- Software Engineering Research
- Software System Performance and Reliability
- Software Reliability and Analysis Research
- Software Testing and Debugging Techniques
- Advanced Malware Detection Techniques
- Advanced Software Engineering Methodologies
- Advanced MRI Techniques and Applications
- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Advanced Data Storage Technologies
- Atomic and Subatomic Physics Research
- Adaptive Dynamic Programming Control
- Big Data Technologies and Applications
- Educational Games and Gamification
- Online Learning and Analytics
- Medical Imaging Techniques and Applications
- IoT and Edge/Fog Computing
- Web Application Security Vulnerabilities
- Cellular Automata and Applications
- Reinforcement Learning in Robotics
- Text and Document Classification Technologies
- Topic Modeling
- Teaching and Learning Programming
- Algorithms and Data Compression
- Human Mobility and Location-Based Analysis
Xidian University
2022-2024
Xi'an Jiaotong University
2016-2022
University of Hawaii System
2019
Beijing Jiaotong University
2007-2009
The main task of microservice extraction is to find which software entities (e.g., methods, classes) should be grouped together from existing monolithic as candidate microservices, responsible for specific functionalities and evolving independently. Current methods extract microservices by analyzing source code following the assumption that "classes with strong relation in same service", originates structure analysis. We 1) many program behaviors cannot explicitly reflected code, 2) at...
In recent years, Complex Network theory and graph algorithms have been proved to be effective in predicting software bugs. On the other hand, as a widely-used algorithm theory, k-core decomposition has used engineering domain identify key classes. Intuitively, classes are more likely buggy since they participate functions or interactions dependencies. However, there is no existing research uses analyze To fill this gap, we first use on Class Dependency Networks bug distribution from new...
The rise of containerization has led to the development container cloud technology, which offers deployment and management services. However, scheduling a large number containers efficiently remains significant challenge for service platforms. Traditional load prediction methods algorithms do not fully consider interdependencies between or fine-grained resource scheduling, leading poor utilization efficiency. To address these challenges, this paper proposes new model CNN-BiGRU-Attention...
Over the past decades, numerous approaches were proposed to help practitioner predict or locate defective files. These techniques often use syntactic dependency, history co-change relation, semantic similarity. The problem is that, it remains unclear whether these different dependency relations will present similar accuracy in terms of defect prediction and localization. In this paper, we our systematic investigation question from perspective software architecture. Considering files involved...
Understanding the dependencies among code entities is fundamental to many software analysis tools and techniques. However, with emergence of new programming languages paradigms, increasingly common practice writing systems in multiple languages, increasing popularity dynamic no existing framework can reliably extract this information. That is, exist accurately from written languages. To address problem, we have designed implemented Extensible eNtity Relation Extraction (ENRE) framework. ENRE...
Extract Method is one of the most frequently performed refactoring operations for decomposition large and complex methods, which can also be combined with other to remove a variety design flaws. Several tools have been proposed based on quantification extraction criteria. To best our knowledge, state-of-the-art related techniques broadly divided into two categories: first line non-machine-learning-based approaches built heuristics, second machine learning-based historical data. Most these...
Incorrect placement of methods within classes is a typical code smell called Feature Envy, which causes additional maintenance and cost during evolution. To remove this design flaw, several Move Method refactoring tools have been proposed. the best our knowledge, state-of-the-art related techniques can be broadly divided into two categories: first line non-machine-learning-based approaches built on software measurement, while selection thresholds metrics heavily rely expert knowledge. The...
Architecture degradation has a strong negative impact on software quality and can result in significant losses. Severe does not happen overnight. Software evolves continuously, through numerous issues, fixing bugs adding new features, architecture flaws emerge quietly largely unnoticed until they grow scope significance when the system becomes difficult to maintain. Developers are unaware of these or accumulating debt as focused their immediate tasks address individual issues. As...
In this paper, cascading failure is studied by coupled map lattice (CML) methods in preferential attachment community networks. It found that external perturbation R increasing with modularity Q growing simulation. particular, the large can hold off dynamic process Furthermore, different attack strategies also greatly affect process. particularly significant to control real
This paper presents a possible and reasonable explanation of cascading failure in small-world modular networks. We aim to introduce the CML's method interpret mechanism networks with different rewiring probability inner-module inter-module. The cascade propagation such initial external perturbation is simulated. Additionally, it found that threshold has close relationships modularity, mean node degree probability. Based on numerical simulation, we can see larger delay process. Furthermore,...
This paper studies the cascading failure on random networks and scale-free by introducing tolerance parameter of edge based coupled map lattices methods. The whole work focuses investigating some indices including number failed edges, dynamic capacity perturbation edge. In general, it assumes that is attributed to normal distribution in adopted simulations. By effectiveness networks, finds larger λ can more efficiently delay process for than networks. These results indicate be effectively...
This paper studies a simple asymmetrically evolved community network with combination of preferential attachment and random properties. An important issue about networks is to discover the different utility increments two nodes, where introduced investigate asymmetrical effect connecting nodes. On other hand, connection nodes in can be classified as belonging same or communities. The simulation results show that model reproduce power-law distribution , which obtained by using mean-field...
Test case prioritization is widely used in testing with the purpose of detecting faults as early possible. Most existing techniques exploit coverage to prioritize test cases based on hypothesis that a higher more likely catch bugs. Statement and function are two granularity. The former typically achieves better terms fault detection capability, while latter efficient because it incurs less overhead. In this paper we argue static information such statement may not be best criteria for guiding...
Instead of developing single-server software system for the powerful computers, is turning from large to multi-server such as distributed system. This change introduces a new challenge quality measurement, since current analysis methods could not observe and assess correlation among components on different nodes. In this paper, dynamic cohesion approach proposed We extend Calling Network model by differentiating deployed Two metrics are describe at component level, extending metric The...
The great influence of Bitcoin has promoted the rapid development blockchain-based digital currencies, especially altcoins, since 2013. However, most altcoins share similar source codes, resulting in concerns about code innovations. In this paper, an empirical study on existing is carried out to offer a thorough understanding various aspects associated with altcoin Firstly, we construct dataset including repository, GitHub fork relation, and market capitalization (cap). Then, analyze...
A 2D EPI based MRF acquisition and reconstruction method was developed in this study. shuffled order pseudo-randomized sampling pattern designed for k-space compressed time-resolved utilized faster reconstruction. T1 T2 T2* were simultaneously quantified, B0, B1+ proton density maps are generated.