Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SentiStrength-SE: Exploiting domain specificity for improved sentiment analysis in software engineering text
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
Detecting missing information in bug descriptions
Bug reports document unexpected software behaviors experienced by users. To be
effective, they should allow bug triagers to easily understand and reproduce the potential …
effective, they should allow bug triagers to easily understand and reproduce the potential …
Leveraging automated sentiment analysis in software engineering
Automated sentiment analysis in software engineering textual artifacts has long been
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
suffering from inaccuracies in those few tools available for the purpose. We conduct an in …
Discovering essential code elements in informal documentation
To access the knowledge contained in developer communication, such as forum posts, it is
useful to determine automatically the code elements referred to in the discussions. We …
useful to determine automatically the code elements referred to in the discussions. We …
Content classification of development emails
Emails related to the development of a software system contain information about design
choices and issues encountered during the development process. Exploiting the knowledge …
choices and issues encountered during the development process. Exploiting the knowledge …
Extracting development tasks to navigate software documentation
Knowledge management plays a central role in many software development organizations.
While much of the important technical knowledge can be captured in documentation, there …
While much of the important technical knowledge can be captured in documentation, there …
Too long; didn't watch! extracting relevant fragments from software development video tutorials
When knowledgeable colleagues are not available, developers resort to offline and online
resources, eg, tutorials, mailing lists, and Q&A websites. These, however, need to be found …
resources, eg, tutorials, mailing lists, and Q&A websites. These, however, need to be found …
Use at your own risk: The java unsafe api in the wild
Java is a safe language. Its runtime environment provides strong safety guarantees that any
Java application can rely on. Or so we think. We show that the runtime actually does not …
Java application can rely on. Or so we think. We show that the runtime actually does not …
Enriching compiler testing with real program from bug report
H Zhong - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Researchers have proposed various approaches to generate test programs. The state-of-the-
art approaches can be roughly divided into random-based and mutation-based approaches …
art approaches can be roughly divided into random-based and mutation-based approaches …
Automatic identification and classification of software development video tutorial fragments
Software development video tutorials have seen a steep increase in popularity in recent
years. Their main advantage is that they thoroughly illustrate how certain technologies …
years. Their main advantage is that they thoroughly illustrate how certain technologies …