Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Xiaolin Ju"'
Publikováno v:
IET Software, Vol 15, Iss 1, Pp 75-89 (2021)
Abstract Security vulnerability prediction (SVP) can construct models to identify potentially vulnerable program modules via machine learning. Two kinds of features from different points of view are used to measure the extracted modules in previous s
Externí odkaz:
https://doaj.org/article/f32ae304c4c7476486cf615ef47df5ad
Publikováno v:
IEEE Access, Vol 8, Pp 207858-207870 (2020)
Fault localization is indeed tedious and costly work during software maintenance. Studies indicate that combining both structural features and behavior characteristics of programs can be beneficial for improving the efficiency of fault locating. In t
Externí odkaz:
https://doaj.org/article/b93307bb844f4edda843847b824ecfba
Autor:
Zhihua Chen Zhihua Chen, Xiaolin Ju Zhihua Chen, Haochen Wang Xiaolin Ju, Xiang Chen Haochen Wang
Publikováno v:
網際網路技術學刊. 23:1099-1107
A blocking bug (BB) is a severe bug that could prevent other bugs from being fixed in time and cost more effort to repair itself in software maintenance. Hence, early detection of BBs is essential to save time and labor costs. However, BBs only occup
Publikováno v:
Automated Software Engineering. 30
Fault localization aims to efficiently locate faults when debugging programs , reducing software development and maintenance costs. Spectrum-based fault location (SBFL) is the mainstream fault location technology, which calculates and ranks the suspi
Publikováno v:
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C).
Publikováno v:
2022 9th International Conference on Dependable Systems and Their Applications (DSA).
Autor:
Xiaolin Ju, Xiaojun Hu, Xiaolei Wang, Hongliang Shi, Feifei He, Xuegong She, Xingang Xie, Shiqiang Ma
Publikováno v:
Organic Chemistry Frontiers. 8:4839-4844
A strategy for the syntheses of pyrrolo [2,1-a] isoquinolines and indolizinoindolones via a Brønsted acid and Lewis acid co-promoted cascade reaction has been developed. The strategy was exemplified in the total synthesis of Erysotramidine.
Publikováno v:
IET Software, Vol 15, Iss 1, Pp 75-89 (2021)
Security vulnerability prediction (SVP) can construct models to identify potentially vulnerable program modules via machine learning. Two kinds of features from different points of view are used to measure the extracted modules in previous studies. O