Jianling Sun

According to our database1, Jianling Sun authored at least 50 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Combined classifier for cross-project defect prediction: an extended empirical study.
Frontiers Comput. Sci., 2018

Fusing multi-abstraction vector space models for concern localization.
Empirical Software Engineering, 2018

Recommending frequently encountered bugs.
Proceedings of the 26th Conference on Program Comprehension, 2018

Unified Locally Linear Classifiers With Diversity-Promoting Anchor Points.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Collaborative topic regression for online recommender systems: an online and Bayesian approach.
Machine Learning, 2017

High-Impact Bug Report Identification with Imbalanced Learning Strategies.
J. Comput. Sci. Technol., 2017

TLEL: A two-layer ensemble learning approach for just-in-time defect prediction.
Information & Software Technology, 2017

Detecting similar repositories on GitHub.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Locally Linear Factorization Machines.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts.
J. Comput. Sci. Technol., 2016

D-Ocean: an unstructured data management system for data ocean environment.
Frontiers Comput. Sci., 2016

Combining Word Embedding with Information Retrieval to Recommend Similar Bug Reports.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Inferring Links between Concerns and Methods with Multi-abstraction Vector Space Model.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Condensing Class Diagrams With Minimal Manual Labeling Cost.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning Strategies.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Online Adaptive Passive-Aggressive Methods for Non-Negative Matrix Factorization and Its Applications.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Online ARIMA Algorithms for Time Series Prediction.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Piecewise statistic approximation based similarity measure for time series.
Knowl.-Based Syst., 2015

Multi-Factor Duplicate Question Detection in Stack Overflow.
J. Comput. Sci. Technol., 2015

Deep Learning for Just-in-Time Defect Prediction.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Combining Software Metrics and Text Features for Vulnerable File Prediction.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Piecewise Factorization for Time Series Classification.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2015

Piecewise Chebyshev Factorization based Nearest Neighbour Classification for Time Series.
Proceedings of the KDIR 2015, 2015

An Empirical Study of Classifier Combination for Cross-Project Defect Prediction.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

RAISE: A Whole Process Modeling Method for Unstructured Data Management.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

Are Features Equally Representative? A Feature-Centric Recommendation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Latent Tunnel Based Information Propagation in Microblog Networks.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Latent Factor Transition for Dynamic Collaborative Filtering.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

BOAT: an experimental platform for researchers to comparatively and reproducibly evaluate bug localization techniques.
Proceedings of the 36th International Conference on Software Engineering, 2014

Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks.
Proceedings of the Advances in Information Retrieval, 2014

2013
A Comparative Study of Supervised Learning Algorithms for Re-opened Bug Prediction.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

Information propagation in microblog networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Large scale microblog mining using distributed MB-LDA.
Proceedings of the 21st World Wide Web Conference, 2012

2011
An analytical performance model of MapReduce.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Minimal role mining method for Web service composition.
Journal of Zhejiang University - Science C, 2010

Inconsistency Resolution Method for RBAC Based Interoperation.
IEICE Transactions, 2010

Towards a Quality-Oriented Real-Time Web Crawler.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Performance Optimization for Composite Services in Multiple Networks Environment.
Proceedings of the 6th World Congress on Services, 2010

2009
A Field-Oriented Approach to Web Form Validation for Database-Isolated Rule.
Proceedings of the IEEE International Conference on Systems, 2009

Selective Regression Test for Access Control System Employing RBAC.
Proceedings of the Advances in Information Security and Assurance, 2009

Preprocessing the noise in legacy user permission assignment data for role mining - An industrial practice.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
Security Violation Detection for RBAC Based Interoperation in Distributed Environment.
IEICE Transactions, 2008

2007
Experience Report: Reengineering Standalone System into the Service-Partition Distributed Environment.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

2006
Reengineering standalone C++ legacy systems into the J2EE partition distributed environment.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2004
Human factors in extracting business rules from legacy systems.
Proceedings of the IEEE International Conference on Systems, 2004

Automatically identifying domain variables based on data dependence graph.
Proceedings of the IEEE International Conference on Systems, 2004

Business Rules Extraction from Large Legacy Systems.
Proceedings of the 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 2004

2003
Non-stop Internet model based on Circle Quorum System.
Proceedings of the IEEE International Conference on Systems, 2003

1997
Transparent Access to Persistent Objects in Object-Oriented Databases.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997


  Loading...