Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 34, Issue 5Sep 2019
Reflects downloads up to 13 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
research-article
Bug Triaging Based on Tossing Sequence Modeling
Abstract

Bug triaging, which routes the bug reports to potential fixers, is an integral step in software development and maintenance. To make bug triaging more efficient, many researchers propose to adopt machine learning and information retrieval ...

research-article
Semi-Supervised Learning Based Tag Recommendation for Docker Repositories
Abstract

Docker has been the mainstream technology of providing reusable software artifacts recently. Developers can easily build and deploy their applications using Docker. Currently, a large number of reusable Docker images are publicly shared in online ...

research-article
Automatic Detection and Repair Recommendation for Missing Checks
Abstract

Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating potential vulnerabilities and ...

research-article
Graph Embedding Based API Graph Search and Recommendation
Abstract

Searching application programming interfaces (APIs) is very important for developers to reuse software projects. Existing natural language based API search mainly faces the following challenges. 1) More accurate results are required as software ...

research-article
CBSC: A Crowdsensing System for Automatic Calibrating of Barometers
Abstract

The mobile crowdsensing software systems can complete large-scale and complex sensing tasks with the help of the collective intelligence from large numbers of ordinary users. In this paper, we build a typical crowdsensing system, which can ...

research-article
DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy
Abstract

In current software defect prediction (SDP) research, most previous empirical studies only use datasets provided by PROMISE repository and this may cause a threat to the external validity of previous empirical results. Instead of SDP dataset ...

research-article
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning
Abstract

Defect prediction assists the rational allocation of testing resources by detecting the potentially defective software modules before releasing products. When a project has no historical labeled defect data, cross project defect prediction (CPDP) ...

research-article
Threshold Extraction Framework for Software Metrics
Abstract

Software metrics are used to measure different attributes of software. To practically measure software attributes using these metrics, metric thresholds are needed. Many researchers attempted to identify these thresholds based on personal ...

research-article
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks
Abstract

Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), ...

research-article
Degree-of-Node Task Scheduling of Fine-Grained Parallel Programs on Heterogeneous Systems
Abstract

Processor specialization has become the development trend of modern processor industry. It is quite possible that this will still be the main-stream in the next decades of semiconductor era. As the diversity of heterogeneous systems grows, ...

research-article
CR-Morph: Controllable Rigid Morphing for 2D Animation
Abstract

This paper presents a rigidity-preserving morphing technique that blends a pair of 2D shapes in a controllable manner. The morphing is controllable in two aspects: 1) motion dynamics in the interpolation sequences can be effectively enhanced ...

research-article
DEMC: A Deep Dual-Encoder Network for Denoising Monte Carlo Rendering
Abstract

In this paper, we present DEMC, a deep dual-encoder network to remove Monte Carlo noise efficiently while preserving details. Denoising Monte Carlo rendering is different from natural image denoising since inexpensive by-products (feature buffers) ...

research-article
A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm
Abstract

The reliability allowance of circuits tends to decrease with the increase of circuit integration and the application of new technology and materials, and the hardening strategy oriented toward gates is an effective technology for improving the ...

research-article
CK-Modes Clustering Algorithm Based on Node Cohesion in Labeled Property Graph
Abstract

The designation of the cluster number K and the initial centroids is essential for K-modes clustering algorithm. However, most of the improved methods based on K-modes specify the K value manually and generate the initial centroids randomly, which ...

Comments