From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Classes Susceptible to Adversarial Attacks., , , и . CoRR, (2019)Modularizing crosscutting concerns with ptolemy., , , , , , и . OOPSLA Companion, стр. 31-32. ACM, (2011)Building scalable software systems in the multicore era.. FoSER, стр. 293-298. ACM, (2010)Behavioral automata composition for automatic topology independent verification of parameterized systems., , и . ESEC/SIGSOFT FSE, стр. 325-334. ACM, (2009)Eos: instance-level aspects for integrated system design., и . ESEC / SIGSOFT FSE, стр. 291-306. ACM, (2003)Repairing deep neural networks: fix patterns and challenges., , , и . ICSE, стр. 1135-1146. ACM, (2020)Inferring Behavioral Specifications from Large-scale Repositories by Leveraging Collective Intelligence., , , и . ICSE (2), стр. 579-582. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Boa: a language and infrastructure for analyzing ultra-large-scale software repositories., , , и . ICSE, стр. 422-431. IEEE Computer Society, (2013)Predictive thread-to-core assignment on a heterogeneous multi-core processor., , и . PLOS@SOSP, стр. 7:1-7:5. ACM, (2007)Fix Fairness, Don't Ruin Accuracy: Performance Aware Fairness Repair using AutoML., , и . ESEC/SIGSOFT FSE, стр. 502-514. ACM, (2023)