Rahul Pandita

Orcid: 0000-0002-7466-2985

According to our database1, Rahul Pandita authored at least 30 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Defect Categorization in Compilers: A Multi-vocal Literature Review.
ACM Comput. Surv., April, 2024

An empirical study of task infections in Ansible scripts.
Empir. Softw. Eng., February, 2024

2023
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study.
ACM Trans. Softw. Eng. Methodol., July, 2023

Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs.
Empir. Softw. Eng., 2023

Building Your Own Product Copilot: Challenges, Opportunities, and Needs.
CoRR, 2023

Predicting API Expertise: A Cross-Community Replication Using Zipf's Law.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2023

2022
Extracting Meaningful Attention on Source Code: An Empirical Study of Developer and Neural Model Code Exploration.
CoRR, 2022

Cognitive biases in software development.
Commun. ACM, 2022

OpenCBS: An Open-Source COBOL Defects Benchmark Suite.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

2021
Contemporary COBOL: Developers' Perspectives on Defects and Defect Location.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

2020
A tale from the trenches: cognitive biases and software development.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Latent patterns in activities: a field study of how developers manage context.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Preface.
J. Comput. Sci. Technol., 2018

A Conceptual Framework for Engineering Chatbots.
IEEE Internet Comput., 2018

Mapping the field of software life cycle security metrics.
Inf. Softw. Technol., 2018

Are vulnerabilities discovered and resolved like other defects?
Empir. Softw. Eng., 2018

No half-measures: A study of manual and tool-assisted end-user programming tasks in Excel.
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018

Towards J.A.R.V.I.S. for Software Engineering: Lessons Learned in Implementing a Natural Language Chat Interface.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
TMAP: Discovering relevant API methods through text mining of API documentation.
J. Softw. Evol. Process., 2017

2016
Veteran developers' contributions and motivations: An open source perspective.
Proceedings of the 2016 IEEE Symposium on Visual Languages and Human-Centric Computing, 2016

A cross-tool communication study on program analysis tool notifications.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Designing for dystopia: software engineering research for the post-apocalypse.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

ICON: Inferring Temporal Constraints from Natural Language API Descriptions.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

2015
Bespoke tools: adapted to the concepts developers know.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Discovering likely mappings between APIs using text mining.
Proceedings of the 15th IEEE International Working Conference on Source Code Analysis and Manipulation, 2015

Enabling forensics by proposing heuristics to identify mandatory log events.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Inferring method specifications from natural language API descriptions.
Proceedings of the 34th International Conference on Software Engineering, 2012

2010
Guided test generation for coverage criteria.
Proceedings of the 26th IEEE International Conference on Software Maintenance (ICSM 2010), 2010


  Loading...