Bug Triaging Based on Tossing Sequence Modeling
Bug triaging, which routes the bug reports to potential fixers, is an integral step in software development and maintenance. To make bug triaging more efficient, many researchers propose to adopt machine learning and information retrieval ...
Semi-Supervised Learning Based Tag Recommendation for Docker Repositories
Docker has been the mainstream technology of providing reusable software artifacts recently. Developers can easily build and deploy their applications using Docker. Currently, a large number of reusable Docker images are publicly shared in online ...
Automatic Detection and Repair Recommendation for Missing Checks
Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating potential vulnerabilities and ...
Graph Embedding Based API Graph Search and Recommendation
Searching application programming interfaces (APIs) is very important for developers to reuse software projects. Existing natural language based API search mainly faces the following challenges. 1) More accurate results are required as software ...
CBSC: A Crowdsensing System for Automatic Calibrating of Barometers
The mobile crowdsensing software systems can complete large-scale and complex sensing tasks with the help of the collective intelligence from large numbers of ordinary users. In this paper, we build a typical crowdsensing system, which can ...
DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy
In current software defect prediction (SDP) research, most previous empirical studies only use datasets provided by PROMISE repository and this may cause a threat to the external validity of previous empirical results. Instead of SDP dataset ...
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning
Defect prediction assists the rational allocation of testing resources by detecting the potentially defective software modules before releasing products. When a project has no historical labeled defect data, cross project defect prediction (CPDP) ...
Threshold Extraction Framework for Software Metrics
Software metrics are used to measure different attributes of software. To practically measure software attributes using these metrics, metric thresholds are needed. Many researchers attempted to identify these thresholds based on personal ...
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks
Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), ...
Degree-of-Node Task Scheduling of Fine-Grained Parallel Programs on Heterogeneous Systems
Processor specialization has become the development trend of modern processor industry. It is quite possible that this will still be the main-stream in the next decades of semiconductor era. As the diversity of heterogeneous systems grows, ...
CR-Morph: Controllable Rigid Morphing for 2D Animation
This paper presents a rigidity-preserving morphing technique that blends a pair of 2D shapes in a controllable manner. The morphing is controllable in two aspects: 1) motion dynamics in the interpolation sequences can be effectively enhanced ...
DEMC: A Deep Dual-Encoder Network for Denoising Monte Carlo Rendering
In this paper, we present DEMC, a deep dual-encoder network to remove Monte Carlo noise efficiently while preserving details. Denoising Monte Carlo rendering is different from natural image denoising since inexpensive by-products (feature buffers) ...
A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm
The reliability allowance of circuits tends to decrease with the increase of circuit integration and the application of new technology and materials, and the hardening strategy oriented toward gates is an effective technology for improving the ...
CK-Modes Clustering Algorithm Based on Node Cohesion in Labeled Property Graph
The designation of the cluster number K and the initial centroids is essential for K-modes clustering algorithm. However, most of the improved methods based on K-modes specify the K value manually and generate the initial centroids randomly, which ...