Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (6): 1788-1791.DOI: 10.11772/j.issn.1001-9081.2014.06.1788
Previous Articles Next Articles
YI Lili,ZHANG Liping,WANG Chunhui,TU Ying,LIU Dongsheng
Received:
2013-11-07
Revised:
2014-01-17
Online:
2014-06-01
Published:
2014-07-02
Contact:
LIU Dongsheng
Supported by:
National Natural Science Foundation
通讯作者:
刘东升
作者简介:
基金资助:
重庆市科委基础与前沿研究项目
CLC Number:
YI Lili ZHANG Liping WANG Chunhui TU Ying LIU Dongsheng. Predicting inconsistent change probability of code clone based on latent Dirichlet allocation model[J]. Journal of Computer Applications, 2014, 34(6): 1788-1791.
尹丽丽 张丽萍 王春辉 涂颖 刘东升. 基于潜在狄利克雷分配模型预测克隆代码不一致变化的可能[J]. 计算机应用, 2014, 34(6): 1788-1791.
[1]KAPSER C, GODFREY M W. "Cloning considered harmful" considered harmful[C]// WCRE 2006: Proceedings of the 13th Working Conference on Reverse Engineering. Piscataway: IEEE Press, 2006: 19-28. |
[1] | . Centered kernel alignment based multiple kernel one-class support vector machine [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | . Solving dynamic traveling salesman problem based on distributional reinforcement learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[3] | . Outlier detection algorithm based on autoencoder and ensemble learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | WANG Zhoukai, ZHANG Jiong, MA Weigang, WANG Huaijun. Parallel decompression algorithm for high-speed train monitoring data [J]. Journal of Computer Applications, 2021, 41(9): 2586-2593. |
[5] | LI Zhuo, SONG Zihui, SHEN Xin, CHEN Xin. Local differential privacy protection mechanism for mobile crowd sensing with edge computing [J]. Journal of Computer Applications, 2021, 41(9): 2678-2686. |
[6] | . Review of computer aided face diagnosis for children with obstructive sleep apnea [J]. Journal of Computer Applications, 0, (): 0-0. |
[7] | . Survey of high utility pattern mining methods based on positive and negative utility division [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | WU Peng, WU Jinzhao. Reasoning method based on linear error assertion [J]. Journal of Computer Applications, 2021, 41(8): 2199-2204. |
[9] | SUN Rui, HAN Meng, ZHANG Chunyan, SHEN Mingyao, DU Shiyu. Algorithm for mining top-k high utility itemsets with negative items [J]. Journal of Computer Applications, 2021, 41(8): 2386-2395. |
[10] | WANG Zisen, LIANG Ying, LIU Zhengjun, XIE Xiaojie, ZHANG Wei, SHI Hongzhou. Matching method for academic expertise of research project peer review experts [J]. Journal of Computer Applications, 2021, 41(8): 2418-2426. |
[11] | ZHAO Quan, TANG Xiaochun, ZHU Ziyu, MAO Anqi, LI Zhanhuai. Low-latency cluster scheduling framework for large-scale short-time tasks [J]. Journal of Computer Applications, 2021, 41(8): 2396-2405. |
[12] | KANG Jun, HUANG Shan, DUAN Zongtao, LI Yixiu. Review of spatio-temporal trajectory sequence pattern mining methods [J]. Journal of Computer Applications, 2021, 41(8): 2379-2385. |
[13] | CHEN Jing, MAO Yingchi, CHEN Hao, WANG Longbao, WANG Zicheng. Dam defect object detection method based on improved single shot multibox detector [J]. Journal of Computer Applications, 2021, 41(8): 2366-2372. |
[14] | MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan. Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability [J]. Journal of Computer Applications, 2021, 41(8): 2232-2241. |
[15] | . Medical electronic record sharing scheme based on sharding-based blockchain [J]. , 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||