Follow
Nasir Ali
Nasir Ali
Data Architect, Apple Inc.
Verified email at apple.com
Title
Cited by
Cited by
Year
Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store
S McIlroy, N Ali, AE Hassan
Empirical Software Engineering 21, 1346-1370, 2016
2652016
Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews
S McIlroy, N Ali, H Khalid, A E. Hassan
Empirical Software Engineering 21, 1067-1106, 2016
2312016
Smurf: A svm-based incremental anti-pattern detection approach
A Maiga, N Ali, N Bhattacharya, A Sabané, YG Guéhéneuc, E Aimeur
2012 19th Working conference on reverse engineering, 466-475, 2012
1542012
Trustrace: Mining software repositories to improve the accuracy of requirement traceability links
N Ali, YG Guéhéneuc, G Antoniol
IEEE Transactions on Software Engineering 39 (5), 725-741, 2012
1502012
Support vector machines for anti-pattern detection
A Maiga, N Ali, N Bhattacharya, A Sabané, YG Guéhéneuc, G Antoniol, ...
Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
1342012
An empirical study of software release notes
SL Abebe, N Ali, AE Hassan
Empirical Software Engineering 21, 1107-1142, 2016
662016
Is it worth responding to reviews? studying the top free apps in google play
S McIlroy, W Shang, N Ali, AE Hassan
IEEE Software 34 (3), 64-71, 2015
592015
An empirical study on requirements traceability using eye-tracking
N Ali, Z Sharafl, YG Guéhéneuc, G Antoniol
2012 28th IEEE International Conference on Software Maintenance (ICSM), 191-200, 2012
542012
Trust-based requirements traceability
N Ali, YG Guéhéneuc, G Antoniol
2011 IEEE 19th International Conference on Program Comprehension, 111-120, 2011
502011
mSieve: differential behavioral privacy in time series of mobile sensor data
N Saleheen, S Chakraborty, N Ali, MM Rahman, SM Hossain, R Bari, ...
Proceedings of the 2016 ACM International Joint Conference on Pervasive and …, 2016
472016
Requirements traceability for object oriented systems by partitioning source code
N Ali, YG Gueheneuc, G Antoniol
2011 18th Working Conference on Reverse Engineering, 45-54, 2011
452011
An empirical study on the importance of source code entities for requirements traceability
N Ali, Z Sharafi, YG Guéhéneuc, G Antoniol
Empirical software engineering 20, 442-478, 2015
412015
Improving bug location using binary class relationships
N Ali, A Sabané, YG Guéhéneuc, G Antoniol
2012 IEEE 12th International Working Conference on Source Code Analysis and …, 2012
352012
Exploiting Parts-of-Speech for effective automated requirements traceability
N Ali, H Cai, A Hamou-Lhadj, J Hassine
Information and software technology 106, 126-141, 2019
322019
Factors impacting the inputs of traceability recovery approaches
N Ali, YG Guéhéneuc, G Antoniol
Software and systems traceability, 99-127, 2012
222012
Leveraging historical co-change information for requirements traceability
N Ali, F Jaafar, AE Hassan
2013 20th Working Conference on Reverse Engineering (WCRE), 361-370, 2013
202013
Moms: Multi-objective miniaturization of software
N Ali, W Wu, G Antoniol, M Di Penta, YG Guéhéneuc, JH Hayes
2011 27th IEEE International Conference on Software Maintenance (ICSM), 153-162, 2011
192011
Building a secure mhealth data sharing infrastructure over ndn
S Dulal, N Ali, AR Thieme, T Yu, S Liu, S Regmi, L Zhang, L Wang
Proceedings of the 9th ACM Conference on Information-Centric Networking, 114-124, 2022
162022
mCerebrum and Cerebral Cortex: A Real-time Collection, Analytic, and Intervention Platform for High-frequency Mobile Sensor Data.
T Hnat, SM Hossain, N Ali, S Carini, T Condie, I Sim, MB Srivastava, ...
AMIA, 2017
52017
A novel process and its implementation for the multi-objective miniaturization of software
N Ali, W Wu, G Antoniol, M Di Penta, YG Guéhéneuc, JH Hayes
École Polytechnique de Montréal, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20