Výsledky vyhledávání - "Theory of computation → Theory and algorithms for application domains"

Upřesnit hledání
  1. 1

    Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System Autor Huang, Jun, Yang, Yang, Yu, Hang, Li, Jianguo, Zheng, Xiao

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “…Microservice architecture has sprung up over recent years for managing enterprise applications, due to its ability to independently deploy and scale services…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions Autor Zhang, Lingfeng, Wang, Zhaohui, Zhang, Yueling, Zhang, Min, Wang, Jiangtao

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…Machine Learning (ML) algorithms are increasingly used in decision-making process across various social-critical domains, but they often somewhat inherit and…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Making Fair ML Software using Trustworthy Explanation Autor Chakraborty, Joymallya, Peng, Kewen, Menzies, Tim

    ISSN: 2643-1572
    Vydáno: ACM 01.09.2020
    “…Machine learning software is being used in many applications (finance, hiring, admissions, criminal justice) having huge social impact. But sometimes the…”
    Získat plný text
    Konferenční příspěvek
  4. 4

    Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining Autor Shen, Weijun, Li, Yanhui, Chen, Lin, Han, Yuanlei, Zhou, Yuming, Xu, Baowen

    ISSN: 2643-1572
    Vydáno: ACM 01.09.2020
    “…With the increasing application of deep learning (DL) models in many safety-critical scenarios, effective and efficient DL testing techniques are much in…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    Quorum: Zero-Training Unsupervised Anomaly Detection using Quantum Autoencoders Autor Ludmir, Jason Zev, Rebello, Sophia, Ruiz, Jacob, Patel, Tirthak

    Vydáno: IEEE 22.06.2025
    “…Detecting mission-critical anomalous events and data is a crucial challenge across various industries, including finance, healthcare, and energy. Quantum…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Holistic Design towards Resource-Stringent Binary Vector Symbolic Architecture Autor Duan, Shijin, Narkthong, Nuntipat, Luo, Yukui, Ren, Shaolei, Xu, Xiaolin

    Vydáno: IEEE 22.06.2025
    “…Classification tasks on ultra-lightweight devices demand devices that are resource-constrained and deliver swift responses. Binary Vector Symbolic Architecture…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Scalable Community Detection Using Quantum Hamiltonian Descent and QUBO Formulation Autor Cheng, Jinglei, Zhou, Ruilin, Gan, Yuhang, Qian, Chen, Liu, Junyu

    Vydáno: IEEE 22.06.2025
    “…We present a quantum-inspired algorithm that utilizes Quantum Hamiltonian Descent (QHD) for efficient community detection. Our approach reformulates the…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    MAGIKA: AI-Powered Content-Type Detection Autor Fratantonio, Yanick, Invernizzi, Luca, Farah, Loua, Thomas, Kurt, Zhang, Marina, Albertini, Ange, Galilee, Francois, Metitieri, Giancarlo, Cretin, Julien, Petit-Bianco, Alex, Tao, David, Bursztein, Elie

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…The task of content-type detection-which entails identifying the data encoded in an arbitrary byte sequence-is critical for operating systems, development,…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone Detection Autor Yu, Tianchen, Yuan, Li, Lin, Liannan, He, Hongkui

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…Over the past decade, the application of deep learning in code clone detection has produced remarkable results. However, the current approaches have two…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data Fusion Autor Duan, Chiming, Yang, Yong, Jia, Tong, Liu, Guiyang, Liu, Jinbu, Zhang, Huxing, Zhou, Qi, Li, Ying, Huang, Gang

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…Accurately diagnosing the fault that causes the failure is crucial for maintaining the reliability of a microservice system after a failure occurs. Mainstream…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers Autor Li, Zhen, Zhang, Ruqian, Zou, Deqing, Wang, Ning, Li, Yating, Xu, Shouhuai, Chen, Chen, Jin, Hai

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “…Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice Autor Ren, Rui, Yang, Jingbang, Yang, Linxiao, Gu, Xinyue, Sun, Liang

    ISSN: 2643-1572
    Vydáno: ACM 27.10.2024
    “…In real-world microservice systems, the newly deployed service -one kind of change service, could lead to a new type of minority fault. Existing…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain Autor Huang, Qing, Wan, Zhenyu, Xing, Zhenchang, Wang, Changjing, Chen, Jieshan, Xu, Xiwei, Lu, Qinghua

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “…API recommendation methods have evolved from literal and semantic keyword matching to query expansion and query clarification. The latest query clarification…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service Systems Autor Gu, Wenwei, Gu, Jiazhen, Liu, Jinyang, Chen, Zhuangbin, Zhang, Jianping, Kuang, Jinxi, Feng, Cong, Yang, Yongqiang, Lyu, Michael R.

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…A common practice in the reliability engineering of cloud services involves the collection of monitoring metrics, followed by comprehensive analysis to…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Can Short Hypervectors Drive Feature-Rich GNNs? Strengthening the Graph Representation of Hyperdimensional Computing for Memory-efficient GNNs Autor Wang, Jihe, Han, Yuxi, Wang, Danghui

    Vydáno: IEEE 22.06.2025
    “…Hyperdimensional computing (HDC) based GNNs are significantly advancing the brain-like cognition in terms of mathematical rigorousness and computational…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    The Laplace Mechanism has optimal utility for differential privacy over continuous queries Autor Fernandes, Natasha, McIver, Annabelle, Morgan, Carroll

    Vydáno: IEEE 29.06.2021
    “…Differential Privacy protects individuals' data when statistical queries are published from aggregated databases: applying "obfuscating" mechanisms to the…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Listening to the Firehose: Sonifying Z3's Behavior Autor Hackett, Finn, Beschastnikh, Ivan

    ISSN: 2832-7632
    Vydáno: IEEE 27.04.2025
    “…Modern formal methods rely heavily on Satisfiability Modulo Theory (SMT) solvers like Z3. Unfortunately, these solvers are complex, have unpredictable runtime…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Uncertainty-Aware Energy Management for Wearable IoT Devices with Conformal Prediction Autor Hussein, Dina, Ugwu, Chibuike E., Bhat, Ganapati, Doppa, Janardhan Rao

    Vydáno: IEEE 22.06.2025
    “…Wearable internet of things (IoT) are transforming diverse healthcare applications including rehabilitation, vital symptom monitoring, and activity…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Towards Secure Data Management using Multi-Cryptographic Solutions (Invited) Autor Zhang, Shufan, He, Xi, Kundu, Ashish, Maiyya, Sujaya, Mehrotra, Sharad, Sharma, Shantanu

    Vydáno: IEEE 22.06.2025
    “…Several secure data outsourcing systems incorporate various cryptographic techniques to balance security, functionalities, and efficiency. However, their…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Delving into Topology Representation for Layout Pattern: A Novel Contrastive Learning Framework for Hotspot Detection Autor Chen, Silin, Di, Kangjian, Wang, Guohao, Zhao, Wenzheng, Du, Li, Zou, Ningmu

    Vydáno: IEEE 22.06.2025
    “…Recently, machine learning-based techniques have been applied for layout hotspot detection. However, existing methods encounter challenges in capturing the…”
    Získat plný text
    Konferenční příspěvek