Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Zhiyuan Wan"'
Publikováno v:
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.
Publikováno v:
IEEE Transactions on Software Engineering. 47:1331-1349
Blockchain-related discussions have become increasingly prevalent in programming QA and LDA-derived topics are not linked to higher level domain-specific concepts. We propose an approach that combines balanced LDA (which ensures that the topics are b
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering.
Publikováno v:
IEEE Transactions on Software Engineering. 46:1241-1266
Defect prediction has been an active research area for over four decades. Despite numerous studies on defect prediction, the potential value of defect prediction in practice remains unclear. To address this issue, we performed a mixed qualitative and
Publikováno v:
Empirical Software Engineering. 25:2694-2747
Deep learning has gained tremendous traction from the developer and researcher communities. It plays an increasingly significant role in a number of application domains. Deep learning frameworks are proposed to help developers and researchers easily
Publikováno v:
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
Publikováno v:
ICSE: International Conference on Software Engineering; 5/22/2021, p1410-1422, 13p
Publikováno v:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 3:1-22
The rapid adoption of Smartphone devices has caused increasing security and privacy risks and breaches. Catching up with ever-evolving contemporary smartphone technology challenges leads older adults (aged 50+) to reduce or to abandon their use of mo
Publikováno v:
Empirical Software Engineering. 24:4034-4070
A container is a group of processes isolated from other groups via distinct kernel namespaces and resource allocation quota. Attacks against containers often leverage kernel exploits through the system call interface. In this paper, we present an app
Publikováno v:
ICSE (Companion Volume)
Smart contracts have been plagued by security incidents, which resulted in substantial financial losses. Given numerous research efforts in addressing the security issues of smart contracts, we wondered how software practitioners build security into