default search action
Meera Sharma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Sushil Kumar, Meera Sharma, Sunil Kumar Muttoo, V. B. Singh:
Inter project defect classification based on word embedding. Int. J. Syst. Assur. Eng. Manag. 15(2): 621-634 (2024) - [j9]Meera Sharma, Madhu Kumari, V. B. Singh:
Bug summary entropy based training candidates identification in cross project severity prediction. Int. J. Syst. Assur. Eng. Manag. 15(3): 981-1014 (2024) - 2022
- [j8]Madhu Kumari, V. B. Singh, Meera Sharma:
Evaluating the Veracity of Software Bug Reports using Entropy-based Measures. Int. J. Open Source Softw. Process. 13(1): 1-21 (2022) - [c13]Lesley Wilton, Stephen Ip, Meera Sharma, Frank Fan:
Where Is the AI? AI Literacy for Educators. AIED (2) 2022: 180-188 - [c12]Sushil Kumar, Meera Sharma, Sunil Kumar Muttoo, V. B. Singh:
Autoclassify Software Defects Using Orthogonal Defect Classification. ICCSA (Workshops 5) 2022: 313-322 - 2020
- [c11]Madhu Kumari, Ujjawal Kumar Singh, Meera Sharma:
Entropy Based Machine Learning Models for Software Bug Severity Assessment in Cross Project Context. ICCSA (6) 2020: 939-953
2010 – 2019
- 2019
- [j7]Meera Sharma, Hoang Pham, V. B. Singh:
Modeling and analysis of leftover issues and release time planning in multi-release open source software using entropy based measure. Comput. Syst. Sci. Eng. 34(1) (2019) - [j6]Meera Sharma, Madhu Kumari, V. B. Singh:
Multi-attribute dependent bug severity and fix time prediction modeling. Int. J. Syst. Assur. Eng. Manag. 10(5): 1328-1352 (2019) - [c10]Kumari Seema Rani, Madhu Kumari, V. B. Singh, Meera Sharma:
Deep Learning with Big Data: An Emerging Trend. ICCSA (7) 2019: 93-101 - 2018
- [j5]Madhu Kumari, Meera Sharma, V. B. Singh:
Severity Assessment of a Reported Bug by Considering its Uncertainty and Irregular State. Int. J. Open Source Softw. Process. 9(4): 20-46 (2018) - [j4]V. B. Singh, Meera Sharma, Hoang Pham:
Entropy Based Software Reliability Analysis of Multi-Version Open Source Software. IEEE Trans. Software Eng. 44(12): 1207-1223 (2018) - [c9]Kamlesh Kumar Raghuvanshi, Meera Sharma, Abhishek Tandon, V. B. Singh:
Quantitative Quality Assessment of Open Source Software by Considering New Features and Feature Improvements. ICCSA (5) 2018: 412-423 - [i1]Meera Sharma, Abhishek Tandon, Madhu Kumari, V. B. Singh:
Reduction of Redundant Rules in Association Rule Mining-Based Bug Assignment. CoRR abs/1807.08906 (2018) - 2017
- [j3]V. B. Singh, Sanjay Misra, Meera Sharma:
Bug Severity Assessment in Cross Project Context and Identifying Training Candidates. J. Inf. Knowl. Manag. 16(1): 1750005:1-1750005:30 (2017) - [c8]V. B. Singh, K. K. Chaturvedi, Sujata Khatri, Meera Sharma:
Complexity of the Code Changes and Issues Dependent Approach to Determine the Release Time of Software Product. ICCSA (5) 2017: 519-529 - [c7]Meera Sharma, Abhishek Tondon:
Developing Prediction Models to Assist Software Developers and Support Managers. ICCSA (5) 2017: 548-560 - 2016
- [j2]Meera Sharma, V. B. Singh:
Clustering-based association rule mining for bug assignee prediction. Int. J. Bus. Intell. Data Min. 11(2): 130-150 (2016) - 2015
- [c6]Meera Sharma, Madhu Kumari, V. B. Singh:
The Way Ahead for Bug-fix time Prediction. QuASoQ/WAWSE/CMCE@APSEC 2015: 31-38 - [c5]Meera Sharma, Madhu Kumari, V. B. Singh:
Bug Assignee Prediction Using Association Rule Mining. ICCSA (4) 2015: 444-457 - [c4]Meera Sharma, Madhu Kumari, V. B. Singh:
Post Release Versions based Code Change Quality Metrics. WCI 2015: 235-243 - 2014
- [j1]Meera Sharma, Punam Bedi, V. B. Singh:
An empirical evaluation of cross project priority prediction. Int. J. Syst. Assur. Eng. Manag. 5(4): 651-663 (2014) - [c3]Meera Sharma, Madhu Kumari, R. K. Singh, V. B. Singh:
Multiattribute Based Machine Learning Models for Severity Prediction in Cross Project Context. ICCSA (5) 2014: 227-241 - [c2]V. B. Singh, Meera Sharma:
Prediction of the Complexity of Code Changes Based on Number of Open bugs, New Feature and Feature Improvement. ISSRE Workshops 2014: 478-483 - 2012
- [c1]Meera Sharma, Punam Bedi, K. K. Chaturvedi, V. B. Singh:
Predicting the priority of a reported bug using machine learning techniques and cross project validation. ISDA 2012: 539-545
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint