issues
search
DeveloperLiberationFront
/
iTrustInterviews
0
stars
0
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
TSE Review Response - Round 2
#452
jssmith1
closed
6 years ago
2
Fix letters in figure 1
#451
jssmith1
closed
6 years ago
1
Add refs to program comprehension strategies
#450
jssmith1
closed
6 years ago
0
Improve discussion of related work
#449
jssmith1
closed
6 years ago
0
All TSE Reviews --- Round 2
#448
jssmith1
closed
6 years ago
0
Assumptions in appendix
#447
jssmith1
closed
6 years ago
1
Say something about experience differences
#446
jssmith1
closed
6 years ago
2
Reading Group Feedback
#445
jssmith1
closed
6 years ago
1
Emerson's review of task section
#444
jssmith1
closed
6 years ago
0
Double check counts
#443
jssmith1
closed
6 years ago
1
How to make results actionable
#442
jssmith1
closed
6 years ago
1
Suggestion: Present table 3 as a graph
#441
jssmith1
closed
7 years ago
1
No difference between fix and alternative fix
#440
jssmith1
closed
6 years ago
4
More details on the tasks
#439
jssmith1
closed
6 years ago
7
Task sequencing threat
#438
jssmith1
closed
7 years ago
2
Add task info to Table III (categories list)
#437
jssmith1
closed
7 years ago
3
Do *developers* care about vulnerabilities
#436
jssmith1
closed
6 years ago
4
Request for an additional study
#435
jssmith1
closed
6 years ago
1
Inappropriate to reuse data for info needs to answer diagnosis RQs
#434
jssmith1
closed
6 years ago
2
Discussion too general and not novel
#433
jssmith1
closed
6 years ago
4
Strategy and assumption results poorly developed
#432
jssmith1
closed
6 years ago
3
Not enough of an increment
#431
jssmith1
closed
6 years ago
1
How would results have changed if we changed the instructions
#430
jssmith1
closed
6 years ago
1
Clarify how task selection is broad, but still limited
#429
jssmith1
closed
7 years ago
2
More specification of attack tree analysis
#428
jssmith1
closed
6 years ago
5
Did the interviewer's prompt impact P3's tasks
#427
jssmith1
closed
6 years ago
4
Clarify DAO fix Example
#426
jssmith1
closed
7 years ago
1
Hard to find assumption results
#425
jssmith1
closed
6 years ago
4
Highlight cross-category strategies
#424
jssmith1
closed
6 years ago
2
Follow through on example used to define assumptions in methodology
#423
jssmith1
closed
6 years ago
3
Clarify definition of an assumption
#422
jssmith1
closed
6 years ago
2
Validity of RQ2/3
#421
jssmith1
closed
6 years ago
9
Is data flow more relevant in a security context
#420
jssmith1
closed
6 years ago
2
Misleading title
#419
jssmith1
closed
7 years ago
2
Make the assumptions available
#418
jssmith1
closed
6 years ago
4
Replication Package
#417
jssmith1
closed
7 years ago
4
Expand discussion of limitations
#416
jssmith1
closed
7 years ago
5
Connections to prior work lacking + How are these strategies unique to security
#415
jssmith1
closed
6 years ago
14
Minor Changes for TSE
#414
jssmith1
closed
6 years ago
2
Create List of Changes
#413
jssmith1
closed
6 years ago
6
Add "Teaser Image"
#412
jssmith1
opened
7 years ago
4
All TSE Reviews
#411
jssmith1
closed
6 years ago
0
Final checks
#410
jssmith1
closed
7 years ago
0
Add bios + Photos
#409
jssmith1
closed
7 years ago
0
Create Separate Appendices
#408
jssmith1
closed
7 years ago
0
Integrate assumptions in "interpreting the results" section
#407
jssmith1
closed
7 years ago
0
Update intro contributions to point to new assumptions
#406
jssmith1
closed
7 years ago
0
statement of contrast?
#405
jssmith1
closed
7 years ago
0
weak transition
#404
jssmith1
closed
7 years ago
0
sgtm. similar to some other tools: -fixbugs (t...
#403
jssmith1
closed
7 years ago
2
Next