Volume 29,Issue 8,2018 Table of Contents
数据驱动的软件智能化开发方法与技术专题前言谢冰,魏峻,彭鑫,孙海龙2018,29(8):2177-2179 [Abstract(3232)] [View PDF(5984)387.81 K]Survey on Intelligent Search and Construction Methods of ProgramLIU Bin-Bin, DONG Wei and WANG Ji2018,29(8):2180-2197 [Abstract(6443)] [View PDF(7904)1.98 M]UI Interaction Pattern Extraction and Retrieving of Android ApplicationsWU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun2018,29(8):2198-2209 [Abstract(4091)] [View PDF(6174)1.27 M]Mining and Organizing Software Functional Features Based on StackOverflow DataZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng2018,29(8):2210-2225 [Abstract(4187)] [View PDF(6791)1.88 M]Method Combining Structural and Semantic Features to Support Code Commenting DecisionHUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan2018,29(8):2226-2242 [Abstract(4234)] [View PDF(6573)6.70 M]Association Analysis and N-Gram Based Detection of Incorrect ArgumentsLI Chao and LIU Hui2018,29(8):2243-2257 [Abstract(3664)] [View PDF(6383)1.51 M]Survey of Software Data Mining for Open Source EcosystemYIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min2018,29(8):2258-2271 [Abstract(5517)] [View PDF(7834)1.34 M]Evaluation of Core Developers in Open Source Software by Contribution AllocationWU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue2018,29(8):2272-2282 [Abstract(4152)] [View PDF(6142)1.14 M]Analysis of Contribution Composition Patterns of Code FilesTAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui2018,29(8):2283-2293 [Abstract(3744)] [View PDF(5544)1.07 M]Developer Recommendation for Software Security BugsSUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin2018,29(8):2294-2305 [Abstract(4748)] [View PDF(5897)1.28 M]Multi-Feature Fused Software Developer RecommendationXIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang2018,29(8):2306-2321 [Abstract(4465)] [View PDF(6861)2.82 M]Bug Triaging Approach Based on Recurrent Neural NetworksXI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian2018,29(8):2322-2335 [Abstract(4366)] [View PDF(6745)1.71 M]Natural Language Data Driven Approach for Software Intelligent Safety EvaluationZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin2018,29(8):2336-2349 [Abstract(4833)] [View PDF(6102)1.42 M]Approach for Generating AADL Model Based on Restricted Natural Language Requirement TemplateWANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao2018,29(8):2350-2370 [Abstract(4792)] [View PDF(6607)2.60 M]
“Black Magic” of Polyhedral CompilationZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai2018,29(8):2371-2396 [Abstract(4914)] [View PDF(12049)2.70 M]Research Progress on Emotional Computation Technology Based on Semantic AnalysisRAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong2018,29(8):2397-2426 [Abstract(6735)] [View PDF(15242)2.85 M]Survey of Sparse Exchangeable Graph ModelingYU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng2018,29(8):2448-2469 [Abstract(4434)] [View PDF(6871)2.17 M]
Routing Algorithm Design Based on Timeslot of Transmission for Data CentersYANG Yang, YANG Jia-Hai and WEN Hao-Sen2018,29(8):2485-2500 [Abstract(4032)] [View PDF(6418)1.71 M]
Research Progress of Video Saliency DetectionCONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie2018,29(8):2527-2544 [Abstract(4962)] [View PDF(12683)1.83 M]
Speculation and Negation Scope Detection via Bidirectional LSTM Neural NetworksQIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming2018,29(8):2427-2447 [Abstract(3598)] [View PDF(5603)1.88 M]Fast Density-Based Clustering Algorithm for Location Big DataYU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei2018,29(8):2470-2484 [Abstract(4355)] [View PDF(6806)3.43 M]JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain IndicatorsHUANG Wei and ZHAO Xian-Feng2018,29(8):2501-2510 [Abstract(3376)] [View PDF(4551)1.06 M]Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure WorldZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua2018,29(8):2511-2526 [Abstract(3456)] [View PDF(5058)1.61 M]