Search
Search Results
-
Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction
Cross-project defect prediction (CPDP) refers to predicting defects in a target project using prediction models trained from historical data of other...
-
Automatic Requirement Dependency Extraction Based on Integrated Active Learning Strategies
Since requirement dependency extraction is a cognitively challenging and error-prone task, this paper proposes an automatic requirement dependency...
-
Application of Machine Learning Algorithms for Detection of Vulnerability in Web Applications
The Internet is a world-class network that connects systems and electronic devices. As per the report, 4.66 billion people in the world use the...
-
FindICI: Using machine learning to detect linguistic inconsistencies between code and natural language descriptions in infrastructure-as-code
Linguistic anti-patterns are recurring poor practices concerning inconsistencies in the naming, documentation, and implementation of an entity. They...
-
A Critical Review of Faults in Cloud Computing: Types, Detection, and Mitigation Schemes
The continuous rise in for demand services in large-scale distributed systems led to the development of cloud Computing (CC). Because it provides a... -
Alternative Data Augmentation for Industrial Monitoring Using Adversarial Learning
Visual inspection software has become a key factor in the manufacturing industry for quality control and process monitoring. Semantic segmentation... -
Attribute-aware multi-task recommendation
User-item rating interactions in the recommender system have a deep potential connection with the friend relationships in the social network. In...
-
Classification of jujube defects in small data sets based on transfer learning
Although convolutional neural networks have achieved success in the field of image classification, there are still challenges in the field of...
-
A survey on binary metaheuristic algorithms and their engineering applications
This article presents a comprehensively state-of-the-art investigation of the engineering applications utilized by binary metaheuristic algorithms....
-
Enhanced kinship verification analysis based on color and texture handcrafted techniques
Nowadays, kinship verification is an attractive research area within computer vision. It significantly affects applications in the real world, such...
-
An Empirical Study of User Story Quality and Its Impact on Open Source Project Performance
When software development teams apply Agile Software Development practices, they commonly express their requirements as User Stories. We aim to study... -
Leveraging side information as adjusting embedding to improve user representation for recommendations
Embedding is the cornerstone of recommendation system, and the embedding of users or items is directly related to the accuracy of recommendation....
-
Personalized recommendation system based on knowledge embedding and historical behavior
Collaborative filtering (CF) usually suffers from limited performance in recommendation systems due to the sparsity of user–item interactions and...
-
Industrial few-shot fractal object detection
In practical industrial visual inspection tasks, foreign object data are difficult to collect and accumulate, hence few-shot object detection has...
-
Foundations of Machine Learning for Software Engineering
Data is everywhere. When we build software, we generate not only code artefacts and documentation, but also tonnes of data about the development... -
A systematic review for class-imbalance in semi-supervised learning
This review aims to examine the state of the art of semi-supervised learning (SSL) techniques for addressing class imbalanced data. Class imbalance...
-
A novel approach for software vulnerability detection based on intelligent cognitive computing
Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new...
-
Evaluating Probabilistic Topic Models for Bug Triaging Tasks
During the software development process, occurring problems are collected and managed as bug reports using bug tracking systems. Usually, a bug... -
Network representation learning: a systematic literature review
Omnipresent network/graph data generally have the characteristics of nonlinearity, sparseness, dynamicity and heterogeneity, which bring numerous...
-
Detecting non-natural language artifacts for de-noising bug reports
Textual documents produced in the software engineering process are a popular target for natural language processing (NLP) and information retrieval...