Volume 29,Issue 8,2018 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 数据驱动的软件智能化开发方法与技术专题前言
  • 谢冰,魏峻,彭鑫,孙海龙
  • 2018,29(8):2177-2179 [Abstract(367)]  [View PDF(354)387.81 K]
  • Survey on Intelligent Search and Construction Methods of Program
  • LIU Bin-Bin, DONG Wei and WANG Ji
  • 2018,29(8):2180-2197 [Abstract(1658)]  [View PDF(1170)1.98 M]
  • UI Interaction Pattern Extraction and Retrieving of Android Applications
  • WU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun
  • 2018,29(8):2198-2209 [Abstract(756)]  [View PDF(625)1.27 M]
  • Mining and Organizing Software Functional Features Based on StackOverflow Data
  • ZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng
  • 2018,29(8):2210-2225 [Abstract(1039)]  [View PDF(644)1.88 M]
  • Method Combining Structural and Semantic Features to Support Code Commenting Decision
  • HUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan
  • 2018,29(8):2226-2242 [Abstract(826)]  [View PDF(642)6.70 M]
  • Association Analysis and N-Gram Based Detection of Incorrect Arguments
  • LI Chao and LIU Hui
  • 2018,29(8):2243-2257 [Abstract(749)]  [View PDF(596)1.51 M]
  • Survey of Software Data Mining for Open Source Ecosystem
  • YIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min
  • 2018,29(8):2258-2271 [Abstract(1064)]  [View PDF(1134)1.34 M]
  • Evaluation of Core Developers in Open Source Software by Contribution Allocation
  • WU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue
  • 2018,29(8):2272-2282 [Abstract(805)]  [View PDF(616)1.14 M]
  • Analysis of Contribution Composition Patterns of Code Files
  • TAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui
  • 2018,29(8):2283-2293 [Abstract(825)]  [View PDF(491)1.07 M]
  • Developer Recommendation for Software Security Bugs
  • SUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin
  • 2018,29(8):2294-2305 [Abstract(885)]  [View PDF(622)1.28 M]
  • Multi-Feature Fused Software Developer Recommendation
  • XIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang
  • 2018,29(8):2306-2321 [Abstract(922)]  [View PDF(718)2.82 M]
  • Bug Triaging Approach Based on Recurrent Neural Networks
  • XI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian
  • 2018,29(8):2322-2335 [Abstract(839)]  [View PDF(719)1.71 M]
  • Natural Language Data Driven Approach for Software Intelligent Safety Evaluation
  • ZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin
  • 2018,29(8):2336-2349 [Abstract(1060)]  [View PDF(618)1.42 M]
  • Approach for Generating AADL Model Based on Restricted Natural Language Requirement Template
  • WANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao
  • 2018,29(8):2350-2370 [Abstract(1013)]  [View PDF(693)2.60 M]
  • Review Articles

  • “Black Magic” of Polyhedral Compilation
  • ZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai
  • 2018,29(8):2371-2396 [Abstract(1015)]  [View PDF(1495)2.70 M]
  • Research Progress on Emotional Computation Technology Based on Semantic Analysis
  • RAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong
  • 2018,29(8):2397-2426 [Abstract(1778)]  [View PDF(1922)2.85 M]
  • Survey of Sparse Exchangeable Graph Modeling
  • YU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng
  • 2018,29(8):2448-2469 [Abstract(1020)]  [View PDF(613)2.17 M]
  • Special Issue's Articles

  • Routing Algorithm Design Based on Timeslot of Transmission for Data Centers
  • YANG Yang, YANG Jia-Hai and WEN Hao-Sen
  • 2018,29(8):2485-2500 [Abstract(811)]  [View PDF(825)1.71 M]
  • Review Articles

  • Research Progress of Video Saliency Detection
  • CONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie
  • 2018,29(8):2527-2544 [Abstract(1051)]  [View PDF(2219)1.83 M]
  • Contents

  • Speculation and Negation Scope Detection via Bidirectional LSTM Neural Networks
  • QIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming
  • 2018,29(8):2427-2447 [Abstract(855)]  [View PDF(989)1.88 M]
  • Fast Density-Based Clustering Algorithm for Location Big Data
  • YU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei
  • 2018,29(8):2470-2484 [Abstract(1676)]  [View PDF(1410)3.43 M]
  • JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain Indicators
  • HUANG Wei and ZHAO Xian-Feng
  • 2018,29(8):2501-2510 [Abstract(1260)]  [View PDF(961)1.06 M]
  • Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure World
  • ZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua
  • 2018,29(8):2511-2526 [Abstract(993)]  [View PDF(1069)1.61 M]