The growing dependence of software projects on external libraries has
ge...
The increasing reliance of software projects on third-party libraries ha...
Recent advances in automated vulnerability detection have achieved poten...
Learning and remembering to use APIs are difficult. Several techniques h...
Attacks against computer systems exploiting software vulnerabilities can...
Vehicle arrival time prediction has been studied widely. With the emerge...
Technology for open-ended language generation, a key application of
arti...
In this paper, we consider the IoT data discovery problem in very large ...
In this paper, we present a Generative Adversarial Network (GAN) machine...
Software fault localization is one of the most expensive, tedious, and
t...
In this paper, we consider the IoT data discovery problem in very large ...
Software fault localization is one of the most expensive, tedious, and
t...
Approximate inference in deep Bayesian networks exhibits a dilemma of ho...
Relational regularized autoencoder (RAE) is a framework to learn the
dis...
Autonomous navigation of steel bridge inspection robots is essential for...
In a buggy configurable system, configuration-dependent bugs cause the
f...
Automatic code completion helps improve developers' productivity in thei...
Unexpected interactions among features induce most bugs in a configurabl...
Statistical machine translation (SMT) is a fast-growing sub-field of
com...
In modern Web technology, JavaScript (JS) code plays an important role. ...