-
2
-
-
37849002654
-
Mining API patterns as partial orders from source code: From usage scenarios to specifications
-
Acharya, M., Xie, T., Pei, J., Xu, J.: Mining API patterns as partial orders from source code: From usage scenarios to specifications. In: Proc. 6th ESEC/FSE, pp. 25-34 (2007)
-
(2007)
Proc. 6th ESEC/FSE
, pp. 25-34
-
-
Acharya, M.1
Xie, T.2
Pei, J.3
Xu, J.4
-
3
-
-
29144521934
-
Synthesis of interface specifications for Java classes
-
Alur, R., Černý, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for Java classes. In: Proc. 32nd POPL, pp. 98-109 (2005)
-
(2005)
Proc. 32nd POPL
, pp. 98-109
-
-
Alur, R.1
Černý, P.2
Madhusudan, P.3
Nam, W.4
-
4
-
-
0031382855
-
Processing natural language requirements
-
IEEE Computer Society, Los Alamitos
-
Ambriola, V., Gervasi, V.: Processing natural language requirements. In: Proc. 12th ASE, pp. 36-45. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proc. 12th ASE
, pp. 36-45
-
-
Ambriola, V.1
Gervasi, V.2
-
5
-
-
0036038253
-
Mining specifications
-
Ammons, G., Bodík, R., Larus, J.: Mining specifications. In: Proc. 29th POPL, pp. 4-16 (2002) (Pubitemid 35009026)
-
(2002)
Conference Record of the Annual ACM Symposium on Principles of Programming Languages
, pp. 4-16
-
-
Ammons, G.1
Bodik, R.2
Larus, J.R.3
-
6
-
-
34247101896
-
Who should fix this bug?
-
Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
-
Anvik, J., Hiew, L., Murphy, G.: Who should fix this bug? In: Proc. 28th ICSE, pp. 361-370 (2006) (Pubitemid 46600933)
-
(2006)
Proceedings - International Conference on Software Engineering
, vol.2006
, pp. 361-370
-
-
Anvik, J.1
Hiew, L.2
Murphy, G.C.3
-
7
-
-
0344160958
-
Uncovering hidden contracts: The. NET example
-
Arnout, K., Meyer, B.: Uncovering hidden contracts: The. NET example. Computer 36(11), 48-55 (2003)
-
(2003)
Computer
, vol.36
, Issue.11
, pp. 48-55
-
-
Arnout, K.1
Meyer, B.2
-
8
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
Baum, L., Petrie, T., Soules, G., Weiss, N.: A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann. Math. Stat. 164-171 (1970)
-
(1970)
Ann. Math. Stat
, pp. 164-171
-
-
Baum, L.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
9
-
-
57449104790
-
Automatic documentation inference for exceptions
-
Buse, R., Weimer, W.: Automatic documentation inference for exceptions. In: Proc. ISSTA, pp. 273-282 (2008)
-
(2008)
Proc. ISSTA
, pp. 273-282
-
-
Buse, R.1
Weimer, W.2
-
10
-
-
78649789321
-
Automatically documenting program changes
-
Buse, R., Weimer, W.: Automatically documenting program changes. In: Proc. 26th ASE, pp. 33-42 (2010)
-
(2010)
Proc. 26th ASE
, pp. 33-42
-
-
Buse, R.1
Weimer, W.2
-
11
-
-
35048891065
-
MUC-7 named entity task definition
-
Chinchor, N.: MUC-7 named entity task definition. In: Proc. 7th MUC (1997)
-
(1997)
Proc. 7th MUC
-
-
Chinchor, N.1
-
13
-
-
80052966480
-
A linguistic-engineering approach to large-scale requirements management
-
Dag, J., Regnell, B., Gervasi, V., Brinkkemper, S.: A linguistic-engineering approach to large-scale requirements management. IEEE Softw. 3, 3 (2005)
-
(2005)
IEEE Softw
, vol.3
, pp. 3
-
-
Dag, J.1
Regnell, B.2
Gervasi, V.3
Brinkkemper, S.4
-
14
-
-
63549093081
-
Enabling static analysis for partial Java programs
-
Dagenais, B., Hendren, L. J.: Enabling static analysis for partial Java programs. In: Proc. 23rd OOPSLA, pp. 313-328 (2008)
-
(2008)
Proc. 23rd OOPSLA
, pp. 313-328
-
-
Dagenais, B.1
Hendren, L.J.2
-
15
-
-
70350000172
-
Reading the documentation of invoked API functions in program comprehension
-
Dekel, U., Herbsleb, J. D.: Reading the documentation of invoked API functions in program comprehension. In: Proc. 17th ICPC, pp. 168-177 (2009a)
-
(2009)
Proc. 17th ICPC
, pp. 168-177
-
-
Dekel, U.1
Herbsleb, J.D.2
-
16
-
-
77949897678
-
Improving API documentation usability with knowledge pushing
-
Dekel, U., Herbsleb, J. D.: Improving API documentation usability with knowledge pushing. In: Proc. 31st ICSE, pp. 320-330 (2009b)
-
(2009)
Proc. 31st ICSE
, pp. 320-330
-
-
Dekel, U.1
Herbsleb, J.D.2
-
17
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
DOI 10.1145/502059.502041
-
Engler, D., Chen, D., Chou, A.: Bugs as inconsistent behavior: A general approach to inferring errors in systems code. In: Proc. 18th SOSP, pp. 57-72 (2001) (Pubitemid 33612605)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
18
-
-
11144236225
-
Applications of linguistic techniques for use case analysis
-
DOI 10.1007/s00766-003-0174-0
-
Fantechi, A., Gnesi, S., Lami, G., Maccari, A.: Applications of linguistic techniques for use case analysis. Requir. Eng. 8(3), 161-170 (2003) (Pubitemid 37142650)
-
(2003)
Requir. Eng.
, vol.8
, Issue.3
, pp. 161-170
-
-
Fantechi, A.1
Gnesi, S.2
Lami, G.3
Maccari, A.4
-
20
-
-
40249094758
-
Analysing source code: Looking for useful verb-direct object pairs in all the right places
-
DOI 10.1049/iet-sen:20070112
-
Fry, Z., Shepherd, D., Hill, E., Pollock, L., Vijay-Shanker, K.: Analysing source code: looking for useful verb-direct object pairs in all the right places. IET Softw. 2(1), 27-36 (2008) (Pubitemid 351333181)
-
(2008)
IET Software
, vol.2
, Issue.1
, pp. 27-36
-
-
Fry, Z.P.1
Shepherd, D.2
Hill, E.3
Pollock, L.4
Vijay-Shanker, K.5
-
21
-
-
57349134461
-
Symbolic mining of temporal specifications
-
Gabel, M., Su, Z.: Symbolic mining of temporal specifications. In: Proc. 13th ICSE, pp. 51-60 (2008)
-
(2008)
Proc. 13th ICSE
, pp. 51-60
-
-
Gabel, M.1
Su, Z.2
-
22
-
-
77954716357
-
Online inference and enforcement of temporal properties
-
Gabel, M., Su, Z.: Online inference and enforcement of temporal properties. In: Proc. 32nd ICSE, pp. 15-24 (2010)
-
(2010)
Proc. 32nd ICSE
, pp. 15-24
-
-
Gabel, M.1
Su, Z.2
-
23
-
-
77953738151
-
Identifying security bug reports via text mining: An industrial case study
-
Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: An industrial case study. In: Proc. 7th MSR, pp. 11-20 (2010)
-
(2010)
Proc. 7th MSR
, pp. 11-20
-
-
Gegick, M.1
Rotella, P.2
Xie, T.3
-
25
-
-
0031259336
-
AbStFinder, a Prototype Natural Language Text Abstraction Finder for Use in Requirements Elicitation
-
Goldin, L., Berry, D.: AbstFinder, a prototype natural language text abstraction finder for use in requirements elicitation. Autom. Softw. Eng. 4(4), 375-412 (1997) (Pubitemid 127507512)
-
(1997)
Automated Software Engineering
, vol.4
, Issue.4
, pp. 375-412
-
-
Goldin, L.1
Berry, D.M.2
-
26
-
-
31744449087
-
Deriving object typestates in the presence of inter-object references
-
Gowri, M., Grothoff, C., Chandra, S.: Deriving object typestates in the presence of inter-object references. In: Proc. 20th OOPSLA, pp. 77-96 (2005)
-
(2005)
Proc. 20th OOPSLA
, pp. 77-96
-
-
Gowri, M.1
Grothoff, C.2
Chandra, S.3
-
27
-
-
32044447691
-
Advancing candidate link generation for requirements tracing: The study of methods
-
DOI 10.1109/TSE.2006.3
-
Hayes, J., Dekhtyar, A., Sundaram, S.: Advancing candidate link generation for requirements tracing: The study of methods. IEEE Trans. Softw. Eng. 32(1), 4-19 (2006) (Pubitemid 43193062)
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.1
, pp. 4-19
-
-
Hayes, J.H.1
Dekhtyar, A.2
Sundaram, S.K.3
-
28
-
-
4544236510
-
A tool for writing and debugging algebraic specifications
-
Henkel, J., Diwan, A.: A tool for writing and debugging algebraic specifications. In: Proc. 26th ICSE, pp. 449-458 (2004)
-
(2004)
Proc. 26th ICSE
, pp. 449-458
-
-
Henkel, J.1
Diwan, A.2
-
29
-
-
0141754926
-
MUC-7 coreference task definition
-
Hirschman, L.: MUC-7 coreference task definition. In: Proc. 7th MUC (1997)
-
(1997)
Proc. 7th MUC
-
-
Hirschman, L.1
-
30
-
-
77952247526
-
Tool support for crosscutting concerns of API documentation
-
Horie, M., Chiba, S.: Tool support for crosscutting concerns of API documentation. In: Proc. 8th AOSD, pp. 97-108 (2010)
-
(2010)
Proc. 8th AOSD
, pp. 97-108
-
-
Horie, M.1
Chiba, S.2
-
33
-
-
77949344285
-
Improving bug triage with bug tossing graphs
-
ACM, New York
-
Jeong, G., Kim, S., Zimmermann, T.: Improving bug triage with bug tossing graphs. In: Proc. 7th ESEC/FSE, pp. 111-120. ACM, New York (2009)
-
(2009)
Proc. 7th ESEC/FSE
, pp. 111-120
-
-
Jeong, G.1
Kim, S.2
Zimmermann, T.3
-
34
-
-
47949090649
-
Scenarios: Identifying missing objects and actions by means of computational linguistics
-
Kof, L.: Scenarios: Identifying missing objects and actions by means of computational linguistics. In: Proc. 15th RE, pp. 121-130 (2007)
-
(2007)
Proc. 15th RE
, pp. 121-130
-
-
Kof, L.1
-
35
-
-
35448945212
-
From uncertainty to belief: Inferring the specification within
-
Kremenek, T., Twohey, P., Back, G., Ng, A., Engler, D.: From uncertainty to belief: Inferring the specification within. In: Proc. 7th OSDI, pp. 259-272 (2006)
-
(2006)
Proc. 7th OSDI
, pp. 259-272
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
36
-
-
79959890862
-
Mining parametric specifications
-
Lee, C., Chen, F., Rosu, G.: Mining parametric specifications. In: Proc. 33rd ICSE, pp. 591-600 (2011)
-
(2011)
Proc. 33rd ICSE
, pp. 591-600
-
-
Lee, C.1
Chen, F.2
Rosu, G.3
-
38
-
-
31744448669
-
Dynamine: Finding common error patterns by mining software revision histories
-
Livshits, V., Zimmermann, T.: Dynamine: Finding common error patterns by mining software revision histories. In: Proc. ESEC/FSE, pp. 31-40 (2005)
-
(2005)
Proc. ESEC/FSE
, pp. 31-40
-
-
Livshits, V.1
Zimmermann, T.2
-
39
-
-
34547367487
-
SMArTIC: Towards building an accurate, robust and scalable specification miner
-
DOI 10.1145/1181775.1181808, 1181808, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
-
Lo, D., Khoo, S.: SMArTIC: towards building an accurate, robust and scalable specification miner. In: Proc. 14th FSE, pp. 265-275 (2006) (Pubitemid 47129403)
-
(2006)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 265-275
-
-
Lo, D.1
Khoo, S.-C.2
-
40
-
-
78649799481
-
Scenario-based and value-based specification mining: Better together
-
Lo, D., Maoz, S.: Scenario-based and value-based specification mining: better together. In: Proc. 25th ASE, pp. 387-396 (2010)
-
(2010)
Proc. 25th ASE
, pp. 387-396
-
-
Lo, D.1
Maoz, S.2
-
41
-
-
77957773135
-
Learning from mistakes: A comprehensive study on real world concurrency bug characteristics
-
DOI 10.1145/1346281.1346323, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
Lu, S., Park, S., Seo, E., Zhou, Y.: Learning from mistakes - a comprehensive study on real world concurrency bug characteristics. In: Proc. 13th ASPLOS, pp. 329-339 (2008) (Pubitemid 351585418)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 329-339
-
-
Lu, S.1
Park, S.2
Seo, E.3
Zhou, Y.4
-
42
-
-
38549178356
-
Generating Natural Language specifications from UML class diagrams
-
DOI 10.1007/s00766-007-0054-0
-
Meziane, F., Athanasakis, N., Ananiadou, S.: Generating natural language specifications from UML class diagrams. Requir. Eng. 13(1), 1-18 (2008) (Pubitemid 351146800)
-
(2008)
Requirements Engineering
, vol.13
, Issue.1
, pp. 1-18
-
-
Meziane, F.1
Athanasakis, N.2
Ananiadou, S.3
-
43
-
-
84912555096
-
Named entity recognition without gazetteers
-
Mikheev, A., Moens, M., Grover, C.: Named entity recognition without gazetteers. In: Proc. 9th EACL, pp. 1-8 (1999)
-
(1999)
Proc. 9th EACL
, pp. 1-8
-
-
Mikheev, A.1
Moens, M.2
Grover, C.3
-
44
-
-
84889604549
-
Why don't people read the manual
-
Novick, D., Ward, K.: Why don't people read the manual. In: Proc. 24th SIGDOC, pp. 11-18 (2006)
-
(2006)
Proc. 24th SIGDOC
, pp. 11-18
-
-
Novick, D.1
Ward, K.2
-
46
-
-
77949880220
-
Listening to programmers-taxonomies and characteristics of comments in operating system code
-
Padioleau, Y., Tan, L., Zhou, Y.: Listening to programmers-Taxonomies and characteristics of comments in operating system code. In: Proc. 31st ICSE, pp. 331-341 (2009)
-
(2009)
Proc. 31st ICSE
, pp. 331-341
-
-
Padioleau, Y.1
Tan, L.2
Zhou, Y.3
-
47
-
-
40449141478
-
Oracle 9i JDBC developer's guide and reference
-
March
-
Perry, E., Sanko, M., Wright, B., Pfaeffle, T.: Oracle 9i JDBC developer's guide and reference. Technical report, March 2002. http://www.oracle.com
-
(2002)
Technical Report
-
-
Perry, E.1
Sanko, M.2
Wright, B.3
Pfaeffle, T.4
-
49
-
-
34548783828
-
Path-sensitive inference of function precedence protocols
-
Ramanathan, M., Grama, A., Jagannathan, S.: Path-sensitive inference of function precedence protocols. In: Proc. 29th ICSE, pp. 240-250 (2007)
-
(2007)
Proc. 29th ICSE
, pp. 240-250
-
-
Ramanathan, M.1
Grama, A.2
Jagannathan, S.3
-
51
-
-
79953175945
-
A field study of API learning obstacles
-
doi:10.1007/s10664-010-9150-8
-
Robillard, M. P., DeLine, R.: A field study of API learning obstacles. Empir. Softw. Eng. (2011). doi:10.1007/s10664-010-9150-8
-
(2011)
Empir. Softw. Eng
-
-
Robillard, M.P.1
DeLine, R.2
-
52
-
-
34548795892
-
Detection of duplicate defect reports using natural language processing
-
Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: Proc. 29th ICSE, pp. 499-510 (2007)
-
(2007)
Proc. 29th ICSE
, pp. 499-510
-
-
Runeson, P.1
Alexandersson, M.2
Nyholm, O.3
-
53
-
-
0036356416
-
REVERE: Support for requirements synthesis from documents
-
Sawyer, P., Rayson, P., Garside, R.: REVERE: Support for requirements synthesis from documents. Inf. Syst. Front. 4(3), 343-353 (2002)
-
(2002)
Inf. Syst. Front
, vol.4
, Issue.3
, pp. 343-353
-
-
Sawyer, P.1
Rayson, P.2
Garside, R.3
-
54
-
-
34548279855
-
Using natural language program analysis to locate and understand action-oriented concerns
-
DOI 10.1145/1218563.1218587, 6th International Conference on Aspect-Oriented Software Development - Research Track Proceedings
-
Shepherd, D., Fry, Z., Hill, E., Pollock, L., Vijay-Shanker, K.: Using natural language program analysis to locate and understand action-oriented concerns. In: Proc. 6th AOSD, pp. 212-224 (2007) (Pubitemid 47326581)
-
(2007)
ACM International Conference Proceeding Series
, vol.208
, pp. 212-224
-
-
Shepherd, D.1
Fry, Z.P.2
Hill, E.3
Pollock, L.4
Vijay-Shanker, K.5
-
55
-
-
79953197237
-
An empirical study on evolution of API documentation
-
Shi, L., Zhong, H., Xie, T., Li, M.: An empirical study on evolution of API documentation. In: Proc. FASE, pp. 416-431 (2011)
-
(2011)
Proc. FASE
, pp. 416-431
-
-
Shi, L.1
Zhong, H.2
Xie, T.3
Li, M.4
-
56
-
-
78649762925
-
Towards automatically generating summary comments for Java methods
-
Sridhara, G., Hill, E., Muppaneni, D., Pollock, L. L., Vijay-Shanker, K.: Towards automatically generating summary comments for Java methods. In: Proc. 25th ASE, pp. 43-52 (2010)
-
(2010)
Proc. 25th ASE
, pp. 43-52
-
-
Sridhara, G.1
Hill, E.2
Muppaneni, D.3
Pollock, L.L.4
Vijay-Shanker, K.5
-
57
-
-
73449149016
-
Improving API documentation using API usage information
-
Stylos, J., Faulring, A., Yang, Z., Myers, B.: Improving API documentation using API usage information. In: Proc. IVL/HCC, pp. 119-126 (2009)
-
(2009)
Proc. IVL/HCC
, pp. 119-126
-
-
Stylos, J.1
Faulring, A.2
Yang, Z.3
Myers, B.4
-
59
-
-
56249134583
-
Spot web: Detecting framework hotspots and coldspots via mining open source code on the web
-
Thummalapenta, S., Xie, T.: SpotWeb: Detecting framework hotspots and coldspots via mining open source code on the web. In: Proc. 23rd ASE, pp. 327-336 (2008)
-
(2008)
Proc. 23rd ASE
, pp. 327-336
-
-
Thummalapenta, S.1
Xie, T.2
-
61
-
-
77952148651
-
Alattin: Mining alternative patterns for detecting neglected conditions
-
Thummalapenta, S., Xie, T.: Alattin: Mining alternative patterns for detecting neglected conditions. In: Proc. 24th Automated Software Engineering, pp. 283-294 (2009b)
-
(2009)
Proc. 24th Automated Software Engineering
, pp. 283-294
-
-
Thummalapenta, S.1
Xie, T.2
-
62
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
Viterbi, A.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. Inf. Theory 13(2), 260-269 (1967)
-
(1967)
IEEE Trans. Inf. Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.1
-
63
-
-
57349172049
-
An approach to detecting duplicate bug reports using natural language and execution information
-
Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An approach to detecting duplicate bug reports using natural language and execution information. In: Proc. 30th ICSE, pp. 461-470 (2008)
-
(2008)
Proc. 30th ICSE
, pp. 461-470
-
-
Wang, X.1
Zhang, L.2
Xie, T.3
Anvik, J.4
Sun, J.5
-
64
-
-
37849020292
-
Detecting object usage anomalies
-
Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. In: Proc. ESEC/FSE, pp. 35-44 (2007)
-
(2007)
Proc. ESEC/FSE
, pp. 35-44
-
-
Wasylkowski, A.1
Zeller, A.2
Lindig, C.3
-
65
-
-
24644493674
-
Mining temporal specifications for error detection
-
Tools and Algorithms for the Construction and Analysis of Systems - 11th Int. Conference, TACAS 2005, held as part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2005, Proc.
-
Weimer, W., Necula, G.: Mining temporal specifications for error detection. In: Proc. TACAS, pp. 461-476 (2005) (Pubitemid 41273759)
-
(2005)
Lecture Notes in Computer Science
, vol.3440
, pp. 461-476
-
-
Weimer, W.1
Necula, G.C.2
-
66
-
-
0036983315
-
Automatic extraction of object-oriented component interfaces
-
Whaley, J., Martin, M., Lam, M.: Automatic extraction of object-oriented component interfaces. In: Proc. ISSTA, pp. 218-228 (2002)
-
(2002)
Proc. ISSTA
, pp. 218-228
-
-
Whaley, J.1
Martin, M.2
Lam, M.3
-
67
-
-
24344496977
-
Automatic mining of source code repositories to improve bug finding techniques
-
DOI 10.1109/TSE.2005.63
-
Williams, C., Hollingsworth, J.: Automatic mining of source code repositories to improve bug finding techniques. IEEE Trans. Softw. Eng. 31(6), 466-480 (2005) (Pubitemid 41245069)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.6
, pp. 466-480
-
-
Williams, C.C.1
Hollingsworth, J.K.2
-
68
-
-
77954721417
-
Supporting developers with natural language queries
-
Würsch, M., Ghezzi, G., Reif, G., Gall, H.: Supporting developers with natural language queries. In: Proc. 32nd ICSE, pp. 165-174 (2010)
-
(2010)
Proc. 32nd ICSE
, pp. 165-174
-
-
Würsch, M.1
Ghezzi, G.2
Reif, G.3
Gall, H.4
-
69
-
-
67650714764
-
Precise memory leak detection for Java software using container profiling
-
Xu, G., Rountev, A.: Precise memory leak detection for Java software using container profiling. In: Proc. 30th ICSE, pp. 151-160 (2008)
-
(2008)
Proc. 30th ICSE
, pp. 151-160
-
-
Xu, G.1
Rountev, A.2
-
70
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
-
Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: mining temporal API rules from imperfect traces. In: Proc. 28th ICSE, pp. 282-291 (2006) (Pubitemid 46600925)
-
(2006)
Proceedings - International Conference on Software Engineering
, vol.2006
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
71
-
-
67650540857
-
Early filtering of polluting method calls for mining temporal specifications
-
Zhong, H., Zhang, L., Mei, H.: Early filtering of polluting method calls for mining temporal specifications. In: Proc. 15th APSEC, pp. 9-16 (2008a)
-
(2008)
Proc. 15th APSEC
, pp. 9-16
-
-
Zhong, H.1
Zhang, L.2
Mei, H.3
-
72
-
-
67650555465
-
Inferring specifications of object oriented APIs from API source code
-
Zhong, H., Zhang, L., Mei, H.: Inferring specifications of object oriented APIs from API source code. In: Proc. 15th APSEC, pp. 221-228 (2008b)
-
(2008)
Proc. 15th APSEC
, pp. 221-228
-
-
Zhong, H.1
Zhang, L.2
Mei, H.3
-
73
-
-
69949134981
-
MAPO: Mining and recommending API usage patterns
-
Zhong, H., Xie, T., Zhang, L., Pei, J., Mei, H.: MAPO: Mining and recommending API usage patterns. In: Proc. 23rd ECOOP, pp. 318-343 (2009a)
-
(2009)
Proc. 23rd ECOOP
, pp. 318-343
-
-
Zhong, H.1
Xie, T.2
Zhang, L.3
Pei, J.4
Mei, H.5
-
74
-
-
77952208003
-
Inferring resource specifications from natural language API documentation
-
Zhong, H., Zhang, L., Xie, T., Mei, H.: Inferring resource specifications from natural language API documentation. In: Proc. 24th ASE, pp. 307-318 (2009b)
-
(2009)
Proc. 24th ASE
, pp. 307-318
-
-
Zhong, H.1
Zhang, L.2
Xie, T.3
Mei, H.4
-
75
-
-
85147755528
-
Named entity recognition using an HMM-based chunk tagger
-
Zhou, G., Su, J.: Named entity recognition using an HMM-based chunk tagger. In: Proc. 40th ACL, pp. 473-480 (2001)
-
(2001)
Proc. 40th ACL
, pp. 473-480
-
-
Zhou, G.1
Su, J.2
|