Human Perception and Performance, 16(4):683–692, November 1990.
  • Dan Sperber and Deirdre Wilson. Relevance: Communication and Cognition. Blackwell Publishers, second edition, 1995.
  • Diomidis Spinellis, Vassilios Karakoidas, and Panos Louridas. Comparative language fuzz testing: Programming languages vs. fat fingers. In Proceedings of the Workshop on Evaluation and Usability of Programming Languages and Tools, PLATEAU'12, pages 25–34, October 2012.
  • Diomidis Spinellis, Zoe Kotti, Konstantinos Kravvaritis, Georgios Theodorou, and Panos Louridas. A dataset of enterprise-driven open source software. In eprint arXiv:cs.SE/2002.03927, February 2020.
  • Diomidis Spinellis. Code Reading: The Open Source Perspective. Addison–Wesley, 2003.
  • Joel Spolsky. Fog Creek professional ladder. https://www.joelonsoftware.com/2009/02/13/fog-creek-professional-ladder, February 2009.
  • Jon Sprouse and Diogo Almeida. Assessing the reliability of textbook data in syntax: Adger's core syntax. Journal of Linguistics, 48(3):609–652, November 2012.
  • David Spuler. C++ and C debugging, testing and reliability. Prentice-Hall, Inc, 1994.
  • Larry R. Squire and Adam J. O. Dede. Conscious and unconscious memory systems. Perspectives in Biology, 7(3):a021667, March 2015.
  • Jayanth Srinivasan. Lifetime Reliability Aware Microprocessor. PhD thesis, University of Illinois at Urbana-Champaign, October 2006.
  • Elmer B. Staats. Millions in savings possible in converting programs from one computer to another. Technical Report FGMSD-77-34, Office of Management and Budget, Nationai Bureau of Standards, September 1977.
  • Charles B. Stabell and Øystein D. Fjeldstad. Configuring value for competitive advantage: On chains, shops, and networks. Strategic Management Journal, 19(5):413–437, May 1998.
  • Standish Group. The CHAOS report. Technical report, The Standish Group International, Inc, August 1994.
  • Phillip Stanley-Marbell, Virginia Estellers, and Martin Rinard. Crayon: Saving power through shape and color approximation on next-generation displays. In Proceedings of the Eleventh European Conference on Computer Systems, EuroSys'16, page 11, April 2016.
  • Keith E. Stanovich and Richard F. West. Individual differences in reasoning: Implications for the rationality debate?. Behavioral and Brain Sciences, 23(5):645–726, October 2000.
  • Keith E. Stanovich. Who Is Rational? Studies of Individual Differences in Reasoning. Lawrence Erlbaum Associates, 1999.
  • Mark Staples, Rafal Kolanski, Gerwin Klein, Corey Lewis, June Andronick, Toby Murray, Ross Jeffery, and Len Bass. Formal specifications better than function points for code sizing. In International Conference on Software Engineering, ICSE'13, pages 1257–1260, May 2013.
  • Jürgen Starek. A large-scale analysis of Java API usage. Thesis (m.s.), Institut für Informatik, Universität Koblenz-Landau, March 2010.
  • Tyler N. Starr, Lora K. Picton, and Joseph W. Thornton. Alternative evolutionary histories in the sequence space of an ancient protein. Nature, 549:409–413, September 2017.
  • Evan Starr. The use, abuse, and enforceability of non-compete and no-poach agreements: A brief review of the theory, evidence, and recent reform efforts. Issue brief, Economic Innovation Group, Washington D.C., February 2019.
  • Mikis Stasinopoulos, Bob Rigby, Vlasios Voudouris, Gillian Heller, and Fernanda De Bastiani. Flexible regression and smoothing: The GAMLSS packages in R. draft book, July 2015.
  • Garold Stasser and William Titus. Effects of information load and percentage of shared information on the dissemination of unshared information during group discussion. Journal of Personality and Social Psychologs, 53(1):81–93, July 1987.
  • Michael Steele and Janet Chaseling. Powers of discrete goodness-of-fit test statistics for a uniform null against a selection of alternative distributions. Communications in Statistics-Simulation and Computation, 35(4):1067–1075, April 2006.
  • Guy L. Steele, Jr. and Richard P. Gabriel. The evolution of Lisp. In The second ACM SIGPLAN conference on History of Programming Languages, HOPL II, pages 231–270, April 1993.
  • R. Grant Steen, Arturo Casadevall, and Ferric C. Fang. Why has the number of scientific retractions increased?. PLoS ONE, 8(7), April 2013. (doi:10.1371/journal.pone.0068397)
  • John Steffens. Newgames: Strategic Competition in the PC revolution. Pergamon Press, 1994.
  • Thanasis Stengos and Eleftherios Zacharias. Intertemporal pricing and price discrimination: A semiparametric hedonic analysis of the personal computer market. Discussion Paper 2002-11, Department of Economics, University of Cyprus, June 2002.
  • Keith Stenning and Michiel van Lambalgen. Semantics as a foundation for psychology: A case study of Wason's selection task. Journal of Logic, Language and Information, 10(3):273–317, June 2001.
  • Keith Stenning and Michiel van Lambalgen. A little logic goes a long way: basing experiment on semantic theory in the cognitive science of conditional reasoning. Cognitive Science, 28(4):481–530, July-August 2004.
  • Keith Stenning and Michiel van Lambalgen. Human Reasoning and Cognitive Science. The MIT Press, 2008.
  • M. A. Stephens. EDF statistics for goodness of fit and some comparisons. Journal of the American Statistical Association, 69(347):730–737, September 1974.
  • Robert J. Sternberg and Evelyn M. Weil. An aptitude-strategy interaction in linear syllogistic reasoning. Technical Report 15, Department of Psychology, Yale University, April 1979.
  • Saul Sternberg. Memory-scanning: Mental processes revealed by reaction-time experiments. American Scientist, 57(4):421–457, 1969.
  • Albert Stevens and Patty Coupe. Distortions in judged spatial relations. Cognitive Psychology, 10(4):422–437, October 1978.
  • Neil Stewart, Nick Chater, and Gordon D. A. Brown. Decision by sampling. Cognitive Psychology, 53(1):1–26, January 2006.
  • Neil Stewart, Christoph Ungemach, Adam J. L. Harris, Daniel M. Bartels, Ben R. Newell, Gabriele Paolacci, and Jesse Chandler. The average laboratory samples a population of 7,300 Amazon Mechanical Turk workers. Judgment and Decision Making, 10(5):479–491, September 2015.
  • Gábor Stikkel. Dynamic model for the system testing process. Information and Software Technology, 48(7):578–585, July 2006.
  • Victoria Stodden, Peixuan Guo, and Zhaokun Ma. Toward reproducible computational research: An empirical analysis of data and code policy adoption by journals. PLoS ONE, 8(6):e13636, June 2013.
  • Zeljko Stojanova, Dalibor Dobrilovic, and Jelena Stojanova. Analyzing trends for maintenance request process assessment: Empirical investigation in a very small software company. Theory and Applications of Mathematics & Computer Science, 3(2):59–74, November 2013.
  • Jonathan Stone, Michael Greenwald, Craig Partridge, and Jim Hughes. Performance of checksums and CRCs over real data. IEEE/ACM Transactions on Networking, 6(5):529–543, October 1998.
  • Gregory P. Stone, Daniel B. Levin, Hojoon Hwang, Miriam Kim, and Caroline Mckay. JANET SKOLD and DAVID DOSSANTOS, on behalf of themselves and all others similarly situated, v. INTEL CORPORATION, HEWLETT PACKARD COMPANY and DOES 1-50, case no. 1-05-CV-039231, filing #g-64475. Opinion, Superior court of the state of California for the county of Santa Clara, 2014.
  • Harold S. Stone. Life-cycle cost analysis of instruction-set architecture standardization for military computer systems. Computer, 12(4):35–47, April 1979.
  • Paul Stoneman. Technological Diffusion and the Computer Revolution: The UK experience. Cambridge University Press, January 1976.
  • David Straker. C-Style standards and guidelines. Prentice-Hall, Inc, 1992.
  • Steve Strand, Ian J. Deary, and Pauline Smith. Sex differences in cognitive abilities test scores: A UK national picture. British Journal of Educational Psychology, 76(3):463–480, April 2006.
  • Wolfgang Stroebe, Bernard A. Nijstad, and Eric F. Rietzschel. Beyond productivity loss in brainstorming groups: The evolution of a question. Working Paper No. 2014-05, Center for Research in Economics, Management and the Arts, CREMA Südstrasse 11 CH, 2014.
  • Randeep Sudan, Seth Ayers, Philippe Dongier, Arturo Muente-Kunigami, and Christine Zhen-Wei Qiang. The global opportunity in IT-based services: Assessing and enhancing country competitiveness. Report, The World Bank, 2010.
  • Chengnian Sun, Vu Le, Qirun Zhang, and Zhendong Su. Toward understanding compiler bugs in GCC and LLVM. In Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA'16, pages 294–305, July 2016.
  • Sun Microsystems, Inc. Java code conventions. Technical report, Sun Microsystems, Inc, September 1997.
  • Liyang Sun. What we are paying for: A quality adjusted price index for laptop microprocessors. Honors thesis, Wellesley College, April 2014.
  • Takahiro Sunada, Akito Monden, and Kenichi Matsumoto. On estimating source lines of code from a binary program. In Joint Conference of International Workshop on Software Measurement and International Conference on Software Process and Product Measurement, IWSM/Mensura 2011, pages 3–6, November 2011.
  • Cass R. Sunstein. The Cost-Benefit Revolution. The MIT Press, August 2018.
  • Arjun Suresh, Bharath Narasimha Swamy, Erven Rohou, and André Seznec. Intercepting functions for memoization: A case study using transcendental functions. Transactions on Architecture and Code Optimization, 12(2):18, July 2015.
  • Pawin Suthipornopas, Pattara Leelaprute, Akito Monden, Hidetake Uwano, Yasutaka Kamei, Naoyasu Ubayashi, Kenji Araki, Kingo Yamada, and Ken ichi Matsumoto. Industry application of software development task measurement system: TaskPit. IEICE Transactions on Information & Systems, E100(3):462–472, March 2017.
  • Kosuke Suzuki and Steven Swanson. A survey of trends in non-volatile memory technologies: 2000-2014. In IEEE International Memory Workshop, IMW, pages 1–4, May 2015.
  • Toshitaka N. Suzuki, David Wheatcroft, and Michael Griesser. Experimental evidence for compositional syntax in bird calls. Nature Communications, 7(10986), March 2016.
  • Michael Swan and Bernard Smith. Learner English: A teacher's guide to interference and other problems. Cambridge University Press, second edition, 2001.
  • E. Burton Swanson and Cynthia Mathis Beath. Maintaining Information Systems in Organizations. John Wiley & Sons, Inc, 1989.
  • Gary M. Swift and Steven M. Guertin. In-flight observations of multiple-bit upset in DRAMs. IEEE Transactions on Nuclear Science, 47(6):2386–2391, December 2000.
  • Raza Abbas Syed, Brian Robinson, and Laurie Williams. Does hardware configuration and processor load impact software fault observability?. In Third International Conference on Software Testing, Verification and Validation, ICST'10, pages 285–294, April 2010.
  • Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai (Box) Leangsuksun, George Ostrouchov, Stephen L. Scott, and Christian Englemann. Blue Gene/L log analysis and time to interrupt estimation. In International Conference on Availability, Reliability and Security, ARES'09, pages 173–180, October 2009.
  • Lisa Takeyama. The shareware industry: Some stylized facts and estimates of rates of return. Economics of Innovation and New Technology, 3(2):161–174, January 1994.
  • Paul P. Tallon, Robert J. Kauffman, Henry C. Lucas, Andrew B. Whinston, and Kevin Zhu. Using real options analysis for evaluating uncertain investments in information technology: Insights from the ICIS 2001 debate. Communications of the Association for Information Systems, 9:136–167, September 2002.
  • Kar Yan Tam. Capital budgeting in information systems development. Information & Management, 23(6):345–357, December 1992.
  • Tetsuo Tamai and Yohsuke Torimitsu. Software lifetime and its evolution process over generations. In Proceedings of 1992 Conference on Software Maintenance, pages 63–69, November 1992.
  • T. Tamai. Experiment on coordination within software development teams. Information and Software Technology, 34(7):437–442, July 1992.
  • Pang-Ning Tan and Vipin Kumarand Jaideep Srivastava. Selecting the right objective measure for association analysis. Information Systems, 29(4):293–313, June 2004.
  • Enyi Tang, Earl Barr, Xuandong Li, and Zhendong Su. Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. In Proceedings of the 19th International symposium on Software testing and analysis, ISSTA'10, pages 131–142, July 2010.
  • Vasily Tarasov, Amar Mudrankit, Will Buik, Philip Shilane, Geoff Kuenning, and Erez Zadok. Generating realistic datasets for deduplication analysis. In Proceedings of the 2012 USENIX Annual Technical Conference, ATC'12, June 2012.
  • R. C. Tausworthe. Staffing implications of software productivity models. In E. C. Posner, editor, The Telecommunication and Data Acquisition Report 42-72, pages 70–77. Jet Propulsion Laboratory, California Institute of Technology, October-December 1982.
  • Frederick Winslow Taylor. The Principles of Scientific Management. Harper & Brothers Publishers, 1919.
  • Quinn C. Taylor. Analysis and characterization of author contribution patterns in open source software development. Thesis (m.s.), Brigham Young University, April 2012.
  • Matti Tedre. Computing as a science: A survey of competing viewpoints. Minds & Machines, 21(3):361–387, August 2011.
  • Jamshid J. Tehrani. The phylogeny of little red riding hood. PLoS ONE, 8(11):e78871, November 2013.
  • Jose Teixeira, Gregorio Robles, and Jesús M. González-Barahona. Lessons learned from applying social network analysis on an industrial free/libre/open source software ecosystem. Journal of Internet Services and Applications, 6(1):1–27, 2015.
  • Matthias Templ, Bernhard Meindl, and Alexander Kowarik. Introduction to statistical disclosure control (SDC). Technical report, International Household Survey Network, October 2015.
  • Katya Tentori, Daniel Osherson, Lynn Hasher, and Cynthia May. Wisdom and ageing: Irrational preferences in college students but not older adults. Cognition, 81(3):B87–B99, 2001.
  • Philip E. Tetlock. Accountability: The neglected social context of judgment and choice. Research in Organizational Behavior, 7:297–332, 1985.
  • Philip E. Tetlock. An alternative metaphor in the study of judgment and choice: People as politicians. Theory and Psychology, 1(4):451–475, 1991.
  • Tezzaron Semiconductor. Soft errors in electronic memory. Technical Report 1.1, Tezzaron Semiconductor, Naperville, IL, January 2004.
  • Thomas A. Thayer, Myron Lipow, and Eldred C. Nelson. Software Reliability. North-Holland Publishing Company, 1978.
  • The Commission. Report of investigation pursuant to section 21(a) of the securities exchange Act of 1934: The DAO. Release No. 81207, Securities and Exchange Commission, July 2017.
  • Eno Thereska, Bjoern Doebel, Alice X. Zheng, and Peter Nobel. Practical performance models for complex, popular applications. In Performance Evaluation Review, SIGMETRICS'10, pages 1–12, June 2010.
  • Manoj Thomas and Vicki Morwitz. Penny wise and pound foolish: The left-digit effect in price cognition. Journal of Consumer Research, 32(1):54–64, June 2005.
  • Manoj Thomas, Daniel H. Simon, and Vrinda Kadiyali. Do consumers perceive precise prices to be lower than round prices? Evidence from laboratory and market data. Research Paper Series #09-07, Johnson School, Cornell University, September 2007.
  • Daniel R. Thomas. Security metrics for computer systems. PhD thesis, Cambridge Computer Laboratory, University of Cambridge, September 2015.
  • Peter Thompson. How much did the Liberty shipbuilders forget?. Management Science, 53(6):908–918, June 2007.
  • Ben Thompson. The Bill Gates line. blog: Stratechery, May 2018. https://stratechery.com/2018/the-bill-gates-line.
  • Suresh Thummalapenta, Luigi Cerulo, Lerina Aversano, and Massimiliano Di Penta. An empirical study on the maintenance of source code clones. Empirical Software Engineering, 15(1):1–34, February 2010.
  • John Daniel Tinder. ENTRY GRANTING REASSERTED MOTION TO DISMISS (Docket No. 34): DANIEL WALLACE, v. FREE SOFTWARE FOUNDATION, INC.. Case 1:05-cv-0618-JDT-TAB, UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION, March 2006.
  • Miles A. Tinker. The relative legibility of the letters, the digits, and of certain mathematical signs. Journal of Generative Psychology, 1:472–494, 1928.
  • Steve Tockey. Return on Software: Maximizing the Return on Your Software Investment. Addison–Wesley, 2005.
  • Bruce Tognazzini. Principles, techniques, and ethics of stage magic and their application to human interface design. In Conference on Human Factors in Computing Systems, INTERCHI'93, pages 355–362, May 1993.
  • James E. Tomayko. Computers in spaceflight: The NASA experience. NASA Contractor Report 182505, Wichita State University, Kansas, March 1988.
  • J. T. Townsend. Theoretical analysis of an alphabetic confusion matrix. Perception & Psychophysics, 9(1A):40–50, 1971.
  • Timothy S. Traaen. The Brooks Act: An 8-bit act in a 64-bit world? An investigation of the Brooks Act and its implications to the Department of Defense information technology acquisition process. Executive Research Project S18, The Industrial College of the Armed Forces, National Defense University, Washington, D.C., May 1995.
  • Transactions on Mathematical Software. Collected algorithms. organization website, October 2020. http://www.acm.org/calgo.
  • Transport, Department for. The accidents sub-objective. Transport Analysis Guidance Unit 3.4.1, Department for Transport, United Kingdom, April 2011.
  • Anne Treisman and Janet Souther. Search asymmetry: A diagnostic for preattentive processing of separable features. Journal of Experimental Psychology: General, 114(3):285–310, 1985.
  • Lana M. Trick and Zenon W. Pylyshyn. What enumeration studies can show us about spatial attention: Evidence for limited capacity preattentive processing. Journal of Experimental Psychology: Human Perception and Performance, 19(2):331–351, 1993.
  • Jack E. Triplett. Performance measures for computers. In Deconstructing the Computer, pages 99–139, February 2003.
  • Dries Trippas, David Kellen, Henrik Singmann, Gordon Pennycook, Derek J. Koehler, Jonathan A. Fugelsang, and Chad Dubé. Characterizing belief bias in syllogistic reasoning: A hierarchical Bayesian meta-analysis of ROC data. Psychonomic Bulletin and Review, 25(2):2141–2174, April 2018.
  • Kishor S. Trivedi. Probability & Statistics with Reliability, Queuing and Computer Science Applications. John Wiley & Sons, Inc, second edition, 2002.
  • Jennifer S. Trueblood and Jerome R. Busemeyer. A quantum probability account of order effects in inference. Cognitive Science, 35(8):1518–1552, November-December 2011.
  • Chia-Che Tsai, Bhushan Jain, Nafees Ahmed Abdul, and Donald E. Porter. A study of modern Linux API usage and compatibility: What to support when you're supporting. In Proceedings of the Eleventh European Conference on Computer Systems, EuroSys'16, page 16, April 2016.
  • Nikolai Philipp Tschacher. Typosquatting in programming language package managers. Thesis (b.sc.), Department of Informatics, University of Hamburg, March 2016.
  • Thanos K. Tsingos. Enforceability of free/open source software licensing terms: A critical review of the global case - law. In Fourth International Conference on Information Law, ICIL 2011, May 2011.
  • TSMC. TSMC historical operating data. http://www.tsmc.com/english/investorRelations/historical_information.htm, May 2017.
  • Michele Tufano, Fabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrea De Lucia, and Denys Poshyvanyk. There and back again: Can you compile that snapshot?. Journal of Software: Evolution and Process, 29(4):e1838, April 2017.
  • Thomas S. Tullis and Jacqueline N. Stetson. A comparison of questionnaires for assessing website usability. In Proceedings of Usability Professionals Association, pages 1–12, June 2004.
  • Jim Turley. Embedded processors. http://www.extremetech.com, January 2002.
  • Marilyn L. Turner and Randall W. Engle. Is working memory capacity task dependent?. Journal of Memory and Language, 28(2):127–154, April 1989.
  • Heather Turner and David Firth. Bradley-Terry models in R: The BradleyTerry2 package. Journal of Statistical Software, 48(9):1–21, 2012.
  • Heather Turner and David Firth. Generalized nonlinear models in R: An overview of the gnm package. University of Warwick, UK, 1.0-8 edition, April 2015.
  • Roger Turner. Weathering Heights: The Emergence of Aeronautical Meteorology as an Infrastructural Science. PhD thesis, University of Pennsylvania, May 2010.
  • Laura D'Andrea Tyson. Who's Bashing Whom? Trade Conflict in High-Technology Industries. Institute for International Economics, November 1992.
  • Joseph Tzelgov, Vered Yehene, Lital Kotler, and Ariel Alon. Automatic comparisons of artificial digits never compared: Learning linear ordering relations. Journal of Experimental Psychology: Learning, Memory, & Cognition, 26(1):103–120, 2000.
  • UBM. Then, now: What's next?. Embedded Market Study 2014, UBM Electronics, 2014.
  • The ultimate Debian database. organization website, 2014. http://wiki.debian.org/UltimateDebianDatabase.
  • Gülden Ülkümen, Manoj Thomas, and Vicki G. Morwitz. Will i spend more in 12 months or a year? The effect of ease of estimation and confidence on budget estimates. Journal of Consumer Research, 35(2):245–256, March 2008.
  • Unicode Consortium, The. The Unicode Standard Version 11.0 – Core Specification. The Unicode Consortium, June 2018.
  • President United States. Fiscal year 2018 activities. Aeronautics and space report of the president, National Aeronautics and Space Council, September 2018.
  • Sri Siddhi N. Upadhyay, Kenneth J. Houghtonb, and Celia M. Klin. Is "few" always less than expected?: The influence of story context on readers' interpretation of natural language quantifiers. Discourse Processes, 56(8):708–727, 2018.
  • Ian Utting, Dennis Bouvier, Michael Caspersen, Allison Elliott Tew, Roger Frye, Yifat Ben-David Kolikant, Mike McCracken, James Paterson, Juha Sorva, Lynda Thomas, and Tadeusz Wilusz. A fresh look at novice programmers' performance and their teachers' expectations. In Proceedings of the ITiCSE working group reports conference on Innovation and Technology in Computer Science Education-Working Group Reports, ITiCSE-WGR'13, pages 15–32, June 2013.
  • Arash Vahabzadeh, Amin Milani Fard, and Ali Mesbah. An empirical study of bugs in test code. In International Conference on Software Maintenance and Evolution, ICSME 2015, pages 101–110, October 2015.
  • Mikko Välimäki. Dual licensing in open source software industry. Systemes d'Information et Management, 8(1):63–75, 2003.
  • Joey van Angeren, Carina Alves, and Slinger Jansen. Can we ask you to collaborate? Analyzing app developer relationships in commercial platform ecosystems. Journal of Systems and Software, 113:430–445, March 2016.
  • Omer Van den Bergh, Scott Vrana, and Paul Eelen. Letters from the heart: Affective categorization of letter combinations in typists and nontypists. Journal of Experimental Psychology: Learning, Memory, & Cognition, 16(6):1153–1161, 1990.
  • K. Gerald van den Boogaart and Raimon Tolosana-Deldago. Analyzing Compositional Data with R. Springer, 2013.
  • Jean-Baptiste van der Henst, Laure Carles, and Dan Sperber. Truthfulness and relevance in telling the time. Mind & Language, 17(5):457–466, November 2002.
  • Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, and Gernot Heiser. Benchmarking crimes: An emerging threat in systems security. In eprint arXiv:cs.CR/1801.02381, January 2018.
  • Carmen van der Merwe. An engineering approach to an integrated value proposition design framework. Thesis (m.s.), Faculty of Industrial Engineering at Stellenbosch University, March 2015.
  • M. J. P. van der Meulen, P. G. Bishop, and M. Revilla. An exploration of software faults and failure behaviour in a large population of programs. In 15th International Symposium on Software Reliability Engineering, ISSRE'04, pages 101–120, November 2004.
  • Meine Jochum Peter van der Meulen. The Effectiveness of Software Diversity. PhD thesis, Centre for Software Reliability, City University, November 2007.
  • Michiel P. van Oeffelen and Peter G. Vos. A probabilistic model for the discrimination of visual number. Perception & Psychophysics, 32(2):163–170, 1982.
  • K. E. van Oorschot, J. W. M. Bertrand, and C. G. Rutte. Field studies into the dynamics of product development tasks. International Journal of Operations & Production Management, 25(8):720–739, 2005.
  • Peter Van Roy. Programming paradigms for dummies: What every programmer should know. In Gérard Assayag and Andrew Gerzso, editors, New computational paradigms for computer music, chapter 2. Delatour France, January 2009.
  • Hurt VanLehn. Mind Bugs: The Origins of Procedural Misconceptions. The MIT Press, 1990.
  • Yoav Vardi and Ely Weitz. Misbehavior in Organizations: Theory, Research, and Management. Lawrence Erlbaum Associates, September 2004.
  • Rajesh Vasa. Growth and Change Dynamics in Open Source Software Systems. PhD thesis, Faculty of Information and Communication Technology, Swinburne University of Technology, Melbourne, October 2010.
  • Bogdan Vasilescu, Alexander Serebrenik, Mathieu Goeminne, and Tom Mens. On the variation and specialisation of workload-A case study of the Gnome ecosystem community. Empirical Software Engineering, 19(4):955–1008, August 2012.
  • Carmine Vassallo, Giovanni Grano, Fabio Palomba, Harald C. Gall, and Alberto Bacchelli. A large-scale empirical exploration on refactoring activities in open source software projects. Science of Computer Programming, 180:1–15, July 2019.
  • Panos Vassiliadis, Michail-Romanos Kolozoff, Maria Zerva, and Apostolos V. Zarras. Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity. Computing, 101(10):1431–1456, October 2019.
  • VCDB. VERIS community database. https://github.com/vz-risk/VCDB, March 2018.
  • W. N. Venables and B. D. Ripley. Modern Applied Statistics with S. Springer, fourth edition, 2002.
  • W. N. Venables, D. M. Smith, and R Core Team. An Introduction to R. The R Development Core Team, May 2014.
  • Christopher Vendome, Mario Linares-Vásquez, Gabriele Bavota, Massimiliano Di Penta, Daniel German, and Denys Poshyvanyk. License usage and changes: A large-scale study on GitHub. Empirical Software Engineering, 22(3):1537–1577, June 2017.
  • Preeti Verghese and Debis G. Pelli. The information capacity of visual attention. Vision Research, 32(5):983–995, 1992.
  • C. Verhoef. Quantitative IT portfolio management. Science of Computer Programming, 45(1):1–96, October 2002.
  • Crista Vesel. Language bias in accident investigation. Thesis (m.s.), Lund University, Sweden, May 2012.
  • Iris Vessey. Cognitive fit: A theory-based analysis of the graphs versus tables literature. Decision Sciences, 22(2):219–240, March 1991.
  • Antonio Vetrò, Rupert Dürre, Marco Conoscenti, Daniel Méndez Fernández, and Magne Jørgensen. Combining data analytics with team feedback to improve the estimation process in agile software development. Foundations of Computing and Decision Sciences, 43(4):305–334, December 2018.
  • Boris Veytsman and Leyla Akhmadeeva. Towards evidence-based typography: First results. TUGboat, 33(2):156–156, April 2012.
  • Vgchartz global yearly chart: 2005-2016. VGChartz news site, February 2017. http://www.vgchartz.com/yearly/2016/Global.
  • V. Brian Viard. Information goods upgrades: Theory and evidence. The B. E. Journal of Theoretical Economics, 7(1):1–34, 2007.
  • Coryn Vickrey and Allen Neuringer. Pigeon reaction time, Hick's law, and intelligence. Psychonomic Bulletin & Review, 7(2):284–291, June 2000.
  • Nadejda M. Victor and Jesse H. Ausubel. DRAMs as model organisms for study of technological evolution. Technological Forecasting & Social Change, 69(3):243–262, April 2002.
  • S. Vidal, A. Bergel, J. A. Díaz-Pace, and C. Marcosa. Over-exposed classes in Java: An empirical study. Computer Languages, Systems & Structures, 46:1–19, November 2016.
  • Françoise Viénot, Hans Brettel, and John D. Mollon. Digital video colourmaps for checking the legibility of displays by dichromats. COLOR research and application, 24(4):243–252, August 1999.
  • Victorien Villard. Android version distribution history. http://www.bidouille.org/misc/androidcharts, 2015.
  • Timothy H. Vines, Arianne Y. K. Albert, Rose L. Andrew, Florence Débarre, Dan G. Bock, Michelle T. Franklin, Kimberly J. Gilbert, Jean-Sébastien Moore, Sébastien Renaut, and Diana J. Rennison. The availability of research data declines rapidly with article age. In eprint arXiv:abs/1312.5670, December 2013.
  • W. Kip Viscusi and Joseph E. Aldy. The value of a statistical life: A critical review of market estimates throughout the world. Working Paper No. 9487, National Bureau of Economic Research, USA, February 2003.
  • Robert Viseur and Gregorio Robles. First results about motivation and impact of license changes in open source projects. In 11th IFIP WG 2.13 International Conference, OSS 2015, pages 137–145, May 2015.
  • Howard M. Vollmer, John J. McAuliffe, Richard I. Hirshberg, and Kendall D. Moll. Organizational design – An exploratory study. R&D Studies Series AFOSR-67-2450, Stanford Research Institute, December 1967.
  • Jenny Volstorf. Against all noise: On noise-robust strategies in the emergence of cooperation. PhD thesis, Mathematisch-Naturwissenschaftlichen Fakultät II, Humboldt-Universität, February 2013.
  • Kirsten G. Volz and Gerd Gigerenzer. Cognitive processes in decisions under risk are not the same as in decisions under uncertainty. frontiers in Neuroscience, 6:105, July 2012.
  • Kai von Fintel and Lisa Matthewson. Universals in semantics. The Linguistic Review, 25(1-2):139–201, 2008.
  • Alexander von Rhein, Jörg Liebig, Andreas Janker, Christian Kästner, and Sven Apel. Variability-aware static analysis at scale: An empirical study. ACM Transactions on Software Engineering and Methodology, 27(4):18, November 2018.
  • Simon L. R. Vrhovec, Tomaž Hovelja, Damjan Vavpotič, and Marjan Krisper. Diagnosing organizational risks in software projects: Stakeholder resistance. International Journal of Project Management, 33(6):1262–1273, August 2015.
  • Martin Wachs. When planners lie with numbers. Journal of the American Planning Association, 55(4):476–479, April 1989.
  • Johan Wagemans, James H. Elder, Michael Kubovy, Mary A. Peterson, Stephen E. Palmer, Manish Singh, and Rüdiger von der Heydt. A century of Gestalt psychology in visual perception: I. Perceptual grouping and figure-ground organization. Psychological Bulletin, 138(6):1172–1217, 2012.
  • Jonathan Wai, Megan Cacchio, Martha Putallaz, and Matthew C. Makel. Sex differences in the right tail of cognitive abilities: A 30 year examination. Intelligence, 38(4):412–423, July-August 2010.
  • Jacques Wainer, Claudia G. Novoa Barsottini, Danilo Lacerda, and Leandro Rodrigues Magalhães de Marco. Empirical evaluation in computer science research published by ACM. Information and Software Technology, 51(6):1081–1085, June 2009.
  • Lord Wakeham. Government policy on the management of risk, volume I: Report. HL Paper 183-I, Select Committee on Economic Affairs, UK House of Lords, June 2006.
  • Sharon Waligora, John Bailey, and Mike Stark. Impact of Ada and object-oriented design in the flight dynamics division at Goddard space flight center. Technical Report SEL-95-001, Goddard Space Flight Center, March 1995.
  • Dolores R. Wallace and D. Richard Kuhn. Failure modes in medical device software: An analysis of 15 years of recall data. International Journal of Reliability, Quality and Safety Engineering, 8(4):351–372, December 2001.
  • Peipei Wang and Kathryn T. Stolee. How well are regular expressions tested in the wild?. In Proceedings of the 26th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'18, pages 668–678, November 2018.
  • Yong Wang and Jing Zhang. The effort distribution of software development phases. Computer Science and Application, 7(5):428–437, May 2017.
  • Haoyu Wang, Hao Li, Li Li, Yao Guo, and Guoai Xu. Why are Android apps removed from Google play? A large-scale empirical study. In Proceedings of the 15th International Conference on Mining Software Repositories, MSR'18, pages 231–242, May 2018.
  • Ping Wang. Chasing the hottest IT: Effects of information technology fashion on organizations. MIS Quarterly, 34(1):63–85, March 2010.
  • Wei Wang. Toward improved understanding and management of software clones. Thesis (m.s.), University of Waterloo, Ontario, Canada, May 2012.
  • Yi Wang. Language matters. In Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM'15, pages 1–10, October 2015.
  • Lucas Wanner, Charwak Apte, Rahul Balani, Puneet Gupta, and Mani Srivastava. A case for opportunistic embedded sensing in presence of hardware power variability. In Proceedings of the 2010 International Conference on Power aware computing and systems, HotPower'10, pages 1–8, October 2010.
  • Geoff Ward, Lydia Tan, and Rachel Grenfell-Essam. Examining the relationship between free recall and immediate serial recall: the effects of list length and output order. Journal of Experimental Psychology: Learning, Memory, & Cognition, 36(5):1207–1241, September 2010.
  • Peter James Ward. Euclid's Elements, from Hilbert's axioms. Thesis (m.s.), The Ohio State University, 2012.
  • W. H. Ware, S. N. Alexander, Paul Armer, M. M. Astrahan, Lipman Bers, H. H. Goode, H. D. Huskey, and Morris Rubinoff. Soviet computer technology–1959. Research Memorandum RM-2541, The RAND Corporation, March 1960.
  • Colin Ware. Information Visualization Perception for Design. Morgan Kaufmann Publishers, 2000.
  • P. C. Wason. On the failure to eliminate hypotheses in a conceptual task. The Quarterly Journal of Experimental Psychology, XII(3):129–140, 1960.
  • P. C. Wason. Reasoning about a rule. The Quarterly Journal of Experimental Psychology, 20(3):273–281, 1968.
  • James Waters. Variable marginal propensities to pirate and the diffusion of computer software. MPRA Paper No. 46036, Nottingham University Business School, April 2013.
  • Christopher Watson and Frederick W. B. Li. Failure rates in introductory programming revisited. In Proceedings of the 2014 conference on Innovation technology in computer science education, ITiCSE'14, pages 39–44, June 2014.
  • Vincent M. Weaver and Jack Dongarra. Can hardware performance counters produce expected, deterministic results?. In 3rd Workshop on Functionality of Hardware Performance Monitoring, pages 1–11, December 2010.
  • Vincent M. Weaver and Sally A. McKee. Can hardware performance counters be trusted?. In IEEE International Symposium on Workload Characterization, IISWC'08, pages 141–150, September 2008.
  • Michael Webb, Nicholas Bloom, Nick Short, and Josh Lerner. Some facts of high-tech patenting. Working Paper No. 18-023, Stanford Institute for Economic Policy Research, July 2018.
  • Elke U. Weber, Ann-Renée Blais, and Nancy E. Betz. A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors. Journal of Behavior and Decision Making, 15(4):263–290, April 2002.
  • Bruce F. Webster. Patterns in IT litigation: Systems failure (1976-2000). A study, PriceaterhouseCoopers LLP, 2000.
  • Brendan S. Weekes. Differential effects of number of letters on word and nonword naming latency. The Quarterly Journal of Experimental Psychology, 50A(2):439–456, 1997.
  • Daniel M. Wegner. The Illusion of Conscious Will. The MIT Press, 2002.
  • Martin H. Weik. A survey of domestic electronic digital computing systems. Technical Report 971, Ballistic Research Laboratories, Maryland, December 1955.
  • Martin H. Weik. A third survey of domestic electronic digital computing systems. Technical Report 1115, Ballistic Research Laboratories, Maryland, March 1961.
  • G. F. Weinwurm and H. J. Zagorski. Research into the management of computer programming: A transitional analysis of cost estimation techniques. Technical Documentary Report ESD-TR-65-575, United States Air Force, L. G. Hanscom Field, Bedford, Massachusetts, November 1965.
  • Marcus V. Welser. Opposing the monetization of Linux: McHardy v. Geniatech & addressing copyright "trolling" in Germany. International Free and Open Source Software Law Review, 10(1):9–20, 2018.
  • Joel West and Jason Dedrick. Innovation and control in standards architectures: The rise and fall of Japan's PC-98. Information Systems Research, 11(2):197–216, June 2000.
  • White House, The. Guidelines and discount rates for benefit-cost analysis of federal programs. OMB Circular A-94, U.S. Government, 1992.
  • Mark White. Scaled CMOS technology reliability users guide. JPL Publication 09-33 01/10, Jet Propulsion Laboratory, California Institute of Technology, 2010.
  • Jerome A. White. Grapher pics. http://www.talljerome.com/mathnerd.html, October 2012.
  • Dexter Whitfield. Cost overruns, delays and terminations: 105 outsourced public sector ICT projects. ESSU Research Report 3, European Services Strategy Unit, December 2007.
  • William Foote Whyte. Money and Motivation: An Analysis of Incentives in Industry. Harper Torchbooks, January 1970.
  • Ronald M. Whyte. Order Re Sun's Motions for Preliminary Injunction Against Microsoft. Re: Sun Microsystems v. Microsoft, Case No. 97-20884 RMW(PVT). Opinion, UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA, 1998.
  • Jelte M. Wicherts, Marjan Bakker, and Dylan Molenaar. Willingness to share research data is related to the strength of the evidence and the quality of reporting of statistical results. PLoS ONE, 6(11):e26828, November 2011.
  • Wayne A. Wickelgren. Size of rehearsal group and short-term memory. Journal of Experimental Psychology, 68(4):413–419, 1964.
  • Gio Wiederhold. What is your software worth?. Communications of the ACM, 49(9):65–75, September 2006.
  • Anna Wierzbicka. Semantics: Primes and Universals. Oxford University Press, 1996.
  • Igor Scaliante Wiese, José Teodoro da Silva, Igor Steinmacher, Christoph Treude, and Marco Aurélio Gerosa. Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant. In International Conference on Software Maintenance and Evolution, ICSME 2016, pages 345–355, October 2016.
  • Wikipedia. List of most expensive video games to develop. organization website, 2018. https://en.wikipedia.org/List_of_most_expensive_video_games_to_develop.
  • Rand Wilcox. Introduction to Robust Estimation & Hypothesis Testing. Elsevier, 3rd edition, 2012.
  • Jennifer Wiley. Expertise as mental set: The effects of domain knowledge in creative problem solving. Memory & Cognition, 26(4):716–730, 1998.
  • Maurice V. Wilkes, David J. Wheeler, and Stanley Gill. The Preparation of Programs for an Electronic Digital Computer. Addison–Wesley, second edition, 1957.
  • Maurice V. Wilkes. Memoirs of a Computer Pioneer. The MIT Press, 1984.
  • J. H. Wilkinson. Rounding Errors in Algebraic Processes. Dover Publications, 1994.
  • Leland Wilkinson. The Grammar of Graphics. Springer, second edition, 2005.
  • Phil Williams and Bill Curtis. A matched project evaluation of modern programming practices: Scientific report on the ASTROS plan. Technical Report RADC-TR-80-6, Vol II, General Electric Company, February 1980.
  • J. C. Williams. A data-based method for assessing and reducing human error to improve operational performance. In Fourth Conference on Human Factors and Power Plants, pages 436–450, June 1988.
  • Ron R. Willis, Robert M. Rova, Mike D. Scott, Martha I. Johnson, John F. Ryskowski, Jane A. Moon, Ken C. Shumate, and Thomas O. Winfield. Hughes Aircraft's widespread deployment of a continuously improving software process. Technical Report CMU/SEI-98-TR-006, Raytheon Systems Company, May 1998.
  • H. E. Willman, Jr., T. A. James, A. A. Beaureguard, and P. Hilcoff. Software systems reliability: A Raytheon project history. Final Technical Report RADC-TR-77-188, Rome Air Development Center, Griffiss Air Force Base, June 1977.
  • Linda Mary Wills. Automated program recognition by graph parsing. A.I. Technical Report No. 1358, MIT Artificial Intelligence Laboratory, July 1992.
  • Michael P. Wilmot and Deniz S. Ones. A century of research on conscientiousness at work. PNAS, 116(46):23004–23010, November 2019.
  • Rober Wiltbank and Warren Boeker. Returns to angel investors in groups. Working Paper 1028592, US universities, November 2007.
  • Katharina Winter, Henning Femmer, and Andreas Vogelsang. How do quantifiers affect the quality of requirements?. In eprint arXiv:cs.SE/2002.02672, February 2014.
  • J. Chris Wise, David L. Hannaman, Peter Kozumplik, Ellen Franke, and Betty L. Leaver. Methods to improve cultural communication skills in special operations forces. ARI Contract Report 98-06, United States Army Research Institute for the Behavioral and Social Sciences, July 1998.
  • Krzysztof Wnuk, Jaap Kabbedijk, Sjaak Brinkkemper, Björn Regnell, and David Callele. Factors affecting decision outcome and lead-time in large-scale requirements engineering. Journal of Software: Evolution and Process, 27(9):647–673, September 2015.
  • Claes Wohlin, Per Runeson, and Johan Brantestam. An experimental evaluation of capture-recapture in software inspections. Journal of Software Testing, Verification and Reliability, 5(4):213–232, 1995.
  • Ray W. Wolverton. The cost of developing large-scale software. IEEE Transactions on Computers, c-23(6):615–636, June 1974.
  • W. Eric Wong, Swapna S. Gokhale, and Joseph R. Horgan. Quantifying the closeness between program components and features. The Journal of Systems and Software, 54(2):87–98, October 2000.
  • Alan Wood. Software reliability growth models. Technical Report 96.1, Tandem Computer, September 1996.
  • Ruth Woodfield. Undergraduate retention and attainment across the disciplines. Report, The Higher Education Academy, York, UK, December 2014.
  • World Semiconductor Trade Statistics. Semiconductor monthly sales volume: 1975–2016. corporate website, March 2016. https://www.wsts.org.
  • Jonathan D. Wren, Alfonso Valencia, and Janet Kelso. Reviewer-coerced citation: case report, update on journal policy and suggestions for future prevention. Bioinformatics, 35(18):3217–3218, September 2019.
  • David Wren. Passmark website. http://www.passmark.com, July 2014.
  • Robert Wright. The Evolution of GOD. Little, Brown Book Group, 2009.
  • Amy Wrzesniewski, Clark McCauley, Paul Rozin, and Barry Schwartz. Jobs, careers, and callings: People's relations to their work. Journal of Research in Personality, 31(1):21–33, March 1997.
  • S. David Wu, C. Rossin, Karl G. Kempf, Mehmet O. Atan, Berrin Aytac, Shamin A. Shirodkar, and Asima Mishra. Extending Bass for improved new product forecasting. Wagner Prize, April 2009.
  • Guanping Xiao, Zheng Zheng, Bo Jiang, and Yulei Sui. An empirical study of regression bug chains in Linux. IEEE Transactions on Reliability, 69(2):558–570, June 2020.
  • Jun Yan and Wei Zhang. Compiler-guided register reliability improvement against soft errors. In Proceedings of the 5th ACM International Conference on Embedded software, EMSOFT'05, pages 203–209, September 2005.
  • Mark C. K. Yang and Anne Chao. Reliability-estimation & stopping-rules for software testing, based on repeated appearances of bugs. IEEE Transactions on Reliability, 44(2):315–321, June 1995.
  • Minghui Yang, Gang-Ryung Uh, and David B. Whalley. Efficient and effective branch reordering using profile data. ACM Transactions on Programming Languages and Systems, 24(6):667–697, November 2002.
  • Xuejun Yang, Zhiyuan Wang, Jingling Xue, and Yun Zhou. The reliability wall for exascale supercomputing. IEEE Transactions on Computers, 61(6):767–779, June 2011.
  • Yibiao Yang, Yuming Zhou, Hao Sun, Zhendong Su, Zhiqiang Zuo, Lei Xu, and Baowen Xu. Hunting for bugs in code coverage tools via randomized differential testing. In IEEE/ACM 41st International Conference on Software Engineering, ICSE'19, pages 488–499, May 2019.
  • Melvin J. Yap, Susan J. Rickard Liow, Sajlia Binte Jalil, and Siti Syuhada Binte Faizal. The Malay lexicon project: A database of lexical statistics for 9,592 words. Behavior Research Methods, 42(4):992–1003, November 2010.
  • Joanne Yates. Structuring the Information Age: Life Insurance and technology in the Twentieth Century. The Johns Hopkins University Press, November 2008.
  • Y. C. (Bob) Yeh. Triple-triple redundant 777 primary flight computer. In Proceedings Aerospace Applications Conference (vol 1), pages 293–307, February 1996.
  • Jeffrey R. Yost. Making IT Work: A History of the Computer Services Industry. The MIT Press, 2017.
  • Liguo Yu and Srini Ramaswamy. A study of SourceForge users and user network. AAAI Technical Report FS-13-05, Association for the Advancement of Artificial Intelligence, November 2013.
  • Angus Gonghua Yu. Managing Application Software Suppliers in Information System Development Projects. PhD thesis, Department of Management and Organisation, University of Stirling, November 2003.
  • Ding Yuan, Soyeon Park, and Yuanyuan Zhou. Characterizing logging practices in open-source software. In Proceedings of the 34th International Conference on Software Engineering, ICSE'12, pages 102–112, June 2012.
  • Tomofumi Yuki and Sanjay Rajopadhye. Folklore confirmed: Compiling for speed = compiling for energy. Technical Report CS13-107, Computer Science Department, Colorado State University, August 2013.
  • Andy Zaidman, Bart Van Rompaey, Arie van Deursen, and Serge Demeyer. Studying the co-evolution of production and test code in open source and industrial developer test processes through repository mining. Technical Report TUD-SERG-2010-035, Software Engineering Research Group, Delft University of Technology, 2010.
  • Mark J. Zbaracki. The rhetoric and reality of total quality management. Administrative Science Quarterly, 43(3):602–636, September 1998.
  • Stephen F. Zeigler. Comparing development costs of C and Ada. Technical report, Rational Software Corporation, March 1995.
  • Achim Zeileis, Kurt Hornik, and Paul Murrell. Escaping RGBland: Selecting colors for statistical graphics. Computational Statistics & Data Analysis, 53(9):3259–3270, July 2009.
  • Marvin V. Zelkowitz. The effectiveness of software prototyping: A case study. In ACM Washington Chapter 26th Annual Technical Symposium, pages 7–15, June 1987.
  • Andreas Zeller, Thomas Zimmermann, and Christian Bird. Failure is a four-letter word-A parody in empirical research-. In Proceedings of the 7th International Conference on Predictive Models in Software Engineering, PROMISE'11, pages 5:1–5:7, September 2011.
  • Andreas Zeller, Rahul Gopinath, Marcel Böhme, Gordon Fraser, and Christian Holler. The Fuzzing Book: Tools and Techniques for Generating Software Tests. Authors, December 2019.
  • Ahmed Zerouali and Tom Mens. Analyzing the evolution of testing library usage in open source Java projects. In IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, pages 503–507, February 2017.
  • Jiajie Zhang and Hongbin Wang. The effect of external representations on numeric tasks. The Quarterly Journal of Experimental Psychology, 58(5):817–838, October 2005.
  • Yun Zhang, Jae W. Lee, Nick P. Johnson, and David I. August. DAFT: Decoupled acyclic fault tolerance. In Proceedings of the 19th International Conference on Parallel architectures and compilation techniques, PACT'10, pages 87–98, September 2010.
  • Jie Zhang, Muyao Zhu, Dan Hao, and Lu Zhang. An empirical study on the scalability of selective mutation testing. In Proceedings 25th International Symposium on Software Reliability Engineering, ISSRE'14, pages 277–287, November 2014.
  • Ying Zhang, Yanyan Jiang, Chang Xu, Xiaoxing Ma, and Ping Yu. ABC: Accelerated building of C/C++ projects. In Asia-Pacific Software Engineering Conference, APSEC 2015, pages 182–189, December 2015.
  • Qirun Zhang, Chengnian Sun, and Zhendong Su. Skeletal program enumeration for rigorous compiler testing. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI'17, pages 347–361, June 2017.
  • Tianyi Zhang, Di Yang, Crista Lopes, and Miryung Kim. Analyzing and supporting adaptation of online code examples. In eprint arXiv:cs.SE/1905.12111, May 2019.
  • Xiaoni Zhang. An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures. PhD thesis, University of North Texas, August 2001.
  • Mingyi Zhao and Peng Liu. Empirical analysis and modeling of black-box mutational fuzzing. In International Symposium on Engineering Secure Software and Systems, ESSoS 2016, pages 173–189, April 2016.
  • Mingyi Zhao, Jens Grossklags, and Peng Liu. An empirical study of web vulnerability discovery ecosystems. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS'15, pages 1105–1117, October 2015.
  • Yangyang Zhao, Alexander Serebrenik, Yuming Zhou, Vladimir Filkov, and Bogdan Vasilescu. The impact of continuous integration on other software development practices: A large-scale empirical study. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE'17, pages 60–71, October-November 2017.
  • Jiang Zheng, Laurie Williams, Nachiappan Nagappan, Will Snipes, John P. Hudepohl, and Mladen A. Vouk. On the value of static analysis for fault detection in software. IEEE Transactions on Software Engineering, 32(4):240–253, April 2006.
  • Qimu Zheng, Audris Mockus, and Minghui Zhou. A method to identify and correct problematic software activity data: Exploiting capacity constraints and data redundancies. In Proceedings of the 10th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'15, pages 637–648, August-September 2015.
  • Hao Zhong and Zhendong Su. An empirical study on real bug fixes. In Proceedings of the 37th International Conference on Software Engineering, ICSE'15, pages 913–923, May 2015.
  • Haotian Zhou and Ayelet Fishbach. The pitfall of experimenting on the web: How unattended selective attrition leads to surprising (yet false) research conclusions. Journal of Personality and Social Psychologs, 111(4):493–504, October 2016.
  • Minghui Zhou and Audris Mockus. Developer fluency: Achieving true mastery in software projects. In Proceedings of the 18th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE'10, pages 137–146, November 2010.
  • Ke Zhou, Ping Huang, Chunhua Li, and Hua Wang. An empirical study on the interplay between filesystems and SSD. In 7th International Conference on Networking, Architecture and Storage, NAS'12, pages 124–133, June 2012.
  • Yajin Zhou, Lei Wu, Zhi Wang, and Xuxian Jiang. Harvesting developer credentials in Android apps. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'15, page 23, June 2015.
  • Jiayuan Zhou, Shaowei Wang, Cor-Paul Bezemer, Ying Zou, and Ahmed E. Hassan. Bounties in open source development on GitHub: A case study of Bountysource bounties. In eprint arXiv:cs.SE/1904.02724, April 2019.
  • Shurui Zhou, Bogdan Vasilescu, and Christian Kästner. What the fork: A study of inefficient and efficient forking practices in social coding. In Proceedings of the 27th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE'19, pages 350–361, August 2019.
  • Xiaoyan Zhu, E. James Whitehead, Jr., Caitlin Sadowski, and Qinbao Song. An analysis of programming language statement frequency in C, C++, and Java source code. Software–Practice and Experience, 15(11):1479–1495, November 2015.
  • Andreas Ziegler, Valentin Rothberg, and Daniel Lohmann. Analyzing the impact of feature changes in Linux. In Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, VaMoS'16, pages 25–32, January 2016.
  • Thomas Zimmermann, Rahul Premraj, and Andreas Zeller. Predicting defects for Eclipse. In Proceedings of the Third International Workshop on Predictor Models in Software Engineering, PROMISE'07, May 2007.
  • Thomas Zimmermann, Nachiappan Nagappan, Harald Gall, Emanuel Giger, and Brendan Murphy. Cross-project defect prediction. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT symposium on the Foundations of Software Engineering, ESEC/FSE 2009, pages 91–100, August 2009.
  • Jens O. Zinn. The proliferation of 'at risk' in The Times: A corpus approach to historical social change, 1785-2009. Historical Social Research, 43(2):313–364, 2018.
  • Paul M. Zislis. An experiment in algorithm implementation. Technical Report CSD-TR 96, Purdue University, June 1973.
  • Fred Zlotnick. The POSIX.1 Standard: A Programmer's Guide. The Benjamin/Cummings Publishing Company, 1991.
  • Weiqin Zou, Weiqiang Zhang, Xin Xia, Reid Holmes, and Zhenyu Chen. Branch use in practice: A large-scale empirical study of 2,923 projects on GitHub. In 19th International Conference on Software Quality, Reliability and Security, QRS 2019, pages 306–317, July 2019.
  • Konrad Zuse. Über den allgemeinen Plankalkül als mittel zur formulierung schematisch-kombinativer aufgaben. Archiv der Mathematik, 1:441–449, 1949.
  • Ofer Zwikael and Shlomo Globerson. Benchmarking of project planning and success in selected industries. Benchmarking: An International Journal, 13(6):688–700, 2006.