default search action
Maxime Lamothe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Amin Ghadesi, Maxime Lamothe, Heng Li:
What causes exceptions in machine learning applications? Mining machine learning-related stack traces on Stack Overflow. Empir. Softw. Eng. 29(5): 107 (2024) - [j11]Khouloud Oueslati, Gabriel Laberge, Maxime Lamothe, Foutse Khomh:
Mining Action Rules for Defect Reduction Planning. Proc. ACM Softw. Eng. 1(FSE): 2309-2331 (2024) - [j10]Zhili Zeng, Tao Xiao, Maxime Lamothe, Hideaki Hata, Shane McIntosh:
How Trustworthy Is Your Continuous Integration (CI) Accelerator?: A Comparison of the Trustworthiness of CI Acceleration Products. IEEE Softw. 41(6): 82-90 (2024) - [j9]Martin P. Robillard, Deeksha M. Arya, Neil A. Ernst, Jin L. C. Guo, Maxime Lamothe, Mathieu Nassif, Nicole Novielli, Alexander Serebrenik, Igor Steinmacher, Klaas-Jan Stol:
Communicating Study Design Trade-offs in Software Engineering. ACM Trans. Softw. Eng. Methodol. 33(5): 112:1-112:10 (2024) - [j8]Farshad Kazemi, Maxime Lamothe, Shane McIntosh:
Characterizing the Prevalence, Distribution, and Duration of Stale Reviewer Recommendations. IEEE Trans. Software Eng. 50(8): 2096-2109 (2024) - [c8]Zhili Zeng, Tao Xiao, Maxime Lamothe, Hideaki Hata, Shane McIntosh:
A Mutation-Guided Assessment of Acceleration Approaches for Continuous Integration: An Empirical Study of YourBase. MSR 2024: 556-568 - [e1]Weiyi Shang, Maxime Lamothe, Zhiyuan Wan:
Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering, PROMISE 2024, Porto de Galinhas, Brazil, 16 July 2024. ACM 2024 [contents] - [i5]Khouloud Oueslati, Gabriel Laberge, Maxime Lamothe, Foutse Khomh:
Mining Action Rules for Defect Reduction Planning. CoRR abs/2405.13740 (2024) - [i4]Baharan Nouriinanloo, Maxime Lamothe:
Re-Ranking Step by Step: Investigating Pre-Filtering for Re-Ranking with Large Language Models. CoRR abs/2406.18740 (2024) - 2023
- [j7]Mehran Meidani, Maxime Lamothe, Shane McIntosh:
Assessing the exposure of software changes. Empir. Softw. Eng. 28(2): 41 (2023) - [i3]Amin Ghadesi, Maxime Lamothe, Heng Li:
What Causes Exceptions in Machine Learning Applications? Mining Machine Learning-Related Stack Traces on Stack Overflow. CoRR abs/2304.12857 (2023) - 2022
- [j6]Maxime Lamothe, Yann-Gaël Guéhéneuc, Weiyi Shang:
A Systematic Review of API Evolution Literature. ACM Comput. Surv. 54(8): 171:1-171:36 (2022) - [j5]Haonan Zhang, Yiming Tang, Maxime Lamothe, Heng Li, Weiyi Shang:
Studying logging practice in test code. Empir. Softw. Eng. 27(4): 83 (2022) - [j4]Maxime Lamothe, Weiyi Shang, Tse-Hsun Peter Chen:
A3: Assisting Android API Migrations Using Code Examples. IEEE Trans. Software Eng. 48(2): 417-431 (2022) - [j3]Maxime Lamothe, Heng Li, Weiyi Shang:
Assisting Example-Based API Misuse Detection via Complementary Artificial Examples. IEEE Trans. Software Eng. 48(9): 3410-3422 (2022) - [c7]Ruiyin Wen, Maxime Lamothe, Shane McIntosh:
How Does Code Reviewing Feedback Evolve?: A Longitudinal Study at Dell EMC. ICSE (SEIP) 2022: 151-160 - [c6]Keheliya Gallaba, Maxime Lamothe, Shane McIntosh:
Lessons from Eight Years of Operational Data from a Continuous Integration Service: An Exploratory Case Study of CircleCI. ICSE 2022: 1330-1342 - [c5]Farshad Kazemi, Maxime Lamothe, Shane McIntosh:
Exploring the Notion of Risk in Code Reviewer Recommendation. ICSME 2022: 139-150 - 2021
- [j2]Sophia Quach, Maxime Lamothe, Yasutaka Kamei, Weiyi Shang:
An empirical study on the use of SZZ for identifying inducing changes of non-functional bugs. Empir. Softw. Eng. 26(4): 71 (2021) - [j1]Sophia Quach, Maxime Lamothe, Bram Adams, Yasutaka Kamei, Weiyi Shang:
Evaluating the impact of falsely detected performance bug-inducing changes in JIT models. Empir. Softw. Eng. 26(5): 97 (2021) - [c4]Ian X. Gauthier, Maxime Lamothe, Gunter Mussbacher, Shane McIntosh:
Is Historical Data an Appropriate Benchmark for Reviewer Recommendation Systems? : A Case Study of the Gerrit Community. ASE 2021: 30-41 - [i2]Mehran Meidani, Maxime Lamothe, Shane McIntosh:
Assessing the Exposure of Software Changes: The DiPiDi Approach. CoRR abs/2104.00725 (2021) - 2020
- [c3]Maxime Lamothe:
Bridging the divide between API users and API developers by mining public code repositories. ICSE (Companion Volume) 2020: 178-181 - [c2]Maxime Lamothe, Weiyi Shang:
When APIs are intentionally bypassed: an exploratory study of API workarounds. ICSE 2020: 912-924
2010 – 2019
- 2018
- [c1]Maxime Lamothe, Weiyi Shang:
Exploring the use of automated API migrating techniques in practice: an experience report on Android. MSR 2018: 503-514 - [i1]Maxime Lamothe, Weiyi Shang, Tse-Hsun Chen:
A4: Automatically Assisting Android API Migrations Using Code Examples. CoRR abs/1812.04894 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint