Author of the publication

Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction.

, , , , and . ACM Trans. Softw. Eng. Methodol., 30 (2): 25:1-25:29 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Load balance optimization with replication degree customization., , and . CCIS, page 170-174. IEEE, (2011)Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation., and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 916-923. Springer, (2003)On Reliability of Patch Correctness Assessment., , , , and . CoRR, (2018)VT-revolution: interactive programming tutorials made possible., , , , and . ESEC/SIGSOFT FSE, page 924-927. ACM, (2018)Duplicate Pull Request Detection: When Time Matters., , , , and . Internetware, page 8:1-8:10. ACM, (2019)Automated Model-Based Performance Testing for PaaS Cloud Services., , and . COMPSAC Workshops, page 644-649. IEEE Computer Society, (2014)Experience report: An industrial experience report on test outsourcing practices., , , , , and . ISSRE, page 370-380. IEEE Computer Society, (2015)Information Credibility on Twitter in Emergency Situation., , , , and . PAISI, volume 7299 of Lecture Notes in Computer Science, page 45-59. Springer, (2012)Exploring the Application of Blockchain Technology to Combat the Effects of Social Loafing in Cross Functional Group Projects., , , , , and . OpenSym, page 13:1-13:8. ACM, (2017)SATD detector: a text-mining-based self-admitted technical debt detection tool., , , , , and . ICSE (Companion Volume), page 9-12. ACM, (2018)