FSTNet: Learning spatial–temporal correlations from fingerprints for indoor positioning
Q Ren, Y Wang, S Liu, X Lv - Ad Hoc Networks, 2023 - Elsevier
Due to the absence of a global positioning system (GPS) signal and pervasive deployment
of wireless local area networks (WLANs), Wireless Fidelity (WiFi) fingerprinting has been …
of wireless local area networks (WLANs), Wireless Fidelity (WiFi) fingerprinting has been …
[HTML][HTML] Best practices for evaluating IRFL approaches
Abstract Information retrieval fault localization (IRFL) is a popular research field and many
IRFL approaches have been proposed recently. Unfortunately, the evaluation of some of …
IRFL approaches have been proposed recently. Unfortunately, the evaluation of some of …
[PDF][PDF] Capturing the Long-Distance Dependency in the Control Flow Graph via Structural-Guided Attention for Bug Localization.
To alleviate the burden of software maintenance, bug localization, which aims to
automatically locate the buggy source files based on the bug report, has drawn significant …
automatically locate the buggy source files based on the bug report, has drawn significant …
An extensive replication study of the ABLoTS approach for bug localization
Bug localization is the task of recommending source code locations (typically files) that
contain the cause of a bug and hence need to be changed to fix the bug. Along these lines …
contain the cause of a bug and hence need to be changed to fix the bug. Along these lines …
On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization
One of the most important tasks related to managing bug reports is localizing the fault so that
a fix can be applied. As such, prior work has aimed to automate this task of bug localization …
a fix can be applied. As such, prior work has aimed to automate this task of bug localization …
Zero-shot program representation learning
Learning program representations has been the core prerequisite of code intelligence tasks
(eg, code search and code clone detection). The state-of-the-art pre-trained models such as …
(eg, code search and code clone detection). The state-of-the-art pre-trained models such as …
Mining API constraints from library and client to detect API misuses
H Zeng, J Chen, B Shen… - 2021 28th Asia-Pacific …, 2021 - ieeexplore.ieee.org
Calling Application Programming Interfaces (APIs) shall follow various constraints (eg, call
orders). If these con-straints are violated, API misuses are introduced to code, and such …
orders). If these con-straints are violated, API misuses are introduced to code, and such …
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining
Bugs and their fixes in the code evolution histories are important assets for many software
engineering tasks such as deriving new state-of-the-art automatic bug fixing techniques …
engineering tasks such as deriving new state-of-the-art automatic bug fixing techniques …
Zero-Shot Code Representation Learning via Prompt Tuning
Learning code representations has been the core prerequisite of many software engineering
tasks such as code clone detection and code generation. State-of-the-art program …
tasks such as code clone detection and code generation. State-of-the-art program …