Author of the publication

TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macro Action Selection with Deep Reinforcement Learning in StarCraft., , , , , and . AIIDE, page 94-99. AAAI Press, (2019)Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection., , , , and . SCAM, page 143-150. IEEE, (2023)Response Time Aware Operator Placement for Complex Event Processing in Edge Computing., , , , and . ICSOC, volume 11236 of Lecture Notes in Computer Science, page 264-278. Springer, (2018)TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts., , , , , , , and . CoRR, (2023)Incorporating Pre-trained Transformer Models into TextCNN for Sentiment Analysis on Software Engineering Texts., , , , , , , , and . Internetware, page 127-136. ACM, (2022)Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery., , , , , , , , and . ASE, page 114:1. ACM, (2022)ENCD: a manually curated database of experimentally supported endocrine system disease and lncRNA associations., , , , , , , , , and 4 other author(s). Database J. Biol. Databases Curation, (January 2023)Propagating frugal user feedback through closeness of code dependencies to improve IR-based traceability recovery., , , , , , and . Empir. Softw. Eng., 27 (2): 41 (2022)Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking., , , , , and . KSEM (3), volume 13370 of Lecture Notes in Computer Science, page 463-476. Springer, (2022)An attention-based automatic vulnerability detection approach with GGNN., , , , , , , , and . Int. J. Mach. Learn. Cybern., 14 (9): 3113-3127 (September 2023)