[1] |
NI Chao,LIU Wangshu,CHEN Xiang,et al.A cluster based feature selection method for cross-project software defect prediction[J].Journal of Computer Science and Technology,2017,32(6):1090-1107.
|
[2] |
RYU D,JIANG J I,BAIK J.A hybrid instance selection using nearest-neighbor for cross-project defect prediction[J].Journal of Computer Science and Technology,2015,30(5):969-980.
|
[3] |
XUAN Jifeng,JIANG He,REN Zhiwei,et al.Automatic BUG triage using semi-supervised text classifica-tion[C]//Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering.Washington D.C.,USA:IEEE Press,2010:1-9.
|
[4] |
LAWRENCE F L,SHARMA S K,SISODIA M S.Network intrusion detection by using feature reduction technique[J].International Journal of Advanced Research in Computer Science and Electronics Engineering,2012,1(1):27-32.
|
[5] |
STRATE J D,LAPLANTE P A.A literature review of research in software defect reporting[J].IEEE Transactions on Reliability,2013,62(2):444-454.
|
[6] |
WANG Jie,PLATANIOTIS K,LU J,et al.Kernel quadratic discriminant analysis for small sample size problem[J].Pattern Recognition,2008,41(5):1528-1538.
|
[7] |
MATTER D,KUHN A,NIERSTRASZ O.Assigning BUG reports using a vocabulary-based expertise model of developers[C]//Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories.Washington D.C.,USA:IEEE Press,2009:131-140.
|
[8] |
ZIOU D,HAMRI T,BOUTEMEDJET S.A hybrid probabilistic framework for content-based image retrieval with feature weighting[J].Pattern Recognition,2009,42(7):1511-1519.
|
[9] |
MENZIES T,MARCUS A.Automated severity assessment of software defect reports[C]//Proceedings of IEEE International Conference on Software.New York,USA:ACM Press,2015:1-12.
|
[10] |
LAMKAN A,DEMEYER S,SOETENS Q D,et al.Comparing mining algorithms for predicting the severity of a reported BUG[C]//Proceedings of European Conference on Software.New York,USA:ACM Press,2011:1-8.
|
[11] |
黄小亮,郁抒思,关佶红.基于LDA主题模型的软件缺陷分派方法[J].计算机工程,2011,37(21):46-48.
|
[12] |
ZHANG Tao,CHEN Jiachi,YANG G,et al.Towards more accurate severity prediction and fixer recommendation of software BUGs[J].Journal of Systems and Software,2016,117(C):166-184.
|
[13] |
SHOKRIPOUR R,KASIRUN Z M,ZAMANI S,et al.Automatic BUG assignment using information extraction methods[C]//Proceedings of International Conference on Advanced Computer Science Applications and Technologies.Washington D.C.,USA:IEEE Press,2012:144-149.
|
[14] |
SHOKRIPOUR R,ANVIK J,KASIRUN Z M,et al.Why so complicated? simple term filtering and weighting for location-based BUG report assignment recommendation[C]//Proceedings of the 10th International Workshopon Mining Software Repositories.Washington D.C.,USA:IEEE Press,2013:2-11.
|
[15] |
LIU Wenjie,WANG Shanshan,CHEN Xin,et al.Predicting the severity of BUG reports based on feature selection[J].International Journal of Software Engineering and Knowledge Engineering,2018,28(4):537-558.
|
[16] |
张肖,王利明.一种半监督继承学习软件缺陷预测方法[J].小型微型计算机系统,2018,39(10):2138-2145.
|
[17] |
史小婉,马于涛.一种基于文本分类和评分机制的软件缺陷分配方法[J].计算机科学,2018,45(11):193-198.
|
[18] |
任胜兵,廖湘荡.基于代价敏感支持向量机的软件缺陷预测研究[J].计算机工程与科学,2018,40(10):1787-1795.
|
[19] |
路永和,李焰锋.改进TF-IDF算法的文本特征项权值计算方法[J].图书情报工作,2013,57(3):90-95.
|
[20] |
孙小兵,周澄,杨辉,等.面向软件安全性缺陷的开发者推荐方法[J].软件学报,2018,29(8):2294-2305.
|