Author of the publication

Navigating the OverKill in Large Language Models.

, , , , , , , , , and . ACL (1), page 4602-4614. Association for Computational Linguistics, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MonArch: Monitoring and analytics in software defined infrastructures., , , , and . CloudNet, page 198-200. IEEE, (2015)Beauty Sells: Identifying Physical Attractiveness Effect In an Online Dating Platform., , and . CONF-IRM, page 13. (2018)Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments., , and . UCC, page 178-185. IEEE Computer Society, (2011)Hashtag Recommendation for Multimodal Microblog Using Co-Attention Network., , , , and . IJCAI, page 3420-3426. ijcai.org, (2017)Stealthy Attacks for Partially-Observed Discrete Event Systems., , , and . ETFA, page 1161-1164. IEEE, (2018)Load Balancing for Performance Differentiation in Dual-Priority Clustered Servers., , , and . QEST, page 385-394. IEEE Computer Society, (2006)Adaptive Doppler frequency shift estimation for OFDM systems., , , and . WCSP, page 1-5. IEEE, (2012)Sparse higher order conditional random fields for improved sequence labeling., , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 849-856. ACM, (2009)Efficient block-based intra prediction for image coding with 2D geometrical manipulations., , , and . ICIP, page 2916-2919. IEEE, (2008)Assertion-Based Validation of Modified Programs., , and . ICST, page 426-435. IEEE Computer Society, (2009)