137 results on '"Bixin Li"'
Search Results
2. Graph-Based Salient Class Classification in Commits.
3. OTCP-ISVM: Online Test Case Prioritization Based on Incremental Support Vector Machine.
4. Test Case Generation for Access Control Based on UML Activity Diagram.
5. CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph.
6. Evaluating the Resilience of Software Architecture Based on Minimal Path.
7. Answering Why-Not Questions on GeoSPARQL Queries.
8. Can PoW Consensus Protocol Resist the Whale Attack?
9. A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately.
10. Model Checking the Safety of Raft Leader Election Algorithm.
11. PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively.
12. SolDetector: Detect Defects Based on Knowledge Graph of Solidity Smart Contract.
13. ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively.
14. A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents.
15. A Co-evolutionary Method Between Architecture and Code.
16. An Empirical Investigation into the Effects of Code Comments on Issue Resolution.
17. An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
18. Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis.
19. HiRec: API Recommendation using Hierarchical Context.
20. Empirical Study of Hybrid Optimization Strategy for Evolutionary Testing.
21. Identify MVC architectural pattern based on ontology.
22. A Multilevel Analysis Method for Architecture Erosion.
23. Recover and Optimize Software Architecture Based on Source Code and Directory Hierarchies (S).
24. Identify Blackboard Pattern Based on Ontology.
25. Analyzing Software Architecture Evolvability Based on Multiple Architectural Attributes Measurements.
26. Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN.
27. Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context.
28. Software Multiple-Level Change Detection Based on Two-Step MPAT Matching.
29. A Framework for CPS Modeling and Verification Based on dL.
30. Verifying CPS for Self-Adaptability.
31. Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution.
32. Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study.
33. Evaluating Software Architecture Evolution Using Performance Simulation.
34. Verifying CPS Using DDL.
35. A Model to Evaluate the Credibility of Service in Cloud Computing Environment.
36. Test Case Selection for Data Flow Based Regression Testing of BPEL Composite Services.
37. Trust analysis of composite service evolution.
38. Cloud-Based Infrastructure for Mobile Testing as a Service.
39. Experience report: How do techniques, programs, and tests impact automated program repair?
40. A Model-Based Framework to Support Complexity Analysis Service for Regression Testing of Component-Based Software.
41. CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization.
42. An empirical analysis of the co-evolution of schema and code in database applications.
43. Monitoring Web Services for Conformance.
44. A User-Oriented Trust Model for Web Services.
45. ELCD: an efficient online cycle detection technique for pointer analysis.
46. Testing Configurable Architectures For Component-Based Software Using an Incremental Approach.
47. WAVE-CIA: a novel CIA approach based on call graph mining.
48. A Unified Modeling and Verifying Framework for Cyber Physical Systems.
49. Mining Call Graph for Change Impact Analysis.
50. Using FCA-based Change Impact Analysis for Regression Testing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.