Di Cui

ORCID: 0000-0003-2859-9003
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Advanced Software Engineering Methodologies
  • Advanced MRI Techniques and Applications
  • Complex Network Analysis Techniques
  • Opinion Dynamics and Social Influence
  • Advanced Data Storage Technologies
  • Atomic and Subatomic Physics Research
  • Adaptive Dynamic Programming Control
  • Big Data Technologies and Applications
  • Educational Games and Gamification
  • Online Learning and Analytics
  • Medical Imaging Techniques and Applications
  • IoT and Edge/Fog Computing
  • Web Application Security Vulnerabilities
  • Cellular Automata and Applications
  • Reinforcement Learning in Robotics
  • Text and Document Classification Technologies
  • Topic Modeling
  • Teaching and Learning Programming
  • Algorithms and Data Compression
  • Human Mobility and Location-Based Analysis

Xidian University
2022-2024

Xi'an Jiaotong University
2016-2022

University of Hawaii System
2019

Beijing Jiaotong University
2007-2009

The main task of microservice extraction is to find which software entities (e.g., methods, classes) should be grouped together from existing monolithic as candidate microservices, responsible for specific functionalities and evolving independently. Current methods extract microservices by analyzing source code following the assumption that "classes with strong relation in same service", originates structure analysis. We 1) many program behaviors cannot explicitly reflected code, 2) at...

10.1109/icws.2018.00034 article EN 2018-07-01

In recent years, Complex Network theory and graph algorithms have been proved to be effective in predicting software bugs. On the other hand, as a widely-used algorithm theory, k-core decomposition has used engineering domain identify key classes. Intuitively, classes are more likely buggy since they participate functions or interactions dependencies. However, there is no existing research uses analyze To fill this gap, we first use on Class Dependency Networks bug distribution from new...

10.1109/tse.2019.2892959 article EN IEEE Transactions on Software Engineering 2019-01-14

The rise of containerization has led to the development container cloud technology, which offers deployment and management services. However, scheduling a large number containers efficiently remains significant challenge for service platforms. Traditional load prediction methods algorithms do not fully consider interdependencies between or fine-grained resource scheduling, leading poor utilization efficiency. To address these challenges, this paper proposes new model CNN-BiGRU-Attention...

10.1155/2023/5959223 article EN cc-by International Journal of Intelligent Systems 2023-07-17

Over the past decades, numerous approaches were proposed to help practitioner predict or locate defective files. These techniques often use syntactic dependency, history co-change relation, semantic similarity. The problem is that, it remains unclear whether these different dependency relations will present similar accuracy in terms of defect prediction and localization. In this paper, we our systematic investigation question from perspective software architecture. Considering files involved...

10.1109/icse.2019.00069 article EN 2019-05-01

Understanding the dependencies among code entities is fundamental to many software analysis tools and techniques. However, with emergence of new programming languages paradigms, increasingly common practice writing systems in multiple languages, increasing popularity dynamic no existing framework can reliably extract this information. That is, exist accurately from written languages. To address problem, we have designed implemented Extensible eNtity Relation Extraction (ENRE) framework. ENRE...

10.1109/icse-companion.2019.00040 article EN 2019-05-01

Extract Method is one of the most frequently performed refactoring operations for decomposition large and complex methods, which can also be combined with other to remove a variety design flaws. Several tools have been proposed based on quantification extraction criteria. To best our knowledge, state-of-the-art related techniques broadly divided into two categories: first line non-machine-learning-based approaches built heuristics, second machine learning-based historical data. Most these...

10.1109/icpc58990.2023.00034 article EN 2023-05-01

Incorrect placement of methods within classes is a typical code smell called Feature Envy, which causes additional maintenance and cost during evolution. To remove this design flaw, several Move Method refactoring tools have been proposed. the best our knowledge, state-of-the-art related techniques can be broadly divided into two categories: first line non-machine-learning-based approaches built on software measurement, while selection thresholds metrics heavily rely expert knowledge. The...

10.1109/icsme55016.2022.00033 preprint EN 2022-10-01

Architecture degradation has a strong negative impact on software quality and can result in significant losses. Severe does not happen overnight. Software evolves continuously, through numerous issues, fixing bugs adding new features, architecture flaws emerge quietly largely unnoticed until they grow scope significance when the system becomes difficult to maintain. Developers are unaware of these or accumulating debt as focused their immediate tasks address individual issues. As...

10.1109/ase.2019.00095 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019-11-01

In this paper, cascading failure is studied by coupled map lattice (CML) methods in preferential attachment community networks. It found that external perturbation R increasing with modularity Q growing simulation. particular, the large can hold off dynamic process Furthermore, different attack strategies also greatly affect process. particularly significant to control real

10.1088/1674-1056/17/5/028 article EN Chinese Physics B 2008-05-01

This paper presents a possible and reasonable explanation of cascading failure in small-world modular networks. We aim to introduce the CML's method interpret mechanism networks with different rewiring probability inner-module inter-module. The cascade propagation such initial external perturbation is simulated. Additionally, it found that threshold has close relationships modularity, mean node degree probability. Based on numerical simulation, we can see larger delay process. Furthermore,...

10.1142/s0217984907014474 article EN Modern Physics Letters B 2007-12-24

This paper studies the cascading failure on random networks and scale-free by introducing tolerance parameter of edge based coupled map lattices methods. The whole work focuses investigating some indices including number failed edges, dynamic capacity perturbation edge. In general, it assumes that is attributed to normal distribution in adopted simulations. By effectiveness networks, finds larger λ can more efficiently delay process for than networks. These results indicate be effectively...

10.1088/1674-1056/18/3/024 article EN Chinese Physics B 2009-03-01

This paper studies a simple asymmetrically evolved community network with combination of preferential attachment and random properties. An important issue about networks is to discover the different utility increments two nodes, where introduced investigate asymmetrical effect connecting nodes. On other hand, connection nodes in can be classified as belonging same or communities. The simulation results show that model reproduce power-law distribution , which obtained by using mean-field...

10.1088/1674-1056/18/2/022 article EN Chinese Physics B 2009-02-01

Test case prioritization is widely used in testing with the purpose of detecting faults as early possible. Most existing techniques exploit coverage to prioritize test cases based on hypothesis that a higher more likely catch bugs. Statement and function are two granularity. The former typically achieves better terms fault detection capability, while latter efficient because it incurs less overhead. In this paper we argue static information such statement may not be best criteria for guiding...

10.1109/compsac.2018.00039 article EN 2018-06-22

Instead of developing single-server software system for the powerful computers, is turning from large to multi-server such as distributed system. This change introduces a new challenge quality measurement, since current analysis methods could not observe and assess correlation among components on different nodes. In this paper, dynamic cohesion approach proposed We extend Calling Network model by differentiating deployed Two metrics are describe at component level, extending metric The...

10.1145/2975954.2975956 article EN 2016-08-29

The great influence of Bitcoin has promoted the rapid development blockchain-based digital currencies, especially altcoins, since 2013. However, most altcoins share similar source codes, resulting in concerns about code innovations. In this paper, an empirical study on existing is carried out to offer a thorough understanding various aspects associated with altcoin Firstly, we construct dataset including repository, GitHub fork relation, and market capitalization (cap). Then, analyze...

10.1145/3379597.3387439 preprint EN 2020-06-29

A 2D EPI based MRF acquisition and reconstruction method was developed in this study. shuffled order pseudo-randomized sampling pattern designed for k-space compressed time-resolved utilized faster reconstruction. T1 T2 T2* were simultaneously quantified, B0, B1+ proton density maps are generated.

10.58530/2023/2190 article EN Proceedings on CD-ROM - International Society for Magnetic Resonance in Medicine. Scientific Meeting and Exhibition/Proceedings of the International Society for Magnetic Resonance in Medicine, Scientific Meeting and Exhibition 2024-08-14
Coming Soon ...