Author of the publication

Efficient scalable thread-safety-violation detection: finding thousands of concurrency bugs during testing.

, , , , and . SOSP, page 162-180. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why do people not attend public library programs in the current digital age? A mix method study in Hong Kong., , and . Libr. Hi Tech, 42 (4): 1237-1265 (2024)Improved Calculation Scheme of Structure Matrix of Boolean Network Using Semi-tensor Product., , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 242-248. Springer, (2012)Research on Green Logistics Service Providers Selection Based on Intuitionistic Language Fuzzy Entropy.. J. Comput., 7 (2): 540-546 (2012)Ontology-based Detection of Inconsistencies in UML/OCL Models., , , , and . MODELSWARD, page 194-202. SCITEPRESS, (2022)Link Prediction on Dynamic Heterogeneous Graphs via GNN with Multiple Attention Mechanisms., , and . ISCID, page 62-65. IEEE, (2022)BDA: Bandit-based Transferable AutoAugment., , , , , and . SDM, page 550-558. SIAM, (2023)Analyzing persistent state interactions to improve state management., , , , , , and . SIGMETRICS/Performance, page 363-364. ACM, (2006)Rate-compatible spatially coupled LDPC codes via repeat-accumulation extension., , and . ISTC, page 87-91. IEEE, (2014)Optical Properties of Reflected Light From Leaves: A Case Study From One Species., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (7): 4388-4406 (2019)Real-Time Tracking of Human Hands from a Sign-Language Image Sequence., , and . ACCV (1), volume 1351 of Lecture Notes in Computer Science, page 698-705. Springer, (1998)