Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance-Aware Approach for Time-Constraint Wireless Data Querying Based on Game Theory., , and . J. Inf. Sci. Eng., 30 (6): 1905-1926 (2014)Synergy between Machine/Deep Learning and Software Engineering: How Far Are We?, , , , , , , and . CoRR, (2020)Swarm-Based Spreading Points., , , and . ICSI (2), volume 10386 of Lecture Notes in Computer Science, page 158-166. Springer, (2017)AST-Trans: Code Summarization with Efficient Tree-Structured Attention., , , , , , and . ICSE, page 150-162. ACM, (2022)A second-order smooth penalty function algorithm for constrained optimization problems., , , , and . Comput. Optim. Appl., 55 (1): 155-172 (2013)Learning the Relation Between Similarity Loss and Clustering Loss in Self-Supervised Learning., , , , , , , and . IEEE Trans. Image Process., (2023)A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks., , , , , , and . CoRR, (2023)Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing., , , , , , and . Multim. Tools Appl., 79 (15-16): 10751-10780 (2020)Relevance and alignment of Real-Client Real-Project courses via technology transfer., and . CSEE&T, page 189-198. IEEE Computer Society, (2011)When to release in open source project?, and . ICSE (Companion Volume), page 737-739. ACM, (2016)