共 53 条
[1]
A Large-Scale Comparative Evaluation of IR-Based Tools for Bug Localization
[J].
2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR,
2020,
:21-31
[2]
[Anonymous], 2011, P ACM SIGSOFT S EURO
[3]
Anvik J., 2006, Proceedings of the 28th International Conference on Software Engineering, ICSE '06, P361, DOI [10.1145/1134285.1134336, DOI 10.1145/1134285.1134336]
[4]
Anvik John., 2005, P 2005 OOPSLA WORKSH, P35, DOI [10.1145/1117696, DOI 10.1145/1117696.1117704]
[5]
Arong, 2014, PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), P51, DOI 10.1109/PIC.2014.6972294
[6]
Mitigating Cyber Security Attacks by being Aware of Vulnerabilities and Bugs
[J].
2017 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW),
2017,
:222-225
[7]
Bachmann A, 2009, IWPSE-EVOL 09: ERCIM WORKSHOP ON SOFTWARE EVOLUTION (EVOL) AND INTERNATIONAL WORKSHOP ON PRINCIPLES OF SOFTWARE EVOLUTION (IWPSE), P119
[8]
Baeza-Yates R., 1999, Modern information retrieval, V463
[9]
Duplicate Bug Reports Considered Harmful ... Really?
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE,
2008,
:337-345
[10]
Carver J.C., 2010, 1 INT WORKSH REPL EM