Showing results 13 to 26 of 26
< previous
Issue Date | Title | Author(s) |
2017-01-01 | Localizing Runtime Anomalies in Service-Oriented Systems | He, Q; Xie, X; Wang, Y; Ye, D; Chen, F; Jin, H; Yang, Y |
2019-01-01 | A manifesto for future generation cloud computing: Research directions for the next decade | Buyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H |
2020-10-01 | Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management | Yuan, B; Zhao, H; Lin, C; Zou, D; Yang, LT; Jin, H; He, L; Yu, S |
2022-05-24 | NaturalCC: An Open-Source Toolkit for Code Intelligence | Wan, Y; He, Y; Bi, Z; Zhang, J; Sui, Y; Zhang, H; Hashimoto, K; Jin, H; Xu, G; Xiong, C; Yu, PS |
2018-06-01 | A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks | Yuan, B; Jin, H; Zou, D; Yang, LT; Yu, S |
2021-11 | Resilient NdFeB magnet recycling under the impacts of COVID-19 pandemic: Stochastic programming and Benders decomposition | Cheramin, M; Saha, AK; Cheng, J; Paul, SK; Jin, H |
2023-07-01 | Resource investment for DDoS attack resistant SDN: a practical assessment | Yuan, B; Zhang, F; Wan, J; Zhao, H; Yu, S; Zou, D; Hua, Q; Jin, H |
2023-11-30 | RETIA: relation-entity twin-interact aggregation for temporal knowledge graph extrapolation | Liu, K; Zhao, F; Xu, G; Wang, X; Jin, H |
2018-06-22 | Seamless Upscaling of the Field-Measured Grassland Aboveground Biomass Based on Gaussian Process Regression and Gap-Filled Landsat 8 OLI Reflectance | Yin, G; Li, A; Wu, C; Wang, J; Xie, Q; Zhang, Z; Nan, X; Jin, H; Bian, J; Lei, G |
2016-09-10 | Taming transitive permission attack via bytecode rewriting on Android application | Wang, D; Jin, H; Zou, D; Xu, P; Zhu, T; Chen, G |
2022-12-31 | Temporal knowledge graph reasoning via time-distributed representation learning | Liu, K; Zhao, F; Xu, G; Wang, X; Jin, H |
2022-01-01 | What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code | Wan, Y; Zhao, W; Zhang, H; Sui, Y; Xu, G; Jin, H |
2022-11-07 | You see what I want you to see: poisoning vulnerabilities in neural code search | Wan, Y; Zhang, S; Zhang, H; Sui, Y; Xu, G; Yao, D; Jin, H; Sun, L |
2016-12-01 | ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets | Pang, G; Ting, KM; Albrecht, D; Jin, H |