default search action
Jiasu Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j11]Yitao Ni, Shan-Shan Hou, Lu Zhang, Jun Zhu, Zhong Jie Li, Qian Lan, Hong Mei, Jiasu Sun:
Effective Message-Sequence Generation for Testing BPEL Programs. IEEE Trans. Serv. Comput. 6(1): 7-19 (2013) - [j10]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis. IEEE Trans. Software Eng. 39(4): 516-536 (2013) - 2010
- [j9]Dan Hao, Tao Xie, Lu Zhang, Xiaoyin Wang, Jiasu Sun, Hong Mei:
Test input reduction for result inspection to facilitate fault localization. Autom. Softw. Eng. 17(1): 5-31 (2010) - [j8]Lu Zhang, Jing Luo, He Li, Jiasu Sun, Hong Mei:
A biting-down approach to hierarchical decomposition of object-oriented systems based on structure analysis. J. Softw. Maintenance Res. Pract. 22(8): 567-596 (2010) - [c23]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating need-to-translate constant strings in web applications. SIGSOFT FSE 2010: 87-96
2000 – 2009
- 2009
- [j7]Dan Hao, Lu Zhang, Ming-Hao Liu, He Li, Jiasu Sun:
Test-Data Generation Guided by Static Defect Detection. J. Comput. Sci. Technol. 24(2): 284-293 (2009) - [j6]Dan Hao, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Interactive Fault Localization Using Test Information. J. Comput. Sci. Technol. 24(5): 962-974 (2009) - [j5]Yan Li, Lu Zhang, Bing Xie, Jiasu Sun:
Refining component description by leveraging user query logs. J. Syst. Softw. 82(5): 751-758 (2009) - [c22]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Locating need-to-translate constant strings for software internationalization. ICSE 2009: 353-363 - [c21]Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
TranStrL: An automatic need-to-translate string locator for software internationalization. ICSE 2009: 555-558 - [c20]Dan Hao, Lingming Zhang, Lu Zhang, Jiasu Sun, Hong Mei:
VIDA: Visual interactive debugging. ICSE 2009: 583-586 - [c19]Shan-Shan Hou, Lu Zhang, Qian Lan, Hong Mei, Jiasu Sun:
Generating Effective Test Sequences for BPEL Testing. QSIC 2009: 331-340 - 2008
- [j4]Dan Hao, Lu Zhang, Ying Pan, Hong Mei, Jiasu Sun:
On similarity-awareness in testing-based fault localization. Autom. Softw. Eng. 15(2): 207-249 (2008) - [j3]Wei Zhao, Lu Zhang, Jiasu Sun, Hong Mei:
An objective-oriented approach to program comprehension using multiple information sources. Sci. China Ser. F Inf. Sci. 51(7): 825-847 (2008) - [c18]Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu Sun:
An approach to detecting duplicate bug reports using natural language and execution information. ICSE 2008: 461-470 - [c17]Shan-Shan Hou, Lu Zhang, Tao Xie, Jiasu Sun:
Quota-constrained test-case prioritization for regression testing of service-centric systems. ICSM 2008: 257-266 - [c16]Yan Li, Liangjie Zhang, Ge Li, Bing Xie, Jiasu Sun:
Recommending Typical Usage Examples for Component Retrieval in Reuse Repositories. ICSR 2008: 76-87 - 2007
- [c15]Yan Li, Shaobin Cheng, Lu Zhang, Bing Xie, Jiasu Sun:
Mining User Query Logs to Refine Component Description. COMPSAC (1) 2007: 71-78 - [c14]Shan-Shan Hou, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun:
Applying Interface-Contract Mutation in Regression Testing of Component-Based Software. ICSM 2007: 174-183 - [c13]Yan Li, Yao Liu, Liang-Jie Zhang, Ge Li, Bing Xie, Jiasu Sun:
An Exploratory Study of Web Services on the Internet. ICWS 2007: 380-387 - 2006
- [j2]Lu Zhang, Tao Qin, Zhiying Zhou, Dan Hao, Jiasu Sun:
Identifying use cases in source code. J. Syst. Softw. 79(11): 1588-1598 (2006) - [j1]Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yang:
SNIAFL: Towards a static noninteractive approach to feature location. ACM Trans. Softw. Eng. Methodol. 15(2): 195-226 (2006) - [c12]Dan Hao, Lu Zhang, Hong Mei, Jiasu Sun:
Towards Interactive Fault Localization Using Test Information. APSEC 2006: 277-284 - [c11]Ming-Hao Liu, You-Feng Gao, Jinhui Shan, Jiang-Hong Liu, Lu Zhang, Jiasu Sun:
An Approach to Test Data Generation for Killing Multiple Mutants. ICSM 2006: 113-122 - [c10]Yan Li, Ying Pan, Lu Zhang, Bing Xie, Jiasu Sun:
Ranking Component Retrieval Results by Leveraging User History Information. SEKE 2006: 284-289 - 2005
- [c9]Wei Zhao, Lu Zhang, Hong Mei, Jiasu Sun:
Requirements Guided Dynamic Software Clustering. ICSM 2005: 605-608 - [c8]Jing Luo, Lu Zhang, Jiasu Sun:
A Hierarchical Decomposition Method for Object-Oriented Systems Based on Identifying Omnipresent Clusters. ICSM 2005: 647-650 - [c7]Dan Hao, Lu Zhang, Hao Zhong, Hong Mei, Jiasu Sun:
Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study. ICSM 2005: 683-686 - [c6]Dan Hao, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun:
A similarity-aware approach to testing based fault localization. ASE 2005: 291-294 - 2004
- [c5]Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yang:
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location. ICSE 2004: 293-303 - [c4]Jing Luo, Renkuan Jiang, Lu Zhang, Hong Mei, Jiasu Sun:
An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems. ICSM 2004: 390-398 - [c3]Wei Zhao, Lu Zhang, Dan Hao, Hong Mei, Jiasu Sun:
Alternative Scalable Algorithms for Lattice-Based Feature Location. ICSM 2004: 528 - 2003
- [c2]Tao Qin, Lu Zhang, Zhiying Zhou, Dan Hao, Jiasu Sun:
Discovering Use Cases from Source Code using the Branch-Reserving Call Graph. APSEC 2003: 60-67 - [c1]Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun:
Understanding How the Requirements Are Implemented in Source Code. APSEC 2003: 68-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint