Anthony Peruma
Anthony Peruma
Home
Experience
Accomplishments
Projects
Talks
Publications
Light
Dark
Publications
Type
Conference paper
Journal article
Book section
Thesis
Magazine Article
Date
2020
2019
2018
2017
tsDetect: An Open Source Test Smells Detection Tool
The test code, just like production source code, is subject to bad design and programming practices, also known as smells. The presence …
Anthony S. Peruma
,
Khalid Almalki
,
Christian D. Newman
,
Mohamed Wiem Mkaouer
,
Ali Ouni
,
Fabio Palomba
PDF
Cite
DOI
How we refactor and how we document it? On the use of supervised machine learning algorithms to classify refactoring documentation
Refactoring is the art of improving the structural design of a software system without altering its external behavior. Today, …
Eman Abdullah AlOmar
,
Anthony S. Peruma
,
Mohamed Wiem Mkaouer
,
Christian Newman
,
Ali Ouni
,
Marouane Kessentini
PDF
Cite
DOI
On the generation, structure, and semantics of grammar patterns in source code identifiers
Identifiers make up a majority of the text in code. They are one of the most basic mediums through which developers describe the code …
Christian D. Newman
,
Reem S. AlSuhaibani
,
Michael J. Decker
,
Anthony S. Peruma
,
Dishant Kaushik
,
Mohamed Wiem Mkaouer
,
Emily Hill
PDF
Cite
DOI
On the Relationship Between Developer Experience and Refactoring: An Exploratory Study and Preliminary Results
Refactoring is one of the means of managing technical debt and maintaining a healthy software structure through enforcing best design …
Eman Abdullah Alomar
,
Anthony S. Peruma
,
Christian D. Newman
,
Mohamed Wiem Mkaouer
,
Ali Ouni
PDF
Cite
DOI
An Exploratory Study on the Refactoring of Unit Test Files in Android Applications
An essential activity of software maintenance is the refactoring of source code. Refactoring operations enable developers to take …
Anthony S. Peruma
,
Christian D. Newman
,
Mohamed Wiem Mkaouer
,
Ali Ouni
,
Fabio Palomba
PDF
Cite
DOI
Contextualizing rename decisions using refactorings, commit messages, and data types
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the …
Anthony S. Peruma
,
Mohamed Wiem Mkaouer
,
Michael J. Decker
,
Christian D. Newman
PDF
Cite
DOI
On the Distribution of Test Smells in Open Source Android Applications: An Exploratory Study
The impact of bad programming practices, such as code smells, in production code has been the focus of numerous studies in software …
Anthony S. Peruma
,
Khalid Almalki
,
Christian D. Newman
,
Mohamed Wiem Mkaouer
,
Ali Ouni
,
Fabio Palomba
PDF
Cite
Towards a Model to Appraise and Suggest Identifier Names
Unknowingly, identifiers in the source code of a software system play a vital role in determining the quality of the system. Ambiguous …
Anthony S. Peruma
PDF
Cite
DOI
Permission Issues in Open-Source Android Apps: An Exploratory Study
Permissions are one of the most fundamental components for protecting an Android user’s privacy and security. Unfortunately, …
Gian Luca Scoccia
,
Anthony S. Peruma
,
Virginia Pujols
,
Ivano Malavolta
,
Daniel E. Krutz
PDF
Cite
DOI
Modeling the Relationship Between Identifier Name and Behavior
This paper presents the features of a model that relates the natural language found in identifiers with program semantics. The model …
Christian D. Newman
,
Anthony S. Peruma
,
Reem S. AlSuhaibani
PDF
Cite
DOI
Contextualizing Rename Decisions using Refactorings and Commit Messages
Identifier names are the atoms of comprehension; weak identifier names decrease productivity by increasing the chance that developers …
Anthony S. Peruma
,
Mohamed Wiem Mkaouer
,
Michael J. Decker
,
Christian D. Newman
PDF
Cite
DOI
An Open Dataset of Abbreviations and Expansions
We present a data set of abbreviations and expansions, derived from a set of five open source systems, for use by the research and …
Christian D. Newman
,
Michael J. Decker
,
Reem S. AlSuhaibani
,
Anthony S. Peruma
,
Dishant Kaushik
,
Emily Hill
PDF
Cite
DOI
An Empirical Study of Abbreviations and Expansions in Software Artifacts
Expanding abbreviations is an important text normalization technique used for the purpose of either increasing developer comprehension …
Christian D. Newman
,
Michael J. Decker
,
Reem S. AlSuhaibani
,
Anthony S. Peruma
,
Dishant Kaushik
,
Emily Hill
PDF
Cite
DOI
An Empirical History of Permission Requests and Mistakes in Open Source Android Apps
Android applications (apps) rely upon proper permission usage to ensure that the user’s privacy and security are adequately …
Gian Luca Scoccia
,
Anthony S. Peruma
,
Virginia Pujols
,
Ben Christians
,
Daniel E. Krutz
PDF
Cite
DOI
A Preliminary Study of Android Refactorings
Throughout the lifetime of a software system, developers continuously refactor the source code as a means of improving the quality of …
Anthony S. Peruma
PDF
Cite
DOI
Variability in Library Evolution: An Exploratory Study on Open-Source Java Libraries
Hussein Alrubaye
,
Mohamed Wiem Mkaouer
,
Anthony S. Peruma
PDF
Cite
An Empirical Investigation of How and Why Developers Rename Identifiers
Renaming is vital to software maintenance and evolution. Developers rename entities when their original names no longer fit their …
Anthony S. Peruma
,
Mohamed Wiem Mkaouer
,
Michael J. Decker
,
Christian D. Newman
PDF
Cite
DOI
What the smell? an empirical investigation on the distribution and severity of test smells in open source android applications
The widespread adoption of mobile devices, coupled with the ease of developing mobile-based applications (apps) has created a lucrative …
Anthony S. Peruma
PDF
Cite
Understanding the Relationship between Quality and Security: A Large-Scale Analysis of Android Applications
Android applications (apps) are not immune to the problems which also plague conventional software including security vulnerabilities, …
Anthony S. Peruma
,
Daniel E. Krutz
PDF
Cite
DOI
Security: A Critical Quality Attribute in Self-Adaptive Systems
Self-Adaptive Systems (SAS) are revolutionizing many aspects of our society. From server clusters to autonomous vehicles, SAS are …
Anthony S. Peruma
,
Daniel E. Krutz
PDF
Cite
DOI
Providing an Experiential Cybersecurity Learning Experience through Mobile Security Labs
The reality of today’s computing landscape already suffers from a shortage of cybersecurity professionals, and this gap only …
Anthony S. Peruma
,
Samuel A. Malachowsky
,
Daniel E. Krutz
PDF
Cite
DOI
Investigating User Perception and Comprehension of Android Permission Models
Do you know the permissions your favorite apps use? You probably don’t, and you aren’t alone. Everyone seemingly talks …
Anthony S. Peruma
,
Jeffrey Palmerino
,
Daniel E. Krutz
PDF
Cite
DOI
Apps for Everyone: Mobile Accessibility Learning Modules
Mobile applications (apps) should be accessible to everyone, yet many of even the most popular are not. To address the lack of …
Yasmine N. El-Glaly
,
Anthony S. Peruma
,
Daniel E. Krutz
,
J. Scott Hawker
PDF
Cite
DOI
CollabAll: Inclusive Discussion Support System For Deaf and Hearing Students
Even with advances in technology, group meetings between hearing and deaf and hard-of-hearing (D/HH) students can be challenging for …
Anthony S. Peruma
,
Yasmine N. El-Glaly
PDF
Cite
DOI
Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps
Android applications rely on a permission-based model to carry out core functionality. Appropriate permission usage is imperative for …
Daniel E. Krutz
,
Nuthan Munaiah
,
Anthony S. Peruma
,
Mohamed Wiem Mkaouer
PDF
Cite
DOI
Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird
To satisfy security requirements, software architects often adopt security tactics. These architectural tactics provide mechanisms for …
Joanna C. S. Santos
,
Anthony S. Peruma
,
Mehdi Mirakhorli
,
Matthias Galstery
,
Jairo Veloz Vidal
,
Adriana Sejfia
PDF
Cite
DOI
Cite
×