首页 > 最新文献

International Journal of Software Engineering and Knowledge Engineering最新文献

英文 中文
Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability 通过多代理系统对饮用水供应基础设施进行建模和控制以实现可持续性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-03-19 DOI: 10.1142/s0218194024500025
Carlos Calatayud Asensi, José Vicente Berná Martínez, Lucía Arnau Muñoz, Francisco Maciá Pérez

Traditionally, drinking water supply infrastructures have been designed to store as much water as possible and to do so during the energy cheap hours. This approach is unsustainable today. The use of digital systems capable of modeling the behavior of infrastructures and the creation of intelligent control systems can help to make drinking water supply systems more efficient and effective, while still meeting minimum service requirements. This work proposes the development of a control system, based on multi-agent systems (MAS), capable of generating an intelligent control over a drinking water infrastructure, based on the use of local interests of the agents and with an emergent behavior coherent with the needs. To validate the proposal, a simulator based on the infrastructures of a medium-sized Spanish city of 5000 inhabitants has been built and the control has been simulated using the MAS. The results show how the system can maintain the objectives set, handling unknown situations, and facilitating the development of future physical systems based on a just-in-time paradigm that guarantees sustainability, as it allows the generation of virtualizations of the infrastructures and their behavior, thus being able to study the best option for an infrastructure to resolve a supply situation.

传统上,饮用水供应基础设施的设计目的是尽可能多地储水,并在能耗低的时段储水。如今,这种方法已难以为继。使用能够模拟基础设施行为的数字系统和创建智能控制系统,有助于提高饮用水供应系统的效率和效益,同时还能满足最低服务要求。这项工作建议开发一个基于多代理系统(MAS)的控制系统,该系统能够对饮用水基础设施进行智能控制,其基础是利用代理的本地兴趣和符合需求的新兴行为。为了验证该建议,我们以西班牙一个拥有 5000 名居民的中型城市的基础设施为基础,建立了一个模拟器,并使用 MAS 对控制进行了模拟。结果表明,该系统能够保持既定目标,处理未知情况,并促进未来基于及时范例的物理系统的发展,从而保证可持续性,因为它允许生成基础设施及其行为的虚拟化,从而能够研究基础设施解决供应问题的最佳方案。
{"title":"Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability","authors":"Carlos Calatayud Asensi, José Vicente Berná Martínez, Lucía Arnau Muñoz, Francisco Maciá Pérez","doi":"10.1142/s0218194024500025","DOIUrl":"https://doi.org/10.1142/s0218194024500025","url":null,"abstract":"<p>Traditionally, drinking water supply infrastructures have been designed to store as much water as possible and to do so during the energy cheap hours. This approach is unsustainable today. The use of digital systems capable of modeling the behavior of infrastructures and the creation of intelligent control systems can help to make drinking water supply systems more efficient and effective, while still meeting minimum service requirements. This work proposes the development of a control system, based on multi-agent systems (MAS), capable of generating an intelligent control over a drinking water infrastructure, based on the use of local interests of the agents and with an emergent behavior coherent with the needs. To validate the proposal, a simulator based on the infrastructures of a medium-sized Spanish city of 5000 inhabitants has been built and the control has been simulated using the MAS. The results show how the system can maintain the objectives set, handling unknown situations, and facilitating the development of future physical systems based on a just-in-time paradigm that guarantees sustainability, as it allows the generation of virtualizations of the infrastructures and their behavior, thus being able to study the best option for an infrastructure to resolve a supply situation.</p>","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"92 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model MOID:多对一专利图嵌入基础侵权检测模型
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-28 DOI: 10.1142/s0218194023420019
Weidong Liu, Fei Li, Senjun Pei, Chunming Cheng

With the increasing number of patent applications over the years, instances of patent infringement cases have become more frequent. However, traditional manual patent infringement detection models are no longer suitable for large-scale infringement detection. Existing automated models mainly focus on detecting one-to-one patent infringements, but neglect the many-to-one scenarios. The many-to-one patent infringement detection model faces some major challenges. First, the diversity of patent domains, complexity of content and ambiguity of features make it difficult to extract and represent patent features. Second, patent infringement detection relies on the correlation between patents and the comparison of contextual information as the key factors, but modeling the process and drawing conclusions present challenges. To address these challenges, we propose a many-to-one patent graph (MPG) embedding base infringement detection model. Our model extracts the relationship between keywords and patents, as well as association relation between keywords from many-to-one patent texts (MPTs), to construct a MPG. We obtain patent infringement features through graph embedding of MPG. By using these embedding features as input, the many-to-one infringement detection (MOID) model outputs the conclusion on whether a patent is infringed or not. The comparative experimental results indicate that our model improves accuracy, precision and F-measure by 3.81%, 11.82% and 5.37%, respectively, when compared to the state-of-the-art method.

随着专利申请数量的逐年增加,专利侵权案件也越来越频繁。然而,传统的人工专利侵权检测模型已不再适用于大规模侵权检测。现有的自动化模型主要侧重于一对一的专利侵权检测,而忽略了多对一的情况。多对一专利侵权检测模型面临着一些重大挑战。首先,专利领域的多样性、内容的复杂性和特征的模糊性使得专利特征的提取和表示非常困难。其次,专利侵权检测的关键因素是专利之间的相关性和上下文信息的比较,但对这一过程进行建模和得出结论却面临挑战。为了应对这些挑战,我们提出了一种多对一专利图(MPG)嵌入式基础侵权检测模型。我们的模型从多对一专利文本(MPT)中提取关键词与专利之间的关系以及关键词之间的关联关系,从而构建一个 MPG。我们通过对 MPG 的图嵌入获得专利侵权特征。多对一侵权检测(MOID)模型以这些嵌入特征为输入,输出专利是否侵权的结论。对比实验结果表明,与最先进的方法相比,我们的模型在准确率、精确度和 F-measure 方面分别提高了 3.81%、11.82% 和 5.37%。
{"title":"MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model","authors":"Weidong Liu, Fei Li, Senjun Pei, Chunming Cheng","doi":"10.1142/s0218194023420019","DOIUrl":"https://doi.org/10.1142/s0218194023420019","url":null,"abstract":"<p>With the increasing number of patent applications over the years, instances of patent infringement cases have become more frequent. However, traditional manual patent infringement detection models are no longer suitable for large-scale infringement detection. Existing automated models mainly focus on detecting one-to-one patent infringements, but neglect the many-to-one scenarios. The many-to-one patent infringement detection model faces some major challenges. First, the diversity of patent domains, complexity of content and ambiguity of features make it difficult to extract and represent patent features. Second, patent infringement detection relies on the correlation between patents and the comparison of contextual information as the key factors, but modeling the process and drawing conclusions present challenges. To address these challenges, we propose a many-to-one patent graph (MPG) embedding base infringement detection model. Our model extracts the relationship between keywords and patents, as well as association relation between keywords from many-to-one patent texts (MPTs), to construct a MPG. We obtain patent infringement features through graph embedding of MPG. By using these embedding features as input, the many-to-one infringement detection (MOID) model outputs the conclusion on whether a patent is infringed or not. The comparative experimental results indicate that our model improves accuracy, precision and F-measure by 3.81%, 11.82% and 5.37%, respectively, when compared to the state-of-the-art method.</p>","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"163 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFSP: an enhanced full scrum process model EFSP:增强型完整 Scrum 流程模型
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-14 DOI: 10.1142/s0218194023500699
Naglaa A. Eldanasory, Engy Yehia, A. Idrees
{"title":"EFSP: an enhanced full scrum process model","authors":"Naglaa A. Eldanasory, Engy Yehia, A. Idrees","doi":"10.1142/s0218194023500699","DOIUrl":"https://doi.org/10.1142/s0218194023500699","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"15 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138971555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach 探索词汇技术对代码完成的影响:比较法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-14 DOI: 10.1142/s0218194023500687
Yasir Hussain, Zhiqiu Huang, Yu Zhou, I. A. Khan
{"title":"Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach","authors":"Yasir Hussain, Zhiqiu Huang, Yu Zhou, I. A. Khan","doi":"10.1142/s0218194023500687","DOIUrl":"https://doi.org/10.1142/s0218194023500687","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"156 20 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138973276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appling Scrum to knowledge transfer among software developers 将 Scrum 应用于软件开发人员之间的知识转移
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-01 DOI: 10.1142/s0218194023430015
Fernando Ibarra-Torres, Matias Urbieta, N. Medina-Medina
{"title":"Appling Scrum to knowledge transfer among software developers","authors":"Fernando Ibarra-Torres, Matias Urbieta, N. Medina-Medina","doi":"10.1142/s0218194023430015","DOIUrl":"https://doi.org/10.1142/s0218194023430015","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"78 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138626014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function-Level Code Obfuscation Detection Through Self-Attention Guided Multi-Representation Fusion 基于自注意引导的多表示融合的功能级代码混淆检测
4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-10 DOI: 10.1142/s0218194023500663
Zhenzhou Tian, Ruikang He, Hongliang Zhao, Lingwei Chen
{"title":"Function-Level Code Obfuscation Detection Through Self-Attention Guided Multi-Representation Fusion","authors":"Zhenzhou Tian, Ruikang He, Hongliang Zhao, Lingwei Chen","doi":"10.1142/s0218194023500663","DOIUrl":"https://doi.org/10.1142/s0218194023500663","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135191278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision SCR-LIBM:一个双精度的正确舍入初等函数库
4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-10 DOI: 10.1142/s0218194023500675
Yang Qu, Jinchen Xu, Bei Zhou, Jiangwei Hao, Fei Li, Zuoyan Zhang
{"title":"SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision","authors":"Yang Qu, Jinchen Xu, Bei Zhou, Jiangwei Hao, Fei Li, Zuoyan Zhang","doi":"10.1142/s0218194023500675","DOIUrl":"https://doi.org/10.1142/s0218194023500675","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135191284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes 具有最小冲突属性的软件开发预算分配方案
4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-08 DOI: 10.1142/s0218194023500596
Yanfang Ma, Wei Zhou
During the process of software development, a significant challenge revolves around accurately estimating the associated costs. The primary goal of project managers is to ensure the delivery of a highly trustworthiness product that aligns with the designated budgetary constraints. Nonetheless, the trustworthiness of software hinges upon a range of distinct attributes. When implementing a budget allocation scheme to enhance these attributes, conflicts among them may arise. Thus, it becomes imperative to select an appropriate allocation scheme that effectively mitigates conflict-associated costs. In this paper, we will define the conflict costs and establish costs estimation models. The difficulty coefficient constraint for improving attributes is established. Subsequently, we will analyze the relative importance weights of these attributes. Drawing upon the conflict costs, importance weights, and difficulty coefficient constraint, we present an algorithm to determine an appropriate budget allocation scheme, which can minimize conflict-associated costs. Finally, we provide an illustrative example that demonstrates the practicability of our proposed algorithm. This research offers valuable insights to software managers, aiding them in the reasonable allocation of budgetary resources, thereby maximizing overall benefits.
在软件开发过程中,一个重要的挑战围绕着准确地估计相关的成本。项目经理的主要目标是确保交付高度可信赖的产品,并与指定的预算限制保持一致。尽管如此,软件的可靠性取决于一系列不同的属性。在实施增强这些属性的预算分配方案时,可能会产生这些属性之间的冲突。因此,必须选择一种适当的分配方案,有效地减轻与冲突有关的费用。在本文中,我们将定义冲突成本并建立成本估算模型。建立了改进属性的难度系数约束。随后,我们将分析这些属性的相对重要性权重。根据冲突成本、重要性权重和难度系数约束,提出了一种确定适当的预算分配方案的算法,使冲突相关成本最小化。最后,我们提供了一个说明性的例子来证明我们所提出的算法的实用性。这项研究为软件经理提供了有价值的见解,帮助他们合理分配预算资源,从而最大化整体利益。
{"title":"The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes","authors":"Yanfang Ma, Wei Zhou","doi":"10.1142/s0218194023500596","DOIUrl":"https://doi.org/10.1142/s0218194023500596","url":null,"abstract":"During the process of software development, a significant challenge revolves around accurately estimating the associated costs. The primary goal of project managers is to ensure the delivery of a highly trustworthiness product that aligns with the designated budgetary constraints. Nonetheless, the trustworthiness of software hinges upon a range of distinct attributes. When implementing a budget allocation scheme to enhance these attributes, conflicts among them may arise. Thus, it becomes imperative to select an appropriate allocation scheme that effectively mitigates conflict-associated costs. In this paper, we will define the conflict costs and establish costs estimation models. The difficulty coefficient constraint for improving attributes is established. Subsequently, we will analyze the relative importance weights of these attributes. Drawing upon the conflict costs, importance weights, and difficulty coefficient constraint, we present an algorithm to determine an appropriate budget allocation scheme, which can minimize conflict-associated costs. Finally, we provide an illustrative example that demonstrates the practicability of our proposed algorithm. This research offers valuable insights to software managers, aiding them in the reasonable allocation of budgetary resources, thereby maximizing overall benefits.","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135293547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction 基于源代码的缺陷预测模型不可知技术的实证研究
4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-04 DOI: 10.1142/s0218194023500572
Yi Zhu, Yuxiang Gao, Yu Qiao
Interpretation is important for adopting software defect prediction in practice. Model-agnostic techniques such as Local Interpretable Model-agnostic Explanation (LIME) can help practitioners understand the factors which contribute to the prediction. They are effective and useful for models constructed on tabular data with traditional features. However, when they are applied on source code-based models, they cannot differentiate the contribution of code tokens in different locations for deep learning-based models with Bag-of-Word features. Besides, only using limited features as explanation may result in information loss about actual riskiness. Such limitations may lead to inaccurate explanation for source code-based models, and make model-agnostic techniques not useful and helpful as expected. Thus, we apply a perturbation-based approach Randomized Input Sampling Explanation (RISE) for source code-based defect prediction. Besides, to fill the gap that there lacks a systematical evaluation on model-agnostic techniques on source code-based defect models, we also conduct an extensive case study on the model-agnostic techniques on both token frequency-based and deep learning-based models. We find that (1) model-agnostic techniques are effective to identify the most important code tokens for an individual prediction and predict defective lines based on the importance scores, (2) using limited features (code tokens) for explanation may result in information loss about actual riskiness, and (3) RISE is more effective than others as it can generate more accurate explanation, achieve better cost-effectiveness for line-level prediction, and result in less information loss about actual riskiness. Based on such findings, we suggest that model-agnostic techniques can be a supplement to file-level source code-based defect models, while such explanations should be used with caution as actual risky tokens may be ignored. Also, compared with LIME, we would recommend RISE for a more effective explanation.
在实践中,解释对于软件缺陷预测的采用是非常重要的。模型不可知论技术,如局部可解释模型不可知论解释(LIME),可以帮助从业者理解促成预测的因素。它们对于在具有传统特征的表格数据上构建模型是有效和有用的。然而,当它们应用于基于源代码的模型时,它们无法区分具有Bag-of-Word特征的基于深度学习的模型中不同位置的代码标记的贡献。此外,仅使用有限的特征进行解释可能会导致实际风险信息的丢失。这种限制可能导致对基于源代码的模型的不准确解释,并使模型不可知技术不像预期的那样有用和有帮助。因此,我们将基于扰动的方法随机输入抽样解释(RISE)应用于基于源代码的缺陷预测。此外,为了填补对基于源代码的缺陷模型的模型不可知技术缺乏系统评估的空白,我们还对基于令牌频率的模型不可知技术和基于深度学习的模型进行了广泛的案例研究。我们发现(1)模型不可知技术可以有效地识别单个预测最重要的代码令牌,并根据重要性分数预测缺陷行;(2)使用有限的特征(代码令牌)进行解释可能导致有关实际风险的信息丢失;(3)RISE比其他技术更有效,因为它可以生成更准确的解释,实现更好的线级预测成本效益。从而减少对实际风险的信息损失。基于这样的发现,我们建议模型不可知技术可以作为文件级基于源代码的缺陷模型的补充,而这样的解释应该谨慎使用,因为实际的风险令牌可能会被忽略。另外,与LIME相比,我们会推荐RISE,因为它能更有效地解释。
{"title":"An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction","authors":"Yi Zhu, Yuxiang Gao, Yu Qiao","doi":"10.1142/s0218194023500572","DOIUrl":"https://doi.org/10.1142/s0218194023500572","url":null,"abstract":"Interpretation is important for adopting software defect prediction in practice. Model-agnostic techniques such as Local Interpretable Model-agnostic Explanation (LIME) can help practitioners understand the factors which contribute to the prediction. They are effective and useful for models constructed on tabular data with traditional features. However, when they are applied on source code-based models, they cannot differentiate the contribution of code tokens in different locations for deep learning-based models with Bag-of-Word features. Besides, only using limited features as explanation may result in information loss about actual riskiness. Such limitations may lead to inaccurate explanation for source code-based models, and make model-agnostic techniques not useful and helpful as expected. Thus, we apply a perturbation-based approach Randomized Input Sampling Explanation (RISE) for source code-based defect prediction. Besides, to fill the gap that there lacks a systematical evaluation on model-agnostic techniques on source code-based defect models, we also conduct an extensive case study on the model-agnostic techniques on both token frequency-based and deep learning-based models. We find that (1) model-agnostic techniques are effective to identify the most important code tokens for an individual prediction and predict defective lines based on the importance scores, (2) using limited features (code tokens) for explanation may result in information loss about actual riskiness, and (3) RISE is more effective than others as it can generate more accurate explanation, achieve better cost-effectiveness for line-level prediction, and result in less information loss about actual riskiness. Based on such findings, we suggest that model-agnostic techniques can be a supplement to file-level source code-based defect models, while such explanations should be used with caution as actual risky tokens may be ignored. Also, compared with LIME, we would recommend RISE for a more effective explanation.","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"15 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135728296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influential spreaders identification by fusing network topology 融合网络拓扑的影响传播者识别
4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-03 DOI: 10.1142/s0218194023410097
Ziyi Zhang, Rong Yan, Wei Yuan, Lintao Zhang
{"title":"Influential spreaders identification by fusing network topology","authors":"Ziyi Zhang, Rong Yan, Wei Yuan, Lintao Zhang","doi":"10.1142/s0218194023410097","DOIUrl":"https://doi.org/10.1142/s0218194023410097","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135869140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Software Engineering and Knowledge Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1