default search action
Xiaoyin Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Lu Xiao, Gengwu Zhao, Xiao Wang, Keye Li, Erick Lim, Chenhao Wei, Tingting Yu, Xiaoyin Wang:
An empirical study on the usage of mocking frameworks in Apache software foundation. Empir. Softw. Eng. 29(2): 39 (2024) - [c77]Tianyi Liu, Jerry Lucas, Sen He, Tongping Liu, Xiaoyin Wang, Wei Wang:
Improving Resource and Energy Efficiency for Cloud 3D through Excessive Rendering Reduction. EuroSys 2024: 317-332 - [c76]Xiaoyi Yang, Yuxing Wang, Tahmid Rafi, Dongfang Liu, Xiaoyin Wang, Xueling Zhang:
Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes. ISSTA 2024: 717-729 - [i7]Xiaoyin Wang, Dakai Zhu:
Validating LLM-Generated Programs with Metamorphic Prompt Testing. CoRR abs/2406.06864 (2024) - [i6]Sheik Murad Hassan Anik, Xinghua Gao, Hao Zhong, Xiaoyin Wang, Na Meng:
Automation Configuration in Smart Home Systems: Challenges and Opportunities. CoRR abs/2408.04755 (2024) - 2023
- [j27]Hao Zhong, Xiaoyin Wang:
An empirical study on API usages from code search engine and local library. Empir. Softw. Eng. 28(3): 63 (2023) - [j26]Xueling Zhang, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux, Xiaoyin Wang:
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. ACM Trans. Softw. Eng. Methodol. 32(4): 89:1-89:34 (2023) - [j25]Matthew C. Davis, Emad Aghayi, Thomas D. LaToza, Xiaoyin Wang, Brad A. Myers, Joshua Sunshine:
What's (Not) Working in Programmer User Studies? ACM Trans. Softw. Eng. Methodol. 32(5): 120:1-120:32 (2023) - [j24]Foyzul Hassan, Na Meng, Xiaoyin Wang:
UniLoc: Unified Fault Localization of Continuous Integration Failures. ACM Trans. Softw. Eng. Methodol. 32(6): 136:1-136:31 (2023) - [c75]Xiaoyin Wang, Wenao Li:
Monkeypox Detection based on MIRNET-v2 and Transfer Learning. AIPR 2023: 458-464 - [c74]Sunzhou Huang, Xiaoyin Wang:
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports. ICSE 2023: 184-195 - [c73]Sunzhou Huang, Xiaoyin Wang:
PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System. ISSTA 2023: 1523-1526 - [c72]Xiaoyin Wang, Tahmid Rafi, Na Meng:
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. ASE 2023: 951-962 - [c71]Kevin Baldor, Xiaoyin Wang, Jianwei Niu:
Thorium: A Language for Bounded Verification of Dynamic Reactive Objects. REBLS@SPLASH 2023: 1-13 - [i5]Sunzhou Huang, Xiaoyin Wang:
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports. CoRR abs/2305.06669 (2023) - [i4]Md Mahir Asef Kabir, Sk Adnan Hassan, Xiaoyin Wang, Ying Wang, Hai Yu, Na Meng:
An empirical study of ChatGPT-3.5 on question answering and code maintenance. CoRR abs/2310.02104 (2023) - 2022
- [j23]Linqi Li, Xiaoyin Wang, Xinhua Ma:
Design of a location-based opportunistic geographic routing protocol. Comput. Commun. 181: 357-364 (2022) - [j22]Xuyang Chen, Xiaolu Zhang, Michael Elliot, Xiaoyin Wang, Feng Wang:
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions. Comput. Secur. 120: 102812 (2022) - [j21]Lingceng Ma, Jian Wu, Qinqin Yang, Zihan Zhou, Hongjian He, Jianfeng Bao, Lijun Bao, Xiaoyin Wang, Pujie Zhang, Jianhui Zhong, Congbo Cai, Shuhui Cai, Zhong Chen:
Single-shot multi-parametric mapping based on multiple overlapping-echo detachment (MOLED) imaging. NeuroImage 263: 119645 (2022) - [j20]Qinqin Yang, Yanhong Lin, Jiechao Wang, Jianfeng Bao, Xiaoyin Wang, Lingceng Ma, Zihan Zhou, Qizhi Yang, Shuhui Cai, Hongjian He, Congbo Cai, Jiyang Dong, Jingliang Cheng, Zhong Chen, Jianhui Zhong:
MOdel-Based SyntheTic Data-Driven Learning (MOST-DL): Application in Single-Shot T2 Mapping With Severe Head Motion Using Overlapping-Echo Acquisition. IEEE Trans. Medical Imaging 41(11): 3167-3181 (2022) - [j19]Hao Zhong, Xiaoyin Wang, Hong Mei:
Inferring Bug Signatures to Detect Real Bugs. IEEE Trans. Software Eng. 48(2): 571-584 (2022) - [j18]Xintao Niu, Huayao Wu, Changhai Nie, Yu Lei, Xiaoyin Wang:
A Theory of Pending Schemas in Combinatorial Testing. IEEE Trans. Software Eng. 48(10): 4119-4151 (2022) - [j17]Xintao Niu, Yanjie Sun, Huayao Wu, Gang Li, Changhai Nie, Yu Lei, Xiaoyin Wang:
Enhance Combinatorial Testing With Metamorphic Relations. IEEE Trans. Software Eng. 48(12): 5007-5029 (2022) - [c70]Xiaoyin Wang, Min Zheng:
COVID-19 Image Segmentation Algorithms Based on Conditional Generative Adversarial Network. AIPR 2022: 419-426 - [c69]Xiaoyin Wang:
VRTest: An Extensible Framework for Automatic Testing of Virtual Reality Scenes. ICSE-Companion 2022: 232-236 - [c68]Tahmid Rafi, Xueling Zhang, Xiaoyin Wang:
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. ASE 2022: 77:1-77:13 - [c67]Yan Zhao, Enyi Tang, Haipeng Cai, Xi Guo, Xiaoyin Wang, Na Meng:
A Lightweight Approach of Human-Like Playtest for Android Apps. SANER 2022: 309-320 - [c66]Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Zexuan Li:
How Do Injected Bugs Affect Deep Learning? SANER 2022: 793-804 - 2021
- [j16]Tao Qian, Xiaoyin Wang, Liming Zhang:
MIMO frequency domain system identification using matrix-valued orthonormal functions. Autom. 133: 109882 (2021) - [j15]Mitra Bokaei Hosseini, Travis D. Breaux, Rocky Slavin, Jianwei Niu, Xiaoyin Wang:
Analyzing privacy policies through syntax-driven semantic analysis of information types. Inf. Softw. Technol. 138: 106608 (2021) - [j14]Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Xuansheng Lu:
The symptoms, causes, and repairs of bugs inside a deep learning library. J. Syst. Softw. 177: 110935 (2021) - [j13]Shaikh Mostafa, Bridgette Findley, Na Meng, Xiaoyin Wang:
Sais: Self-Adaptive Identification of Security Bug Reports. IEEE Trans. Dependable Secur. Comput. 18(4): 1779-1792 (2021) - [c65]Irving Rodriguez, Xiaoyin Wang:
Topic Trends in Issue Tracking System of Extended Reality Frameworks. APSEC 2021: 572-573 - [c64]Shaikh Mostafa, Xiaoyin Wang:
An Exploration Study On the Dependency Among Vulnerabilities and Bugs. APSEC 2021: 574-575 - [c63]Fariha Nusrat, Foyzul Hassan, Hao Zhong, Xiaoyin Wang:
How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects. ICSE 2021: 473-485 - [c62]Jacinto Molina, Xue Qin, Xiaoyin Wang:
Automatic Extraction of Code Dependency in Virtual Reality Software. ICPC 2021: 381-385 - [c61]Rodney Rodriguez, Xiaoyin Wang:
Understanding Execution Environment of File-Manipulation Scripts by Extracting Pre-Conditions. ICPC 2021: 406-410 - [c60]Yifan Chen, Chenyang Yang, Xin Zhang, Yingfei Xiong, Hao Tang, Xiaoyin Wang, Lu Zhang:
Accelerating Program Analyses in Datalog by Merging Library Facts. SAS 2021: 77-101 - [c59]Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu:
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. SP 2021: 796-812 - 2020
- [j12]Xiaoyin Wang, Tao Qian, Ieng Tak Leong, You Gao:
Two-Dimensional Frequency-Domain System Identification. IEEE Trans. Autom. Control. 65(2): 577-590 (2020) - [j11]Xintao Niu, Changhai Nie, Jeff Yu Lei, Hareton Leung, Xiaoyin Wang:
Identifying Failure-Causing Schemas in the Presence of Multiple Faults. IEEE Trans. Software Eng. 46(2): 141-162 (2020) - [j10]Xintao Niu, Changhai Nie, Hareton Leung, Yu Lei, Xiaoyin Wang, Jiaxi Xu, Yan Wang:
An Interleaving Approach to Combinatorial Testing and Failure-Inducing Interaction Identification. IEEE Trans. Software Eng. 46(6): 584-615 (2020) - [c58]Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Xuansheng Lu:
An Empirical Study on Bugs Inside TensorFlow. DASFAA (1) 2020: 604-620 - [c57]Lingchao Chen, Foyzul Hassan, Xiaoyin Wang, Lingming Zhang:
Taming behavioral backward incompatibilities via cross-project testing and analysis. ICSE 2020: 112-124 - [c56]Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
How does misconfiguration of analytic services compromise mobile privacy? ICSE 2020: 1572-1583 - [c55]Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Xiaoyin Wang, Jianwei Niu:
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. REFSQ 2020: 97-115 - [c54]Wei Ye, Rui Xie, Jinglei Zhang, Tianxiang Hu, Xiaoyin Wang, Shikun Zhang:
Leveraging Code Generation to Improve Code Retrieval and Summarization via Dual Learning. WWW 2020: 2309-2319 - [i3]Wei Ye, Rui Xie, Jinglei Zhang, Tianxiang Hu, Xiaoyin Wang, Shikun Zhang:
Leveraging Code Generation to Improve Code Retrieval and Summarization via Dual Learning. CoRR abs/2002.10198 (2020)
2010 – 2019
- 2019
- [c53]Hongyu Liu, Sam Silvestro, Xiaoyin Wang, Lide Duan, Tongping Liu:
CSOD: Context-Sensitive Overflow Detection. CGO 2019: 50-60 - [c52]Xue Qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Taming web views in the detection of Android privacy leaks. HotSoS 2019: 23:1-23:2 - [c51]John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward a reliability measurement framework automated using deep learning. HotSoS 2019: 25:1-25:2 - [c50]Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, Peng Gao:
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. ICSE 2019: 257-268 - [c49]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How reliable is the crowdsourced knowledge of security implementation? ICSE 2019: 536-547 - [c48]Xue Qin, Hao Zhong, Xiaoyin Wang:
TestMig: migrating GUI test cases from iOS to Android. ISSTA 2019: 284-295 - [c47]Xueling Zhang, Rocky Slavin, Xiaoyin Wang, Jianwei Niu:
Privacy Assurance for Android Augmented Reality Apps. PRDC 2019: 114-115 - [c46]Rodney Rodriguez, Xiaoyin Wang:
Static Analysis of File Manipulation Scripts. PRDC 2019: 118-119 - [c45]John Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward Detection of Access Control Models from Source Code via Word Embedding. SACMAT 2019: 103-112 - [i2]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How Reliable is the Crowdsourced Knowledge of Security Implementation? CoRR abs/1901.01327 (2019) - 2018
- [c44]Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
GUILeak: tracing privacy policy claims on user input data for Android applications. ICSE 2018: 37-47 - [c43]Eric Ruiz, Richard Avelar, Xiaoyin Wang:
Protecting remote controlling apps of smart-home-oriented IOT devices. ICSE (Companion Volume) 2018: 212-213 - [c42]Foyzul Hassan, Xiaoyin Wang:
HireBuild: an automatic approach to history-driven repair of build scripts. ICSE 2018: 1078-1089 - [c41]Ruru Yue, Zhe Gao, Na Meng, Yingfei Xiong, Xiaoyin Wang, J. David Morgenthaler:
Automatic Clone Recommendation for Refactoring Based on the Present and the Past. ICSME 2018: 115-126 - [c40]Foyzul Hassan, Rodney Rodriguez, Xiaoyin Wang:
RUDSEA: recommending updates of Dockerfiles via software environment analysis. ASE 2018: 796-801 - [c39]John Heaps, Rocky Slavin, Xiaoyin Wang:
Toward A Code Pattern Based Vulnerability Measurement Model. SACMAT 2018: 209-211 - [e2]Ming Li, Xiaoyin Wang, David Lo:
Proceedings of the 7th International Workshop on Software Mining, ASE 2018, Montpellier, France, September 3, 2018. ACM 2018 [contents] - [i1]Ruru Yue, Zhe Gao, Na Meng, Yingfei Xiong, Xiaoyin Wang, J. David Morgenthaler:
Automatic Clone Recommendation for Refactoring Based on the Present and the Past. CoRR abs/1807.11184 (2018) - 2017
- [j9]Tao Xie, Yuanfang Cai, Xuanzhe Liu, Xiaoyin Wang, Mithun P. Acharya, Marcelo d'Amorim, Xiaoxing Ma:
Preface. J. Comput. Sci. Technol. 32(6): 1057-1059 (2017) - [c38]Foyzul Hassan, Shaikh Mostafa, Edmund S. L. Lam, Xiaoyin Wang:
Automatic Building of Java Projects in Software Repositories: A Study on Feasibility and Challenges. ESEM 2017: 38-47 - [c37]Foyzul Hassan, Xiaoyin Wang:
Change-Aware Build Prediction Model for Stall Avoidance in Continuous Integration. ESEM 2017: 157-162 - [c36]Xue Qin, Smitha Holla, Liang Huang, Lymari Montijo, Dylan Aguirre, Xiaoyin Wang:
How Does Machine Translated User Interface Affect User Experience? A Study on Android Apps. ESEM 2017: 430-435 - [c35]Irving Rodriguez, Xiaoyin Wang:
An Empirical Study of Open Source Virtual Reality Software Projects. ESEM 2017: 474-475 - [c34]Hao Tang, Di Wang, Yingfei Xiong, Lingming Zhang, Xiaoyin Wang, Lu Zhang:
Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization. ESOP 2017: 880-908 - [c33]Shaikh Mostafa, Rodney Rodriguez, Xiaoyin Wang:
A study on behavioral backward incompatibility bugs in Java software libraries: poster. ICSE (Companion Volume) 2017: 127-129 - [c32]Foyzul Hassan, Xiaoyin Wang:
Mining readme files to support automatic building of Java projects in software repositories: poster. ICSE (Companion Volume) 2017: 277-279 - [c31]Shaikh Mostafa, Xiaoyin Wang, Tao Xie:
PerfRanker: prioritization of performance regression tests for collection-intensive software. ISSTA 2017: 23-34 - [c30]Shaikh Mostafa, Rodney Rodriguez, Xiaoyin Wang:
Experience paper: a study on behavioral backward incompatibilities of Java software libraries. ISSTA 2017: 215-225 - [c29]Shaikh Mostafa, Rodney Rodriguez, Xiaoyin Wang:
NetDroid: summarizing network behavior of Android apps for network code maintenance. ICPC 2017: 165-175 - [c28]Hao Zhong, Xiaoyin Wang:
Boosting complete-code tool for partial program. ASE 2017: 671-681 - [c27]Rodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang:
NTApps: A Network Traffic Analyzer of Android Applications. SACMAT 2017: 199-206 - 2016
- [c26]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. ICSE 2016: 25-36 - [c25]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
PVDetector: a detector of privacy-policy violations for Android apps. MOBILESoft 2016: 299-300 - [e1]Ming Li, Xiaoyin Wang, Lucia:
Proceedings of the 5th International Workshop on Software Mining, SoftwareMining@ASE 2016, Singapore, Singapore, September 3, 2016. ACM 2016, ISBN 978-1-4503-4511-8 [contents] - 2015
- [j8]Jie Zhang, Xiaoyin Wang, Dan Hao, Bing Xie, Lu Zhang, Hong Mei:
A survey on bug-report analysis. Sci. China Inf. Sci. 58(2): 1-24 (2015) - [c24]Xiaoyin Wang, Lingming Zhang, Philip Tanofsky:
Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE. ISSTA 2015: 199-210 - [c23]Hao Tang, Xiaoyin Wang, Lingming Zhang, Bing Xie, Lu Zhang, Hong Mei:
Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks. POPL 2015: 83-95 - [c22]Zeyad Alshaikh, Shaikh Mostafa, Xiaoyin Wang, Sen He:
A Empirical Study on the Status of Software Localization in Open Source Projects. SEKE 2015: 692-695 - 2014
- [j7]Hao Bai, Changzhen Hu, Xiao-chuan Jing, Ning Li, Xiaoyin Wang:
Approach for malware identification using dynamic behaviour and outcome triggering. IET Inf. Secur. 8(2): 140-151 (2014) - [j6]Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:
Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time. IEEE Trans. Software Eng. 40(8): 773-794 (2014) - [c21]Shaikh Mostafa, Xiaoyin Wang:
An Empirical Study on the Usage of Mocking Frameworks in Software Testing. QSIC 2014: 127-132 - 2013
- [j5]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis. IEEE Trans. Software Eng. 39(4): 516-536 (2013) - [c20]Xianglei Dang, Xiaoyin Wang, Dong Tong, Zichao Xie, Lingda Li, Keyi Wang:
An adaptive filtering mechanism for energy efficient data prefetching. ASP-DAC 2013: 332-337 - [c19]Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song:
NetworkProfiler: Towards automatic fingerprinting of Android apps. INFOCOM 2013: 809-817 - 2012
- [j4]Zhen-Hao Zhang, Xiaoyin Wang, Dong Tong, Jiangfang Yi, Junlin Lu, Keyi Wang:
Active Store Window: Enabling Far Store-Load Forwarding with Scalability and Complexity-Efficiency. J. Comput. Sci. Technol. 27(4): 769-780 (2012) - [c18]Xianglei Dang, Xiaoyin Wang, Dong Tong, Junlin Lu, Jiangfang Yi, Keyi Wang:
S/DC: A storage and energy efficient data prefetcher. DATE 2012: 461-466 - [c17]Zhen-Hao Zhang, Dong Tong, Xiaoyin Wang, Jiangfang Yi, Keyi Wang:
SOLE: Speculative one-cycle load execution with scalability, high-performance and energy-efficiency. ICCD 2012: 291-296 - [c16]Sichen Meng, Xiaoyin Wang, Lu Zhang, Hong Mei:
A history-based matching approach to identification of framework evolution. ICSE 2012: 353-363 - [c15]Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:
Can I clone this piece of code here? ASE 2012: 170-179 - [c14]Tao Huang, Qi Zhong, Xuetao Guan, Xiaoyin Wang, Xu Cheng, Keyi Wang:
Reducing last level cache pollution through OS-level software-controlled region-based partitioning. SAC 2012: 1779-1784 - [c13]Xiaoyin Wang, Lu Zhang, Tao Xie, Yingfei Xiong, Hong Mei:
Automating presentation changes in dynamic web applications via collaborative hybrid analysis. SIGSOFT FSE 2012: 16 - 2011
- [j3]Hongyu Zhang, Hee Beng Kuan Tan, Lu Zhang, Xi Lin, Xiaoyin Wang, Chun Zhang, Hong Mei:
Checking enforcement of integrity constraints in database applications based on code patterns. J. Syst. Softw. 84(12): 2253-2264 (2011) - [c12]David Lo, Hong Cheng, Xiaoyin Wang:
Bug Signature Minimization and Fusion. HASE 2011: 340-347 - [c11]Zichao Xie, Dong Tong, Mingkai Huang, Xiaoyin Wang, Qinqing Shi, Xu Cheng:
TAP prediction: Reusing conditional branch predictor for indirect branches with Target Address Pointers. ICCD 2011: 119-126 - [c10]Liucheng Guo, Jiangfang Yi, Liang Zhang, Xiaoyin Wang, Dong Tong:
CGA: Combining cluster analysis with genetic algorithm for regression suite reduction of microprocessors. SoCC 2011: 207-212 - 2010
- [j2]Dan Hao, Tao Xie, Lu Zhang, Xiaoyin Wang, Jiasu Sun, Hong Mei:
Test input reduction for result inspection to facilitate fault localization. Autom. Softw. Eng. 17(1): 5-31 (2010) - [j1]Xu Cheng, Xiaoyin Wang, Junlin Lu, Jiangfang Yi, Dong Tong, Xuetao Guan, Feng Liu, Xianhua Liu, Chun Yang, Yi Feng:
Research Progress of UniCore CPUs and PKUnity SoCs. J. Comput. Sci. Technol. 25(2): 200-213 (2010) - [c9]Chengnian Sun, David Lo, Xiaoyin Wang, Jing Jiang, Siau-Cheng Khoo:
A discriminative model approach for accurate duplicate bug report retrieval. ICSE (1) 2010: 45-54 - [c8]Yoonki Song, Xiaoyin Wang, Tao Xie, Lu Zhang, Hong Mei:
JDF: detecting duplicate bug reports in Jazz. ICSE (2) 2010: 315-316 - [c7]Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu:
Matching dependence-related queries in the system dependence graph. ASE 2010: 457-466 - [c6]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating need-to-translate constant strings in web applications. SIGSOFT FSE 2010: 87-96
2000 – 2009
- 2009
- [c5]Xiaoyin Wang, David Lo, Jing Jiang, Lu Zhang, Hong Mei:
Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpora. ACL/IJCNLP (2) 2009: 197-200 - [c4]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating need-to-translate constant strings for software internationalization. ICSE 2009: 353-363 - [c3]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
TranStrL: An automatic need-to-translate string locator for software internationalization. ICSE 2009: 555-558 - [c2]Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan:
Identifying bug signatures using discriminative graph mining. ISSTA 2009: 141-152 - 2008
- [c1]Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu Sun:
An approach to detecting duplicate bug reports using natural language and execution information. ICSE 2008: 461-470
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint