From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning., , , , , и . CoRR, (2023)Has Your FaaS Application Been Decommissioned Yet? - A Case Study on the Idle Timeout in Function as a Service Infrastructure., , , и . CoRR, (2022)Towards a Change Taxonomy for Machine Learning Systems., , , , , и . CoRR, (2022)2nd International Workshop on Load Testing of Large Software Systems (LT 2013)., , , и . CASCON, стр. 353-354. IBM / ACM, (2013)Keeping Deep Learning Models in Check: A History-Based Approach to Mitigate Overfitting., , , , и . CoRR, (2024)Assessing the Maturity of Model Maintenance Techniques for AIOps Solutions., , , и . CoRR, (2023)An exploratory study of the evolution of communicated information about the execution of large software systems., , , , , , и . J. Softw. Evol. Process., 26 (1): 3-26 (2014)A Framework for Studying Clones In Large Software Systems., и . SCAM, стр. 203-212. IEEE Computer Society, (2007)Automated performance analysis of load tests., , , и . ICSM, стр. 125-134. IEEE Computer Society, (2009)Understanding Log Lines Using Development Knowledge., , , и . ICSME, стр. 21-30. IEEE Computer Society, (2014)