Your selections:
Techniques for enhancing security in industrial control systems
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol Krishna
- Lutz, Bernhard, Adam, Marc, Feuerriegel, Stefan, Pröllochs, Nicolas, Neumann, Dirk
Approximating the Boundaries of Unstable Nuclei Using Analytic Continued Fractions
- Moscato, Pablo, Grebogi, Rafael B.
Dynamic Depth for Better Generalization in Continued Fraction Regression
- Moscato, Pablo, Ciezak, Andrew, Noman, Nasimul
Revisiting Code Search in a Two-Stage Paradigm
- Hu, Fan, Wang, Yanlin, Du, Lun, Li, Xirong, Zhang, Hongyu, Han, Shi, Zhang, Dongmei
- Deffrennes, Armand, Vincent, Lucile, Pivette, Marie, El Haddad, Kevin, Bailey, Jacqueline Deanna, Perusquia-Hernandez, Monica, Alarcão, Soraia M., Dutoit, Thierry
Diet code is healthy: simplifying programs for pre-trained models of code
- Zhang, Zhaowei, Zhang, Hongyu, Shen, Beijun, Gu, Xiaodong
Multi-task Hierarchical Classification for Disk Failure Prediction in Online Service Systems
- Liu, Yudong, Yang, Hailan, Zhang, Chenjian, Wang, Paul, Dang, Yingnong, Rajmohan, Saravan, Zhang, Dongmei, Zhao, Pu, Ma, Minghua, Wen, Chengwu, Zhang, Hongyu, Luo, Chuan, Lin, Qingwei, Yi, Chang, Wang, Jiaojian
NENYA: Cascade Reinforcement Learning for Cost-Aware Failure Mitigation at Microsoft 365
- Wang, Lu, Zhao, Pu, Zhang, Hongyu, Rajmohan, Saravan, Zhang, Dongmei, Du, Chao, Luo, Chuan, Su, Mengna, Yang, Fangkai, Liu, Yudong, Lin, Qingwei, Wang, Min, Dang, Yingnong
Patching Weak Convolutional Neural Network Models through Modularization and Composition
- Qi, Binhang, Sun, Hailong, Gao, Xiang, Zhang, Hongyu
SPINE: a scalable log parser with feedback guidance
- Wang, Xuheng, Zhang, Xu, Rajmohan, Saravanakumar, Zhang, Dongmei, Li, Liqun, He, Shilin, Zhang, Hongyu, Liu, Yudong, Zheng, Lingling, Kang, Yu, Lin, Qingwei, Dang, Yingnong
Stop Reinventing the Wheel! Promoting Community Software in Computing Education
- Blanchard, Jeremiah, Hott, John R., Berry, Vincent, Carroll, Rebecca, Edmison, Bob, Glassey, Richard, Karnalim, Oscar, Plancher, Brian, Russell, Sean
Understanding the Importance of Cultural Appropriateness for User Interface Design: An Avatar Study
- Aljaroodi, Hussain M., Adam, Marc T. P., Teubner, Timm, Chiong, Raymond
Gender differences when adopting avatars for educational games
- Brown, Aiden A. B., Bailey, Jacqueline J. B., Blackmore, Karen L., Boogaard, Sherin S. B., Nesbitt, Keith V.
A novel graph-based program representation for Java code plagiarism detection
- Chen, Junjie, Patra, Jibesh, Pradel, Michael, Xiong, Yingfei, Zhang, Hongyu, Hao, Dan, Zhang, Lu
An empirical study on program failures of deep learning jobs
- Zhang, Ru, Xiao, Wencong, Zhang, Hongyu, Liu, Yu, Lin, Haoxiang, Yang, Mao
Choosing code segments to exclude from code similarity detection
- Simon,, Karnalim, Oscar, Sheard, Judy, Dema, Ilir, Karkare, Amey, Leinonen, Juho, Liut, Michael, McCauley, Renée
Efficient incident identification from multi-dimensional issue reports via meta-heuristic search
- Gu, Jiazhen, Luo, Chuan, Qin, Si, Qiao, Bo, Lin, Qingwei, Zhang, Hongyu, Li, Ze, Dang, Yingnong, Cai, Shaowei, Wu, Wei, Zhou, Yangfan, Chintalapati, Murali, Zhang, Dongmei
Estimating GPU memory consumption of deep learning models
- Gao, Yanjie, Liu, Yu, Zhang, Hongyu, Li, Zhengxian, Zhu, Yonghao, Lin, Haoxiang, Yang, Mao
Are you sure you would like to clear your session, including search history and login status?