From post

A software defect prediction method with metric compensation based on feature selection and transfer learning.

, , , , , и . Frontiers Inf. Technol. Electron. Eng., 23 (5): 715-731 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing., , и . Security Protocols Workshop, том 6615 из Lecture Notes in Computer Science, стр. 107-114. Springer, (2008)Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation., , , , и . ACM Conference on Computer and Communications Security, стр. 1607-1619. ACM, (2015)A Case for Virtualizing Persistent Memory., , , , , , и . SoCC, стр. 126-140. ACM, (2016)Poster: TVisor - A Practical and Lightweight Mobile Red-Green Dual-OS Architecture., , , , и . MobiSys, стр. 485. ACM, (2015)VButton: Practical Attestation of User-driven Operations in Mobile Apps., , , , , , , и . MobiSys, стр. 28-40. ACM, (2018)X10-PM: Transparent and Efficient Place Migration for APGAS Language., , , и . HPCC/EUC, стр. 1337-1344. IEEE, (2013)An Enhanced Predictive Cruise Control System Design With Data-Driven Traffic Prediction., , , , , , и . IEEE Trans. Intell. Transp. Syst., 23 (7): 8170-8183 (2022)Modelling Uptake Sensitivities of Connected and Automated Vehicle Technologies., , и . Int. J. Syst. Dyn. Appl., 10 (2): 88-106 (2021)Tiled-MapReduce: Efficient and Flexible MapReduce Processing on Multicore with Tiling., и . ACM Trans. Archit. Code Optim., 10 (1): 3:1-3:30 (2013)TZ-Container: protecting container from untrusted OS with ARM TrustZone., , , , , и . Sci. China Inf. Sci., (2021)