Author of the publication

Online Defect Prediction for Imbalanced Data.

, , , and . ICSE (2), page 99-108. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight Bounds on the Message Complexity of Distributed Tree Verification., , and . OPODIS, volume 286 of LIPIcs, page 26:1-26:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Improved Tradeoffs for Leader Election., , , and . PODC, page 355-365. ACM, (2023)A Geospatial Method for Detecting Map-Based Road Segment Discrepancies., , , , , , , , , and 3 other author(s). MDM, page 230-237. IEEE, (2022)Aquila: A unified, low-latency fabric for datacenter networks., , , , , , , , , and 15 other author(s). NSDI, page 1249-1266. USENIX Association, (2022)Efficient methods for estimating constrained parameters with applications to regularized (lasso) logistic regression, , , and . Computational Statistics & Data Analysis, 52 (7): 3528--3542 (Mar 15, 2008)Cost-Sensitive Concept Learning of Sensor Use in Approach ad Recognition., and . ML, page 392-395. Morgan Kaufmann, (1989)Game Based Flow Rate Control for Networks., , , , and . ICICIC (1), page 401-404. IEEE Computer Society, (2006)Semi-automated microRNA ontology development based on artificial neural networks., , , , , and . BIBM, page 526-529. IEEE Computer Society, (2013)Direct 0-1 Loss Minimization and Margin Maximization with Boosting., , , and . NIPS, page 872-880. (2013)Time-varying Target Characteristic Analysis of Dual Stealth Aircraft Formation., , , , , and . HPCCT/BDAI, page 200-204. ACM, (2019)