- Advanced Software Engineering Methodologies
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Software Engineering Research
- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Model-Driven Software Engineering Techniques
- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Software Engineering Techniques and Practices
- Distributed systems and fault tolerance
- Caching and Content Delivery
- Business Process Modeling and Analysis
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Mobile Agent-Based Network Management
- Parallel Computing and Optimization Techniques
- Semantic Web and Ontologies
- Security and Verification in Computing
- Web Application Security Vulnerabilities
- Peer-to-Peer Network Technologies
- Web Data Mining and Analysis
- Green IT and Sustainability
- Advanced Data Storage Technologies
- Control Systems and Identification
Peking University
2016-2025
Shanghai Jiao Tong University
2014-2025
First Affiliated Hospital of GuangXi Medical University
2025
Guangxi Medical University
2025
Beijing Institute of Technology
2017-2024
Software (Spain)
2024
Beijing Institute of Big Data Research
2024
Institute of Software
2011-2021
PLA Academy of Military Science
2021
Anhui University of Technology
2021
Many researchers propose that, not only functional but also non-functional properties, known as quality of service (QoS), should be taken into consideration when consumers select services. Consumers need to make prediction on unused web services before selecting. Usually, this is based other consumers' experiences. Being aware different QoS experiences consumers, paper proposes a collaborative filtering approach making similarity mining and from Experimental results demonstrate that can...
Indoor human tracking is fundamental to many real-world applications such as security surveillance, behavioral analysis, and elderly care. Previous solutions usually require dedicated device being carried by the target, which inconvenient or even infeasible in scenarios care break-ins. However, compared with device-based tracking, device-free particularly challenging because much weaker reflection signals are employed for tracking. The problem becomes more difficult commodity Wi-Fi devices,...
Device-free passive indoor localization is playing a critical role in many applications such as elderly care, intrusion detection, smart home, etc. However, existing device-free systems either suffer from labor-intensive offline training or require dedicated special-purpose devices. To address the challenges, we present our system named MaTrack, which implemented on commodity off-the-shelf Intel 5300 Wi-Fi cards. MaTrack proposes novel Dynamic-MUSIC method to detect subtle reflection signals...
To deal with post-release bugs, many software projects set up public bug repositories for users all over the world to report bugs that they have encountered. Recently, researchers proposed various information retrieval based approaches localizing faults on reports. In these approaches, source files are processed as single units, where noise in large may affect accuracy of fault localization. Furthermore, reports often contain stack-trace information, but existing treat this plain text....
Typically, software libraries provide API documentation, through which developers can learn how to use correctly. However, may still write code inconsistent with documentation and thus introduce bugs, as existing research shows that many are reluctant carefully read documentation. To find those researchers have proposed various detection approaches based on known specifications. mine specifications, been proposed, most of them rely client code. Consequently, these mining would fail...
The metamodel techniques and model transformation provide a standard way to represent transform data, especially the software artifacts in development. However, after is applied, source target usually co-exist evolve independently. How propagate modifications across models different formats still remains as an open problem.
Test case prioritization is used in regression testing to schedule the execution order of test cases so as expose faults earlier testing. Over past few years, many techniques have been proposed literature. Most these require data on dynamic form code coverage information for cases. However, collection has several associated drawbacks including cost increases and reduction precision. In this paper, we propose an approach prioritizing absence that operates Java programs tested under JUnit...
Techniques for test-case prioritization re-order test cases to increase their rate of fault detection. When there is a fixed time budget that does not allow the execution all cases, time-aware techniques may achieve better detection than traditional prioritization. In this paper, we propose novel approach using integer linear programming. To evaluate our approach, performed experiments on two subject programs involving four an based genetic algorithms, and The empirical results indicate...
Due to the expensiveness of compiling and executing a large number mutants, it is usually necessary select subset mutants substitute whole set generated in mutation testing analysis. Most existing research on mutant selection focused operator-based selection, i.e., determining sufficient operators selecting with only this operators. Recently, researchers began leverage statistical analysis determine using execution information mutants. However, whether selected these sophisticated techniques...
In recent years, researchers have intensively investigated various topics in test-case prioritization, which aims to re-order test cases increase the rate of fault detection during regression testing. The total and additional prioritization strategies, prioritize based on numbers elements covered per test, (not-yet-covered) are two widely-adopted generic strategies used for such prioritization. This paper proposes a basic model an extended that unify strategy strategy. Our models yield...
Computation offloading is a promising way to improve the performance as well reducing battery power consumption of smartphone application by executing some parts on remote server. Supporting such capability not easy for developers due (1) correctness: code, e.g., that GPS, gravity, and other sensors, can run only so have identify which cannot be offloaded; (2) effectiveness: reduced execution time must greater than network delay caused computation need calculate are worth offloading; (3)...
Metamorphic testing (MT) is an effective methodology for those so-called ``non-testable'' programs (e.g., scientific programs), where it sometimes very difficult testers to know whether the outputs are correct. In metamorphic testing, relations (MRs) (which specify how particular changes input of program under test would change output) play essential role. However, may typically have obtain MRs manually.
In recent years, researchers have intensively investigated various topics in test-case prioritization, which aims to re-order test cases increase the rate of fault detection during regression testing. The total and additional prioritization strategies, prioritize based on numbers elements covered per test, (not-yet-covered) are two widely-adopted generic strategies used for such prioritization. This paper proposes a basic model an extended that unify strategy strategy. Our models yield...
Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based typically use one of two overall strategies: total strategy or an additional . These strategies prioritize based on number code (or code-related) elements covered per and (not yet covered) case, respectively. In this article, we present unified approach encompasses both strategies. Our includes models ( basic extended )...
Feature models have been widely adopted in software reuse to organize the requirements of a set similar applications domain/product line. However, most feature-oriented methods, construction feature heavily depends on domain analysts' personal understanding, and work constructing from original sample is often tedious ineffective. This paper proposes semiautomatic approach based clustering, which automates activities identification, organization variability modeling great extent. The...
Mutation testing has been used to assess and improve the quality of test inputs. Generating inputs achieve high mutant-killing ratios is important in mutation testing. However, existing test-generation techniques do not provide effective support for killing mutants In this paper, we propose a general approach, called PexMutator, using Dynamic Symbolic Execution (DSE), recent technique. Based on set transformation rules, PexMutator transforms program under an instrumented meta-program that...
Monitoring plays a significant role in improving the quality of service cloud computing. It helps clouds to scale resource utilization adaptively, identify defects services for developers, and discover usage patterns numerous end users. However, due heterogeneity components complexity arising from wealth runtime information, monitoring faces many new challenges. In this paper, we propose model (RMCM), which denotes an intuitive representation running by focusing on common concerns. Raw data...
The Web has undergone a tremendous change toward highly user-centric environment. Millions of users can participate and collaborate for their own interests benefits. Services Computing paradigm together with the proliferation services have created great potential opportunities users, also known as service consumers, to produce value-added by means discovery composition. In this paper, we propose an efficient approach facilitating consumer on discovering services. First, analyze requirements...
To meet the needs of computing in Internet environment, Internetware software paradigm provides a set technologies that support development applications with characteristics are autonomous, cooperative, situational, evolvable, emergent, and trustworthy.
Recurring bugs are common in software systems, especially client programs that depend on the same framework. Existing research uses human-written templates, and is limited to certain types of bugs. In this paper, we propose a fully automatic approach fixing recurring crash via analyzing Q&A sites. By extracting queries from traces retrieving list pages, analyze pages generate edit scripts. Then apply these scripts target source code filter out incorrect patches. The empirical results show...
API libraries provide thousands of APIs, and are essential in daily programming tasks. To understand their usages, it has long been a hot research topic to mine specifications that formally define legal usages for APIs. Furthermore, researchers working on many other topics Although the APIs is intensively studied, fundamental questions still open. For example, answers open questions, such as which format can naturally case, largely unknown. We notice not concerned with concrete specific but...