Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BOTS: a constraint-based component system for synthesizing scalable software systems., and . LCTES, page 189-198. ACM, (2006)Correct Shading of Regularized CSG Solids Using a Depth-Interval Buffer., and . Advances in Computer Graphics Hardware V, page 117-138. Springer, (1990)Protection against remote code execution exploits of popular applications in Windows., , and . MALWARE, page 26-31. IEEE, (2014)Fine-Tuning Language Models from Human Preferences., , , , , , , and . CoRR, (2019)SYSDES: A Systolic Array Automation Design System., , , and . PPSC, page 375-384. SIAM, (1989)Language Models are Unsupervised Multitask Learners, , , , , and . (2018)Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Language Models are Few-Shot Learners, , , , , , , , , and 21 other author(s). (2020)Use-case-specific metrics for comparative testing of endpoint security products., and . MALWARE, page 35-40. IEEE Computer Society, (2013)Scaling Laws for Neural Language Models., , , , , , , , , and . CoRR, (2020)