Volume 29,Issue 8,2018 Table of Contents
数据驱动的软件智能化开发方法与技术专题前言谢冰,魏峻,彭鑫,孙海龙2018,29(8):2177-2179 [Abstract(3209)] [View PDF(5840)387.81 K]Survey on Intelligent Search and Construction Methods of ProgramLIU Bin-Bin, DONG Wei and WANG Ji2018,29(8):2180-2197 [Abstract(6412)] [View PDF(7746)1.98 M]UI Interaction Pattern Extraction and Retrieving of Android ApplicationsWU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun2018,29(8):2198-2209 [Abstract(4065)] [View PDF(6032)1.27 M]Mining and Organizing Software Functional Features Based on StackOverflow DataZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng2018,29(8):2210-2225 [Abstract(4161)] [View PDF(6607)1.88 M]Method Combining Structural and Semantic Features to Support Code Commenting DecisionHUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan2018,29(8):2226-2242 [Abstract(4201)] [View PDF(6436)6.70 M]Association Analysis and N-Gram Based Detection of Incorrect ArgumentsLI Chao and LIU Hui2018,29(8):2243-2257 [Abstract(3649)] [View PDF(6223)1.51 M]Survey of Software Data Mining for Open Source EcosystemYIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min2018,29(8):2258-2271 [Abstract(5480)] [View PDF(7699)1.34 M]Evaluation of Core Developers in Open Source Software by Contribution AllocationWU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue2018,29(8):2272-2282 [Abstract(4113)] [View PDF(5970)1.14 M]Analysis of Contribution Composition Patterns of Code FilesTAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui2018,29(8):2283-2293 [Abstract(3718)] [View PDF(5407)1.07 M]Developer Recommendation for Software Security BugsSUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin2018,29(8):2294-2305 [Abstract(4690)] [View PDF(5711)1.28 M]Multi-Feature Fused Software Developer RecommendationXIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang2018,29(8):2306-2321 [Abstract(4444)] [View PDF(6705)2.82 M]Bug Triaging Approach Based on Recurrent Neural NetworksXI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian2018,29(8):2322-2335 [Abstract(4334)] [View PDF(6544)1.71 M]Natural Language Data Driven Approach for Software Intelligent Safety EvaluationZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin2018,29(8):2336-2349 [Abstract(4796)] [View PDF(5949)1.42 M]Approach for Generating AADL Model Based on Restricted Natural Language Requirement TemplateWANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao2018,29(8):2350-2370 [Abstract(4766)] [View PDF(6519)2.60 M]
“Black Magic” of Polyhedral CompilationZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai2018,29(8):2371-2396 [Abstract(4864)] [View PDF(11863)2.70 M]Research Progress on Emotional Computation Technology Based on Semantic AnalysisRAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong2018,29(8):2397-2426 [Abstract(6578)] [View PDF(15119)2.85 M]Survey of Sparse Exchangeable Graph ModelingYU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng2018,29(8):2448-2469 [Abstract(4400)] [View PDF(6650)2.17 M]
Routing Algorithm Design Based on Timeslot of Transmission for Data CentersYANG Yang, YANG Jia-Hai and WEN Hao-Sen2018,29(8):2485-2500 [Abstract(4009)] [View PDF(6274)1.71 M]
Research Progress of Video Saliency DetectionCONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie2018,29(8):2527-2544 [Abstract(4923)] [View PDF(12392)1.83 M]
Speculation and Negation Scope Detection via Bidirectional LSTM Neural NetworksQIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming2018,29(8):2427-2447 [Abstract(3575)] [View PDF(5419)1.88 M]Fast Density-Based Clustering Algorithm for Location Big DataYU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei2018,29(8):2470-2484 [Abstract(4338)] [View PDF(6731)3.43 M]JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain IndicatorsHUANG Wei and ZHAO Xian-Feng2018,29(8):2501-2510 [Abstract(3359)] [View PDF(4469)1.06 M]Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure WorldZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua2018,29(8):2511-2526 [Abstract(3431)] [View PDF(4957)1.61 M]