Search Results - "Theory of computation Theory and algorithms for application domains"
-
1
Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…Microservice architecture has sprung up over recent years for managing enterprise applications, due to its ability to independently deploy and scale services…”
Get full text
Conference Proceeding -
2
HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Machine Learning (ML) algorithms are increasingly used in decision-making process across various social-critical domains, but they often somewhat inherit and…”
Get full text
Conference Proceeding -
3
Making Fair ML Software using Trustworthy Explanation
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Machine learning software is being used in many applications (finance, hiring, admissions, criminal justice) having huge social impact. But sometimes the…”
Get full text
Conference Proceeding -
4
Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…With the increasing application of deep learning (DL) models in many safety-critical scenarios, effective and efficient DL testing techniques are much in…”
Get full text
Conference Proceeding -
5
Holistic Design towards Resource-Stringent Binary Vector Symbolic Architecture
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Classification tasks on ultra-lightweight devices demand devices that are resource-constrained and deliver swift responses. Binary Vector Symbolic Architecture…”
Get full text
Conference Proceeding -
6
Quorum: Zero-Training Unsupervised Anomaly Detection using Quantum Autoencoders
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Detecting mission-critical anomalous events and data is a crucial challenge across various industries, including finance, healthcare, and energy. Quantum…”
Get full text
Conference Proceeding -
7
Scalable Community Detection Using Quantum Hamiltonian Descent and QUBO Formulation
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…We present a quantum-inspired algorithm that utilizes Quantum Hamiltonian Descent (QHD) for efficient community detection. Our approach reformulates the…”
Get full text
Conference Proceeding -
8
MAGIKA: AI-Powered Content-Type Detection
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…The task of content-type detection-which entails identifying the data encoded in an arbitrary byte sequence-is critical for operating systems, development,…”
Get full text
Conference Proceeding -
9
Famos: Fault Diagnosis for Microservice Systems Through Effective Multi-Modal Data Fusion
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Accurately diagnosing the fault that causes the failure is crucial for maintaining the reliability of a microservice system after a failure occurs. Mainstream…”
Get full text
Conference Proceeding -
10
A Multiple Representation Transformer with Optimized Abstract Syntax Tree for Efficient Code Clone Detection
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Over the past decade, the application of deep learning in code clone detection has produced remarkable results. However, the current approaches have two…”
Get full text
Conference Proceeding -
11
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship…”
Get full text
Conference Proceeding -
12
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…In real-world microservice systems, the newly deployed service -one kind of change service, could lead to a new type of minority fault. Existing…”
Get full text
Conference Proceeding -
13
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI Chain
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…API recommendation methods have evolved from literal and semantic keyword matching to query expansion and query clarification. The latest query clarification…”
Get full text
Conference Proceeding -
14
ADAMAS: Adaptive Domain-Aware Performance Anomaly Detection in Cloud Service Systems
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…A common practice in the reliability engineering of cloud services involves the collection of monitoring metrics, followed by comprehensive analysis to…”
Get full text
Conference Proceeding -
15
Can Short Hypervectors Drive Feature-Rich GNNs? Strengthening the Graph Representation of Hyperdimensional Computing for Memory-efficient GNNs
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Hyperdimensional computing (HDC) based GNNs are significantly advancing the brain-like cognition in terms of mathematical rigorousness and computational…”
Get full text
Conference Proceeding -
16
The Laplace Mechanism has optimal utility for differential privacy over continuous queries
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…Differential Privacy protects individuals' data when statistical queries are published from aggregated databases: applying "obfuscating" mechanisms to the…”
Get full text
Conference Proceeding -
17
Listening to the Firehose: Sonifying Z3's Behavior
ISSN: 2832-7632Published: IEEE 27.04.2025Published in IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Technologies Results (Online) (27.04.2025)“…Modern formal methods rely heavily on Satisfiability Modulo Theory (SMT) solvers like Z3. Unfortunately, these solvers are complex, have unpredictable runtime…”
Get full text
Conference Proceeding -
18
Delving into Topology Representation for Layout Pattern: A Novel Contrastive Learning Framework for Hotspot Detection
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Recently, machine learning-based techniques have been applied for layout hotspot detection. However, existing methods encounter challenges in capturing the…”
Get full text
Conference Proceeding -
19
Uncertainty-Aware Energy Management for Wearable IoT Devices with Conformal Prediction
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Wearable internet of things (IoT) are transforming diverse healthcare applications including rehabilitation, vital symptom monitoring, and activity…”
Get full text
Conference Proceeding -
20
Towards Secure Data Management using Multi-Cryptographic Solutions (Invited)
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Several secure data outsourcing systems incorporate various cryptographic techniques to balance security, functionalities, and efficiency. However, their…”
Get full text
Conference Proceeding