Your selections:
Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey
- Hu, Han, Wang, Han, Dong, Ruiqi, Chen, Xiao, Chen, Chunyang
Ensuring Fairness and Gradient Privacy in Personalized Heterogeneous Federated Learning
- Lewis, Cody, Varadharajan, Vijay, Noman, Nasimul, Tupakula, Uday
LogSD: Detecting anomalies from system logs through self-supervised learning and frequency-based masking
- Xie, Yongzheng, Zhang, Hongyu, Babar, Muhammad Ali
LogShrink: Effective log compression by leveraging commonality and variability of log data
- Li, Xiaoyun, Zhang, Hongyu, Le, Van-Hoang, Chen, Pengfei
Optimizing the utilization of Large Language Models via schedule optimization: an exploratory study
- Liu, Yueyue, Zhang, Hongyu, Li, Zhiqiang, Miao, Yuantian
Techniques for enhancing security in industrial control systems
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol Krishna
- Lutz, Bernhard, Adam, Marc, Feuerriegel, Stefan, Pröllochs, Nicolas, Neumann, Dirk
Approximating the Boundaries of Unstable Nuclei Using Analytic Continued Fractions
- Moscato, Pablo, Grebogi, Rafael B.
Dynamic Depth for Better Generalization in Continued Fraction Regression
- Moscato, Pablo, Ciezak, Andrew, Noman, Nasimul
Revisiting Code Search in a Two-Stage Paradigm
- Hu, Fan, Wang, Yanlin, Du, Lun, Li, Xirong, Zhang, Hongyu, Han, Shi, Zhang, Dongmei
- Deffrennes, Armand, Vincent, Lucile, Pivette, Marie, El Haddad, Kevin, Bailey, Jacqueline Deanna, Perusquia-Hernandez, Monica, Alarcão, Soraia M., Dutoit, Thierry
Diet code is healthy: simplifying programs for pre-trained models of code
- Zhang, Zhaowei, Zhang, Hongyu, Shen, Beijun, Gu, Xiaodong
Multi-task Hierarchical Classification for Disk Failure Prediction in Online Service Systems
- Liu, Yudong, Yang, Hailan, Zhang, Chenjian, Wang, Paul, Dang, Yingnong, Rajmohan, Saravan, Zhang, Dongmei, Zhao, Pu, Ma, Minghua, Wen, Chengwu, Zhang, Hongyu, Luo, Chuan, Lin, Qingwei, Yi, Chang, Wang, Jiaojian
NENYA: Cascade Reinforcement Learning for Cost-Aware Failure Mitigation at Microsoft 365
- Wang, Lu, Zhao, Pu, Zhang, Hongyu, Rajmohan, Saravan, Zhang, Dongmei, Du, Chao, Luo, Chuan, Su, Mengna, Yang, Fangkai, Liu, Yudong, Lin, Qingwei, Wang, Min, Dang, Yingnong
Patching Weak Convolutional Neural Network Models through Modularization and Composition
- Qi, Binhang, Sun, Hailong, Gao, Xiang, Zhang, Hongyu
SPINE: a scalable log parser with feedback guidance
- Wang, Xuheng, Zhang, Xu, Rajmohan, Saravanakumar, Zhang, Dongmei, Li, Liqun, He, Shilin, Zhang, Hongyu, Liu, Yudong, Zheng, Lingling, Kang, Yu, Lin, Qingwei, Dang, Yingnong
Stop Reinventing the Wheel! Promoting Community Software in Computing Education
- Blanchard, Jeremiah, Hott, John R., Berry, Vincent, Carroll, Rebecca, Edmison, Bob, Glassey, Richard, Karnalim, Oscar, Plancher, Brian, Russell, Sean
Understanding the Importance of Cultural Appropriateness for User Interface Design: An Avatar Study
- Aljaroodi, Hussain M., Adam, Marc T. P., Teubner, Timm, Chiong, Raymond
Gender differences when adopting avatars for educational games
- Brown, Aiden A. B., Bailey, Jacqueline J. B., Blackmore, Karen L., Boogaard, Sherin S. B., Nesbitt, Keith V.
A novel graph-based program representation for Java code plagiarism detection
Are you sure you would like to clear your session, including search history and login status?