共 68 条
[2]
Akiyama F., 1972, Information Processing 71 Proceedings of the IFIP Congress 1971 Volume 1, P353
[3]
Combining Deep Learning with Information Retrieval to Localize Buggy Files for Bug Reports
[J].
2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE),
2015,
:476-481
[4]
[Anonymous], 2014, P 11 WORK C MIN SOFT, DOI DOI 10.1145/2597073.2597075
[5]
[Anonymous], 2006, ISESE '06: Proceedings of the 5th International Symposium on Empirical Software Engineering. Volume II: Short Papers and Posters, DOI [10.1145/1159733.1159739, DOI 10.1145/1159733.1159739.]
[6]
Data mining techniques for building fault-proneness models in telecom Java']Java softwarea
[J].
ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS,
2007,
:215-+
[8]
Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models
[J].
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016),
2016,
:214-221
[10]
Feng Changyong, 2014, Shanghai Arch Psychiatry, V26, P105, DOI 10.3969/j.issn.1002-0829.2014.02.009