Author of the publication

Capabilities for Better ML Engineering.

, , , , and . SafeAI@AAAI, volume 3381 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Situated Software: Concepts, Motivation, Technology, and the Future., , , and . IEEE Software, 25 (6): 50-55 (2008)Architecture Patterns for Mobile Systems in Resource-Constrained Environments., , , , , , and . MILCOM, page 680-685. IEEE, (2013)1st international workshop on the engineering of mobile-enabled systems (MOBS 2013)., , , , , and . ICSE, page 1533-1534. IEEE Computer Society, (2013)Cloudlet-based cyber-foraging for mobile systems in resource-constrained edge environments., , , , and . ICSE Companion, page 412-415. ACM, (2014)CSEE&T 2017 Hall of Fame Nomination: Studio-Based Master of Software Engineering Program at Carnegie Mellon University.. CSEE&T, page 1-2. IEEE, (2017)Tactical Cloudlets: Moving Cloud Computing to the Edge., , , , and . MILCOM, page 1440-1446. IEEE, (2014)Data Leakage in Notebooks: Static Detection and Better Processes., , , and . ASE, page 30:1-30:12. ACM, (2022)Common Misconceptions about Service-Oriented Architecture., , , and . ICCBSS, page 123-130. IEEE Computer Society, (2007)Why Standards Are Not Enough to Guarantee End-to-End Interoperability., , , and . ICCBSS, page 164-173. IEEE Computer Society, (2008)A Catalog of Architectural Tactics for Cyber-Foraging., and . QoSA, page 53-62. ACM, (2015)