Author of the publication

aComment: mining annotations from comments and code to detect interrupt related concurrency bugs.

, , and . ICSE, page 11-20. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical analysis of dynamic correlations of stock returns: evidence from Chinese A-share and B-share markets, , and . Quantitative Finance, 7 (6): 651--667 (2007)Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities., , , and . J. Inf. Secur. Appl., (February 2024)On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files., , , , and . Empir. Softw. Eng., 23 (6): 3187-3220 (2018)Sequential Human Activity Recognition Based on Deep Convolutional Network and Extreme Learning Machine Using Wearable Sensors., , , , , and . J. Sensors, (2018)ElemCor: accurate data analysis and enrichment calculation for high-resolution LC-MS stable isotope labeling experiments., , , , , , , and . BMC Bioinform., 20 (1): 89:1-89:9 (2019)ENCORE: Ensemble Learning using Convolution Neural Machine Translation for Automatic Program Repair., , , , and . CoRR, (2019)Energy-Efficient Collaborative Multi-Access Edge Computing via Deep Reinforcement Learning., , , and . IEEE Trans. Ind. Informatics, 19 (6): 7689-7699 (June 2023)Bit-split string-matching engines for intrusion detection and prevention., , and . ACM Trans. Archit. Code Optim., 3 (1): 3-34 (2006)Exposing numerical bugs in deep learning via gradient back-propagation., , , , , and . ESEC/SIGSOFT FSE, page 627-638. ACM, (2021)Vicious Cycles in Distributed Software Systems., , , and . ASE, page 91-103. IEEE, (2023)