default search action
Emily Hill 0001
Person information
- affiliation: Drew University, Madison, NJ, USA
Other persons with the same name
- Emily Hill 0002 — University of California, Berkeley, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Christian D. Newman
, Michael John Decker
, Reem S. Alsuhaibani
, Anthony Peruma
, Mohamed Wiem Mkaouer
, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy J. Sheldon, Emily Hill:
An Ensemble Approach for Annotating Source Code Identifiers With Part-of-Speech Tags. IEEE Trans. Software Eng. 48(9): 3506-3522 (2022) - 2021
- [i2]Christian D. Newman, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Mohamed Wiem Mkaouer, Timothy J. Sheldon, Emily Hill:
An Ensemble Approach for Annotating Source Code Identifiers with Part-of-speech Tags. CoRR abs/2109.00629 (2021) - 2020
- [j8]Christian D. Newman
, Reem S. Alsuhaibani, Michael John Decker, Anthony Peruma
, Dishant Kaushik, Mohamed Wiem Mkaouer
, Emily Hill:
On the generation, structure, and semantics of grammar patterns in source code identifiers. J. Syst. Softw. 170: 110740 (2020) - [i1]Christian D. Newman, Reem S. Alsuhaibani, Michael John Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill:
On the Generation, Structure, and Semantics of Grammar Patterns in Source Code Identifiers. CoRR abs/2007.08033 (2020)
2010 – 2019
- 2019
- [c42]Christian Donald Newman
, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma
, Dishant Kaushik, Emily Hill:
An Empirical Study of Abbreviations and Expansions in Software Artifacts. ICSME 2019: 269-279 - [c41]Christian D. Newman
, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma
, Dishant Kaushik, Emily Hill:
An Open Dataset of Abbreviations and Expansions. ICSME 2019: 280 - 2018
- [j7]Romain Robbes, Emily Hill, Christian Bird:
Guest Editorial: Special section on mining software repositories. Empir. Softw. Eng. 23(2): 833-834 (2018) - [c40]Mohammed Hassan
, Emily Hill:
Toward Automatic Summarization of Arbitrary Java Statements for Novice Programmers. ICSME 2018: 539-543 - [e1]Andy Zaidman, Yasutaka Kamei, Emily Hill:
Proceedings of the 15th International Conference on Mining Software Repositories, MSR 2018, Gothenburg, Sweden, May 28-29, 2018. ACM 2018, ISBN 978-1-4503-5716-6 [contents] - 2016
- [j6]Emily Hill, Philip M. Johnson, Daniel Port:
Is an Athletic Approach the Future of Software Engineering Education? IEEE Softw. 33(1): 97-100 (2016) - [c39]Philip M. Johnson, Dan Port, Emily Hill:
An Athletic Approach to Software Engineering Education. CSEE&T 2016: 8-17 - [c38]Wyatt Olney, Emily Hill, Chris Thurber, Bezalem Lemma:
Part of Speech Tagging Java Method Names. ICSME 2016: 483-487 - [c37]Benwen Zhang, Emily Hill, James Clause:
Towards automatically generating descriptive names for unit tests. ASE 2016: 625-636 - 2015
- [c36]Nikita S. Panchariya, Andrew DeStefano, Varsha Nimbagal, Revathi Ragupathy, Serkan Yavuz, Katherine G. Herbert
, Emily Hill, Jerry Alan Fails:
Current Developments in Big Data and Sustainability Sciences in Mobile Citizen Science Applications. BigDataService 2015: 202-212 - [c35]Jerry Alan Fails, Katherine G. Herbert
, Emily Hill, Andrew De Stefano, Brandon Hesse, Paul W. Cushman, Travis Gant, Syed Shah, Aliet Abreu-Cruz, Nikita S. Panchariya, Varsha Nimbagal:
Geotagger: A collaborative environmental inquiry platform. CTS 2015: 383-390 - [c34]Emily Hill, David C. Shepherd
, Lori L. Pollock:
Exploring the use of concern element role information in feature location evaluation. ICPC 2015: 140-150 - [c33]Benwen Zhang, Emily Hill, James Clause:
Automatically Generating Test Templates from Test Names (N). ASE 2015: 506-511 - 2014
- [j5]Emily Hill, David W. Binkley, Dawn J. Lawrie
, Lori L. Pollock, K. Vijay-Shanker:
An empirical study of identifier splitting techniques. Empir. Softw. Eng. 19(6): 1754-1780 (2014) - [j4]Thomas Fritz, Gail C. Murphy, Emerson R. Murphy-Hill, Jingwen Ou, Emily Hill:
Degree-of-knowledge: Modeling a developer's knowledge of code. ACM Trans. Softw. Eng. Methodol. 23(2): 14:1-14:42 (2014) - [c32]Katherine G. Herbert
, Emily Hill, Jerry Alan Fails, Joseph O. Ajala, Richard T. Boniface, Paul W. Cushman:
Scientific Data Infrastructure for Sustainability Science Mobile Applications. BigData Congress 2014: 804-805 - [c31]Jerry Alan Fails, Katherine G. Herbert
, Emily Hill, Christopher Loeschorn, Spencer Kordecki, David Dymko, Andrew DeStefano, Zill Christian:
GeoTagger: a collaborative and participatory environmental inquiry system. CSCW Companion 2014: 157-160 - [c30]Emily Hill, Manuel Roldan-Vega, Jerry Alan Fails, Greg Mallet:
NL-based query refinement and contextualized code search results: A user study. CSMR-WCRE 2014: 34-43 - [c29]Emily Hill, Bunyamin Sisman, Avinash C. Kak:
On the use of positional proximity in IR-based feature location. CSMR-WCRE 2014: 318-322 - 2013
- [c28]Lori L. Pollock, David W. Binkley, Dawn J. Lawrie
, Emily Hill, Rocco Oliveto, Gabriele Bavota
, Alberto Bacchelli:
1st international workshop on natural language analysis in software engineering (NaturaLiSE 2013). ICSE 2013: 1537-1538 - [c27]Emily Hill, David C. Shepherd
, Lori L. Pollock, K. Vijay-Shanker:
Differentiating Roles of Program Elements in Action-Oriented Concerns. ICSM 2013: 376-379 - [c26]Emily Hill, Alberto Bacchelli, Dave W. Binkley, Bogdan Dit, Dawn J. Lawrie, Rocco Oliveto:
Which Feature Location Technique is Better? ICSM 2013: 408-411 - [c25]Dave W. Binkley, Dawn J. Lawrie, Emily Hill, Janet E. Burge, Ian G. Harris, Regina Hebig
, Oliver Keszöcze
, Karl Reed, John Slankas:
Task-Driven Software Summarization. ICSM 2013: 432-435 - [c24]Manuel Roldan-Vega, Greg Mallet, Emily Hill, Jerry Alan Fails:
CONQUER: A Tool for NL-Based Query Refinement and Contextualizing Code Search Results. ICSM 2013: 512-515 - [c23]David W. Binkley, Dawn J. Lawrie, Lori L. Pollock, Emily Hill, K. Vijay-Shanker:
A dataset for evaluating identifier splitters. MSR 2013: 401-404 - [c22]Marvin Lapeine, Katherine G. Herbert
, Emily Hill, Nina M. Goodey:
Mobile interaction and query optimization in a protein-ligand data analysis system. SIGMOD Conference 2013: 1291-1292 - 2012
- [c21]Emily Hill, Shivani Rao, Avinash C. Kak:
On the Use of Stemming for Concern Location and Bug Localization in Java. SCAM 2012: 184-193 - 2011
- [c20]Andrew Wiese, Valerie Ho, Emily Hill:
A comparison of stemmers on source code identifiers for software search. ICSM 2011: 496-499 - [c19]Lori L. Pollock, K. Vijay-Shanker, Emily Hill, Giriprasad Sridhara, David C. Shepherd
:
Natural Language-Based Software Analyses and Tools for Software Maintenance. ISSSE 2011: 94-125 - [c18]Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Improving source code search with natural language phrasal representations of method signatures. ASE 2011: 524-527 - 2010
- [c17]Giriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori L. Pollock, K. Vijay-Shanker:
Towards automatically generating summary comments for Java methods. ASE 2010: 43-52
2000 – 2009
- 2009
- [c16]Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Automatically capturing source code context of NL-queries for software maintenance and reuse. ICSE 2009: 232-242 - [c15]Eric Enslen, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Mining source code to automatically split identifiers for software analysis. MSR 2009: 71-80 - 2008
- [j3]Zachary P. Fry, David C. Shepherd
, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Analysing source code: looking for useful verbdirect object pairs in all the right places. IET Softw. 2(1): 27-36 (2008) - [c14]Emily Hill:
Developing natural language-based program analyses and tools to expedite software maintenance. ICSE Companion 2008: 1015-1018 - [c13]Giriprasad Sridhara, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools. ICPC 2008: 123-132 - [c12]Emily Hill, Zachary P. Fry, Haley Boyd, Giriprasad Sridhara, Yana Novikova, Lori L. Pollock, K. Vijay-Shanker:
AMAP: automatically mining abbreviation expansions in programs to enhance software maintenance tools. MSR 2008: 79-88 - 2007
- [j2]Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock, Amie Souter Greenwald:
Applying Concept Analysis to User-Session-Based Testing of Web Applications. IEEE Trans. Software Eng. 33(10): 643-658 (2007) - [c11]David C. Shepherd
, Zachary P. Fry, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Using natural language program analysis to locate and understand action-oriented concerns. AOSD 2007: 212-224 - [c10]Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Exploring the neighborhood with dora to expedite software maintenance. ASE 2007: 14-23 - [c9]Lori L. Pollock, K. Vijay-Shanker, David C. Shepherd
, Emily Hill, Zachary P. Fry, Kishen Maloor:
Introducing natural language program analysis. PASTE 2007: 15-16 - [c8]Sara Sprenkle, Emily Hill, Lori L. Pollock:
Learning Effective Oracle Comparator Combinations for Web Applications. QSIC 2007: 372-379 - [c7]Thomas Fritz, Gail C. Murphy, Emily Hill:
Does a programmer's activity indicate knowledge of code? ESEC/SIGSOFT FSE 2007: 341-350 - 2006
- [c6]Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock:
Web Application Testing with Customized Test Requirements - An Experimental Comparison Study. ISSRE 2006: 266-278 - [c5]Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock:
A case study of automatically creating test suites from web application field data. TAV-WEB 2006: 1-9 - [c4]Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock:
Integrating customized test requirements with traditional requirements in web application testing. TAV-WEB 2006: 23-32 - 2005
- [j1]Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock, Amie L. Souter:
Analyzing clusters of web application user sessions. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c3]Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lori L. Pollock, Amie L. Souter:
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications. ICSM 2005: 587-596 - [c2]Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock:
Automated replay and failure detection for web applications. ASE 2005: 253-262 - 2004
- [c1]David C. Shepherd, Emily Gibson, Lori L. Pollock:
Design and Evaluation of an Automated Aspect Mining Tool. Software Engineering Research and Practice 2004: 601-607
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint