Author of the publication

Efficient scalable thread-safety-violation detection: finding thousands of concurrency bugs during testing.

, , , , and . SOSP, page 162-180. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why do people not attend public library programs in the current digital age? A mix method study in Hong Kong., , and . Libr. Hi Tech, 42 (4): 1237-1265 (2024)Rate-compatible spatially coupled LDPC codes via repeat-accumulation extension., , and . ISTC, page 87-91. IEEE, (2014)Real-Time Tracking of Human Hands from a Sign-Language Image Sequence., , and . ACCV (1), volume 1351 of Lecture Notes in Computer Science, page 698-705. Springer, (1998)A New Method to Synthesize Japanese Sign Language Based on Intuitive Motion Primitives., , , and . HCI (1), page 441-445. Lawrence Erlbaum, (1999)Color-Based Hands Tracking System for Sign Language Recognition., , and . FG, page 462-467. IEEE Computer Society, (1998)Linear Mismatched Model Based Offset-Free MPC for Nonlinear Constrained Systems With Both Stochastic and Deterministic Disturbances and Its Application to CSTR., , , and . IEEE Access, (2018)Optical Properties of Reflected Light From Leaves: A Case Study From One Species., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (7): 4388-4406 (2019)AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants., , , and . IEEE Micro, 27 (1): 26-35 (2007)Energy Management Optimization of Open-Pit Mine Solar Photothermal-Photoelectric Membrane Distillation Using a Support Vector Machine and a Non-Dominated Genetic Algorithm., , , , , and . IEEE Access, (2020)Improved Calculation Scheme of Structure Matrix of Boolean Network Using Semi-tensor Product., , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 242-248. Springer, (2012)