default search action
Nadia Nahar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Nadia Nahar, Jenny Rowlett, Matthew Bray, Zahra Abba Omar, Xenophon Papademetris, Alka Menon, Christian Kästner:
Regulating Explainability in Machine Learning Applications - Observations from a Policy Design Experiment. FAccT 2024: 2101-2112 - 2023
- [c10]Nadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner:
A Meta-Summary of Challenges in Building Products with ML Components - Collecting Experiences from 4758+ Practitioners. CAIN 2023: 171-183 - [c9]Avinash Bhat, Austin Coursey, Grace Hu, Sixian Li, Nadia Nahar, Shurui Zhou, Christian Kästner, Jin L. C. Guo:
Aspirations and Practice of ML Model Documentation: Moving the Needle with Nudging and Traceability. CHI 2023: 749:1-749:17 - [i7]Nadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner:
A Meta-Summary of Challenges in Building Products with ML Components - Collecting Experiences from 4758+ Practitioners. CoRR abs/2304.00078 (2023) - [i6]Nadia Nahar, Haoran Zhang, Grace A. Lewis, Shurui Zhou, Christian Kästner:
A Dataset and Analysis of Open-Source Machine Learning Products. CoRR abs/2308.04328 (2023) - 2022
- [c8]Nadia Nahar, Shurui Zhou, Grace A. Lewis, Christian Kästner:
Collaboration Challenges in Building ML-Enabled Systems: Communication, Documentation, Engineering, and Process. ICSE 2022: 413-425 - [i5]Avinash Bhat, Austin Coursey, Grace Hu, Sixian Li, Nadia Nahar, Shurui Zhou, Christian Kästner, Jin L. C. Guo:
Aspirations and Practice of Model Documentation: Moving the Needle with Nudging and Traceability. CoRR abs/2204.06425 (2022) - 2021
- [c7]Moumita Asad, Rafed Muhammad Yasir, Shihab Shahriar Khan, Nadia Nahar, Md. Nurul Ahad Tawhid:
Analyzing Program Comprehensibility of Go Projects. SEKE 2021: 255-260 - [i4]Fazle Rabbi, Nishat Tasnim Niloy, Nadia Nahar, Md. Nurul Ahad Tawhid:
SysMap: A Lightweight Software Visualization Tool to Analyze the Software Evolution of a System. CoRR abs/2108.05989 (2021) - [i3]Nadia Nahar, Shurui Zhou, Grace A. Lewis, Christian Kästner:
More Engineering, No Silos: Rethinking Processes and Interfaces in Collaboration between Interdisciplinary Teams for Machine Learning Projects. CoRR abs/2110.10234 (2021) - 2020
- [j2]Atish Kumar Dipongkor, Iftekhar Ahmed, Rayhanul Islam, Nadia Nahar, Abdus Satter, Md. Saeed Siddik:
ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method's External Dependencies. Int. J. Softw. Eng. Knowl. Eng. 30(9): 1289-1307 (2020) - [c6]Syed Fatiul Huq, Md. Aquib Azmain, Nadia Nahar, Md. Nurul Ahad Tawhid:
On the Evolutionary Properties of Fix Inducing Changes. QuASoQ@APSEC 2020: 13-20 - [i2]Asadullah Hill Galib, Nadia Nahar, B. M. Mainul Hossain:
The Influences of Pre-birth Factors in Early Assessment of Child Mortality using Machine Learning Techniques. CoRR abs/2011.09536 (2020)
2010 – 2019
- 2017
- [j1]Nadia Nahar, Kazi Sakib:
Software semantics and syntax as a tool for automated test generation. Int. J. Crit. Comput. Based Syst. 7(4): 369-396 (2017) - [c5]Abdus Satter, Nadia Nahar, Kazi Sakib:
Automatically Identifying Dead Fields in Test Code by Resolving Method Call and Field Dependency. QuASoQ@APSEC 2017: 51-58 - [c4]Abdus Satter, M. G. Muntaqeem, Nadia Nahar, Kazi Sakib:
Retrieving Self-Executable and Functionally Correct Code to Improve Source Code Search. APSEC 2017: 749-750 - 2016
- [c3]Nadia Nahar, Kazi Sakib:
ACDPR: A Recommendation System for the Creational Design Patterns Using Anti-patterns. PPAP@SANER 2016: 4-7 - [c2]Ahmad Tahmid, Nadia Nahar, Kazi Sakib:
Understanding the Evolution of Code Smells by Observing Code Smell Clusters. PPAP@SANER 2016: 8-11 - 2015
- [c1]Nadia Nahar, Kazi Sakib:
Automatic Recommendation of Software Design Patterns Using Anti-patterns in the Design Phase: A Case Study on Abstract Factory. QuASoQ/WAWSE/CMCE@APSEC 2015: 9-16 - 2014
- [i1]Asif Imran, Nadia Nahar, Kazi Sakib:
Watchword-Oriented and Time-Stamped Algorithms for Tamper-Proof Cloud Provenance Cognition. CoRR abs/1409.5546 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint