default search action
Lulu Wang 0001
Person information
- affiliation: Southeast University, School of Computer Science and Engineering, Nanjing, China
Other persons with the same name
- Lulu Wang — disambiguation page
- Lulu Wang 0002 — Shenzhen Technology University, China (and 2 more)
- Lulu Wang 0003 — The Affiliated Huai'an Hospital of Xuzhou Medical University, Huai'an, China
- Lulu Wang 0004 — Harbin Engineering University, College of Automation, Harbin, China
- Lulu Wang 0005 — Peking University, Key Laboratory of High Confidence Software Technologies, Beijing, China
- Lulu Wang 0006 — Academy of Military Science, Artificial Intelligence Research Center, Beijing, China
- Lulu Wang 0007 — University of Shanghai for Science and Technology, Shanghai, China
- Lulu Wang 0008 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Lulu Wang 0009 — Indiana University, Bloomington, Indiana, USA
- Lulu Wang 0010 — Heifei University of Technology, School of Resources and Environmental Engineering, Hefei, China
- Lulu Wang 0011 — Xinjiang University, Urumqi, China
- Lulu Wang 0012 — Central South University, Changsha, China
- Lulu Wang 0013 — Chongqing University, College of Computer Science, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Huaixu Lin, Bixin Li, Liang Liu, Lulu Wang, Jianming Chang:
OTCP-ISVM: Online Test Case Prioritization Based on Incremental Support Vector Machine. QRS 2024: 84-94 - [c15]Ao Fan, Li Liao, Lulu Wang, Bixin Li:
Test Case Generation for Access Control Based on UML Activity Diagram. QRS 2024: 95-104 - [c14]Jiahao Ren, Jianming Chang, Lulu Wang, Zaixing Zhang, Bixin Li:
Graph-Based Salient Class Classification in Commits. QRS 2024: 620-631 - [i1]Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang:
Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. CoRR abs/2409.08512 (2024) - 2023
- [j10]Chunguang Zhang, Bixin Li, Lulu Wang, Haixin Xu, Tao Shao:
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 25010. Int. J. Softw. Eng. Knowl. Eng. 33(2): 181-205 (2023) - [j9]Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li:
An empirical study of software architecture resilience evaluation methods. J. Syst. Softw. 202: 111726 (2023) - [j8]Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, Bixin Li, Haixin Xu, Tao Shao:
Microservice architecture recovery based on intra-service and inter-service features. J. Syst. Softw. 204: 111754 (2023) - [c13]Zheheng Liang, Jianming Chang, Wuqiang Shen, Chaosheng Yao, Lulu Wang:
ECIA: Elaborate Change Impact Analysis Based on Sub-Statement Level Dependency Graph. QRS Companion 2023: 471-480 - [c12]Zaixing Zhang, Liang Liu, Jianming Chang, Lulu Wang, Li Liao:
Commit Classification via Diff-Code GCN based on System Dependency Graph. QRS 2023: 476-487 - 2020
- [j7]Lulu Wang, Bixin Li, Xianglong Kong:
Type slicing: An accurate object oriented slicing based on sub-statement level dependence graph. Inf. Softw. Technol. 127: 106369 (2020) - [c11]Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li:
An Empirical Investigation into the Effects of Code Comments on Issue Resolution. COMPSAC 2020: 921-930 - [c10]Huidan Li, Rensong Xie, Xianglong Kong, Lulu Wang, Bixin Li:
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts? QRS 2020: 479-488
2010 – 2019
- 2019
- [j6]Lulu Wang, Jingyue Li, Bixin Li:
Tracking runtime concurrent dependences in java threads using thread control profiling. J. Syst. Softw. 148: 116-131 (2019) - [j5]Lulu Wang, Jingyue Li, Bixin Li:
Erratum to "Tracking runtime concurrent dependences in java threads using thread control profiling" [The Journal of Systems and Software 148 (2019) 116-131]. J. Syst. Softw. 153: 44 (2019) - [c9]Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li:
HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379 - [c8]Qiang Yin, Lulu Wang, Bixin Li:
Identify MVC architectural pattern based on ontology. SEKE 2019: 612-777 - [c7]Lihui Tang, Lulu Wang, Bixin Li:
Identify Blackboard Pattern Based on Ontology. TASE 2019: 224-231 - 2018
- [j4]Xianglong Kong, Bixin Li, Lulu Wang, Wensheng Wu:
Directory-Based Dependency Processing for Software Architecture Recovery. IEEE Access 6: 52321-52335 (2018) - 2016
- [j3]Lulu Wang, Bixin Li, Hareton Leung:
A new method to encode calling contexts with recursions. Sci. China Inf. Sci. 59(5): 052104:1-052104:15 (2016) - 2014
- [j2]Bixin Li, Lulu Wang, Hareton Leung:
Profiling selected paths with loops. Sci. China Inf. Sci. 57(7): 1-15 (2014) - 2013
- [c6]Fei Liu, Lulu Wang, Bixin Li:
ELCD: an efficient online cycle detection technique for pointer analysis. SEKE 2013: 606-611 - 2012
- [j1]Bixin Li, Lulu Wang, Hareton Leung, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. J. Syst. Softw. 85(7): 1558-1576 (2012) - 2011
- [c5]Lulu Wang, Bixin Li:
A Technique of Profiling Selective Paths. COMPSAC 2011: 588-589 - [c4]Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
An Effective Approach for Automatic Generation of Class Integration Test Order. COMPSAC 2011: 680-681 - [c3]Lulu Wang, Bixin Li:
A Technology of Profiling Inter-procedural Paths. SEKE 2011: 31-36 - [c2]Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
A Brief Survey on Automatic Integration Test Order Generation. SEKE 2011: 254-257 - 2010
- [c1]Zhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong:
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem. COMPSAC Workshops 2010: 329-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint