SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
Peer Reviews
(and how to survive them)
Alexander Serebrenik

Eindhoven University of Technology, The Netherlands
ICSME 2018: 6/176
ICSE 2018: 13/502
https://upload.wikimedia.org/wikipedia/commons/b/bf/Per_aspera_ad_astra%2C_1894.jpg
https://sigcse2018.sigcse.org/reviewers/review-bidding.html
~ 3 x what you
expect to review}
A program committee member (including the chair of the committee) is considered
to have a conflict of interest on a submission that has an author in any of the
following categories:
• the person themselves;
• a past or current student or academic advisor;
• a supervisor or employee in the same line of authority within the past 3 years;
• a member of the same organization within the past 3 years;
• a co-author of a paper appearing in publication within the past 3 years;
• someone with whom there has been a financial relationship (e.g., grants,
contracts, …) within the past 3 years;
• someone with whom acceptance or rejection would further the personal goals of
the reviewer (e.g., a competitor);
• a member of the same family or anyone considered a close personal friend; or
• someone about whom, for whatever reason, their work cannot be evaluated
objectively.
https://www.sigsoft.org/policies/pgmcommittee.html
Columns = PC members
Rows =
submissions
• Asterisk = assignment
• Encircled = somebody had to review it…
https://www.missiontolearn.com/wp-content/uploads/2017/10/bias-patterns_30118192_m.jpg
Photo credit: DMARK/ISTOCKPHOTO
Submissions will be evaluated on the basis of
soundness, importance of contribution,
originality, quality of presentation, appropriate
comparison to related work, and convincing
evaluation of the proposed approach. 
ICSME 2018
ICSE 2019
ICSE 2019 NIER
ICSE 2019
ICSE 2019 NIER
TEMPLATE

Overall Recommendation: 

Reviewer Confidence: 

Ranking 

Summary

Detailed Evaluation

* Soundness

* Significance

* Verifiability

* Presentation.

Strengths and Weaknesses

* Strengths

* Weaknesses

<…>

Confidential Remarks:
TEMPLATE

Overall Recommendation: 

Reviewer Confidence: 

<…>

Summary

Detailed Evaluation

* Soundness

* Significance

* Verifiability

* Presentation.

Strengths and Weaknesses

* Strengths

* Weaknesses

<…>

Confidential Remarks:

reject, weak reject, weak accept, accept
low, medium, high
bullet points

• facilitate discussion between the reviewers

• help the authors to navigate the review
helps the authors: did the reviewer get the
main points of the paper?
I use rarely and only in extreme cases to alert
other reviewers/chairs: e.g., suspected plagiarism
Soundness
Research question
Research
method(s)
Research finding(s)
Discussion
Is the method appropriate? Can the question
be answered using this method?
Has the method been applied correctly?
Can one trust the findings?
Are the findings correctly interpreted?
Are the limitations/threats correctly
identified and addressed?
Has the question
been answered?
“The reviewer suspects that many of the
predictors used are highly correlated and likely
offer little additional explanatory power. However,
the paper does not describe whether a correlation
analysis was performed.”
“Similarly, I had some questions about the
evaluation interviews. How many engineers used
the tool? How many of them were interviewed?
Are they continuing to use it?”
https://www.trade.be/wp-content/uploads/2018/03/tips_tricks.jpg
• Have the questions been asked in a way that the
respondents are likely to understand?

• Are there leading questions?

• In case of multiple-choice questions: how have the answer
options been derived?

• How is confidentiality of the responses ensured? Is there a
risk of conflict between different subgroups, e.g., employees
and managers?

• Is there a risk of stereotyping? 

• How many responses have been received? Are they
representative?
Example questions to
ask yourself when
reviewing surveys
• Is the data “cleaned” somehow? How/why?

• Are the tests carried out appropriate for the data at
hand?

• What are the assumptions of these tests? Did the
authors check that the assumptions are satisfied?

• If multiple tests are performed, are the p-values
adjusted?

• What is the effect size? 

• Is the sample large enough? Is it representative?
Example questions to
ask yourself when
reviewing statistics
Survival
kit
http://1vad2tck9o4hd59s-zippykid.netdna-ssl.com/wp-content/uploads/2014/08/article-significance-relevance.jpg
Significance
“Overall, I like this paper, since it (rightfully) makes the case for commit-
based bug prediction instead of more traditional file-based prediction. The
heuristics based on clues are novel, incorporating a kind of voting system
for finding the culprit commit. <…>
However, the idea of commit-based prediction is less novel than
discussed, since XXX (Ref1), YYY (Ref2) and ZZZ (Ref3) performed earlier
studies on commit-based prediction in industry. These three papers all
focus on prediction of risk (not necessarily bugs), however YYY also build
bug (introduction) prediction models.” 
Is related work cited?
Is the contribution clear?
Survival
kit
Survival
kit
Rijnard van Tonder, Claire Le Goues. Static Automated
Program Repair for Heap Properties. ICSE 2018
(Distinguished paper award)
Verifiability
“How were the 79 Pharo systems selected is not so obvious - does the
Pharo standard distribution contain only 39 large software applications
or more than 39? What does exactly large mean?”
• Is every step clear? Are there vague words like
popular, large, active?
• Are the tools used open source and publicly
available?
• Is the data used publicly available?
• This is of course not always possible but should
be encouraged
• If the data/tools are not available, this should be
explained
Example questions to
ask yourself when
assessing verifiability
https://i.ytimg.com/vi/CcdgO10VbcQ/maxresdefault.jpg
Presentation
“The write up is not well-structured. For instance, the approach (i.e., the
model and its features) are at least partially described in the section
"Experimental Results". IMO there should be a section "Approach" which
describes the model/approach.”
• Are the figures/tables legible?
• Also for colour-blind individuals?
• Is English reasonable?
• It is not an English exam but the text should be
understandable.
• Are the abbreviations explained and is their use
reasonable?
• And those broken sentences…
Example questions to
ask yourself when
assessing presentation
https://cdn3.vectorstock.com/i/1000x1000/39/22/beta-testing-stamp-vector-10413922.jpg
Survival
kit
• You should also include a section with threats to
validity to describe the limitations of your study.
• Please consider including a section with threats to
validity to describe the limitations of your study.
• A section with threats to validity describing the
limitations of the study can further improve the
paper.
Be kind
https://cangeo-media-library.s3.amazonaws.com/s3fs-public/styles/web_article_slider_image/public/images/web_articles/article_images/4626/
iceberg_header_0.jpg?itok=_5093yiY
https://axerosolutions.com/attachment?file=hZ%2F1gPXNESPO8Hz0KGdELQ%3D%3D
1108.5
https://burgewords.files.wordpress.com/2014/10/muppet-critics.jpg
https://burgewords.files.wordpress.com/2014/10/muppet-critics.jpg
https://www.theindianwire.com/wp-content/uploads/2018/04/books.jpg
5
https://c.tadst.com/gfx/750x500/clock-noon-time.jpg?1
SATTOSE 2015 (Mons)
Peer reviews

Weitere ähnliche Inhalte

Was ist angesagt?

Writing A Research Proposal
Writing A Research ProposalWriting A Research Proposal
Writing A Research ProposalOrna Farrell
 
Unit-I Resarch Ethics and Publication.pptx
Unit-I Resarch Ethics and Publication.pptxUnit-I Resarch Ethics and Publication.pptx
Unit-I Resarch Ethics and Publication.pptxDrSmritiAgarwal
 
How to write a journal article
How to write a journal articleHow to write a journal article
How to write a journal articleKhalid Mahmood
 
Selecting Engineering Project
Selecting Engineering ProjectSelecting Engineering Project
Selecting Engineering ProjectA B Shinde
 
Failure Reporting, Analysis, Corrective Action System
Failure Reporting, Analysis, Corrective Action System Failure Reporting, Analysis, Corrective Action System
Failure Reporting, Analysis, Corrective Action System Ricky Smith CMRP, CMRT
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysisSiti Mastura
 
Introduction to Thesis
Introduction to ThesisIntroduction to Thesis
Introduction to ThesisUltraman Taro
 
Critical review
Critical reviewCritical review
Critical reviewAzura Zaki
 
Predatory journals 2019
Predatory journals 2019Predatory journals 2019
Predatory journals 2019Hasanain Ghazi
 
Introduction to Peer review, updated 2015-03-05
Introduction to Peer review, updated 2015-03-05Introduction to Peer review, updated 2015-03-05
Introduction to Peer review, updated 2015-03-05Wouter Gerritsma
 
Week 10 writing research proposal
Week 10  writing research proposalWeek 10  writing research proposal
Week 10 writing research proposalwawaaa789
 
Research methods for engineering students (v.2020)
Research methods for engineering students (v.2020)Research methods for engineering students (v.2020)
Research methods for engineering students (v.2020)Minh Pham
 
Understanding scientific peer review
Understanding scientific peer reviewUnderstanding scientific peer review
Understanding scientific peer reviewSamir Haffar
 

Was ist angesagt? (20)

Writing A Research Proposal
Writing A Research ProposalWriting A Research Proposal
Writing A Research Proposal
 
Literature review in research
Literature review in researchLiterature review in research
Literature review in research
 
How to respond to comments by peer reviewers
How to respond to comments by peer reviewersHow to respond to comments by peer reviewers
How to respond to comments by peer reviewers
 
How to Select A Research Topic
How to Select A Research TopicHow to Select A Research Topic
How to Select A Research Topic
 
Unit-I Resarch Ethics and Publication.pptx
Unit-I Resarch Ethics and Publication.pptxUnit-I Resarch Ethics and Publication.pptx
Unit-I Resarch Ethics and Publication.pptx
 
How to write a journal article
How to write a journal articleHow to write a journal article
How to write a journal article
 
Most common reasons for journal rejections
Most common reasons for journal rejectionsMost common reasons for journal rejections
Most common reasons for journal rejections
 
Selecting Engineering Project
Selecting Engineering ProjectSelecting Engineering Project
Selecting Engineering Project
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Failure Reporting, Analysis, Corrective Action System
Failure Reporting, Analysis, Corrective Action System Failure Reporting, Analysis, Corrective Action System
Failure Reporting, Analysis, Corrective Action System
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
 
Introduction to Thesis
Introduction to ThesisIntroduction to Thesis
Introduction to Thesis
 
Critical review
Critical reviewCritical review
Critical review
 
Predatory journals 2019
Predatory journals 2019Predatory journals 2019
Predatory journals 2019
 
Introduction to Peer review, updated 2015-03-05
Introduction to Peer review, updated 2015-03-05Introduction to Peer review, updated 2015-03-05
Introduction to Peer review, updated 2015-03-05
 
Peer Review
Peer ReviewPeer Review
Peer Review
 
Authorship (Part 1): Who should be the author of a research paper
Authorship (Part 1): Who should be the author of a research paperAuthorship (Part 1): Who should be the author of a research paper
Authorship (Part 1): Who should be the author of a research paper
 
Week 10 writing research proposal
Week 10  writing research proposalWeek 10  writing research proposal
Week 10 writing research proposal
 
Research methods for engineering students (v.2020)
Research methods for engineering students (v.2020)Research methods for engineering students (v.2020)
Research methods for engineering students (v.2020)
 
Understanding scientific peer review
Understanding scientific peer reviewUnderstanding scientific peer review
Understanding scientific peer review
 

Ähnlich wie Peer reviews

Survey Research In Empirical Software Engineering
Survey Research In Empirical Software EngineeringSurvey Research In Empirical Software Engineering
Survey Research In Empirical Software Engineeringalessio_ferrari
 
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxModule 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxroushhsiu
 
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxModule 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxroushhsiu
 
Evaluating information
Evaluating informationEvaluating information
Evaluating informationPenelope Cole
 
Publishing in Wiley Materials Science Journals - Wiley (February 2015)
Publishing in Wiley Materials Science Journals - Wiley (February 2015)Publishing in Wiley Materials Science Journals - Wiley (February 2015)
Publishing in Wiley Materials Science Journals - Wiley (February 2015)HKBU Library
 
Introduction to Epidemiology Course Project Detailed Article Cri.docx
Introduction to Epidemiology Course Project Detailed Article Cri.docxIntroduction to Epidemiology Course Project Detailed Article Cri.docx
Introduction to Epidemiology Course Project Detailed Article Cri.docxmariuse18nolet
 
Assessment Assignment
Assessment AssignmentAssessment Assignment
Assessment Assignmenteward511
 
Top Five Things that Public Relations Students need to know about research
Top Five Things that Public Relations Students need to know about researchTop Five Things that Public Relations Students need to know about research
Top Five Things that Public Relations Students need to know about researchSheila Cost
 
Survey design workshop
Survey design workshopSurvey design workshop
Survey design workshopJames Neill
 
Klaus-MSKCC-Feb-8-2010.ppt
Klaus-MSKCC-Feb-8-2010.pptKlaus-MSKCC-Feb-8-2010.ppt
Klaus-MSKCC-Feb-8-2010.pptJamesBon18
 
DSWBL Week 1: Using evidence in writing
DSWBL Week 1: Using evidence in writingDSWBL Week 1: Using evidence in writing
DSWBL Week 1: Using evidence in writingADT U2B
 
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchTao Xie
 
1Week 5Critiquing Research Articles to Prepare an Annotated B.docx
1Week 5Critiquing Research Articles to Prepare an Annotated B.docx1Week 5Critiquing Research Articles to Prepare an Annotated B.docx
1Week 5Critiquing Research Articles to Prepare an Annotated B.docxfelicidaddinwoodie
 
Week 1: Using evidence in writing
Week 1: Using evidence in writingWeek 1: Using evidence in writing
Week 1: Using evidence in writingADT U2B
 
How to write a CHI paper
How to write a CHI paperHow to write a CHI paper
How to write a CHI paperMaria Wolters
 
Academic Writing Guidelines ResourceDescriptionGuideline.docx
Academic Writing Guidelines ResourceDescriptionGuideline.docxAcademic Writing Guidelines ResourceDescriptionGuideline.docx
Academic Writing Guidelines ResourceDescriptionGuideline.docxbartholomeocoombs
 
Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
LIB300 Week 9 finding, analyzing, and documenting information
LIB300 Week 9 finding, analyzing, and documenting informationLIB300 Week 9 finding, analyzing, and documenting information
LIB300 Week 9 finding, analyzing, and documenting informationDr. Russell Rodrigo
 

Ähnlich wie Peer reviews (20)

Survey Research In Empirical Software Engineering
Survey Research In Empirical Software EngineeringSurvey Research In Empirical Software Engineering
Survey Research In Empirical Software Engineering
 
A referee's plea reviewed
A referee's plea reviewedA referee's plea reviewed
A referee's plea reviewed
 
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxModule 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
 
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docxModule 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
Module 1 - CaseKNOWLEDGE TRANSFER; PERFORMANCE MANAGEMENT; ON-TH.docx
 
Evaluating information
Evaluating informationEvaluating information
Evaluating information
 
Publishing in Wiley Materials Science Journals - Wiley (February 2015)
Publishing in Wiley Materials Science Journals - Wiley (February 2015)Publishing in Wiley Materials Science Journals - Wiley (February 2015)
Publishing in Wiley Materials Science Journals - Wiley (February 2015)
 
Introduction to Epidemiology Course Project Detailed Article Cri.docx
Introduction to Epidemiology Course Project Detailed Article Cri.docxIntroduction to Epidemiology Course Project Detailed Article Cri.docx
Introduction to Epidemiology Course Project Detailed Article Cri.docx
 
Assessment Assignment
Assessment AssignmentAssessment Assignment
Assessment Assignment
 
Top Five Things that Public Relations Students need to know about research
Top Five Things that Public Relations Students need to know about researchTop Five Things that Public Relations Students need to know about research
Top Five Things that Public Relations Students need to know about research
 
Survey design workshop
Survey design workshopSurvey design workshop
Survey design workshop
 
Klaus-MSKCC-Feb-8-2010.ppt
Klaus-MSKCC-Feb-8-2010.pptKlaus-MSKCC-Feb-8-2010.ppt
Klaus-MSKCC-Feb-8-2010.ppt
 
DSWBL Week 1: Using evidence in writing
DSWBL Week 1: Using evidence in writingDSWBL Week 1: Using evidence in writing
DSWBL Week 1: Using evidence in writing
 
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
 
1Week 5Critiquing Research Articles to Prepare an Annotated B.docx
1Week 5Critiquing Research Articles to Prepare an Annotated B.docx1Week 5Critiquing Research Articles to Prepare an Annotated B.docx
1Week 5Critiquing Research Articles to Prepare an Annotated B.docx
 
Week 1: Using evidence in writing
Week 1: Using evidence in writingWeek 1: Using evidence in writing
Week 1: Using evidence in writing
 
How to write a CHI paper
How to write a CHI paperHow to write a CHI paper
How to write a CHI paper
 
How to select your publications & who is who in research?: Impact & H factors
How to select your publications & who is who in research?: Impact & H factorsHow to select your publications & who is who in research?: Impact & H factors
How to select your publications & who is who in research?: Impact & H factors
 
Academic Writing Guidelines ResourceDescriptionGuideline.docx
Academic Writing Guidelines ResourceDescriptionGuideline.docxAcademic Writing Guidelines ResourceDescriptionGuideline.docx
Academic Writing Guidelines ResourceDescriptionGuideline.docx
 
Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
LIB300 Week 9 finding, analyzing, and documenting information
LIB300 Week 9 finding, analyzing, and documenting informationLIB300 Week 9 finding, analyzing, and documenting information
LIB300 Week 9 finding, analyzing, and documenting information
 

Mehr von Alexander Serebrenik

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Alexander Serebrenik
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
 
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...Alexander Serebrenik
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...Alexander Serebrenik
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsAlexander Serebrenik
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Alexander Serebrenik
 
Gender and Age in Software Engineering
Gender and Age in Software EngineeringGender and Age in Software Engineering
Gender and Age in Software EngineeringAlexander Serebrenik
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomAlexander Serebrenik
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAlexander Serebrenik
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsAlexander Serebrenik
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsAlexander Serebrenik
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software qualityAlexander Serebrenik
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Alexander Serebrenik
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)Alexander Serebrenik
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software EngineeringAlexander Serebrenik
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical DebtAlexander Serebrenik
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringAlexander Serebrenik
 

Mehr von Alexander Serebrenik (20)

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBot
 
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software Ecosystems
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
 
Gender and Age in Software Engineering
Gender and Age in Software EngineeringGender and Age in Software Engineering
Gender and Age in Software Engineering
 
Alexander - intro
Alexander - introAlexander - intro
Alexander - intro
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroom
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis Alarms
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
 
Gender and Community Smells
Gender and Community SmellsGender and Community Smells
Gender and Community Smells
 
Bias in MSR Research
Bias in MSR ResearchBias in MSR Research
Bias in MSR Research
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software quality
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software Engineering
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical Debt
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software Engineering
 

Kürzlich hochgeladen

Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicinesherlingomez2
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oManavSingh202607
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY1301aanya
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Servicenishacall1
 

Kürzlich hochgeladen (20)

Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 o
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 

Peer reviews