A method framework for identifying digital resource clusters in software ecosystems
Decision Support Systems - Trang 114085 - 2023
Tài liệu tham khảo
Manikas, 2016, Revisiting software ecosystems research: a longitudinal literature study, J. Syst. Softw., 117, 84, 10.1016/j.jss.2016.02.003
Decan, 2019, An empirical comparison of dependency network evolution in seven software packaging ecosystems, Empir. Softw. Eng., 24, 381, 10.1007/s10664-017-9589-y
Kikas, 2017, 102
F. Zandt, How Big Tech Contributes to Open Source, (n.d.). https://www.statista.com/chart/25795/active-github-contributors-by-employer/.
Um, 2023
Henfridsson, 2018, Recombination in the open-ended value landscape of digital innovation, Inf. Organ., 28, 89, 10.1016/j.infoandorg.2018.03.001
A. Luttwak, Log4Shell 10 Days Later: Enterprises Halfway through Patching, (n.d.). https://www.wiz.io/blog/10-days-later-enterprises-halfway-through-patching-log4shell.
Microsoft Threat intelligence, Guidance for Preventing, Detecting, and Hunting for Exploitation of the Log4j 2 Vulnerability, (n.d.). https://www.microsoft.com/en-us/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/.
I. Ilascu, Log4j: List of Vulnerable Products and Vendor Advisories, (n.d.). https://www.bleepingcomputer.com/news/security/log4j-list-of-vulnerable-products-and-vendor-advisories/.
Datta, 2020, Understanding the relation between repeat developer interactions and bug resolution times in large open source ecosystems: A multisystem study, J. Software: Evolut. Proc., e2317
Hanssen, 2012, A longitudinal case study of an emerging software ecosystem: implications for practice and theory, J. Syst. Softw., 85, 1455, 10.1016/j.jss.2011.04.020
Baldwin, 2014, Hidden structure: using network methods to map system architecture, Res. Policy, 43, 1381, 10.1016/j.respol.2014.05.004
MacCormack, 2006, Exploring the structure of complex software designs: An empirical study of open source and proprietary code, Manag. Sci., 52, 1015, 10.1287/mnsc.1060.0552
Blincoe, 2019, Reference coupling: An exploration of inter-project technical dependencies and their characteristics within large software ecosystems, Inf. Softw. Technol., 110, 174, 10.1016/j.infsof.2019.03.005
Hou, 2021, Community detection in software ecosystem by comprehensively evaluating developer cooperation intensity, Inf. Softw. Technol., 130, 106451, 10.1016/j.infsof.2020.106451
Wareham, 2014, Technology ecosystem governance, Organ. Sci., 25, 1195, 10.1287/orsc.2014.0895
Dittrich, 2014, Software engineering beyond the project–sustaining software ecosystems, Inf. Softw. Technol., 56, 1436, 10.1016/j.infsof.2014.02.012
Liu, 2020
Sun, 2020, Network embedding for community detection in attributed networks, 14, 1
Wu, 2020, Deep learning techniques for community detection in social networks, IEEE Access., 8, 96016, 10.1109/ACCESS.2020.2996001
Dong, 2017, metapath2vec: Scalable representation learning for heterogeneous networks, 135
Ribeiro, 2017, struc2vec: Learning node representations from structural identity, 385
Grover, 2016, node2vec: Scalable feature learning for networks, 855
Ankerst, 1999, OPTICS: ordering points to identify the clustering structure, ACM SIGMOD Rec., 28, 49, 10.1145/304181.304187
Agrawal, 2016, Development and validation of OPTICS based spatio-temporal clustering technique, Inf. Sci., 369, 388, 10.1016/j.ins.2016.06.048
Eaton, 2015, Distributed tuning of boundary resources: the case of Apple’s iOS service system, MIS Quart. Manag. Inform. Syst., 39, 217, 10.25300/MISQ/2015/39.1.10
Hein, 2020, Digital platform ecosystems, Electron. Mark., 30, 87, 10.1007/s12525-019-00377-4
Sears, 2014, Technological overlap, technological capabilities, and resource recombination in technological acquisitions, Strateg. Manag. J., 35, 48, 10.1002/smj.2083
Crowston, 2008, Free/libre open-source software development: what we know and what we do not know, ACM Comp. Surveys (CSUR)., 44, 1
Scacchi, 2007, Free/open source software development: recent research results and methods, Adv. Comput., 69, 243, 10.1016/S0065-2458(06)69005-0
Toral, 2010, Analysis of virtual communities supporting OSS projects using social network analysis, Inf. Softw. Technol., 52, 296, 10.1016/j.infsof.2009.10.007
Zhou, 2011, Understanding online community user participation: a social influence perspective, Internet Res, 21, 67, 10.1108/10662241111104884
Wang, 2018, Copycats vs. original mobile apps: A machine learning copycat-detection method and empirical analysis, Information Systems Research., 29, 273, 10.1287/isre.2017.0735
Wang, 2018, Understanding blockchain technology for future supply chains: a systematic literature review and research agenda, Supply Chain Manag. Int. J., 24, 62, 10.1108/SCM-03-2018-0148
Teixeira, 2015, Lessons learned from applying social network analysis on an industrial free/libre/open source software ecosystem, J. Internet Serv. Appl., 6, 1, 10.1186/s13174-015-0028-2
Grossman, 2005, Does UML make the grade? Insights from the software development community, Inf. Softw. Technol., 47, 383, 10.1016/j.infsof.2004.09.005
Stolee, 2013, Discovering how end-user programmers and their communities use public repositories: a study on yahoo! Pipes, Inf. Softw. Technol., 55, 1289, 10.1016/j.infsof.2012.10.004
Füller, 2014, User roles and contributions in innovation-contest communities, J. Manag. Inf. Syst., 31, 273, 10.2753/MIS0742-1222310111
Martínez-Torres, 2014, Analysis of open innovation communities from the perspective of social network analysis, Tech. Anal. Strat. Manag., 26, 435, 10.1080/09537325.2013.851378
Sosa, 2011, Degree distribution and quality in complex engineered systems, J. Mech. Des., 133, 10.1115/1.4004973
Cui, 2018, A survey on network embedding, IEEE Trans. Knowl. Data Eng., 31, 833, 10.1109/TKDE.2018.2849727
Liu, 2021, Policy learning with constraints in model-free reinforcement learning: A Survey, IJCAI, 4508
Ma, 2021, A comprehensive survey on graph anomaly detection with deep learning
Ding, 2019, Interactive anomaly detection on attributed networks, 357
Aggarwal, 2014, A framework for dynamic link prediction in heterogeneous networks, Stat. Anal. Data Min. ASA Data Sci. J., 7, 14, 10.1002/sam.11198
Symeonidis, 2013, From biological to social networks: link prediction based on multi-way spectral clustering, Data Knowl. Eng., 87, 226, 10.1016/j.datak.2013.05.008
Goyal, 2018, Graph embedding techniques, applications, and performance: a survey, Knowl.-Based Syst., 151, 78, 10.1016/j.knosys.2018.03.022
Roweis, 2000, Nonlinear dimensionality reduction by locally linear embedding, Science., 290, 2323, 10.1126/science.290.5500.2323
Perozzi, 2014, Deepwalk: Online learning of social representations, 701
Schmidhuber, 2015, Deep learning in neural networks: An overview, Neural Netw., 61, 85, 10.1016/j.neunet.2014.09.003
Chiang, 2019, Cluster-gcn: An efficient algorithm for training deep and large graph convolutional networks, 257
Zhao, 2019, T-gcn: a temporal graph convolutional network for traffic prediction, IEEE Trans. Intell. Transp. Syst., 21, 3848, 10.1109/TITS.2019.2935152
Kaufman, 2009
Ng, 1994, E cient and E ective clustering methods for spatial data mining, 144
Baboo, 2013, Clustering centroid finding algorithm (CCFA) using spatial temporal data mining concept, 30
Garg, 2006, Variation of k-mean algorithm: a study for high-dimensional large data set, Inf. Technol. J., 5, 1132, 10.3923/itj.2006.1132.1135
Garg, 2007, A heuristic based variation of K-mean clustering algorithm for dealing with outlier, IJCSE., 4, 56
Zhang, 1996, BIRCH: an efficient data clustering method for very large databases, ACM SIGMOD Rec., 25, 103, 10.1145/235968.233324
Guha, 1998, CURE: An efficient clustering algorithm for large databases, ACM SIGMOD Rec., 27, 73, 10.1145/276305.276312
Lee, 2005, Unsupervised multistage image classification using hierarchical clustering with a Bayesian similarity measure, IEEE Trans. Image Process., 14, 312, 10.1109/TIP.2004.841195
Campello, 2013, Density-based clustering based on hierarchical density estimates, 160
Nagpal, 2011, Comparative study of density based clustering algorithms, Int. J. Comput. Appl., 27, 421
Ester, 1996, A density-based algorithm for discovering clusters in large spatial databases with noise, 226
Birant, 2007, ST-DBSCAN: An algorithm for clustering spatial–temporal data, Data Knowl. Eng., 60, 208, 10.1016/j.datak.2006.01.013
Mikolov, 2013
De Winter, 2018, 1234
Du, 2018, 2086
Nguyen, 2018, Dynamic network embeddings: From random walks to temporal random walks, 1085
Manikas, 2013, Software ecosystems–a systematic literature review, J. Syst. Softw., 86, 1294, 10.1016/j.jss.2012.12.026
Sun, 2011, Pathsim: Meta path-based top-k similarity search in heterogeneous information networks, Proc. VLDB Endowment., 4, 992, 10.14778/3402707.3402736
Dong, 2015, Coupledlp: Link prediction in coupled networks, 199
Sun, 2013, Pathselclus: integrating meta-path selection with user-guided object clustering in heterogeneous information networks, ACM Transactions on Knowledge Discovery from Data (TKDD)., 7, 1, 10.1145/2500492
Sun, 2012, Mining heterogeneous information networks: principles and methodologies, Synth. Lectures Data Min. Knowledge Disc., 3, 1, 10.1007/978-3-031-01902-9
Jin, 2020, How does weight correlation affect generalisation ability of deep neural networks?, Adv. Neural Inf. Proces. Syst., 33, 21346
Pernice, 2011, How structure determines correlations in neuronal networks, PLoS Comput. Biol., 7, 10.1371/journal.pcbi.1002059
Li, 2017, 1232
Mahdavi, 2018, 3762
Wu, 2020, A comprehensive survey on graph neural networks
Desgraupes, 2013, Clustering indices, Univ. Paris Ouest-Lab Modal’X., 1, 34
Wang, 2007, On fuzzy cluster validity indices, Fuzzy Sets Syst., 158, 2095, 10.1016/j.fss.2007.03.004
Langfelder, 2008, WGCNA: an R package for weighted correlation network analysis, BMC Bioinform., 9, 1, 10.1186/1471-2105-9-559
Danilovic, 2007, Managing complex product development projects with design structure matrices and domain mapping matrices, Int. J. Proj. Manag., 25, 300, 10.1016/j.ijproman.2006.11.003
Huang, 2022, A graph entropy measure from urelement to higher-order graphlets for network analysis
Dodd, 2003, Partial AUC estimation and regression, Biometrics., 59, 614, 10.1111/1541-0420.00071
Son, 2019, Understanding the uncertainty of disaster tweets and its effect on retweeting: the perspectives of uncertainty reduction theory and information entropy, J. Assoc. Inf. Sci. Technol., 71, 1145, 10.1002/asi.24329
Kang, 2022, Development of methods for identifying an appropriate benchmarking peer to establish information security policy, Expert Syst. Appl., 201, 117028, 10.1016/j.eswa.2022.117028
