init
This commit is contained in:
commit
6a29a7f1cc
|
@ -0,0 +1,10 @@
|
|||
*.fls
|
||||
*.fdb_latexmk
|
||||
*.gz
|
||||
*.aux
|
||||
*.pdf
|
||||
*.log
|
||||
*.bbl
|
||||
*.blg
|
||||
*(busy)
|
||||
.DS*
|
|
@ -0,0 +1,8 @@
|
|||
\begin{abstract}
|
||||
|
||||
|
||||
\end{abstract}
|
||||
|
||||
\begin{IEEEkeywords}
|
||||
Pull-request; duplicate; code review
|
||||
\end{IEEEkeywords}
|
|
@ -0,0 +1,19 @@
|
|||
|
||||
\section{Introduction}
|
||||
\label{sec:intro}
|
||||
hhh~\cite{Yu:2015}
|
||||
|
||||
|
||||
% 对每一个项目中的每一个pr,
|
||||
% 找出 1) desc中的cc
|
||||
% 2) comment中的cc
|
||||
% 然后观察 执行cc的人是谁,被cc的人是谁,被cc的是否响应了,以及过了多长时间响应,
|
||||
|
||||
% RQ1: 执行cc的人 按其角色,经验等 看 被cc的是否响应了,以及过了多长时间响应,都接受了哪些评论
|
||||
RQ1: What feedback does CC performer get?
|
||||
|
||||
% RQ2: 被cc的人 按其角色经验等 看 被cc的是否响应了,以及过了多长时间响应
|
||||
% 被CC的人角色,经验(贡献,审阅),对该pr中某一个文件的修改次数,对该pr中某一文件的审阅次数等。
|
||||
RQ2: What feedback does CC responder give?
|
||||
|
||||
|
|
@ -0,0 +1,13 @@
|
|||
|
||||
\section{Background}
|
||||
\label{sec:bg}
|
||||
|
||||
|
||||
|
||||
|
||||
\begin{figure}[ht]
|
||||
\centering
|
||||
\includegraphics[width=8.5cm]{resources/prflow.png}
|
||||
\caption{Pull-based workflow on GitHub}
|
||||
\label{fig:github_wf}
|
||||
\end{figure}
|
|
@ -0,0 +1,23 @@
|
|||
\section{DATASET}
|
||||
\label{sec:dataset}
|
||||
|
||||
\subsection{Project selection}
|
||||
|
||||
\begin{table}[ht]
|
||||
\centering
|
||||
\caption{Basic informtion of the dataset}
|
||||
\begin{tabular}{r c c c c}
|
||||
\bottomrule
|
||||
\textbf{Statistic} &\textbf{Min} &\textbf{Max} &\textbf{Mean} &\textbf{Median}\\ \hline
|
||||
|
||||
Age & & & & \\
|
||||
pull-requests & & & & \\
|
||||
Contributors & & & & \\
|
||||
Forks & & & & \\
|
||||
Stars & & & & \\
|
||||
Watchers & & & & \\
|
||||
|
||||
\toprule
|
||||
\end{tabular}
|
||||
\label{tab:basic_dataset}
|
||||
\end{table}
|
|
@ -0,0 +1,2 @@
|
|||
\section{RESULT}
|
||||
\label{sec:result}
|
|
@ -0,0 +1,4 @@
|
|||
\section{THREATS TO VALIDITY}
|
||||
\label{sec:Threats}
|
||||
In this section, we discuss some threats to validity
|
||||
which may affect the experiment results of our study.
|
|
@ -0,0 +1,2 @@
|
|||
\section{RELATED WORK}
|
||||
\label{sec:RelatedW}
|
|
@ -0,0 +1,7 @@
|
|||
|
||||
\section{Conclusion}
|
||||
\label{sec:Concl}
|
||||
|
||||
\section*{Acknowledgment}
|
||||
We would like to thank the anonymous reviewers for their comments. The research is supported by the National Natural Science Foundation of China (Grant No.61432020, 61303064, 61472430, 61502512) and National Grand R\&D Plan (Grant No. 2016YFB1000805).
|
||||
% The authors would like to thank... more thanks here
|
|
@ -0,0 +1,9 @@
|
|||
@article{Yu:2015,
|
||||
title={Reviewer recommendation for pull-requests in GitHub: What can we learn from code review and bug assignment?},
|
||||
author={Yu, Yue and Wang, Huaimin and Yin, Gang and Wang, Tao},
|
||||
journal={Information and Software Technology},
|
||||
volume={74},
|
||||
pages={204--218},
|
||||
year={2016},
|
||||
publisher={Elsevier}
|
||||
}
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,55 @@
|
|||
\documentclass[10pt, conference, compsocconf]{IEEEtran}
|
||||
|
||||
\usepackage{graphicx}
|
||||
\usepackage{subfig}
|
||||
\usepackage{color,soul}
|
||||
\usepackage{colortbl}
|
||||
\usepackage{enumitem}
|
||||
\usepackage{multirow,booktabs}
|
||||
\usepackage{caption}
|
||||
\usepackage{dcolumn}
|
||||
\usepackage{xspace}
|
||||
\usepackage{balance}
|
||||
\usepackage{bm}
|
||||
\usepackage{cite}
|
||||
\usepackage{url}
|
||||
\usepackage{framed}
|
||||
\usepackage{hhline}
|
||||
\usepackage{setspace}
|
||||
|
||||
|
||||
\newcommand{\ie}{{\emph{i.e.}},\xspace}
|
||||
\newcommand{\eg}{{\emph{e.g.}},\xspace}
|
||||
\newcommand{\etc}{etc.}
|
||||
\newcommand{\etal}{{\emph{et al.}}}
|
||||
|
||||
\begin{document}
|
||||
|
||||
\title{
|
||||
title
|
||||
}
|
||||
|
||||
\author{
|
||||
\IEEEauthorblockN{Zhixing Li, Yue Yu, Gang Yin, Tao Wang, Huaimin Wang}
|
||||
\IEEEauthorblockA{National Laboratory for Parallel and Distributed Processing\\
|
||||
College of Computer, National University of Defense Technology\\
|
||||
Changsha, 410073, China\\
|
||||
\{lizhixing15, yuyue, yingang, taowang2005, hmwang\}@nudt.edu.cn }
|
||||
}
|
||||
|
||||
\maketitle
|
||||
|
||||
\input{0_abstract}
|
||||
\input{1_introduction}
|
||||
\input{2_background}
|
||||
\input{3_dataset}
|
||||
\input{4_result}
|
||||
\input{6_threats}
|
||||
\input{7_related_work}
|
||||
\input{8_conlusion}
|
||||
|
||||
|
||||
\bibliographystyle{plain}
|
||||
\bibliography{9_ref}
|
||||
|
||||
\end{document}
|
Binary file not shown.
After Width: | Height: | Size: 198 KiB |
Loading…
Reference in New Issue