Author of the publication

An in-depth investigation into the relationships between structural metrics and unit testability in object-oriented systems.

, , , , , , and . Sci. China Inf. Sci., 55 (12): 2800-2815 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process Feature Change Recognition Based on Model Performance Monitoring and Adaptive Model Correction for the Gold Cyanidation Leaching Process., , , , , , and . IEEE Access, (2019)MorphStream: Scalable Processing of Transactions over Streams on Multicores., , , , , and . CoRR, (2023)Assessment of Night-Time Lighting for Global Terrestrial Protected and Wilderness Areas., , , , , and . Remote. Sens., 11 (22): 2699 (2019)Time Optimal n-Size Matching Parentheses and Binary Tree Decoding Algorithms on a p-Processor BSR., , and . Parallel Process. Lett., 12 (3-4): 365-374 (2002)Embedded Feature Selection and Machine Learning Methods for Flash Flood Susceptibility-Mapping in the Mainstream Songhua River Basin, China., , , , , and . Remote. Sens., 14 (21): 5523 (2022)Towards Benchmarking GUI Compatibility Testing on Mobile Applications., , , , , , and . CoRR, (2022)Enhancing Mixup-Based Graph Learning for Language Processing via Hybrid Pooling., , , , , , and . CoRR, (2022)Comparison and Evaluation of Annual NDVI Time Series in China Derived from the NOAA AVHRR LTDR and Terra MODIS MOD13C1 Products., , , , and . Sensors, 17 (6): 1298 (2017)The role of model checking in software engineering., , , , and . Frontiers Comput. Sci., 12 (4): 642-668 (2018)Detecting compromised email accounts via login behavior characterization., , , , , , and . Cybersecur., 6 (1): 36 (December 2023)