Остановите войну!
for scientists:
default search action
Wenyun Zhao
- > Home > Persons > Wenyun Zhao
Publications
- 2022
- [j43]Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao:
"More Than Deep Learning": post-processing for API sequence recommendation. Empir. Softw. Eng. 27(1): 15 (2022) - [j42]Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao:
Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation. IEEE Trans. Software Eng. 48(8): 2987-3009 (2022) - 2020
- [c89]Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao:
API method recommendation via explicit matching of functionality verb phrases. ESEC/SIGSOFT FSE 2020: 1015-1026 - [i1]Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao:
Holistic Combination of Structural and Textual Code Information for Context based API Recommendation. CoRR abs/2010.07514 (2020) - 2019
- [j39]Chi Chen, Xin Peng, Jun Sun, Zhenchang Xing, Xin Wang, Yifan Zhao, Hairui Zhang, Wenyun Zhao:
Generative API usage code recommendation with parameter concretization. Sci. China Inf. Sci. 62(9): 192103:1-192103:22 (2019) - 2018
- [c83]Wenjian Liu, Xin Peng, Zhenchang Xing, Junyi Li, Bing Xie, Wenyun Zhao:
Supporting exploratory code search with differencing and visualization. SANER 2018: 300-310 - 2017
- [j21]Qingtao Jiang, Xin Peng, Hai Wang, Zhenchang Xing, Wenyun Zhao:
Understanding systematic and collaborative code changes by mining evolutionary trajectory patterns. J. Softw. Evol. Process. 29(3) (2017) - [c81]Yun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, Jin Song Dong:
Mining implicit design templates for actionable code reuse. ASE 2017: 394-404 - [c78]Jinshui Wang, Xin Peng, Zhenchang Xing, Kun Fu, Wenyun Zhao:
Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process. SCAM 2017: 61-70 - 2015
- [c71]Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao:
Clone-based and interactive recommendation for modifying pasted code. ESEC/SIGSOFT FSE 2015: 520-531 - [c69]Qingtao Jiang, Xin Peng, Hai Wang, Zhenchang Xing, Wenyun Zhao:
Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changes. SANER 2015: 361-370 - [c68]Hongwei Li, Xuejiao Zhao, Zhenchang Xing, Lingfeng Bao, Xin Peng, Dongjing Gao, Wenyun Zhao:
amAssist: In-IDE ambient search of online programming resources. SANER 2015: 390-398 - 2014
- [c66]Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao:
Detecting differences across multiple instances of code clones. ICSE 2014: 164-174 - [c64]Yun Lin, Zhenchang Xing, Xin Peng, Yang Liu, Jun Sun, Wenyun Zhao, Jin Song Dong:
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance. ICSME 2014: 341-350 - 2013
- [j5]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Improving feature location using structural similarity and iterative graph mapping. J. Syst. Softw. 86(3): 664-676 (2013) - [j4]Jinshui Wang, Xin Peng, Zhenchang Xing, Wenyun Zhao:
How developers perform feature location tasks: a human-centric and process-oriented exploratory study. J. Softw. Evol. Process. 25(11): 1193-1224 (2013) - [c62]Jinshui Wang, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Improving feature location practice with multi-faceted interactive exploration. ICSE 2013: 762-771 - [c61]Wenyi Qian, Xin Peng, Zhenchang Xing, Stan Jarzabek, Wenyun Zhao:
Mining Logical Clones in Software: Revealing High-Level Business and Programming Rules. ICSM 2013: 40-49 - [c59]Gang Zhang, Xin Peng, Zhenchang Xing, Shihai Jiang, Hai Wang, Wenyun Zhao:
Towards contextual and on-demand code clone management by continuous monitoring. ASE 2013: 497-507 - [c57]Hongwei Li, Zhenchang Xing, Xin Peng, Wenyun Zhao:
What help do developers seek, when and how? WCRE 2013: 142-151 - 2012
- [c56]Yang Song, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Automatic Adaptation of Software Applications to Database Evolution by Graph Differencing and AOP-Based Dynamic Patching. COMPSAC 2012: 111-118 - [c52]Gang Zhang, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Cloning practices: Why developers clone and what can be changed. ICSM 2012: 285-294 - 2011
- [c48]Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao:
Iterative context-aware feature location. ICSE 2011: 900-903 - [c47]Jinshui Wang, Xin Peng, Zhenchang Xing, Wenyun Zhao:
An exploratory study of feature location process: Distinct phases, recurring patterns, and elementary actions. ICSM 2011: 213-222 - [c46]Gang Zhang, Liwei Shen, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Incremental and iterative reengineering towards Software Product Line: An industrial case study. ICSM 2011: 418-427 - [c42]Jiayi Zhu, Xin Peng, Stan Jarzabek, Zhenchang Xing, Yinxing Xue, Wenyun Zhao:
Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling. ICSR 2011: 151-166 - [c39]Tianmei Zhu, Yijian Wu, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views. WCRE 2011: 229-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 17:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint