Computer Science ›› 2022, Vol. 49 ›› Issue (7): 212-219.doi: 10.11896/jsjkx.210500075
• Artificial Intelligence • Previous Articles Next Articles
XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang
CLC Number:
[1]GABRIELE B,BARBARA R.A large-scale empirical study on self-admitted technical debt[C]//Proceedings of the 13th International Workshop.IEEE,2016:315-326. [2]CUNNINGHAM W.The WyCash portfolio management system[J].Acm Sigplan Oops Messenger,1992,4(2):29-30. [3]HUANG C,XU K H,ZHENG S,et al.Software self-admitted technical debt identification approach based on cross oversampling[J].Journal of Jiangsu University of Science and Techno-logy Natural Science Edition,2020,182(5):55-60. [4]POTDAR A,SHIHAB E.An Exploratory Study on Self-Admitted Technical Debt[C]//2014 IEEE International Conference on Software Maintenance and Evolution.IEEE,2014:91-100. [5]JERNEJ F,VILI P.Enhanced Feature Selection Using WordEmbeddings for Self-Admitted Technical Debt Identification[C]//Proceedings of the 2018 44th Euromicro Conference on Software Engineering and Advanced Applications(SEAA).IEEE Computer Society,2018:230-233. [6]SIERRA G,SHIHAB E,KAMEI Y.A survey of self-admitted technical debt[J].Journal of Systems and Software,2019,152:70-82. [7]ZAMPETTI F,SEREBRENIK A,PENTA M.Was Self-Admitted Technical Debt Removal a Real Removal?An In-Depth Perspective[C]//IEEE/ACM International Conference on Mining Software Repositories.IEEE Computer Society,2018:526-536. [8]AVERSANO L,IAMMARINO M,CARAPELLA M,et al.On the Relationship between Self-Admitted Technical Debt Remo-vals and Technical Debt Measures[J].Algorithms,2020,13(7):1-16. [9]HUANG Q,SHIHAB E,XIA X,et al.Identifying self-admitted technical debt in open source projects using text mining[J].Empirical Software Engineering,2018,23(1):418-451. [10]MALDONADO E D S,SHIHAB E,TSANTALIS N.UsingNatural Language Processing to Automatically Detect Self-Admitted Technical Debt[J].IEEE Transactions on Software Engineering,2017,43(11):1044-1062. [11]MALDONADO E D S,SHIHAB E.Detecting and quantifyingdifferent types of self-admitted technical Debt[C]//IEEE International Workshop on Managing Technical Debt.IEEE Compu-ter Society,2015:9-15. [12]WEHAIBI S,SHIHAB E,GUERROUJ L.Examining the Impact of Self-Admitted Technical Debt on Software Quality[C]//Proceedings of the 2016 IEEE 23rd International Conference on Software Analysis,Evolution,and Reengineering(SANER).IEEE,2016:179-188. [13]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[J].arXiv:1301.3781,2013. [14]HOCHREITER S,SCHMIDHUBER J.Long Short-Term Me-mory[J].Neural Computation,1997,9(8):1735-1780. [15]BI L,HU G,RAZA M M,et al.A Gated Recurrent Units(GRU)-Based Model for Early Detection of Soybean Sudden Death Syndrome through Time-Series Satellite Imagery[J].Remote Sensing,2020,12(21):1-20. [16]MIAO J,DUAN Y X,ZHANG Y Q,et al.Method for Extracting Event Trigger Words Based on the CNN-BiGRU Model[J].Computer Engineering,2021,47(9):69-74,83. [17]CHEN J J,PENG B Z,WU P Z.Malicious Code DetectionMethod Based on Dynamic Behavior and Machine Learning[J].Computer Engineering,2021,47(3):166-173. [18]SCHUSTER M,PALIWAL K K.Bidirectional recurrent neural networks[J].IEEE Transactions on Signal Processing,1997,45(11):2673-2681. [19]PENG Z,WEI S,TIAN J,et al.Attention-Based BidirectionalLong Short-Term Memory Networks for Relation Classification[C]//Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics.Association for Computational Linguistics,2016:207-212. [20]WANG H,SHI J C,ZHANG Z W.Text semantic relation extraction of LSTM based on attention mechanism[J].Application Research of Computers,2018,319(5):143-146,166. [21]REN X X,XING Z C,XIA X,et al.Neural Network-based Detection of Self-Admitted Technical Debt:From Performance to Explainability[J].ACM Transactions on Software Engineering and Methodology,2019,28(3):1-45. [22]MAIPRADIT R,TREUDE C,HATA H,et al.Wait for it:identifying “On-Hold” self-admitted technical debt[J].Empirical Software Engineering,2020,25(5):3770-3798. [23]XIAO L,CAI Y,KAZMAN R,et al.Identifying and quantifying architectural debt[C]//IEEE/ACM 38th IEEE International Conference on Software Engineering.2016:488-498. [24]KIRK B S,PETERSON J W,STOGNER R H,et al.libMesh:a C++ library for parallel adaptive mesh refinement/coarsening simulations[J].Engineering with Computers,2006,22(3/4):237-254. |
[1] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[2] | DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145. |
[3] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[4] | XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182. |
[5] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[6] | WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[9] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[10] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[11] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[12] | PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247. |
[13] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
[14] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[15] | XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141. |
|