On identifiability of discrete-time nonlinearly parameterized systems | 0 | 0.34 | 2022 |
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel | 0 | 0.34 | 2021 |
Simplify Array Processing Loops for Efficient Program Verification | 0 | 0.34 | 2021 |
Online 3-D Trajectory Design for UAV-Enabled Communications with User Mobility and UAV Kinematic Constraints. | 0 | 0.34 | 2021 |
DRA U-Net - An Attention based U-Net Framework for 2D Medical Image Segmentation. | 0 | 0.34 | 2021 |
Biological Tissue Damage Monitoring Method Based on IMWPE and PNN during HIFU Treatment. | 0 | 0.34 | 2021 |
MulCode: A Multi-task Learning Approach for Source Code Understanding | 1 | 0.35 | 2021 |
An Improved Firefly Algorithm for Software Defect Prediction. | 0 | 0.34 | 2020 |
Runtime Verification on Hierarchical Properties of ROS-Based Robot Swarms | 0 | 0.34 | 2020 |
Iterative Controller Synthesis for Multirobot System | 0 | 0.34 | 2020 |
Decentralized Runtime Enforcement For Robotic Swarms | 0 | 0.34 | 2020 |
Collective intelligence for smarter neural program synthesis | 0 | 0.34 | 2020 |
Boosting component-based synthesis with API usage knowledge | 0 | 0.34 | 2020 |
Symbolic verification of message passing interface programs | 4 | 0.41 | 2020 |
基于非局部相似联合低秩表示的高光谱图像去噪 (Hyperspectral Images Denoising Based on Non-local Similarity Joint Low-rank Representation). | 0 | 0.34 | 2020 |
Prosy: Api-Based Synthesis With Probabilistic Model | 0 | 0.34 | 2020 |
Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution | 0 | 0.34 | 2020 |
How Much Support Can Api Recommendation Methods Provide For Component-Based Synthesis? | 0 | 0.34 | 2020 |
Accuracy Improvement For Neural Program Synthesis Via Attention Mechanism And Program Slicing | 0 | 0.34 | 2020 |
改进的神经语言模型及其在代码提示中的应用 (Modified Neural Language Model and Its Application in Code Suggestion). | 0 | 0.34 | 2019 |
Characteristics of Spatial Magnetic Field of Coupling Mechanism with Magnetic Shield in Wireless Charging System. | 0 | 0.34 | 2019 |
NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis Capability | 0 | 0.34 | 2018 |
Guide Fuzzing with Multi-Factor Potential Analysis | 0 | 0.34 | 2018 |
Automatic Exploit Generation for Buffer Overflow Vulnerabilities | 0 | 0.34 | 2018 |
User Identification with Spatio-Temporal Awareness across Social Networks. | 0 | 0.34 | 2018 |
Monitor Synthesis for Parametric MTL Properties in Discrete Control Software | 0 | 0.34 | 2017 |
Unified Access Layer with PostgreSQL FDW for Heterogeneous Databases. | 0 | 0.34 | 2017 |
RSVP-TE Signaling Procedure for End-to-End GMPLS Restoration and Resource Sharing. | 0 | 0.34 | 2017 |
Optimizing Monitor Code Based on Patterns in Runtime Verification | 0 | 0.34 | 2017 |
Towards verification of computation orchestration | 2 | 0.37 | 2014 |
Challenges, Experiences and Lessons Learned from Deploying Patient Monitoring and Assistance System at Dementia Care Hostel. | 0 | 0.34 | 2013 |
ACARP: auto correct activity recognition rules using process analysis toolkit (PAT) | 3 | 0.47 | 2012 |
Formal Analysis of Pervasive Computing Systems | 7 | 0.51 | 2012 |
Runtime verification with predictive semantics | 8 | 0.49 | 2012 |
An event pattern language for runtime monitoring based on AOP. | 0 | 0.34 | 2011 |
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP | 0 | 0.34 | 2010 |
Verifying Stateful Timed CSP Using Implicit Clocks and Zone Abstraction | 21 | 1.10 | 2009 |
Automating Software FMEA via Formal Analysis of Dependence Relations | 5 | 0.46 | 2008 |
Specifying and Verifying Sensor Networks: An Experiment of Formal Methods | 12 | 0.58 | 2008 |
Verification of computation orchestration via timed automata | 30 | 1.32 | 2006 |
A reasoning method for timed CSP based on constraint solving | 15 | 0.96 | 2006 |
HighSpec: a tool for building and checking OZTA models | 3 | 0.36 | 2006 |
The semantics and tool support of OZTA | 1 | 0.38 | 2005 |
Real Solutions of the Equation Φt(A)=1/nJn. | 0 | 0.34 | 2000 |