Author of the publication

SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.

, , , , , , , and . ASE, page 821-833. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cluster Computing Workshop - Preface/Introduction., , and . PDPTA, CSREA Press, (2000)Data management services and transfer scheme in ChinaGrid., , , and . IJWGS, 3 (4): 447-461 (2007)COMET: A communication-efficient load balancing strategy for multi-agent cluster computing., , , and . PARCO, page 574-581. Imperial College Press, (1999)Designing SSI clusters with hierarchical checkpointing and single I/O space., , , , and . IEEE Concurrency, 7 (1): 60-69 (1999)iAware: Making Live Migration of Virtual Machines Interference-Aware in the Cloud., , , , , and . IEEE Trans. Computers, 63 (12): 3012-3025 (2014)Multi-View Object Detection by Classifier Interpolation., , , and . ICASSP, page 826-829. IEEE, (2010)ImageGrid: An Image Processing Grid Based on CGSP., , and . High Performance Computing Workshop, volume 16 of Advances in Parallel Computing, page 403-423. IOS Press, (2006)Parallel singular value decomposition on heterogeneous multi-core and multi-GPU platforms., , , and . ICDIM, page 45-50. IEEE, (2014)CUDAGA: A Portable Parallel Programming Model for GPU Cluster., , , , , and . CloudCom-Asia, volume 9106 of Lecture Notes in Computer Science, page 203-216. Springer, (2015)PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks., , , and . IEEE Access, (2018)