-
1
-
-
84865117869
-
-
Action-oriented concerns. http://www.eecis.udel.edu/~gibson/context/ action-oriented-concerns.txt.
-
Action-oriented Concerns
-
-
-
4
-
-
84870453858
-
-
Apache OpenNLP. http://incubator.apache.org/opennlp/.
-
Apache OpenNLP
-
-
-
5
-
-
84865119495
-
-
iReport. http://jasperforge.org/projects/ireport.
-
IReport
-
-
-
6
-
-
84865135760
-
-
jajuk. http://www.jajuk.info/index.php/Main-Page.
-
Jajuk
-
-
-
7
-
-
84865115276
-
-
javaHMO. http://www.javahmo.sourceforge.net/.
-
JavaHMO
-
-
-
8
-
-
84865111852
-
-
jBidWatcher. http://www.jbidwatcher.com/.
-
JBidWatcher
-
-
-
10
-
-
84865124485
-
-
The Linux Kernel. http://www.kernel.org.
-
-
-
-
11
-
-
84865124573
-
-
WordNet. Princeton University. http://wordnet.princeton.edu.
-
-
-
-
12
-
-
77956149674
-
Natural language parsing of program element names for concept extraction
-
S. L. Abebe and P. Tonella. Natural language parsing of program element names for concept extraction. ICPC, 2010.
-
(2010)
ICPC
-
-
Abebe, S.L.1
Tonella, P.2
-
14
-
-
84880822333
-
Extended gloss overlaps as a measure of semantic relatedness
-
S. Banerjee and T. Pedersen. Extended gloss overlaps as a measure of semantic relatedness. In IJCAI, 2003.
-
(2003)
IJCAI
-
-
Banerjee, S.1
Pedersen, T.2
-
15
-
-
84865135761
-
Improving identifier informativeness using part of speech information
-
D. Binkley, M. Hearn, and D. Lawrie. Improving identifier informativeness using part of speech information. MSR, 2011.
-
(2011)
MSR
-
-
Binkley, D.1
Hearn, M.2
Lawrie, D.3
-
16
-
-
0023454438
-
The vocabulary problem in human-system communication
-
G. W. Furnas, T. K. Landauer, L. M. Gomez, and S. T. Dumais. The vocabulary problem in human-system communication. Commun. ACM, 30, 1987.
-
(1987)
Commun. ACM
, vol.30
-
-
Furnas, G.W.1
Landauer, T.K.2
Gomez, L.M.3
Dumais, S.T.4
-
17
-
-
84865131622
-
Identifying security bug reports via text mining: An industrial case study
-
M. Gegick, P. Rotella, and T. Xie. Identifying security bug reports via text mining: An industrial case study. In MSR'10.
-
MSR'10
-
-
Gegick, M.1
Rotella, P.2
Xie, T.3
-
19
-
-
67651054001
-
AMAP: Automatically mining abbreviation expansions in programs to enhance software maintenance tools
-
E. Hill, Z. P. Fry, H. Boyd, G. Sridhara, Y. Novikova, L. Pollock, and K. Vijay-Shanker. AMAP: Automatically mining abbreviation expansions in programs to enhance software maintenance tools. MSR, 2008.
-
(2008)
MSR
-
-
Hill, E.1
Fry, Z.P.2
Boyd, H.3
Sridhara, G.4
Novikova, Y.5
Pollock, L.6
Vijay-Shanker, K.7
-
20
-
-
77949886473
-
Automatically capturing source code context of NL-queries for software maintenance and reuse
-
E. Hill, L. Pollock, and K. Vijay-Shanker. Automatically capturing source code context of NL-queries for software maintenance and reuse. ICSE, 2009.
-
(2009)
ICSE
-
-
Hill, E.1
Pollock, L.2
Vijay-Shanker, K.3
-
21
-
-
84865124486
-
Investigating how to effectively combine static concern location techniques
-
E. Hill, L. Pollock, and K. Vijay-Shanker. Investigating how to effectively combine static concern location techniques. SUITE, 2011.
-
(2011)
SUITE
-
-
Hill, E.1
Pollock, L.2
Vijay-Shanker, K.3
-
22
-
-
84855447262
-
Improving source code search with natural language phrasal representations of method signatures
-
E. Hill, L. L. Pollock, and K. Vijay-Shanker. Improving source code search with natural language phrasal representations of method signatures. In ASE, 2011.
-
(2011)
ASE
-
-
Hill, E.1
Pollock, L.L.2
Vijay-Shanker, K.3
-
23
-
-
33244490514
-
Using structural context to recommend source code examples
-
R. Holmes and G. C. Murphy. Using structural context to recommend source code examples. ICSE, 2005.
-
(2005)
ICSE
-
-
Holmes, R.1
Murphy, G.C.2
-
24
-
-
0141539417
-
Navigating and querying code without getting lost
-
D. Janzen and K. De Volder. Navigating and querying code without getting lost. AOSD, 2003.
-
(2003)
AOSD
-
-
Janzen, D.1
De Volder, K.2
-
25
-
-
85087282802
-
Semantic similarity based on corpus statistics and lexical taxonomy
-
J. J. Jiang and D. W. Conrath. Semantic similarity based on corpus statistics and lexical taxonomy. CoRR, 1997.
-
(1997)
CoRR
-
-
Jiang, J.J.1
Conrath, D.W.2
-
26
-
-
29244445934
-
Eliciting design requirements for maintenance-oriented IDEs: A detailed study of corrective and perfective maintenance tasks
-
A. J. Ko, H. Aung, and B. A. Myers. Eliciting design requirements for maintenance-oriented IDEs: a detailed study of corrective and perfective maintenance tasks. In ICSE, 2005.
-
(2005)
ICSE
-
-
Ko, A.J.1
Aung, H.2
Myers, B.A.3
-
27
-
-
83455214120
-
Expanding identifiers to normalize source code vocabulary
-
D. Lawrie and D. Binkley. Expanding identifiers to normalize source code vocabulary. In ICSM, 2011.
-
(2011)
ICSM
-
-
Lawrie, D.1
Binkley, D.2
-
29
-
-
34547229642
-
Have things changed now? - An empirical study of bug characteristics in modern open source software
-
Z. Li, L. Tan, X. Wang, S. Lu, Y. Zhou, and C. Zhai. Have things changed now? - An empirical study of bug characteristics in modern open source software. In ASID, 2006.
-
(2006)
ASID
-
-
Li, Z.1
Tan, L.2
Wang, X.3
Lu, S.4
Zhou, Y.5
Zhai, C.6
-
30
-
-
0005180705
-
An information-theoretic definition of similarity
-
D. Lin. An information-theoretic definition of similarity. ICML, 1998.
-
(1998)
ICML
-
-
Lin, D.1
-
31
-
-
84992162860
-
Discovery of inference rules for question-answering
-
D. Lin and P. Pantel. Discovery of inference rules for question-answering. Nat. Lang. Eng., 7, 2001.
-
(2001)
Nat. Lang. Eng.
, pp. 7
-
-
Lin, D.1
Pantel, P.2
-
32
-
-
70349906970
-
Assigning bug reports using a vocabulary-based expertise model of developers
-
D. Matter, A. Kuhn, and O. Nierstrasz. Assigning bug reports using a vocabulary-based expertise model of developers. In MSR, 2009.
-
(2009)
MSR
-
-
Matter, D.1
Kuhn, A.2
Nierstrasz, O.3
-
33
-
-
33845381193
-
Jiriss - An eclipse plug-in for source code exploration
-
D. Poshyvanyk, A. Marcus, and Y. Dong. Jiriss - an eclipse plug-in for source code exploration. In ICPC, 2006.
-
(2006)
ICPC
-
-
Poshyvanyk, D.1
Marcus, A.2
Dong, Y.3
-
34
-
-
34547271967
-
Source code exploration with google
-
D. Poshyvanyk, M. Petrenko, A. Marcus, X. Xie, and D. Liu. Source code exploration with google. In ICSM, 2006.
-
(2006)
ICSM
-
-
Poshyvanyk, D.1
Petrenko, M.2
Marcus, A.3
Xie, X.4
Liu, D.5
-
35
-
-
0003033112
-
Using information content to evaluate semantic similarity in a taxonomy
-
P. Resnik. Using information content to evaluate semantic similarity in a taxonomy. In IJCAI, 1995.
-
(1995)
IJCAI
-
-
Resnik, P.1
-
36
-
-
34548795892
-
Detection of duplicate defect reports using natural language processing
-
P. Runeson, M. Alexandersson, and O. Nyholm. Detection of duplicate defect reports using natural language processing. In ICSE, 2007.
-
(2007)
ICSE
-
-
Runeson, P.1
Alexandersson, M.2
Nyholm, O.3
-
38
-
-
36549019416
-
Using natural language program analysis to locate and understand action-oriented concerns
-
D. Shepherd, Z. P. Fry, E. Hill, L. Pollock, and K. Vijay-Shanker. Using natural language program analysis to locate and understand action-oriented concerns. In AOSD, 2007.
-
(2007)
AOSD
-
-
Shepherd, D.1
Fry, Z.P.2
Hill, E.3
Pollock, L.4
Vijay-Shanker, K.5
-
39
-
-
34247344154
-
Towards supporting on-demand virtual remodularization using program graphs
-
D. Shepherd, L. Pollock, and K. Vijay-Shanker. Towards supporting on-demand virtual remodularization using program graphs. AOSD, 2006.
-
(2006)
AOSD
-
-
Shepherd, D.1
Pollock, L.2
Vijay-Shanker, K.3
-
40
-
-
71149104752
-
Identifying word relations in software: A comparative study of semantic similarity tools
-
G. Sridhara, E. Hill, L. Pollock, and K. Vijay-Shanker. Identifying word relations in software: A comparative study of semantic similarity tools. ICPC, 2008.
-
(2008)
ICPC
-
-
Sridhara, G.1
Hill, E.2
Pollock, L.3
Vijay-Shanker, K.4
-
41
-
-
77954706970
-
A discriminative model approach for accurate duplicate bug report retrieval
-
C. Sun, D. Lo, X. Wang, J. Jiang, and S.-C. Khoo. A discriminative model approach for accurate duplicate bug report retrieval. In ICSE, 2010.
-
(2010)
ICSE
-
-
Sun, C.1
Lo, D.2
Wang, X.3
Jiang, J.4
Khoo, S.-C.5
-
43
-
-
79959897812
-
AComment: Mining annotations from comments and code to detect interrupt-related concurrency bugs
-
L. Tan, Y. Zhou, and Y. Padioleau. aComment: Mining annotations from comments and code to detect interrupt-related concurrency bugs. In ICSE, 2011.
-
(2011)
ICSE
-
-
Tan, L.1
Zhou, Y.2
Padioleau, Y.3
-
44
-
-
57349172049
-
An approach to detecting duplicate bug reports using natural language and execution information
-
X. Wang, L. Zhang, T. Xie, J. Anvik, and J. Sun. An approach to detecting duplicate bug reports using natural language and execution information. In ICSE, 2008.
-
(2008)
ICSE
-
-
Wang, X.1
Zhang, L.2
Xie, T.3
Anvik, J.4
Sun, J.5
-
45
-
-
85156194739
-
CosTriage: A Cost-Aware Triage Algorithm for Bug Reporting Systems
-
J. woo Park, M. woong Lee, J. Kim, S. won Hwang, and S. Kim. CosTriage: A Cost-Aware Triage Algorithm for Bug Reporting Systems. In AAAI, 2011.
-
(2011)
AAAI
-
-
Woo Park, J.1
Woong Lee, M.2
Kim, J.3
Won Hwang, S.4
Kim, S.5
-
46
-
-
85146676791
-
Verbs semantics and lexical selection
-
Z. Wu and M. Palmer. Verbs semantics and lexical selection. ACL, 1994.
-
(1994)
ACL
-
-
Wu, Z.1
Palmer, M.2
-
48
-
-
77952208003
-
Inferring resource specifications from natural language API documentation
-
H. Zhong, L. Zhang, T. Xie, and H. Mei. Inferring resource specifications from natural language API documentation. In ASE, 2009.
-
(2009)
ASE
-
-
Zhong, H.1
Zhang, L.2
Xie, T.3
Mei, H.4
|