Showing
1 - 8
results of
8
for search '
YANG, Xinli
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
YANG, Xinli
Showing
1 - 8
results of
8
for search '
YANG, Xinli
'
, query time: 0.16s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Condensing class diagrams with minimal manual labeling cost
by
YANG
,
Xinli
,
David LO
,
XIA, Xin
,
SUN, Jianling
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
2
TLEL: A two-layer ensemble learning approach for just-in-time defect prediction
by
YANG
,
Xinli
,
LO, David
,
XIA, Xin
,
SUN, Jianling
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
3
Deep Learning for Just-In-Time Defect Prediction
by
YANG
,
Xinli
,
David LO
,
XIA, Xin
,
ZHANG, Yun
,
SUN, Jianling
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
4
Combining word embedding with information retrieval to recommend similar bug reports
by
YANG
,
Xinli
,
LO, David
,
XIA, Xin
,
BAO, Lingfeng
,
SUN, Jianling
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
5
Automated identification of high impact bug reports leveraging imbalanced learning strategies
by
YANG
,
Xinli
,
David LO
,
HUANG, Qiao
,
XIA, Xin
,
SUN, Jianling
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
6
High impact bug report identification with imbalanced learning strategies
by
YANG
,
Xinli
,
LO, David
,
XIA, Xin
,
HUANG, Qiao
,
SUN, Jianling
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
7
What security questions do developers ask? A large-scale study of stack overflow posts
by
YANG
,
Xinli
,
David LO
,
XIA, Xin
,
WAN, Zhi-Yuan
,
SUN, Jian-Ling
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
8
Characterizing malicious Android apps by mining topic-specific data flow signatures
by
YANG
,
Xinli
,
LO, David
,
LI, Li
,
XIA, Xin
,
BISSYANDE, Tegawendé F.
,
KLEIN, Jacques
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...