Volume 29,Issue 8,2018 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 数据驱动的软件智能化开发方法与技术专题前言
  • 谢冰,魏峻,彭鑫,孙海龙
  • 2018,29(8):2177-2179 [Abstract(752)]  [View PDF(505)387.81 K]
  • Survey on Intelligent Search and Construction Methods of Program
  • LIU Bin-Bin, DONG Wei and WANG Ji
  • 2018,29(8):2180-2197 [Abstract(2817)]  [View PDF(1469)1.98 M]
  • UI Interaction Pattern Extraction and Retrieving of Android Applications
  • WU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun
  • 2018,29(8):2198-2209 [Abstract(1251)]  [View PDF(814)1.27 M]
  • Mining and Organizing Software Functional Features Based on StackOverflow Data
  • ZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng
  • 2018,29(8):2210-2225 [Abstract(1460)]  [View PDF(851)1.88 M]
  • Method Combining Structural and Semantic Features to Support Code Commenting Decision
  • HUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan
  • 2018,29(8):2226-2242 [Abstract(1278)]  [View PDF(845)6.70 M]
  • Association Analysis and N-Gram Based Detection of Incorrect Arguments
  • LI Chao and LIU Hui
  • 2018,29(8):2243-2257 [Abstract(1155)]  [View PDF(770)1.51 M]
  • Survey of Software Data Mining for Open Source Ecosystem
  • YIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min
  • 2018,29(8):2258-2271 [Abstract(1598)]  [View PDF(1487)1.34 M]
  • Evaluation of Core Developers in Open Source Software by Contribution Allocation
  • WU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue
  • 2018,29(8):2272-2282 [Abstract(1225)]  [View PDF(757)1.14 M]
  • Analysis of Contribution Composition Patterns of Code Files
  • TAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui
  • 2018,29(8):2283-2293 [Abstract(1233)]  [View PDF(623)1.07 M]
  • Developer Recommendation for Software Security Bugs
  • SUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin
  • 2018,29(8):2294-2305 [Abstract(1385)]  [View PDF(788)1.28 M]
  • Multi-Feature Fused Software Developer Recommendation
  • XIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang
  • 2018,29(8):2306-2321 [Abstract(1383)]  [View PDF(939)2.82 M]
  • Bug Triaging Approach Based on Recurrent Neural Networks
  • XI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian
  • 2018,29(8):2322-2335 [Abstract(1280)]  [View PDF(1002)1.71 M]
  • Natural Language Data Driven Approach for Software Intelligent Safety Evaluation
  • ZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin
  • 2018,29(8):2336-2349 [Abstract(1677)]  [View PDF(772)1.42 M]
  • Approach for Generating AADL Model Based on Restricted Natural Language Requirement Template
  • WANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao
  • 2018,29(8):2350-2370 [Abstract(1587)]  [View PDF(977)2.60 M]
  • Review Articles

  • “Black Magic” of Polyhedral Compilation
  • ZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai
  • 2018,29(8):2371-2396 [Abstract(1398)]  [View PDF(2276)2.70 M]
  • Research Progress on Emotional Computation Technology Based on Semantic Analysis
  • RAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong
  • 2018,29(8):2397-2426 [Abstract(2363)]  [View PDF(2514)2.85 M]
  • Survey of Sparse Exchangeable Graph Modeling
  • YU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng
  • 2018,29(8):2448-2469 [Abstract(1490)]  [View PDF(764)2.17 M]
  • Special Issue's Articles

  • Routing Algorithm Design Based on Timeslot of Transmission for Data Centers
  • YANG Yang, YANG Jia-Hai and WEN Hao-Sen
  • 2018,29(8):2485-2500 [Abstract(1261)]  [View PDF(1055)1.71 M]
  • Review Articles

  • Research Progress of Video Saliency Detection
  • CONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie
  • 2018,29(8):2527-2544 [Abstract(1603)]  [View PDF(2980)1.83 M]
  • Contents

  • Speculation and Negation Scope Detection via Bidirectional LSTM Neural Networks
  • QIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming
  • 2018,29(8):2427-2447 [Abstract(1204)]  [View PDF(1244)1.88 M]
  • Fast Density-Based Clustering Algorithm for Location Big Data
  • YU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei
  • 2018,29(8):2470-2484 [Abstract(2083)]  [View PDF(1742)3.43 M]
  • JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain Indicators
  • HUANG Wei and ZHAO Xian-Feng
  • 2018,29(8):2501-2510 [Abstract(1570)]  [View PDF(1247)1.06 M]
  • Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure World
  • ZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua
  • 2018,29(8):2511-2526 [Abstract(1347)]  [View PDF(1390)1.61 M]