References
- J. Baquero, J. Camargo, Restrepo-Calle, F. Aponte, and F. González. “Predicting the programming language: Extracting knowledge from stack overflow posts”. In Colombian Conference on Computing, pages 199–210. Springer, 2017.
- J. Kennedy, V. Dam, and V. Zaytsev. “Software language identification with natural language classifiers”. In IEEE Software Analysis, Evolution, and Reengineering Conference, pages 624–628, 2016.
- J. Khasnabish, M. Sodhi, J. Deshmukh, and G. Srinivasaraghavan. “Detecting programming language from source code using Bayesian learning techniques”. In International Workshop on Machine Learning and Data Mining in Pattern Recognition, pages 513–522, 2014.
- Saha Saha, A. K and R. Schneider. “A discriminative model approach for suggesting tags automatically for stack overflow questions”. In IEEE Working Conference on Mining Software Repositories, pages 73–76, 2013.
- A. Barua, S Thomas, and A. Hassan. “What are developers talking about? An analysis of topics and trends in stack overflow”. Empirical Software Engineering, 19(3):619–654, 2014. doi: 10.1007/s10664-012-9231-y
- C. Rosen and E. Shihab. “What are mobile developers asking about? A large scale study using stack overflow”. Empirical Software Engineering, 21(3):1192–1223, 2016. doi: 10.1007/s10664-015-9379-3
- Patrick Morrison, Emurson Murphy-Hill. “Is programming knowledge related to age? An exploration of stack overflow”. Mining Software Repositories (MSR), 2013 10th IEEE Working Conference.
- S. Nasehi, J. Sillito, F. Maurer, and C. Burns. “What makes a good code example?: A study of programming Q&A in stack overflow”. In IEEE International Conference on Software Maintenance, pages 25–34, 2012.
- D. Correa and A. Sureka. “Chaff from the wheat: Characterization and modelling of deleted questions on stack overflow”. In ACM International Conference on World wide web, pages 631–642, 2014.
- Arora, I., & Saha, A. (2019). ELM and KELM based software defect prediction using feature selection techniques. Journal of Information and Optimization Sciences, 40(5), 1025-1045. doi: 10.1080/02522667.2019.1637999
- Arora, A. S., Raja, L., & Bahl, B. (2018). Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing.
- Y. Zhang, R. Jin, and Zhi-Hua Zhou. “Understanding bag-of-words model: A statistical framework”. International Journal of Machine Learning and Cybernetics. 2010
- Elena Rudkowsky, Martin Haselmayer, Matthias Wastian, Marcelo Jenny, Štefan Emrich & Michael Sedlmair (2018), “More than Bags of Words: Sentiment Analysis with Word Embeddings, Communication Methods and Measures”, 12:2-3, 140-157.