Lin Tan

According to our database1, Lin Tan authored at least 59 papers between 1994 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Heterogeneous Defect Prediction.
IEEE Trans. Software Eng., 2018

Measuring the Impact of Code Dependencies on Software Architecture Recovery Techniques.
IEEE Trans. Software Eng., 2018

Preliminary results on the minimal polynomial of modified de Bruijn sequences.
Finite Fields and Their Applications, 2018

On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files.
Empirical Software Engineering, 2018

Towards extracting web API specifications from documentation.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Designing bug detection rules for fewer false alarms.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Research on Security of Public Security Iris Application.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
Better test cases for better automated program repair.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

QTEP: quality-aware test case prioritization.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Gatekeepers to broadening participation in engineering investigating variation across high schools comparing who could go versus who does go into engineering.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Detecting sensitive data disclosure via bi-directional text correlation analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Bugram: bug detection with n-gram language models.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Automatic model generation from documentation for Java API functions.
Proceedings of the 38th International Conference on Software Engineering, 2016

Automatically learning semantic features for defect prediction.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
CloCom: Mining existing source code for automatic comment generation.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

A Survey and Application of Indoor Positioning Based on Scene Classification Optimization.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Analysis for Large Passenger Flow Area and Monitoring Technology.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Online Defect Prediction for Imbalanced Data.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Comparing Software Architecture Recovery Techniques Using Accurate Dependencies.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
SWordNet: Inferring semantically related words from software context.
Empirical Software Engineering, 2014

Bug characteristics in open source software.
Empirical Software Engineering, 2014

Correlations between bugginess and time-based commit characteristics.
Empirical Software Engineering, 2014

Finding patterns in static analysis alerts: improving actionable alert ranking.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

em-SPADE: a compiler extension for checking rules extracted from processor specifications.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2014

On the Recursive Construction of MDS Matrices for Lightweight Cryptography.
Proceedings of the Information Security Practice and Experience, 2014

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Discovering, reporting, and fixing performance bugs.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

AutoComment: Mining question and answer sites for automatic comment generation.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Personalized defect prediction.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

R2Fix: Automatically Generating Bug Fixes from Bug Reports.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Internet of Things for Special Materials Transportation Vehicles.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
A CMOS Voltage Reference Based on Mutual Compensation of Vtn and Vtp.
IEEE Trans. on Circuits and Systems, 2012

Distribution of one-error linear complexity of binary sequences for arbitrary prime period.
J. Systems Science & Complexity, 2012

Asymptotic analysis on the normalized k-error linear complexity of binary sequences.
Des. Codes Cryptography, 2012

Remarks on the generalized cyclotomic sequences of length $$2p^{m}$$.
Appl. Algebra Eng. Commun. Comput., 2012

Inferring semantically related words from software context.
Proceedings of the 9th IEEE Working Conference of Mining Software Repositories, 2012

@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Generating precise dependencies for large software.
Proceedings of the 4th International Workshop on Managing Technical Debt, 2012

2011
Do time of day and developer experience affect commit bugginess.
Proceedings of the 8th International Working Conference on Mining Software Repositories, 2011

aComment: mining annotations from comments and code to detect interrupt related concurrency bugs.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
On the k-error linear complexity of l-sequences.
Finite Fields and Their Applications, 2010

Analyzing the robustness of FTSP with timed automata.
Proceedings of the Second Asia-Pacific Symposium on Internetware, 2010

SherLog: error diagnosis by connecting clues from run-time logs.
Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010

2009
A robotic nursing bed design and its control system.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Listening to programmers - Taxonomies and characteristics of comments in operating system code.
Proceedings of the 31st International Conference on Software Engineering, 2009

2008
AutoISES: Automatically Inferring Security Specification and Detecting Violations.
Proceedings of the 17th USENIX Security Symposium, 2008

A Scheme to Aid Construction of Left-Hand Sides of Axioms in Algebraic Specifications forObject-Oriented Program Testing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Quantifying Trust Based on Service Level Agreement for Software as a Service.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
/*icomment: bugs or bad comments?*/.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

HotComments: How to Make Program Comments More Useful?
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
Bit-split string-matching engines for intrusion detection and prevention.
TACO, 2006

Architectures for Bit-Split String Scanning in Intrusion Detection.
IEEE Micro, 2006

Have things changed now?: an empirical study of bug characteristics in modern open source software.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
Hibernator: helping disk arrays sleep through the winter.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

A High Throughput String Matching Architecture for Intrusion Detection and Prevention.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

1994
Signs in the Laplace expansions and the parity of the distinguished representatives.
Discrete Mathematics, 1994


  Loading...