Search Results - "Theory of computation Theory and algorithms for application domains"

Refine Results
  1. 1

    Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System by Huang, Jun, Yang, Yang, Yu, Hang, Li, Jianguo, Zheng, Xiao

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Microservice architecture has sprung up over recent years for managing enterprise applications, due to its ability to independently deploy and scale services…”
    Get full text
    Conference Proceeding
  2. 2

    HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions by Zhang, Lingfeng, Wang, Zhaohui, Zhang, Yueling, Zhang, Min, Wang, Jiangtao

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Machine Learning (ML) algorithms are increasingly used in decision-making process across various social-critical domains, but they often somewhat inherit and…”
    Get full text
    Conference Proceeding
  3. 3

    Making Fair ML Software using Trustworthy Explanation by Chakraborty, Joymallya, Peng, Kewen, Menzies, Tim

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Machine learning software is being used in many applications (finance, hiring, admissions, criminal justice) having huge social impact. But sometimes the…”
    Get full text
    Conference Proceeding
  4. 4

    Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining by Shen, Weijun, Li, Yanhui, Chen, Lin, Han, Yuanlei, Zhou, Yuming, Xu, Baowen

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…With the increasing application of deep learning (DL) models in many safety-critical scenarios, effective and efficient DL testing techniques are much in…”
    Get full text
    Conference Proceeding
  5. 5

    Holistic Design towards Resource-Stringent Binary Vector Symbolic Architecture by Duan, Shijin, Narkthong, Nuntipat, Luo, Yukui, Ren, Shaolei, Xu, Xiaolin

    Published: IEEE 22.06.2025
    “…Classification tasks on ultra-lightweight devices demand devices that are resource-constrained and deliver swift responses. Binary Vector Symbolic Architecture…”
    Get full text
    Conference Proceeding
  6. 6

    Quorum: Zero-Training Unsupervised Anomaly Detection using Quantum Autoencoders by Ludmir, Jason Zev, Rebello, Sophia, Ruiz, Jacob, Patel, Tirthak

    Published: IEEE 22.06.2025
    “…Detecting mission-critical anomalous events and data is a crucial challenge across various industries, including finance, healthcare, and energy. Quantum…”
    Get full text
    Conference Proceeding
  7. 7

    Scalable Community Detection Using Quantum Hamiltonian Descent and QUBO Formulation by Cheng, Jinglei, Zhou, Ruilin, Gan, Yuhang, Qian, Chen, Liu, Junyu

    Published: IEEE 22.06.2025
    “…We present a quantum-inspired algorithm that utilizes Quantum Hamiltonian Descent (QHD) for efficient community detection. Our approach reformulates the…”
    Get full text
    Conference Proceeding
  8. 8

    MAGIKA: AI-Powered Content-Type Detection by Fratantonio, Yanick, Invernizzi, Luca, Farah, Loua, Thomas, Kurt, Zhang, Marina, Albertini, Ange, Galilee, Francois, Metitieri, Giancarlo, Cretin, Julien, Petit-Bianco, Alex, Tao, David, Bursztein, Elie

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…The task of content-type detection-which entails identifying the data encoded in an arbitrary byte sequence-is critical for operating systems, development,…”
    Get full text
    Conference Proceeding
  9. 9

    Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data Fusion by Duan, Chiming, Yang, Yong, Jia, Tong, Liu, Guiyang, Liu, Jinbu, Zhang, Huxing, Zhou, Qi, Li, Ying, Huang, Gang

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Accurately diagnosing the fault that causes the failure is crucial for maintaining the reliability of a microservice system after a failure occurs. Mainstream…”
    Get full text
    Conference Proceeding
  10. 10

    A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone Detection by Yu, Tianchen, Yuan, Li, Lin, Liannan, He, Hongkui

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Over the past decade, the application of deep learning in code clone detection has produced remarkable results. However, the current approaches have two…”
    Get full text
    Conference Proceeding
  11. 11

    Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers by Li, Zhen, Zhang, Ruqian, Zou, Deqing, Wang, Ning, Li, Yating, Xu, Shouhuai, Chen, Chen, Jin, Hai

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship…”
    Get full text
    Conference Proceeding
  12. 12

    SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice by Ren, Rui, Yang, Jingbang, Yang, Linxiao, Gu, Xinyue, Sun, Liang

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…In real-world microservice systems, the newly deployed service -one kind of change service, could lead to a new type of minority fault. Existing…”
    Get full text
    Conference Proceeding
  13. 13

    Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain by Huang, Qing, Wan, Zhenyu, Xing, Zhenchang, Wang, Changjing, Chen, Jieshan, Xu, Xiwei, Lu, Qinghua

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…API recommendation methods have evolved from literal and semantic keyword matching to query expansion and query clarification. The latest query clarification…”
    Get full text
    Conference Proceeding
  14. 14

    ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service Systems by Gu, Wenwei, Gu, Jiazhen, Liu, Jinyang, Chen, Zhuangbin, Zhang, Jianping, Kuang, Jinxi, Feng, Cong, Yang, Yongqiang, Lyu, Michael R.

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…A common practice in the reliability engineering of cloud services involves the collection of monitoring metrics, followed by comprehensive analysis to…”
    Get full text
    Conference Proceeding
  15. 15

    Can Short Hypervectors Drive Feature-Rich GNNs? Strengthening the Graph Representation of Hyperdimensional Computing for Memory-efficient GNNs by Wang, Jihe, Han, Yuxi, Wang, Danghui

    Published: IEEE 22.06.2025
    “…Hyperdimensional computing (HDC) based GNNs are significantly advancing the brain-like cognition in terms of mathematical rigorousness and computational…”
    Get full text
    Conference Proceeding
  16. 16

    The Laplace Mechanism has optimal utility for differential privacy over continuous queries by Fernandes, Natasha, McIver, Annabelle, Morgan, Carroll

    Published: IEEE 29.06.2021
    “…Differential Privacy protects individuals' data when statistical queries are published from aggregated databases: applying "obfuscating" mechanisms to the…”
    Get full text
    Conference Proceeding
  17. 17

    Listening to the Firehose: Sonifying Z3's Behavior by Hackett, Finn, Beschastnikh, Ivan

    ISSN: 2832-7632
    Published: IEEE 27.04.2025
    “…Modern formal methods rely heavily on Satisfiability Modulo Theory (SMT) solvers like Z3. Unfortunately, these solvers are complex, have unpredictable runtime…”
    Get full text
    Conference Proceeding
  18. 18

    Delving into Topology Representation for Layout Pattern: A Novel Contrastive Learning Framework for Hotspot Detection by Chen, Silin, Di, Kangjian, Wang, Guohao, Zhao, Wenzheng, Du, Li, Zou, Ningmu

    Published: IEEE 22.06.2025
    “…Recently, machine learning-based techniques have been applied for layout hotspot detection. However, existing methods encounter challenges in capturing the…”
    Get full text
    Conference Proceeding
  19. 19

    Uncertainty-Aware Energy Management for Wearable IoT Devices with Conformal Prediction by Hussein, Dina, Ugwu, Chibuike E., Bhat, Ganapati, Doppa, Janardhan Rao

    Published: IEEE 22.06.2025
    “…Wearable internet of things (IoT) are transforming diverse healthcare applications including rehabilitation, vital symptom monitoring, and activity…”
    Get full text
    Conference Proceeding
  20. 20

    Towards Secure Data Management using Multi-Cryptographic Solutions (Invited) by Zhang, Shufan, He, Xi, Kundu, Ashish, Maiyya, Sujaya, Mehrotra, Sharad, Sharma, Shantanu

    Published: IEEE 22.06.2025
    “…Several secure data outsourcing systems incorporate various cryptographic techniques to balance security, functionalities, and efficiency. However, their…”
    Get full text
    Conference Proceeding