Остановите войну!
for scientists:
default search action
Daoxu Chen
- > Home > Persons > Daoxu Chen
Publications
- 2017
- [j32]Chao Ni, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen, George Q. Huang:
A Cluster Based Feature Selection Method for Cross-Project Software Defect Prediction. J. Comput. Sci. Technol. 32(6): 1090-1107 (2017) - [c86]Chao Ni, Wangshu Liu, Qing Gu, Xiang Chen, Daoxu Chen:
FeSCH: A Feature Selection Method using Clusters of Hybrid-data for Cross-Project Defect Prediction. COMPSAC (1) 2017: 51-56 - 2016
- [j30]Wangshu Liu, Shulong Liu, Qing Gu, Jiaqiang Chen, Xiang Chen, Daoxu Chen:
Empirical Studies of a Two-Stage Data Preprocessing Approach for Software Fault Prediction. IEEE Trans. Reliab. 65(1): 38-53 (2016) - 2015
- [c84]Wangshu Liu, Shulong Liu, Qing Gu, Xiang Chen, Daoxu Chen:
FECS: A Cluster Based Feature Selection Method for Software Fault Prediction with Noises. COMPSAC 2015: 276-281 - 2014
- [c82]Shulong Liu, Xiang Chen, Wangshu Liu, Jiaqiang Chen, Qing Gu, Daoxu Chen:
FECAR: A Feature Selection Framework for Software Defect Prediction. COMPSAC 2014: 426-435 - [c79]Jiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen:
A Two-Stage Data Preprocessing Approach for Software Fault Prediction. SERE 2014: 20-29 - 2013
- [c74]Jiaqiang Chen, Shulong Liu, Xiang Chen, Qing Gu, Daoxu Chen:
Empirical studies on feature selection for software fault prediction. Internetware 2013: 26:1-26:4 - 2012
- [c69]Lijiu Zhang, Xiang Chen, Qing Gu, Haigang Zhao, Xiaoyan Shi, Daoxu Chen:
CATESR: Change-aware Test Suite Reduction Based on Partial Coverage of Test Requirements. SEKE 2012: 217-224 - [c67]Xing Shang, Xiang Chen, Zhiwei Jiang, Qing Gu, Daoxu Chen:
Factor Analysis for Influence Maximization Problem in Social Networks. SNPD 2012: 95-101 - 2011
- [c64]Xiang Chen, Lijiu Zhang, Qing Gu, Haigang Zhao, Ziyuan Wang, Xiaobing Sun, Daoxu Chen:
A test suite reduction approach based on pairwise interaction of requirements. SAC 2011: 1390-1397 - 2010
- [c63]Xiang Chen, Qing Gu, Jingxian Qi, Daoxu Chen:
Applying Particle Swarm Optimization to Pairwise Testing. COMPSAC 2010: 107-116 - [c60]Lijiu Zhang, Qing Gu, Shushen Peng, Xiang Chen, Haigang Zhao, Daoxu Chen:
D-WAV: A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms. ICSEA 2010: 501-507 - [c55]Xin Zhang, Qing Gu, Xiang Chen, Jingxian Qi, Daoxu Chen:
A study of relative redundancy in test-suite reduction while retaining or improving fault-localization effectiveness. SAC 2010: 2229-2236 - 2009
- [c53]Xiang Chen, Qing Gu, Ang Li, Daoxu Chen:
Variable Strength Interaction Testing with an Ant Colony System Approach. APSEC 2009: 160-167 - [c52]Xinping Wang, Qing Gu, Xin Zhang, Xiang Chen, Daoxu Chen:
Fault Localization Based on Multi-level Similarity of Execution Traces. APSEC 2009: 399-405 - [c41]Xiang Chen, Qing Gu, Xin Zhang, Daoxu Chen:
Building Prioritized Pairwise Interaction Test Suites with Ant Colony Optimization. QSIC 2009: 347-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 16:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint