Computer Science ›› 2022, Vol. 49 ›› Issue (12): 99-108.doi: 10.11896/jsjkx.220400289
• Computer Software • Previous Articles Next Articles
JIANG Jing, PING Yuan, WU Qiu-di, ZHANG Li
CLC Number:
[1]DABBISH L,STUART C,TSAY J,et al.Social coding inGitHub:transparency and collaboration in an open software repository[C]//Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work.2012:1277-1286. [2]DUBEY A,ABHINAV K,VIRDI G.A framework to preserve confidentiality in crowdsourced software development[C]//2017 IEEE/ACM 39th International Conference on Software Engineering Companion(ICSE-C).IEEE,2017:115-117. [3]BAO L,XIA X,LO D,et al.A large scale study of long-timecontributor prediction for github projects[J].IEEE Transactions on Software Engineering,2019,47(6):1277-1298. [4]WANG Q Y,XIA X,LO D,et al.Why Is My Code ChangeAbandoned?[J].Information and Software Technology,2019,110(JUN.):108-120. [5]SAREMI R L,YANG Y E,RUHE G,et al.Leveraging crow-dsourcing for team elasticity:An empirical evaluation at Topco-der[C]//2017 IEEE/ACM 39th International Conference on Software Engineering:Software Engineering in Practice Track(ICSE-SEIP).IEEE,2017:103-112. [6]ARCHAK N.Money,glory and cheap talk:analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com[C]//Proceedings of the 19th International Conference on World Wide Web.2010:21-30. [7]SAXTON G D,OH O,KISHORE R.Rules of Crowdsourcing:Models,Issues,and Systems of Control[J].Information Systems Management,2013,30(1/2):2-20. [8]RUI L L,ZHANG P,HUANG H Q,et al.A trust-based incentive mechanism for crowdsourcing [J].Journal of Electronics Information Technology,2016,38(7):1808-1815. [9]SAXTON G D,OH O,KISHORE R.Rules of Crowdsourcing:Models,Issues,and Systems of Control[J].Information Systems Management,2013,30(1/2):2-20. [10]HASTEER N,NAZIR N,BANSAL A,et al.CrowdsourcingSoftware Development:Many Benefits Many Concerns[J].Procedia Computer Science,2016,78:48-54. [11]FU Y,SUN H L,YE L T.Competition-aware task routing for contest based crowdsourced software development[C]//2017 6th International Workshop on Software Mining(Software Mi-ning).IEEE,2017:32-39. [12]JIANG J,WU Q,CAO J,et al.Recommending tags for pull requests in GitHub[J].Information and Software Technology,2021,129:106394. [13]WANG Z Z,SUN H L,FU Y,et al.Recommending crowd- sourced software developersin consideration of skill improvement[C]//2017 32nd IEEE/ACM International Conference on Automated Software Engineering(ASE).IEEE,2017:717-722. [14]BABA Y,KINOSHITA K,KASHIMA H.Participation recommendation system for crowdsourcing contests[J].Expert Systems with Applications,2016,58:174-183. [15]JIANG J,LO D,ZHENG J T,et al.Who should make decision on this pull request? Analyzing time-decaying relationships and file similarities for integrator prediction[J].Journal of Systems and Software,2019,154:196-210. [16]YANG Y.Code review decision maker recommendation and result prediction research [D].Beijing:BeiHang University,2018. [17]MAO K,YANG Y,WANG Q,et al.Developer recommendation for crowdsourced software development tasks[C]//2015 IEEE Symposium on Service-Oriented System Engineering.IEEE,2015:347-356. [18]ZHANG Z Y,SUN H L,ZHANG H Y.Developer recommendation for Topcoder through a meta-learning based policy model[J].Empirical Software Engineering,2020,25(1):859-889. [19]YANG Y,KARIM M R,SAREMI R,et al.Who should take this task?dynamic decision support for crowd workers[C]//Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement.2016:1-10. [20]JIANG J,YANG Y,HE J H,et al.Who should comment on this pull request? Analyzing attributes for more accurate commenter recommendation in pull-based development-Science Direct[J].Information & Software Technology,2017,84(C):48-62. [21]HANNEBAUER C,PATALAS M,STÜNKEL S,et al.Automatically recommending code reviewers based on their exper-tise:An empiricalcomparison[C]//Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering.2016:99-110. [22]BEGEL A,HERBSLEB J D,STOREY M A.The future of collaborative software development[C]//Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion.2012:17-18. [23]CUI C,HU M Q,WEIR J D,et al.A recommendation system for meta-modeling:A meta-learning based approach[J].Expert Systems with Applications,2016,46(Mar.):33-44. [24]HAUFF C,GOUSIOS G.Matching GitHub developer profilesto job advertisements[C]//2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.IEEE,2015:362-366. [25]WAN Y,CHEN L,XU G D,et al.SCSMiner:mining social co-ding sites for software developer recommendation with relevance propagation[J].World Wide Web,2018,21(6):1523-1543. [26]GOUSIOS G,ZAIDMAN A,STOREY M A,et al.Work practices and challenges in pull-based development:the integrator’s perspective[C]//2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.IEEE,2015:358-368. [27]ALELYANI T,YANG Y.Software crowdsourcing reliability:an empirical study on developers behavior[C]//Proceedings of the 2nd International Workshop on Software Analytics.2016:36-42. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[3] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[4] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[5] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[6] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[7] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[8] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[11] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[12] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[13] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[14] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
[15] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
|