Carlos Jensen

Carlos Jensen
Oregon State University | OSU · College of Engineering

PhD

About

82
Publications
14,430
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,469
Citations
Introduction
Carlos Jensen works at the College of Engineering, Oregon State University. Carlos does research in Software Engineering, Human-computer Interaction and Computer and Society. Their most recent publication is 'An Empirical Examination of the Relationship between Code Smells and Merge Conflicts.'
Additional affiliations
January 2017 - present
Oregon State University
Position
  • Head of Faculty
March 2014 - December 2016
Oregon State University
Position
  • Manager
September 2012 - present
Oregon State University
Position
  • Professor (Associate)
Education
August 1998 - December 2005
Georgia Institute of Technology
Field of study
  • Computer Science (HCI)
January 1996 - June 1998
August 1993 - December 1995
University of Oslo
Field of study
  • Informatikk

Publications

Publications (82)
Conference Paper
Full-text available
Although mutation analysis is considered the best way to evaluate the effectiveness of a test suite, hefty computational cost often limits its use. To address this problem, various mutation reduction strategies have been proposed, all seeking to gain efficiency by reducing the number of mutants while maintaining the representativeness of an exhaust...
Article
Several recent surveys conclude that people are concerned about privacy and consider it to be an important factor in their online decision making. This paper reports on a study in which (1) user concerns were analysed more deeply and (2) what users said was contrasted with what they did in an experimental e-commerce scenario. Eleven independent var...
Conference Paper
Full-text available
In the field of Human-Computer Interaction, provenance refers to the history and genealogy of a document or file. Provenance helps us to understand the evolution and relationships of files; how and when different versions of a document were created, or how different documents in a collection build on each other through copy-paste events. Though met...
Article
Full-text available
Merge conflicts are known to cause extra effort for developers, but little is known about their effect on software. While some research has been done, many questions remain. To better understand merge conflicts and their impact we performed an empirical study about the types, frequency, and impact of merge conflicts, where impact is measured in ter...
Article
Full-text available
Formal verification has advanced to the point that developers can verify the correctness of small, critical modules. Unfortunately, despite considerable efforts, determining if a “verification” verifies what the author intends is still difficult. Previous approaches are difficult to understand and often limited in applicability. Developers need ver...
Article
Full-text available
Mutation analysis is the primary means of evaluating the quality of test suites, though it suffers from inadequate standardization. Mutation analysis tools vary based on language, when mutants are generated (phase of compilation), and target audience. Mutation tools rarely implement the complete set of operators proposed in the literature, and most...
Article
Mutation analysis is a well-known yet unfortunately costly method for measuring test suite quality. Researchers have proposed numerous mutation reduction strategies in order to reduce the high cost of mutation analysis, while preserving the representativeness of the original set of mutants. As mutation reduction is an area of active research, it i...
Article
What does an online programming course need to engage students and improve their skills? To answer this question, the authors designed and tested a feature-rich collaborative environment for an online class and found that it enhanced learning through methods such as remote pair programming, live coding, and a tight code-to-artifact feedback loop.
Conference Paper
Fault masking happens when the effect of one fault serves to mask that of another fault for particular test inputs. The coupling effect is relied upon by testing practitioners to ensure that fault masking is rare. It states that complex faults are coupled to simple faults in such a way that a test data set that detects all simple faults in a progra...
Conference Paper
Among the major questions that a practicing tester faces are deciding where to focus additional testing effort, and deciding when to stop testing. Test the least-tested code, and stop when all code is well-tested, is a reasonable answer. Many measures of "testedness" have been proposed; unfortunately, we do not know whether these are truly effectiv...
Conference Paper
Mutation analysis is an effective, if computationally expensive, technique that allows practitioners to accurately evaluate the quality of their test suites. To reduce the time and cost of mutation analysis, researchers have looked at parallelizing mutation runs --- running multiple mutated versions of the program in parallel, and running through t...
Conference Paper
Code smells are associated with poor coding practices that cause long-term maintainability problems and mask bugs. Despite mobile being a fast growing software sector, code smells in mobile applications have been understudied. We do not know how code smells in mobile applications compare to those in desktop applications, and how code smells are aff...
Poster
Although mutation analysis is considered the best way to evaluate the effectiveness of a test suite, hefty computational cost often limits its use. To address this problem, various mutation reduction strategies have been proposed, all seeking to reduce the number of mutants while maintaining the representativeness of an exhaustive mutation analysis...
Conference Paper
Redundancy in mutants, where multiple mutants end up producing the same semantic variant of a program, is a major problem in mutation analysis; a measure of effectiveness that accounts for redundancy is an essential tool for evaluating mutation tools, new operators, and reduction techniques. Previous research suggests using the size of the disjoint...
Article
Team collaboration plays a key role in the success of any multi-user activity. Software engineering is a highly collaborative activity, where multiple developers and designers work together to solve a common problem. Meaningful and effective designer-developer collaboration improves the user experience, which can improve the chances of success for...
Conference Paper
There are many papers about projects that release their software as open source. Our panel looks at why open source is a good idea for education, and how it can best be leveraged. The panel represents industry and academia and its members have years of experience in the field. Specific questions that panelists will address, in addition to their pos...
Technical Report
Full-text available
Mutation analysis is a well-known, but computationally intensive, method for measuring test suite quality. While multiple strategies have been proposed to reduce the number of mutants, there is inconclusive evidence for their utility due to the limited number and size of programs used for validation, and a lack of comprehensive comparative studies....
Conference Paper
Full-text available
Mutation analysis is considered the best method for measuring the adequacy of test suites. However, the number of test runs required for a full mutation analysis grows faster than project size, which is not feasible for real-world software projects, which often have more than a million lines of code. It is for projects of this size, however, that d...
Conference Paper
Full-text available
Context: Software decay is a key concern for large, long-lived software projects. Systems degrade over time as design and implementation compromises and exceptions pile up. Goal: Quantify design decay and understand how software projects deal with this issue. Method: We conducted an empirical study on the presence and evolution of code smells, used...
Book
This book constitutes the refereed proceedings of the 5th International Symposium on End-User Development, IS-EUD 2015, held in Madrid, Spain, in May 2015. The 10 full papers and 13 short papers were presented at the event. Additionally, the volume contains 2 keynote speeches, 3 doctoral consortia papers, 1 workshop paper, and 6 EUD-playground pape...
Conference Paper
Full-text available
Mutation analysis is often used to compare the effectiveness of different test suites or testing techniques. One of the main assumptions underlying this technique is the Competent Programmer Hypothesis, which proposes that programs are very close to a correct version, or that the difference between current and correct code for each fault is very sm...
Conference Paper
Free/Open Source Software projects often rely on users submitting bug reports. However, reports submitted by novice users may lack information critical to developers, and the process may be intimidating and difficult. To gather more and better data, projects deploy automatic crash reporting tools, which capture stack traces and memory dumps when a...
Conference Paper
Researchers have investigated the lack of diversity in Free/Open Source Software (FOSS) communities, but there have been few studies on age diversity. We interviewed 11 older FOSS contributors and 6 FOSS community leaders (of any age). This formative study reports on 4 key findings from those interviews: 1) motivations of older contributors, 2) ben...
Conference Paper
Full-text available
One of the key challenges of developers testing code is determining a test suite's quality -- its ability to find faults. The most common approach is to use code coverage as a measure for test suite quality, and diminishing returns in coverage or high absolute coverage as a stopping rule. In testing research, suite quality is often evaluated by a s...
Conference Paper
It is a widely held belief that Free/Open Source Software (FOSS) development leads to the creation of software with the same, if not higher quality compared to that created using proprietary software development models. However there is little research on evaluating the quality of FOSS code, and the impact of project characteristics such as age, nu...
Conference Paper
How can we understand FOSS collaboration better? Can social issues that emerge be identified and addressed as they happen? Can the community heal itself, become more transparent and inclusive, and promote diversity? We propose a technique to address these issues by quantitative analysis and temporal visualization of social dynamics in FOSS communit...
Conference Paper
Full-text available
Free/Open Source Software allows students to learn valuable real world skills and experiences, as well as a create a portfolio to show future employers. However, the learning curve to joining FOSS can be daunting, often leading newcomers to walk away frustrated. Universities therefore need to find ways to provide a structured introduction to studen...
Conference Paper
Older adults are increasingly savvy consumers of smartphone-based health solutions and information. These technologies may enable older adults to age-in-place more successfully. However, many app creators fail to do needs assessments of their end-users. To rectify this issue, we involved older adults (aged 65+) in the beginning stages of designing...
Conference Paper
In this exploratory study, we map the use of free and open source software (FOSS) in the United States energy sector, especially as it relates to cyber security. Through two surveys and a set of semi-structured interviews—targeting both developers and policy makers—we identified key stakeholders, organizations, and FOSS projects, be they rooted in...
Conference Paper
Researchers often use participatory design -- involving endusers in technology ideation -- as this is found to lead to more useful and relevant products. Researchers have sought to involve older adults in the design of emerging technologies like smartphones, with which older adults often have little experience. Therefore, their effectiveness as co-...
Conference Paper
In this paper we explore the design of Leyline, a provenance-based desktop search and file management system, both on a conceptual and user interface level. We start with a comparative analysis and classification of previous provenance based search systems, examining their underlying assumptions and focus, search coverage and flexibility, as well a...
Article
The global population is aging rapidly, and older adults are becoming increasingly technically savvy. This paper explores ways to engage these individuals to contribute to free/open source software (FOSS) projects. We conducted a pilot diary study to explore motivations, barriers, and the contribution processes of first-time contributors in a real...
Conference Paper
There is a growing interest in bringing online and streaming content to the television. Gaming platforms such as the PS3, Xbox 360 and Wii are at the center of this digital convergence; platforms for accessing new media services. This presents a number of interface challenges, as controllers designed for gaming have to be adapted to accessing onlin...
Conference Paper
The most effective strategy for finding files is to carefully arrange them into folders. This strategy breaks down for teams, where organizational schemes often differ between team members. It also breaks down when information is copied and reused as it becomes harder to track versions. As storage continues to grow and costs decline, the incentives...
Conference Paper
With the growth of free and open source software (FOSS) and the adoption of FOSS solutions in business and everyday life, it is important that projects serve their growingly diverse user base. The sustainability of FOSS projects relies on a constant influx of new contributors. Several large demographic surveys found that FOSS communities are very h...
Conference Paper
Free/Open Source Software (FOSS) projects have a reputation for being grass-roots efforts driven by individual contributors volunteering their time and effort. While this may be true for a majority of smaller projects, it is not always the case for large projects. As projects grow in size, importance and complexity, many come to depend on corporati...
Conference Paper
Free/Open Source Software (FOSS) communities often use open bug reporting to allow users to participate by reporting bugs. This practice can lead to more duplicate reports, as users can be less rigorous about researching existing bug reports. This paper examines how FOSS projects deal with duplicate bug reports. We examined 12 FOSS projects: 4 smal...
Conference Paper
Tools aimed at helping users safely navigate the web and safeguard themselves against potential online predators have become reasonably common. Currently there are two families of tools; heuristics analysis tools that test websites directly using automated scripts and programs, and community based tools where users rate websites and write reviews f...
Conference Paper
Full-text available
Free/Open source software (FOSS) is an important part of the IT ecosystem. Due to the voluntary nature of participation, continual recruitment is key to the growth and sustainability of these communities. It is therefore important to understand how and why potential contributors fail in the process of transitioning from user to contributor. Most ne...
Conference Paper
Full-text available
In co-located software development, diagramming practices, such as sketching ideas out with a pen and paper, support the creative process and allow designers to shape, analyze, and communicate their ideas. This study focuses on the diagramming practices used in the design of Open Source Software (OSS), where the norm is highly distributed group wor...
Article
Re-inventing Computer Science through open source.
Conference Paper
Full-text available
This paper explores how historical models of documents as stable information artifacts should be replaced with a new model of information objects that exist around and between document boundaries. The new model is information-centered; files and documents are seen as snapshots in time, part of individual and group information flows. The flows are v...
Conference Paper
Full-text available
Using machine learning, we gathered information on Office application usage for 18 information workers over a combined 730 workdays. We tracked operations like copy/paste, save, search. We tracked heavy flows of information across applications.
Conference Paper
Joining an Open Source project is not easy. Newcomers often experience a steep learning curve dealing with technical complexity, lack of domain knowledge, and the amount of project information available for starters. This paper looks at the information needs of newcomers and the potential benefits of information visualization in supporting newcomer...
Conference Paper
Full-text available
Some of the most interesting differences between Open Source Software (OSS) development and commercial co- located software development lie in the communication and collaboration practices of these two groups of developers. One interesting practice is that of diagramming. Though well studied and important in many aspects of co-located software deve...
Conference Paper
Full-text available
In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make possible a new type of analysis of trends, the impact of legislation on practices, and geographic and social differences online. In th...
Conference Paper
Full-text available
Many of the most vivid recollections we have of major sporting events and accomplishments as TV viewers and sports fans are things like scores, statistics, or the TV images of specific events. What make many of these live in our memories, or grab our attention in the first place is often the commentator or sports-caster, their words of wisdom, or l...
Article
Full-text available
We introduce the concept of augmentation methods, methods that complement other methods by addressing specific non-functional requirements (NFRs). Since most projects do not have dedicated expertise in all relevant NFRs most team members may be comparative novices for that class of NFR. STRAP is a lightweight goal-refinement method for analyzing pr...
Article
Full-text available
The clarity and the readability of the financial privacy policies posted by companies are analyzed. A survey carried out by the Progress and Freedom Foundation (PFF) shows that 83% of the highly visited websites have posted privacy policies, showing a significant increase regarding information privacy practices. Overall the PFF study shows that com...
Conference Paper
Full-text available
Users are concerned about their privacy, and many of the problems they face in managing their privacy are fundamentally HCI problems. Palen and Dorish note that privacy is a fluid process [4]. Individual differences in preferences and thresholds are often significant, and constantly evolving over time. Given a moderately complex system, it is likel...
Conference Paper
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy policies have become almost ubiquitous. An estimated 77% of websites now post a privacy policy. These policies differ greatly from site to site, and often address issues t...
Article
This workshop seeks to address the privacy needs and concerns of users in the design of digital environments, whether they be websites, collaborative calendar systems, collaborative work environments, online communities, communications systems or ubiquitous computing environments. Each of these settings faces real and pressing challenges when it co...
Article
MOOSE Crossing is a text-based virtual reality environment (or "MUD") designed to be a constructionist learning environment for children ages 8 to 12. We performed a portfolio-style assessment of children's programming accomplishments in this environment. Analysis of the data reveals uneven levels of achievement---some children accomplish a great d...
Conference Paper
Full-text available
'Bad' behavior is a serious problem in many online social situations, such as chat rooms. One potential reason is that social norms for 'proper' interpersonal behavior are not invoked in these situations as they are in face-to-face interactions. We describe a game we developed to explore good and bad behavior in computer-mediated situations. We fou...
Article
Full-text available
In this study, we analyzed 3.4 Gb of log file data from the participation of 475 children in a CSCL environment over a period of five years. Using scripts to divide the children's commands typed into categories, we found that girls spend significantly more time than boys communicating with others in the CSCL environment. Analyzing the children's le...
Conference Paper
Full-text available
In this study, we analyzed 3.4 Gb of log file data from the participation of 475 children in a CSCL environment over a period of five years. Using scripts to divide the children's commands typed into categories, we found that girls spend significantly more time than boys communicating with others in the CSCL environment. Analyzing the children's le...
Conference Paper
Full-text available
In this paper, we examine what types of reputation information users find valuable when selecting someone to interact with in online environments. In an online experiment, we asked users to imagine that they were looking for a partner for a social chat. We found that similarity to the user and ratings from the user's friends were the most valuable...
Conference Paper
Full-text available
In this paper, we examine what types of reputation information users find valuable when selecting someone to interact with in online environments. In an online experiment, we asked users to imagine that they were looking for a partner for a social chat. We found that similarity to the user and ratings from the user's friends were the most valuable...
Article
Full-text available
One of the most robust findings in the sociological literature is the positive effect of communication on cooperation and trust. When individuals are able to communicate, cooperation increases significantly. How does the choice of communication modality influence this effect? We adapt the social dilemma research paradigm to quantitatively analyze d...
Article
Full-text available
Exposure to Open Source Software (OSS) projects provides students with opportunities to experience "real-world" software development processes and practices, including the opportunity to work with large, existing, and complex code-bases and development communities. Working with OSS also poses challenges. In this paper, we look at some of the challe...
Article
Full-text available
MOOSE Crossing is a text-based virtual reality environment (or "MUD") designed to be a constructionist learning environment for children ages 8 to 12. We performed a portfolio-style assessment of children's programming accomplishments in this environment. Analysis of the data reveals uneven levels of achievement—some children accomplish a great dea...
Article
This paper discusses the lack of clarity of 40 online privacy statements from nine financial institutions that are covered by the Gramm-Leach-Bliley Act (GLBA), which states that policies must be "clear and conspicuous." The study is novel in that it uses two complimentary approaches to analyze the clarity of policies: goal-driven requirements engi...
Article
Posting privacy policies has become a popular practice with businesses as they seek to shield themselves from potential liability or regulation, as well as inform users about their privacy and rights. These policies are in many ways modeled after software license statements, and are often more legalistic than user friendly. This paper examines the...