2022
DOI: 10.1016/j.jss.2022.111219
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting gated graph neural network for detecting and explaining self-admitted technical debts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Recently, due to the powerful ability to model dependency relationships within a graph, GNNs have been widely applied in various deep learning tasks and applications 55–57 . Therefore, our model employs GCN to learn dependency information when encoding event types, as mentioned in subsection 4.3.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, due to the powerful ability to model dependency relationships within a graph, GNNs have been widely applied in various deep learning tasks and applications 55–57 . Therefore, our model employs GCN to learn dependency information when encoding event types, as mentioned in subsection 4.3.…”
Section: Methodsmentioning
confidence: 99%
“…Recently, due to the powerful ability to model dependency relationships within a graph, GNNs have been widely applied in various deep learning tasks and applications. [55][56][57] Therefore, our model employs GCN to learn dependency information when encoding event types, as mentioned in subsection 4.3. Moreover, due to the significant advantages of hyperbolic space in capturing hierarchical structures, we have also applied hyperbolic space in our model to learn the hierarchical relationships among event types.…”
Section: Ablation Studymentioning
confidence: 99%
“…One of the threats to construct validity in the study concerns the potentially different interpretations of discussed topics between interviewees and researchers. Because we focus on SATD in this study and most Code Comments [6], [7], [12], [14], [15], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66] Issue Trackers [3], [12], [16] Commit Messages [12] Pull Requests [12] Automated Differentiation Between Fixed and Unfixed SATD -Automated Tracing Between SATD in Different Sources [11], [12], [36], [37] and Code and Related Development Tasks -Automated SATD Prioritization [9], [67], …”
Section: Threats To Validity 61 Construct Validitymentioning
confidence: 99%
“…proposed a graph matching network, which utilizes the CFG of the program to deal with the challenge of binary function similarity search Ling et al (2021). proposed a deep graph matching and searching model based on graph neural networks(Kipf and Welling, 2017; Wang et al, 2021b,a;Yu et al, 2022; for code retrieval. They represented both natural language queries and code snippets based on the unified graph-structured data Iyer et al (2020).…”
mentioning
confidence: 99%