Volume 29,Issue 8,2018 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 数据驱动的软件智能化开发方法与技术专题前言
  • 谢冰,魏峻,彭鑫,孙海龙
  • 2018,29(8):2177-2179 [Abstract(3107)]  [View PDF(3724)387.81 K]
  • Survey on Intelligent Search and Construction Methods of Program
  • LIU Bin-Bin, DONG Wei and WANG Ji
  • 2018,29(8):2180-2197 [Abstract(6234)]  [View PDF(5701)1.98 M]
  • UI Interaction Pattern Extraction and Retrieving of Android Applications
  • WU Jun-Wei, SHEN Li-Wei, GUO Wu-Nan, WANG Chao and ZHAO Wen-Yun
  • 2018,29(8):2198-2209 [Abstract(3887)]  [View PDF(4287)1.27 M]
  • Mining and Organizing Software Functional Features Based on StackOverflow Data
  • ZHU Zi-Xiao, ZOU Yan-Zhen, HUA Chen-Yan, SHEN Qi and ZHAO Jun-Feng
  • 2018,29(8):2210-2225 [Abstract(4053)]  [View PDF(4716)1.88 M]
  • Method Combining Structural and Semantic Features to Support Code Commenting Decision
  • HUANG Yuan, JIA Nan, ZHOU Qiang, CHEN Xiang-Ping, XIONG Ying-Fei and LUO Xiao-Nan
  • 2018,29(8):2226-2242 [Abstract(4066)]  [View PDF(4503)6.70 M]
  • Association Analysis and N-Gram Based Detection of Incorrect Arguments
  • LI Chao and LIU Hui
  • 2018,29(8):2243-2257 [Abstract(3591)]  [View PDF(4460)1.51 M]
  • Survey of Software Data Mining for Open Source Ecosystem
  • YIN Gang, WANG Tao, LIU Bing-Xun, ZHOU Ming-Hui, YU Yue, LI Zhi-Xing, OUYANG Jian-Quan and WANG Huai-Min
  • 2018,29(8):2258-2271 [Abstract(5260)]  [View PDF(5847)1.34 M]
  • Evaluation of Core Developers in Open Source Software by Contribution Allocation
  • WU Zhe-Fu, ZHU Tian-Tong, XUAN Qi and YU Yue
  • 2018,29(8):2272-2282 [Abstract(3886)]  [View PDF(4190)1.14 M]
  • Analysis of Contribution Composition Patterns of Code Files
  • TAN Xin, LIN Ze-Yan, ZHANG Yu-Xia and ZHOU Ming-Hui
  • 2018,29(8):2283-2293 [Abstract(3624)]  [View PDF(3779)1.07 M]
  • Developer Recommendation for Software Security Bugs
  • SUN Xiao-Bing, ZHOU Cheng, YANG Hui and LI Bin
  • 2018,29(8):2294-2305 [Abstract(4549)]  [View PDF(4102)1.28 M]
  • Multi-Feature Fused Software Developer Recommendation
  • XIE Xin-Qiang, YANG Xiao-Chun, WANG Bin, ZHANG Xia, JI Yong and HUANG Zhi-Gang
  • 2018,29(8):2306-2321 [Abstract(4288)]  [View PDF(4848)2.82 M]
  • Bug Triaging Approach Based on Recurrent Neural Networks
  • XI Sheng-Qu, YAO Yuan, XU Feng and LÜ Jian
  • 2018,29(8):2322-2335 [Abstract(4198)]  [View PDF(4993)1.71 M]
  • Natural Language Data Driven Approach for Software Intelligent Safety Evaluation
  • ZHANG Yi-Fan, TANG En-Yi, SU Yan-Zi, YANG Kai-Mao, KUANG Hong-Yu and CHEN Xin
  • 2018,29(8):2336-2349 [Abstract(4646)]  [View PDF(4240)1.42 M]
  • Approach for Generating AADL Model Based on Restricted Natural Language Requirement Template
  • WANG Fei, YANG Zhi-Bin, HUANG Zhi-Qiu, ZHOU Yong, LIU Cheng-Wei, ZHANG Wen-Bing, XUE Lei and XU Jin-Miao
  • 2018,29(8):2350-2370 [Abstract(4616)]  [View PDF(4866)2.60 M]
  • Review Articles

  • “Black Magic” of Polyhedral Compilation
  • ZHAO Jie, LI Ying-Ying and ZHAO Rong-Cai
  • 2018,29(8):2371-2396 [Abstract(4598)]  [View PDF(9676)2.70 M]
  • Research Progress on Emotional Computation Technology Based on Semantic Analysis
  • RAO Yuan, WU Lian-Wei, WANG Yi-Ming and FENG Cong
  • 2018,29(8):2397-2426 [Abstract(6142)]  [View PDF(10828)2.85 M]
  • Survey of Sparse Exchangeable Graph Modeling
  • YU Qian-Cheng, YU Zhi-Wen, WANG Zhu and WANG Xiao-Feng
  • 2018,29(8):2448-2469 [Abstract(4218)]  [View PDF(4620)2.17 M]
  • Special Issue's Articles

  • Routing Algorithm Design Based on Timeslot of Transmission for Data Centers
  • YANG Yang, YANG Jia-Hai and WEN Hao-Sen
  • 2018,29(8):2485-2500 [Abstract(3912)]  [View PDF(4501)1.71 M]
  • Review Articles

  • Research Progress of Video Saliency Detection
  • CONG Run-Min, LEI Jian-Jun, FU Hua-Zhu, WANG Wen-Guan, HUANG Qing-Ming and NIU Li-Jie
  • 2018,29(8):2527-2544 [Abstract(4714)]  [View PDF(9670)1.83 M]
  • Contents

  • Speculation and Negation Scope Detection via Bidirectional LSTM Neural Networks
  • QIAN Zhong, LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming
  • 2018,29(8):2427-2447 [Abstract(3450)]  [View PDF(4650)1.88 M]
  • Fast Density-Based Clustering Algorithm for Location Big Data
  • YU Yan-Wei, JIA Zhao-Fei, CAO Lei, ZHAO Jin-Dong, LIU Zhao-Wei and LIU Jing-Lei
  • 2018,29(8):2470-2484 [Abstract(4245)]  [View PDF(5816)3.43 M]
  • JPEG Steganography Based on Adaptive Cover Selection Using Haar Wavelet Domain Indicators
  • HUANG Wei and ZHAO Xian-Feng
  • 2018,29(8):2501-2510 [Abstract(3301)]  [View PDF(3670)1.06 M]
  • Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure World
  • ZHANG Zhang-Kai, LI Zhou-Jun, XIA Chun-He, MA Jin-Xin and CUI Jin-Hua
  • 2018,29(8):2511-2526 [Abstract(3354)]  [View PDF(4241)1.61 M]