default search action
Ashish Sureka
Person information
- affiliation: Ashoka University, Haryana, India
- affiliation (former): ABB Corporate Research, Bangalore, India
- affiliation: Indraprastha Institute of Information Technology, Delhi (IIIT-D), Software Analytics Research Lab
- affiliation: Infosys Technologies Ltd, Bangalore, India
- affiliation: North Carolina State University, Raleigh, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c115]Veena Saini, Paramvir Singh, Ashish Sureka:
Control-Flow based Anomaly Detection in the Bug-Fixing Process of Open-Source Projects. ISEC 2020: 4:1-4:11
2010 – 2019
- 2019
- [j21]Sangeeta Lal, Neetu Sardana, Ashish Sureka:
Three-level learning for improving cross-project logging prediction for if-blocks. J. King Saud Univ. Comput. Inf. Sci. 31(4): 481-496 (2019) - [j20]Lov Kumar, Ashish Sureka:
Quality of service (QoS) parameters prediction for web services using hybrid neural network and ensemble methods. Int. J. Syst. Assur. Eng. Manag. 10(6): 1577-1614 (2019) - 2018
- [j19]Lov Kumar, Saikrishna Sripada, Ashish Sureka, Santanu Ku. Rath:
Effective fault prediction model developed using Least Square Support Vector Machine (LSSVM). J. Syst. Softw. 137: 686-712 (2018) - [j18]Paramvir Singh, Sheikh Umar Farooq, Saurabh Tiwari, Ashish Sureka:
An Experience Report on Workshop on Emerging Software Engineering Education. ACM SIGSOFT Softw. Eng. Notes 43(2): 12-23 (2018) - [c114]Swati Agarwal, Nitish Mittal, Ashish Sureka:
Potholes and bad road conditions: mining Twitter to extract information on killer roads. COMAD/CODS 2018: 67-77 - [c113]Lov Kumar, Ashish Sureka:
An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework. COMPSAC (1) 2018: 2-11 - [c112]Saurabh Tiwari, Deepti Ameta, Paramvir Singh, Ashish Sureka:
Teaching requirements engineering concepts using case-based learning. SEEM@ICSE 2018: 8-15 - [c111]Lov Kumar, Ashish Sureka:
Feature Selection Techniques to Counter Class Imbalance Problem for Aging Related Bug Prediction: Aging Related Bug Prediction. ISEC 2018: 2:1-2:11 - [c110]Saurabh Tiwari, Veena Saini, Paramvir Singh, Ashish Sureka:
A Case Study on the Application of Case-Based Learning in Software Testing. ISEC 2018: 11:1-11:5 - [i27]Saurabh Tiwari, Deepti Ameta, Paramvir Singh, Ashish Sureka:
Teaching Requirements Engineering Concepts using Case-Based Learning. CoRR abs/1804.01770 (2018) - [i26]Aditya G. Parameswaran, Dibyendu Mishra, Sanchit Bansal, Vinayak Agarwal, Anjali Goyal, Ashish Sureka:
Automatic email response suggestion for support departments within a university. PeerJ Prepr. 6: e26531 (2018) - [i25]Vijay Lingam, Simran Bhuria, Mayukh Nair, Divij Gurpreetsingh, Anjali Goyal, Ashish Sureka:
Deep learning for conflicting statements detection in text. PeerJ Prepr. 6: e26589 (2018) - [i24]Deva Surya Vivek Madala, Ayushree Gangal, Shreyash Krishna, Anjali Goyal, Ashish Sureka:
An empirical analysis of machine learning models for automated essay grading. PeerJ Prepr. 6: e3518 (2018) - 2017
- [j17]Sangeeta Lal, Neetu Sardana, Ashish Sureka:
ECLogger: Cross-Project Catch-Block Logging Prediction Using Ensemble of Classifiers. e Informatica Softw. Eng. J. 11(1): 7-38 (2017) - [j16]Swati Agarwal, Nitish Mittal, Ashish Sureka:
A general overview and bibliometric analysis of seven ACM hypertext and web conferences. Int. J. Web Eng. Technol. 12(3): 190-233 (2017) - [j15]Swati Agarwal, Nitish Mittal, Ashish Sureka:
Minority ethnic groups in computer science research: what is the bibliography data telling us? SIGCAS Comput. Soc. 47(2): 5-15 (2017) - [j14]Lov Kumar, Ranjan Kumar Behera, Santanu Kumar Rath, Ashish Sureka:
Transfer Learning for Cross-Project Change-Proneness Prediction in Object-Oriented Software Systems: A Feasibility Analysis. ACM SIGSOFT Softw. Eng. Notes 42(3): 1-11 (2017) - [j13]Lov Kumar, Ranjan Kumar Behera, Santanu Kumar Rath, Ashish Sureka:
A Bibliometric Study of ACM SIGSOFT Software Engineering Notes from 2007 to 2016. ACM SIGSOFT Softw. Eng. Notes 42(3): 1-7 (2017) - [j12]Swati Agarwal, Nitish Mittal, Ashish Sureka:
How healthy are ACM SIGWEB sponsored conferences? SIGWEB Newsl. 2017(Spring): 4:1-4:17 (2017) - [j11]Swati Agarwal, Nitish Mittal, Ashish Sureka:
How healthy are DocEng, JCDL and UMAP series of conferences? SIGWEB Newsl. 2017(Summer): 5:1-5:14 (2017) - [c109]Sandhya Tarwani, Ashish Sureka:
Investigating the Effectiveness of Greedy Algorithm on Open Source Software Systems for Determining Refactoring Sequence. QuASoQ@APSEC 2017: 43-50 - [c108]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Estimating Web Service Quality of Service Parameters using Source Code Metrics and LSSVM. QuASoQ@APSEC 2017: 66-73 - [c107]Lov Kumar, Ashish Sureka:
Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level. APSEC 2017: 90-99 - [c106]Swati Agarwal, Ashish Sureka:
Investigating the Role of Twitter in E-Governance by Extracting Information on Citizen Complaints and Grievances Reports. BDA 2017: 300-310 - [c105]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
An Empirical Analysis on Effective Fault Prediction Model Developed Using Ensemble Methods. COMPSAC (1) 2017: 244-249 - [c104]Veena Saini, Paramvir Singh, Ashish Sureka:
SEABED: An Open-Source Software Engineering Case-Based Learning Database. COMPSAC (1) 2017: 426-431 - [c103]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software. HASE 2017: 88-95 - [c102]Denzil Correa, Ashish Sureka, Sangeeta Lal:
Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairs. IC3 2017: 1-5 - [c101]Lov Kumar, Ashish Sureka:
Analyzing fault prediction usefulness from cost perspective using source code metrics. IC3 2017: 1-7 - [c100]Lov Kumar, Ashish Sureka:
Neural network with multiple training methods for web service quality of service parameter prediction. IC3 2017: 1-7 - [c99]Richa Sharma, Ashish Sureka:
CRUISE: A platform for crowdsourcing Requirements Elicitation and evolution. IC3 2017: 1-7 - [c98]Swati Agarwal, Ashish Sureka:
A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on Tumblr. ICDCIT 2017: 43-57 - [c97]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Empirical Analysis on Effectiveness of Source Code Metrics for Predicting Change-Proneness. ISEC 2017: 4-14 - [c96]Lov Kumar, Ashish Sureka:
Using Structured Text Source Code Metrics and Artificial Neural Networks to Predict Change Proneness at Code Tab and Program Organization Level. ISEC 2017: 172-180 - [c95]Swati Agarwal, Ashish Sureka:
Investigating the Dynamics of Religious Conflicts by Mining Public Opinions on Social Media. PAKDD (1) 2017: 421-433 - [c94]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Using source code metrics to predict change-prone web services: A case-study on ebay services. MaLTeSQuE 2017: 1-7 - [e6]P. Krishna Reddy, Ashish Sureka, Sharma Chakravarthy, Subhash Bhalla:
Big Data Analytics - 5th International Conference, BDA 2017, Hyderabad, India, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10721, Springer 2017, ISBN 978-3-319-72412-6 [contents] - [e5]Srinivas Alum, Ananth Kalyanaraman, Bora Uçar, Kishore Kothapalli, Mahantesh Halappanavar, Kamesh Madduri, Madhu Govindaraju, Yinglong Xia, Sushil K. Prasad, Martina Barnas, Ashish Sureka, Pankesh Patel, Vikas Saxena, Sanjay Goel:
Tenth International Conference on Contemporary Computing, IC3 2017, Noida, India, August 10-12, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3077-8 [contents] - [e4]Ravi Prakash Gorthi, Santonu Sarkar, Nenad Medvidovic, Vinay Kulkarni, Atul Kumar, Padmaja Joshi, Paola Inverardi, Ashish Sureka, Richa Sharma:
Proceedings of the 10th Innovations in Software Engineering Conference, ISEC 2017, Jaipur, India, February 5-7, 2017. ACM 2017, ISBN 978-1-4503-4856-0 [contents] - [i23]Jeevan Joishi, Ashish Sureka:
Graph or Relational Databases: A Speed Comparison for Process Mining Algorithm. CoRR abs/1701.00072 (2017) - [i22]Ashish Sureka:
Parichayana: An Eclipse Plugin for Detecting Exception Handling Anti-Patterns and Code Smells in Java Programs. CoRR abs/1701.00108 (2017) - [i21]Swati Agarwal, Ashish Sureka:
Characterizing Linguistic Attributes for Automatic Classification of Intent Based Racist/Radicalized Posts on Tumblr Micro-Blogging Website. CoRR abs/1701.04931 (2017) - [i20]Swati Agarwal, Ashish Sureka:
Investigating the Application of Common-Sense Knowledge-Base for Identifying Term Obfuscation in Adversarial Communication. CoRR abs/1701.04934 (2017) - [i19]Kunal Gupta, Astha Sachdev, Ashish Sureka:
Empirical Analysis on Comparing the Performance of Alpha Miner Algorithm in SQL Query Language and NoSQL Column-Oriented Databases Using Apache Phoenix. CoRR abs/1703.05481 (2017) - [i18]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Using Source Code Metrics and Ensemble Methods for Fault Proneness Prediction. CoRR abs/1704.04383 (2017) - [i17]Lov Kumar, Ashish Sureka:
A Comparative Study of Different Source Code Metrics and Machine Learning Algorithms for Predicting Change Proneness of Object Oriented Systems. CoRR abs/1712.07944 (2017) - 2016
- [j10]Sangeeta Lal, Neetu Sardana, Ashish Sureka:
Improving Logging Prediction on Imbalanced Datasets: A Case Study on Open Source Java Projects. Int. J. Open Source Softw. Process. 7(2): 43-71 (2016) - [j9]Swati Agarwal, Nitish Mittal, Rohan Katyal, Ashish Sureka, Denzil Correa:
Women in computer science research: what is the bibliography data telling us? SIGCAS Comput. Soc. 46(1): 7-19 (2016) - [j8]Richa Sharma, Peeyush Aggarwal, Ashish Sureka:
Insights from Mining Eleven Years of Scholarly Paper Publications in Requirements Engineering (RE) Series of Conferences. ACM SIGSOFT Softw. Eng. Notes 41(2): 1-6 (2016) - [j7]Richa Sharma, Ashish Sureka:
A Nine Year Story of the India Software Engineering Conference from 2008 to 2016. ACM SIGSOFT Softw. Eng. Notes 41(5): 31-44 (2016) - [j6]Swati Agarwal, Nitish Mittal, Ashish Sureka:
A scientometric analysis of 9 ACM SIGWEB cooperating conferences. SIGWEB Newsl. 2016(Autumn): 6:1-6:15 (2016) - [j5]Swati Agarwal, Nitish Mittal, Ashish Sureka:
A glance at seven ACM SIGWEB series of conferences. SIGWEB Newsl. 2016(Summer): 5:1-5:10 (2016) - [c93]Nitish Mittal, Swati Agarwal, Ashish Sureka:
Got a Complaint?- Keep Calm and Tweet It! ADMA 2016: 619-635 - [c92]Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Predicting Quality of Service (QoS) Parameters using Extreme Learning Machines with Various Kernel Methods. QuASoQ/TDA@APSEC 2016: 27-34 - [c91]Lov Kumar, Saikrishna Sripada, Ashish Sureka:
A Review of Six Years of Asia-Pacific Software Engineering Conference. APSEC 2016: 341-344 - [c90]Swati Agarwal, Ashish Sureka:
Investigating the Potential of Aggregated Tweets as Surrogate Data for Forecasting Civil Protests. CODS 2016: 8:1-8:6 - [c89]Prerna Juneja, Divya Kundra, Ashish Sureka:
Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking Systems. COMPSAC 2016: 53-62 - [c88]Xin Xia, David Lo, Denzil Correa, Ashish Sureka, Emad Shihab:
It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features. COMPSAC 2016: 73-82 - [c87]Sangeeta Lal, Neetu Sardana, Ashish Sureka:
LogOptPlus: Learning to Optimize Logging in Catch and If Programming Constructs. COMPSAC 2016: 215-220 - [c86]Swati Agarwal, Ashish Sureka:
But I did not Mean It! - Intent Classification of Racist Posts on Tumblr. EISIC 2016: 124-127 - [c85]Swati Agarwal, Ashish Sureka:
Role of Author Personality Traits for Identifying Intent Based Racist Posts. EISIC 2016: 197 - [c84]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Siddharth Dawar, Vikram Goyal, Ashish Sureka, Bay Vo:
A More Efficient Algorithm to Mine Skyline Frequent-Utility Patterns. ICGEC 2016: 127-135 - [c83]Lov Kumar, Raoul Jetley, Ashish Sureka:
Source code metrics for programmable logic controller (PLC) ladder diagram (LD) visual programming language. WETSoM@ICSE 2016: 15-21 - [c82]Sangeeta Lal, Ashish Sureka:
LogOpt: Static Feature Extraction from Source Code for Automated Catch Block Logging Prediction. ISEC 2016: 151-155 - [c81]Saurabh Chauhan, Pankesh Patel, Ashish Sureka, Flávia Coimbra Delicato, Sanjay Chaudhary:
Demonstration Abstract: IoTSuite - A Framework to Design, Implement, and Deploy IoT Applications. IPSN 2016: 37:1-37:2 - [c80]Vidushi Chaudhary, Vishnu Agrawal, Pragya Sureka, Ashish Sureka:
An Experience Report on Teaching Programming and Computational Thinking to Elementary Level Children Using Lego Robotics Education Kit. T4E 2016: 38-41 - [c79]Divya Kundra, Ashish Sureka:
An Experience Report on Teaching Compiler Design Concepts Using Case-Based and Project-Based Learning Approaches. T4E 2016: 216-219 - [e3]Horst Lichter, Konrad Fögen, Thanwadee Sunetnanta, Toni Anwar, Aiko Yamashita, Leon Moonen, Tom Mens, Amjed Tahir, Ashish Sureka:
Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016) and 1st International Workshop on Technical Debt Analytics (TDA 2016) co-located with the 23rd Asia-Pacific Software Engineering Conference (APSEC 2016), Hamilton, New Zealand, December 6, 2016. CEUR Workshop Proceedings 1771, CEUR-WS.org 2016 [contents] - [e2]Santonu Sarkar, Ashish Sureka, Domenico Cotroneo, Nishant Sinha, Vibha Singhal Sinha, Radhika Venkatasubramanyam, Padmaja Joshi, R. D. Naik, Pushpendra Singh, JayPrakash Lalchandani:
Proceedings of the 9th India Software Engineering Conference, Goa, India, February 18-20, 2016. ACM 2016, ISBN 978-1-4503-4018-2 [contents] - [i16]Swati Agarwal, Ashish Sureka:
Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities. CoRR abs/1603.09164 (2016) - [i15]Lov Kumar, Ashish Sureka:
Thirteen Years of Mining Software Repositories (MSR) Conference - What is the Bibliography Data Telling Us? CoRR abs/1609.06266 (2016) - [i14]Vidushi Chaudhary, Vishnu Agrawal, Ashish Sureka:
An Experimental Study on the Learning Outcome of Teaching Elementary Level Children using Lego Mindstorms EV3 Robotics Education Kit. CoRR abs/1610.09610 (2016) - [i13]Lov Kumar, Saikrishna Sripada, Ashish Sureka:
A Bibliometric Study of Asia Pacific Software Engineering Conference from 2010 to 2015. CoRR abs/1610.09635 (2016) - [i12]Divya Kundra, Ashish Sureka:
Application of Case-Based Teaching and Learning in Compiler Design Course. CoRR abs/1611.00271 (2016) - 2015
- [j4]Sangeeta Lal, Neetu Sardana, Ashish Sureka:
Two Level Empirical Study of Logging Statements in Open Source Java Projects. Int. J. Open Source Softw. Process. 6(1): 49-73 (2015) - [j3]Ashish Sureka, Y. Raghu Reddy, Pornsiri Muenchaisri, Masateru Tsunoda:
A Report on Software Engineering Education Workshop (SEEW) 2014 Co-Located with Asia-Pacific Software Engineering Conference 2014. ACM SIGSOFT Softw. Eng. Notes 40(1): 40-43 (2015) - [c78]Ashish Sureka, Himanshu Singh, Manjunat Bagewadi, Abhishek Mitra, Rohit Karanth:
A Decision Support Platform for Guiding a Bug Triage for Resolver Recommendation Using Textual and Non-Textual Features. QuASoQ/WAWSE/CMCE@APSEC 2015: 23-30 - [c77]Ritika Atal, Ashish Sureka:
Anukarna: A Software Engineering Simulation Game for Teaching Practical Decision Making in Peer Code Review. QuASoQ/WAWSE/CMCE@APSEC 2015: 63-70 - [c76]Kirti Garg, Ashish Sureka, Vasudeva Varma:
A Case Study on Teaching Software Engineering Concepts using a Case-Based Learning Environment. QuASoQ/WAWSE/CMCE@APSEC 2015: 71-78 - [c75]Bowen Xu, David Lo, Xin Xia, Ashish Sureka, Shanping Li:
EFSPredictor: Predicting Configuration Bugs with Ensemble Feature Selection. APSEC 2015: 206-213 - [c74]Swati Agarwal, Ashish Sureka, Vikram Goyal:
Open Source Social Media Analytics for Intelligence and Security Informatics Applications. BDA 2015: 21-37 - [c73]Kritika Anand, Nisha Gupta, Ashish Sureka:
Utility-Based Control Flow Discovery from Business Process Event Logs. BDA 2015: 69-83 - [c72]Astha Sachdev, Kunal Gupta, Ashish Sureka:
Khanan: Performance Comparison and Programming \alpha α -Miner Algorithm in Column-Oriented and Relational Database Query Languages. BDA 2015: 165-180 - [c71]Divya Kundra, Prerna Juneja, Ashish Sureka:
Vidushi: Parallel Implementation of Alpha Miner Algorithm and Performance Analysis on CPU and GPU Architecture. Business Process Management Workshops 2015: 230-241 - [c70]Kunal Gupta, Astha Sachdev, Ashish Sureka:
Pragamana: Performance Comparison and Programming Alpha-miner Algorithm in Relational Database Query Language and NoSQL Column-Oriented Using Apache Phoenix. C3S2E 2015: 113-118 - [c69]Vikram Goyal, Ashish Sureka, Dhaval Patel:
Efficient Skyline Itemsets Mining. C3S2E 2015: 119-124 - [c68]Swati Agarwal, Ashish Sureka:
Using common-sense knowledge-base for detecting word obfuscation in adversarial communication. COMSNETS 2015: 1-6 - [c67]Saikrishna Sripada, Y. Raghu Reddy, Ashish Sureka:
In Support of Peer Code Review and Inspection in an Undergraduate Software Engineering Course. CSEE&T 2015: 3-6 - [c66]Vikram Goyal, Siddharth Dawar, Ashish Sureka:
High Utility Rare Itemset Mining over Transaction Databases. DNIS 2015: 27-40 - [c65]Swati Agarwal, Ashish Sureka:
Topic-Specific YouTube Crawling to Detect Online Radicalization. DNIS 2015: 133-151 - [c64]Nisha Gupta, Kritika Anand, Ashish Sureka:
Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents. DNIS 2015: 244-263 - [c63]Swati Agarwal, Ashish Sureka:
Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter. ICDCIT 2015: 431-442 - [c62]Jeevan Joishi, Ashish Sureka:
Vishleshan: Performance Comparison and Programming Process Mining Algorithms in Graph-Oriented and Relational Database Query Languages. IDEAS 2015: 192-197 - [c61]Yash Lamba, Manisha Khattar, Ashish Sureka:
Pravaaha: Mining Android Applications for Discovering API Call Usage Patterns and Trends. ISEC 2015: 10-19 - [c60]Manisha Khattar, Yash Lamba, Ashish Sureka:
SARATHI: Characterization Study on Regression Bugs and Identification of Regression Bug Inducing Changes: A Case-Study on Google Chromium Project. ISEC 2015: 50-59 - [c59]Ashish Sureka, Atul Kumar, Shrinath Gupta:
Ahaan: Software Process Intelligence: Mining Software Process Data for Extracting Actionable Information. ISEC 2015: 198-199 - [c58]Bimlesh Wadhwa, Bharat Gera, Ashish Sureka:
A Report on Software Engineering Education Workshop (SEED) colocated with ISEC 2015. ISEC 2015: 206-207 - [c57]Akanksha Mishra, Ashish Sureka:
A Graph Processing Based Approach for Automatic Detection of Semantic Inconsistency Between BPMN Process Model and SBVR Rules. MIKE 2015: 115-129 - [c56]Swati Agarwal, Ashish Sureka:
A Topical Crawler for Uncovering Hidden Communities of Extremist Micro-Bloggers on Tumblr. #MSM 2015: 26-27 - [c55]Monika Gupta, Ashish Sureka, Srinivas Padmanabhuni, Allahbaksh M. Asadullah:
Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company. MSR 2015: 346-356 - [c54]Ambika Tripathi, Savita Dabral, Ashish Sureka:
University-industry collaboration and open source software (OSS) dataset in mining software repositories (MSR) research. SWAN@SANER 2015: 39-40 - [e1]Srinivas Padmanabhuni, Raghu Nambiar, Premkumar T. Devanbu, Murali Krishna Ramanathan, Ashish Sureka:
Proceedings of the 8th India Software Engineering Conference, ISEC 2015, Bangalore, India, February 18-20, 2015. ACM 2015, ISBN 978-1-4503-3432-7 [contents] - [i11]Ashish Sureka, Ambika Tripathi, Savita Dabral:
Survey Results on Threats To External Validity, Generalizability Concerns, Data Sharing and University-Industry Collaboration in Mining Software Repository (MSR) Research. CoRR abs/1506.01499 (2015) - [i10]Ashish Sureka:
Intention-Oriented Process Model Discovery from Incident Management Event Logs. CoRR abs/1507.01062 (2015) - [i9]Ashish Sureka:
Kernel Based Sequential Data Anomaly Detection in Business Process Event Logs. CoRR abs/1507.01168 (2015) - [i8]Swati Agarwal, Ashish Sureka:
Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats. CoRR abs/1511.06858 (2015) - [i7]Prerna Juneja, Divya Kundra, Ashish Sureka:
Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models generated by Mining Event-Log Data in Issue Tracking System. CoRR abs/1511.07023 (2015) - 2014
- [c53]Ayushi Rastogi, Ashish Sureka:
What Community Contribution Pattern Says about Stability of Software Project? APSEC (2) 2014: 31-34 - [c52]Sangeeta Lal, Denzil Correa, Ashish Sureka:
Migrated Question Prediction on StackExchange. APSEC (2) 2014: 35-38 - [c51]Monika Gupta, Ashish Sureka:
Process Cube for Software Defect Resolution. APSEC (1) 2014: 239-246 - [c50]Ashish Sureka:
Requirements Prioritization and Next-Release Problem under Non-additive Value Conditions. Australian Software Engineering Conference 2014: 120-123 - [c49]Ashish Sureka, Girish Maskeri Rama, Atul Kumar:
Kashvi: Process Mining Software Repositories. COMAD 2014: 11-13 - [c48]Swati Agarwal, Ashish Sureka:
A focused crawler for mining hate and extremism promoting videos on YouTube. HT 2014: 294-296 - [c47]Ritika Jain, Smita Ghaisas, Ashish Sureka:
SANAYOJAN: a framework for traceability link recovery between use-cases in software requirement specification and regulatory documents. RAISE 2014: 12-18 - [c46]Ayushi Aggarwal, Gajendra Waghmare, Ashish Sureka:
Mining issue tracking systems using topic models for trend analysis, corpus exploration, and understanding evolution. RAISE 2014: 52-58 - [c45]Megha Mittal, Ashish Sureka:
Process mining software repositories from student projects in an undergraduate software engineering course. ICSE Companion 2014: 344-353 - [c44]Rahul Mishra, Ashish Sureka:
Mining Peer Code Review System for Computing Effort and Contribution Metrics for Patch Reviewers. MUD@ICSME 2014: 11-15 - [c43]Monika Gupta, Ashish Sureka:
Nirikshan: mining bug report history for discovering process maps, inefficiencies and inconsistencies. ISEC 2014: 1:1-1:10 - [c42]Ayushi Rastogi, Ashish Sureka:
SamikshaViz: a panoramic view to measure contribution and performance of software maintenance professionals by mining bug archives. ISEC 2014: 2:1-2:10 - [c41]Ashish Sureka, Swati Agarwal:
Learning to Classify Hate and Extremism Promoting Tweets. JISIC 2014: 320 - [c40]Monika Gupta, Ashish Sureka, Srinivas Padmanabhuni:
Process mining multiple repositories for software defect resolution from control and organizational perspective. MSR 2014: 122-131 - [c39]Ayushi Rastogi, Ashish Sureka:
Does Contributor Characteristics Influence Future Participation? A Case Study on Google Chromium Issue Tracking System. OSS 2014: 164-167 - [c38]Nisha Aggarwal, Swati Agarwal, Ashish Sureka:
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. PST 2014: 84-93 - [c37]Denzil Correa, Ashish Sureka:
Chaff from the wheat: characterization and modeling of deleted questions on stack overflow. WWW 2014: 631-642 - [i6]Denzil Correa, Ashish Sureka:
Chaff from the Wheat : Characterization and Modeling of Deleted Questions on Stack Overflow. CoRR abs/1401.0480 (2014) - 2013
- [c36]Denzil Correa, Sangeeta Lal, Apoorv Saini, Ashish Sureka:
Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion Forum. APSEC (1) 2013: 25-33 - [c35]Ayushi Rastogi, Ashish Sureka:
SamikshaUmbra: Contribution and Performance Assessment of Software Maintenance Professionals by Mining Software Repositories. APSEC (2) 2013: 170-175 - [c34]Denzil Correa, Ashish Sureka:
Integrating Issue Tracking Systems with Community-Based Question and Answering Websites. Australian Software Engineering Conference 2013: 88-96 - [c33]Swati Agarwal, Ashish Sureka:
Copyright Infringement Detection of Music Videos on YouTube by Mining Video and Uploader Meta-data. BDA 2013: 48-67 - [c32]Denzil Correa, Ashish Sureka:
Fit or unfit: analysis and prediction of 'closed questions' on stack overflow. COSN 2013: 201-212 - [c31]Ayushi Rastogi, Arpit Gupta, Ashish Sureka:
Samiksha: mining issue tracking system for contribution and performance assessment. ISEC 2013: 13-22 - [c30]Vidushi Chaudhary, Ashish Sureka:
Contextual feature based one-class classifier approach for detecting video response spam on YouTube. PST 2013: 195-204 - [i5]Denzil Correa, Ashish Sureka:
Solutions to Detect and Analyze Online Radicalization : A Survey. CoRR abs/1301.4916 (2013) - [i4]Denzil Correa, Ashish Sureka:
Fit or Unfit : Analysis and Prediction of 'Closed Questions' on Stack Overflow. CoRR abs/1307.7291 (2013) - [i3]Ashish Sureka, Monika Gupta, Dipto Sarkar, Vidushi Chaudhary:
A Case-Study on Teaching Undergraduate-Level Software Engineering Course Using Inverted-Classroom, Large-Group, Real-Client and Studio-Based Instruction Model. CoRR abs/1309.0714 (2013) - 2012
- [j2]Rakesh Shukla, Ashish Sureka, Rushikesh K. Joshi, Rajib Mall:
A report on software engineering education workshop. ACM SIGSOFT Softw. Eng. Notes 37(3): 26-31 (2012) - [c29]Sangeeta Lal, Ashish Sureka:
Comparison of Seven Bug Report Types: A Case-Study of Google Chrome Browser Project. APSEC 2012: 517-526 - [c28]Denzil Correa, Ashish Sureka, Mayank Pundir:
iTop: interaction based topic centric community discovery on twitter. PIKM 2012: 51-58 - [c27]Sangeeta Lal, Ashish Sureka:
A static technique for fault localization using character n-gram based information retrieval model. ISEC 2012: 109-118 - [c26]Ashish Sureka:
Source code identifier splitting using Yahoo image and web search engine. Software Mining 2012: 1-8 - [c25]Denzil Correa, Ashish Sureka, Raghav Sethi:
WhACKY! - What anyone could know about you from Twitter. PST 2012: 43-50 - [c24]Ashish Sureka:
Learning to Classify Bug Reports into Components. TOOLS (50) 2012: 288-303 - [i2]Aditi Gupta, Ponnurangam Kumaraguru, Ashish Sureka:
Characterizing Pedophile Conversations on the Internet using Online Grooming. CoRR abs/1208.4324 (2012) - 2011
- [j1]Pradeep Kumar, Kishore Varma Indukuri, Ashish Sureka:
Fuzzy based clustering algorithm for privacy preserving data mining. Int. J. Bus. Inf. Syst. 7(1): 27-40 (2011) - [c23]Ashish Sureka, Sangeeta Lal, Lucky Agarwal:
Applying Fellegi-Sunter (FS) Model for Traceability Link Recovery between Bug Databases and Version Archives. APSEC 2011: 146-153 - [c22]Denzil Correa, Ashish Sureka:
Mining tweets for tag recommendation on social media. SMUC 2011: 69-76 - [c21]Ashish Sureka, Atul Goyal, Ayushi Rastogi:
Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis. ISEC 2011: 195-204 - [i1]Ashish Sureka:
Mining User Comment Activity for Detecting Forum Spammers in YouTube. CoRR abs/1103.5044 (2011) - 2010
- [c20]Ashish Sureka, Ponnurangam Kumaraguru, Atul Goyal, Sidharth Chhabra:
Mining YouTube to Discover Extremist Videos, Users and Hidden Communities. AIRS 2010: 13-24 - [c19]Ashish Sureka, Pankaj Jalote:
Detecting Duplicate Bug Report Using Character N-Gram-Based Features. APSEC 2010: 366-374 - [c18]Ashish Sureka, Kishore Varma Indukuri:
Linguistic analysis of bug report titles with respect to the dimension of bug importance. Bangalore Compute Conf. 2010: 9:1-9:6 - [c17]Vikram Goyal, Ashish Sureka, Sangeeta Lal:
AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS. DNIS 2010: 107-121
2000 – 2009
- 2009
- [c16]Ashish Sureka, Pranav Prabhakar Mirajkar, Prasanna Nagesh Teli, Girish Agarwal, Sumit Kumar Bose:
Semantic Based Text Classification of Patent Documents to a User-Defined Taxonomy. ADMA 2009: 644-651 - [c15]Ashish Sureka, Pranav Prabhakar Mirajkar, Kishore Varma Indukuri:
A rapid application development framework for rule-based named-entity extraction. Bangalore Compute Conf. 2009: 25 - [c14]Pranav Prabhakar Mirajkar, Prasanna Nagesh Teli, Ashish Sureka:
Automatic Index Generation of Technical Articles Using a Combination of Heuristics, Linguistic and Statistical Approach. IICAI 2009: 2040-2054 - [c13]Kishore Varma Indukuri, Ashish Sureka, Aadil Ehsan Akhter, Pratibha Parthasarathy:
Table Extraction from PDF Files using combination of Heuristics and Machine Learning Techniques. IICAI 2009: 2170-2182 - [c12]Ashish Sureka, Vikram Goyal, Denzil Correa, Anirban Mondal:
Polarity Classification of Subjective Words Using Common-Sense Knowledge-Base. RSFDGrC 2009: 486-493 - 2008
- [c11]Ashish Sureka, Kishore Varma Indukuri:
Using Genetic Algorithms for Parameter Optimization in Building Predictive Data Mining Models. ADMA 2008: 260-271 - [c10]Ashish Sureka, Sudripto De, Kishore Varma Indukuri:
A generic software architecture of a text processing system for analyzing product warranty claims data. Bangalore Compute Conf. 2008: 21 - [c9]Ashish Sureka, Sudripto De, Kishore Varma Indukuri:
Mining Automotive Warranty Claims Data for Effective Root Cause Analysis. DASFAA 2008: 621-626 - [c8]Ashish Sureka, Pranav Prabhakar Mirajkar:
An Empirical Study on the Effect of Different Similarity Measures on User-Based Collaborative Filtering Algorithms. PRICAI 2008: 1065-1070 - [c7]Kishore Varma Indukuri, Pranav Prabhakar Mirajkar, Ashish Sureka:
An Algorithm for Classifying Articles and Patent Documents Using Link Structure. WAIM 2008: 203-210 - 2005
- [c6]Ashish Sureka, Peter R. Wurman:
Using tabu best-response search to find pure strategy nash equilibria in normal form games. AAMAS 2005: 1023-1029 - [c5]Ashish Sureka, Peter R. Wurman:
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions. GECCO 2005: 2097-2103 - 2003
- [c4]Peter R. Wurman, Gangshu Cai, Jie Zhong, Ashish Sureka:
An algorithm for computing the outcome of combinatorial auctions with proxy bidding. ICEC 2003: 1-8 - [c3]Peter R. Wurman, Gangshu Cai, Ashish Sureka:
Computing the outcome of proxy bidding in combinatorial auctions extended abstract. EC 2003: 242-243 - 2002
- [c2]Harshit S. Shah, Neeraj R. Joshi, Ashish Sureka, Peter R. Wurman:
Mining eBay: Bidding Strategies and Shill Detection. WEBKDD 2002: 17-34 - [c1]Ashish Sureka, Peter R. Wurman:
Applying the Generalized Vickrey Auction to Pricing Reliable Multicasts. QofIS 2002: 283-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint