Volume 29,Issue 8,2018 Table of Contents
数据驱动的软件智能化开发方法与技术专题前言谢冰,魏峻,彭鑫,孙海龙2018,29(8):2177-2179 [Abstract(3205)] [View PDF(5429)387.81 K]Survey on Intelligent Search and Construction Methods of ProgramLIU Bin-Bin, DONG Wei and WANG Ji2018,29(8):2180-2197 [Abstract(6391)] [View PDF(7313)1.98 M]UI Interaction Pattern Extraction and Retrieving of Android ApplicationsWU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun2018,29(8):2198-2209 [Abstract(4049)] [View PDF(5578)1.27 M]Mining and Organizing Software Functional Features Based on StackOverflow DataZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng2018,29(8):2210-2225 [Abstract(4157)] [View PDF(6111)1.88 M]Method Combining Structural and Semantic Features to Support Code Commenting DecisionHUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan2018,29(8):2226-2242 [Abstract(4190)] [View PDF(5963)6.70 M]Association Analysis and N-Gram Based Detection of Incorrect ArgumentsLI Chao and LIU Hui2018,29(8):2243-2257 [Abstract(3645)] [View PDF(5837)1.51 M]Survey of Software Data Mining for Open Source EcosystemYIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min2018,29(8):2258-2271 [Abstract(5462)] [View PDF(7342)1.34 M]Evaluation of Core Developers in Open Source Software by Contribution AllocationWU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue2018,29(8):2272-2282 [Abstract(4079)] [View PDF(5590)1.14 M]Analysis of Contribution Composition Patterns of Code FilesTAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui2018,29(8):2283-2293 [Abstract(3712)] [View PDF(5025)1.07 M]Developer Recommendation for Software Security BugsSUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin2018,29(8):2294-2305 [Abstract(4670)] [View PDF(5297)1.28 M]Multi-Feature Fused Software Developer RecommendationXIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang2018,29(8):2306-2321 [Abstract(4432)] [View PDF(6242)2.82 M]Bug Triaging Approach Based on Recurrent Neural NetworksXI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian2018,29(8):2322-2335 [Abstract(4322)] [View PDF(6161)1.71 M]Natural Language Data Driven Approach for Software Intelligent Safety EvaluationZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin2018,29(8):2336-2349 [Abstract(4769)] [View PDF(5565)1.42 M]Approach for Generating AADL Model Based on Restricted Natural Language Requirement TemplateWANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao2018,29(8):2350-2370 [Abstract(4750)] [View PDF(6068)2.60 M]
“Black Magic” of Polyhedral CompilationZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai2018,29(8):2371-2396 [Abstract(4838)] [View PDF(11418)2.70 M]Research Progress on Emotional Computation Technology Based on Semantic AnalysisRAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong2018,29(8):2397-2426 [Abstract(6506)] [View PDF(14522)2.85 M]Survey of Sparse Exchangeable Graph ModelingYU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng2018,29(8):2448-2469 [Abstract(4371)] [View PDF(6117)2.17 M]
Routing Algorithm Design Based on Timeslot of Transmission for Data CentersYANG Yang, YANG Jia-Hai and WEN Hao-Sen2018,29(8):2485-2500 [Abstract(4000)] [View PDF(5885)1.71 M]
Research Progress of Video Saliency DetectionCONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie2018,29(8):2527-2544 [Abstract(4908)] [View PDF(11828)1.83 M]
Speculation and Negation Scope Detection via Bidirectional LSTM Neural NetworksQIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming2018,29(8):2427-2447 [Abstract(3551)] [View PDF(5325)1.88 M]Fast Density-Based Clustering Algorithm for Location Big DataYU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei2018,29(8):2470-2484 [Abstract(4330)] [View PDF(6665)3.43 M]JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain IndicatorsHUANG Wei and ZHAO Xian-Feng2018,29(8):2501-2510 [Abstract(3347)] [View PDF(4400)1.06 M]Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure WorldZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua2018,29(8):2511-2526 [Abstract(3420)] [View PDF(4889)1.61 M]