Search For:

Displaying 1-20 out of 20 total
SOLE: Speculative one-cycle load execution with scalability, high-performance and energy-efficiency
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Zhenhao Zhang,Dong Tong,Xiaoyin Wang,Jiangfang Yi,Keyi Wang
Issue Date:September 2012
pp. 291-296
Conventional superscalar processors usually contain large CAM-based LSQ (load/store queue) with poor scalability and high energy consumption. Recently proposals only focus on improving the LSQ scalability to increase the in-flight instruction capacity, but...
 
S/DC: A storage and energy efficient data prefetcher
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Xianglei Dang, Xiaoyin Wang, Dong Tong, Junlin Lu, Jiangfang Yi, Keyi Wang
Issue Date:March 2012
pp. 461-466
Energy efficiency is becoming a major constraint in processor designs. Every component of the processor should be reconsidered to reduce wasted energy and area. Prefetching is an important technique for tolerating memory latency. Prefetcher designs have im...
 
Predicting Consistency-Maintenance Requirement of Code Clones at Copy-and-Paste Time
Found in: IEEE Transactions on Software Engineering
By Xiaoyin Wang,Yingnong Dang,Lu Zhang,Dongmei Zhang,Erica Lan,Hong Mei
Issue Date:May 2014
pp. 1
Code clones have always been a double edged sword in software development. On one hand, it is a very convenient way to reuse existing code, and to save coding effort. On the other hand, since developers may need to ensure consistency among cloned code segm...
 
Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis
Found in: IEEE Transactions on Software Engineering
By Xiaoyin Wang,Lu Zhang,Tao Xie,Hong Mei,Jiasu Sun
Issue Date:April 2013
pp. 516-536
Nowadays, a software product usually faces a global market. To meet the requirements of different local users, the software product must be internationalized. In an internationalized software product, user-visible hard-coded constant strings are externaliz...
 
Can I clone this piece of code here?
Found in: 2012 27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
By Xiaoyin Wang,Yingnong Dang,Lu Zhang,Dongmei Zhang,Erica Lan,Hong Mei
Issue Date:September 2012
pp. 170-179
While code cloning is a convenient way for developers to reuse existing code, it may potentially lead to negative impacts, such as degrading code quality or increasing maintenance costs. Actually, some cloned code pieces are viewed as harmless since they e...
 
Using Bayesian Dominance Hierarchies to Determine Predictor Importance in Service Research Predictive Studies
Found in: Service Sciences, International Joint Conference on
By Xiaoyin Wang,Philippe Duverger,Harvir S. Bansal
Issue Date:May 2012
pp. 40-45
Empirical results in business research derived from multiple linear regression models are often susceptible to issues of dimensionality and multicollinearity. We extend the current research practices for addressing multicollinearity by introducing an origi...
 
Bug Signature Minimization and Fusion
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By David Lo,Hong Cheng,Xiaoyin Wang
Issue Date:November 2011
pp. 340-347
Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location a...
 
TAP prediction: Reusing conditional branch predictor for indirect branches with Target Address Pointers
Found in: Computer Design, International Conference on
By Zichao Xie,Dong Tong,Mingkai Huang,Xiaoyin Wang,Qinqing Shi,Xu Cheng
Issue Date:October 2011
pp. 119-126
Indirect-branch prediction is becoming more important for modern processors as more programs are written in object-oriented languages. Previous hardware-based indirect-branch predictors generally require significant hardware storage or use aggressive algor...
 
A discriminative model approach for accurate duplicate bug report retrieval
Found in: Software Engineering, International Conference on
By Chengnian Sun,David Lo,Xiaoyin Wang,Jing Jiang,Siau-Cheng Khoo
Issue Date:May 2010
pp. 45-54
Bug repositories are usually maintained in software projects. Testers or users submit bug reports to identify various issues with systems. Sometimes two or more bug reports correspond to the same defect. To address the problem with duplicate bug reports, a...
 
JDF: detecting duplicate bug reports in Jazz
Found in: Software Engineering, International Conference on
By Yoonki Song,Xiaoyin Wang,Tao Xie,Lu Zhang,Hong Mei
Issue Date:May 2010
pp. 315-316
Both developers and users submit bug reports to a bug repository. These reports can help reveal defects and improve software quality. As the number of bug reports in a bug repository increases, the number of the potential duplicate bug reports increases. D...
 
A Breast Detecting Algorithm for Adult Image Recognition
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Xiaoyin Wang, Changzhen Hu, Shuping Yao
Issue Date:December 2009
pp. 341-344
Information spreading on the Internet is increasing explosively. Juveniles should be protected from the harmful information. Adult image recognition is one of the important works. In order to avoid the low recognizing accuracy of present algorithms, an adu...
 
TranStrL: An automatic need-to-translate string locator for software internationalization
Found in: Software Engineering, International Conference on
By Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun
Issue Date:May 2009
pp. 555-558
Software internationalization is often necessary when distributing software applications to different regions around the world. In many cases, developers often do not internationalize a software application at the beginning of the development stage. To int...
 
Locating need-to-translate constant strings for software internationalization
Found in: Software Engineering, International Conference on
By Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun
Issue Date:May 2009
pp. 353-363
Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internationalized at early stages of development. To internationalize such an existing ...
 
An approach to detecting duplicate bug reports using natural language and execution information
Found in: Software Engineering, International Conference on
By Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu Sun
Issue Date:May 2008
pp. 461-470
An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an existi...
 
Automating presentation changes in dynamic web applications via collaborative hybrid analysis
Found in: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (FSE '12)
By Hong Mei, Lu Zhang, Tao Xie, Xiaoyin Wang, Yingfei Xiong
Issue Date:November 2012
pp. 1-11
Web applications are becoming increasingly popular nowadays. During the development and evolution of a web application, a typical type of tasks is to change the presentation of the web application, such as correcting display errors, adding user-interface c...
     
Can I clone this piece of code here?
Found in: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012)
By Dongmei Zhang, Erica Lan, Hong Mei, Lu Zhang, Xiaoyin Wang, Yingnong Dang
Issue Date:September 2012
pp. 170-179
While code cloning is a convenient way for developers to reuse existing code, it may potentially lead to negative impacts, such as degrading code quality or increasing maintenance costs. Actually, some cloned code pieces are viewed as harmless since they e...
     
Locating need-to-translate constant strings in web applications
Found in: Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering (FSE '10)
By Hong Mei, Jiasu Sun, Lu Zhang, Tao Xie, Xiaoyin Wang
Issue Date:November 2010
pp. 87-96
Software internationalization aims to make software accessible and usable by users all over the world. For a Java application that does not consider internationalization at the beginning of its develop- ment stage, our previous work proposed an approach to...
     
Matching dependence-related queries in the system dependence graph
Found in: Proceedings of the IEEE/ACM international conference on Automated software engineering (ASE '10)
By David Lo, Hong Mei, Jeffrey Xu Yu, Jiefeng Cheng, Lu Zhang, Xiaoyin Wang
Issue Date:September 2010
pp. 457-466
In software maintenance and evolution, it is common that developers want to apply a change to a number of similar places. Due to the size and complexity of the code base, it is challenging for developers to locate all the places that need the change. A mai...
     
Identifying bug signatures using discriminative graph mining
Found in: Proceedings of the eighteenth international symposium on Software testing and analysis (ISSTA '09)
By David Lo, Hong Cheng, Xiaoyin Wang, Xifeng Yan, Yang Zhou
Issue Date:July 2009
pp. 5-6
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Although such methods could be very accurate, it is usually very hard for devel...
     
An approach to detecting duplicate bug reports using natural language and execution information
Found in: Proceedings of the 13th international conference on Software engineering (ICSE '08)
By Jiasu Sun, John Anvik, Lu Zhang, Tao Xie, Xiaoyin Wang
Issue Date:May 2008
pp. 1-1
An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an existi...
     
 1