Search Results - General and reference Cross-computing tools and techniques Evaluation*

Refine Results
  1. 1

    Guidelines for Assessing the Accuracy of Log Message Template Identification Techniques by Khan, Zanis Ali, Shin, Donghwan, Bianculli, Domenico, Briand, Lionel

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “… While many techniques have been proposed in the literature, only two recent studies provide a comprehensive evaluation and comparison of the techniques using an established benchmark composed of real-world logs…”
    Get full text
    Conference Proceeding
  2. 2

    Breaking the Silence: the Threats of Using LLMs in Software Engineering by Sallou, June, Durieux, Thomas, Panichella, Annibale

    ISSN: 2832-7632
    Published: ACM 14.04.2024
    “… and research evaluation, and the reproducibility of LLM-based findings. In response, this paper proposes a set of guidelines tailored for SE researchers and Language Model (LM…”
    Get full text
    Conference Proceeding
  3. 3

    Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics by Lan, Yuanhong, Lu, Yifei, Pan, Minxue, Li, Xuandong

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “… However, conducting a reliable and robust evaluation based on the two metrics remains challenging, due to the imperfections of the current evaluation system, with a tangle of numerous metric…”
    Get full text
    Conference Proceeding
  4. 4

    How secure is your cache against side-channel attacks? by He, Zecheng, Lee, Ruby B.

    ISBN: 1450349528, 9781450349529
    ISSN: 2379-3155
    Published: New York, NY, USA ACM 14.10.2017
    “…Security-critical data can leak through very unexpected side channels, making side-channel attacks very dangerous threats to information security. Of these,…”
    Get full text
    Conference Proceeding
  5. 5

    OptiWISE: Combining Sampling and Instrumentation for Granular CPI Analysis by Guo, Yuxin, Chadwick, Alex W., Erdos, Marton, Bora, Utpal, Vougioukas, Ilias, Gabrielli, Giacomo, Jones, Timothy M.

    ISSN: 2643-2838
    Published: IEEE 02.03.2024
    “… Existing profiling tools typically either sample hardware performance counters or instrument the program with extra instructions to analyze its execution…”
    Get full text
    Conference Proceeding
  6. 6

    Fairquant: Certifying and Quantifying Fairness of Deep Neural Networks by Kim, Brian Hyeongseok, Wang, Jingbo, Wang, Chao

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…) receive the same treatment. While there are existing techniques that provide such a guarantee, they tend to suffer from lack of scalability or accuracy as the size and input dimension of the DNN increase…”
    Get full text
    Conference Proceeding
  7. 7

    AIBench Scenario: Scenario-Distilling AI Benchmarking by Gao, Wanling, Tang, Fei, Zhan, Jianfeng, Wen, Xu, Wang, Lei, Cao, Zheng, Lan, Chuanxin, Luo, Chunjie, Liu, Xiaoli, Jiang, Zihan

    Published: IEEE 01.09.2021
    “…Modern real-world application scenarios like Internet services consist of a diversity of AI and non-AI modules with huge code sizes and long and complicated…”
    Get full text
    Conference Proceeding
  8. 8

    EvalDNN: A Toolbox for Evaluating Deep Neural Network Models by Tian, Yongqiang, Zeng, Zhihua, Wen, Ming, Liu, Yepang, Kuo, Tzu-yang, Cheung, Shing-Chi

    Published: ACM 01.10.2020
    “… What is worse, due to the large number of hyper-parameters and inadequate documentation, evaluation results of some deep learning models are hard to reproduce, especially when the models and metrics…”
    Get full text
    Conference Proceeding
  9. 9

    Probing for Requirements Knowledge to Stimulate Architectural Thinking by Anish, Preethu Rose, Balasubramaniam, Balaji, Sainani, Abhishek, Cleland-Huang, Jane, Daneva, Maya, Wieringa, Roel J., Ghaisas, Smita

    ISSN: 1558-1225
    Published: ACM 01.05.2016
    “…Software requirements specifications (SRSs) often lack the detail needed to make informed architectural decisions. Architects therefore either make…”
    Get full text
    Conference Proceeding
  10. 10

    Mind the gap: can and should software engineering data sharing become a path of less resistance? by Wallace, Ken

    ISBN: 9781450356596, 1450356591
    Published: New York, NY, USA ACM 27.05.2018
    “…The facility to process data is, arguably, the defining capability underpinning the transformative power of software: the relationships of each to the other…”
    Get full text
    Conference Proceeding
  11. 11

    Exploring the Impact of the Output Format on the Evaluation of Large Language Models for Code Translation by Macedo, Marcos, Tian, Yuan, Cogo, Filipe R., Adams, Bram

    Published: ACM 14.04.2024
    “…, and enhancing software performance. With the recent advances in large language models (LLMs) and their applications to code translation, there is an increasing need for comprehensive evaluation of these models…”
    Get full text
    Conference Proceeding
  12. 12

    An empirical study on selection of Open Source Software - Preliminary results by Hauge, Oyvind, Osterlie, Thomas, Sorensen, Carl-Fredrik, Gerea, Marinela

    ISBN: 1424437202, 9781424437207
    ISSN: 0270-5257
    Published: Washington, DC, USA IEEE Computer Society 18.05.2009
    “…Growing attention on component-based development has inspired the development of several normative methods for selection of software components. Despite these…”
    Get full text
    Conference Proceeding Journal Article
  13. 13

    Student research poster: A low complexity cache sharing mechanism to address system fairness by Selfa, Vicent, Sahuquillo, Julio, Petit, Salvador, Gomez, Maria E.

    Published: ACM 01.09.2016
    “…Shared caches have become, de facto, the common design choice in current multi-cores, ranging from embedded devices to high-performance processors. In these…”
    Get full text
    Conference Proceeding
  14. 14
  15. 15
  16. 16

    Evaluating the Benefits of Systematic Project Management in Large Public Sector Projects by Guzman, Liliana, Steinbach, Silke, Diebold, Philipp, Zehler, Thomas, Schneider, Klaus, Habbe, Matthias

    Published: ACM 01.05.2016
    “…s. We designed a formative evaluation to understand the adequacy and acceptance of the new PM system and to elicit stakeholders' feedback in order to improve the new PM system and the related transfer…”
    Get full text
    Conference Proceeding
  17. 17

    Student research poster - from processing-in-Memory to Processing-in-Storage by Kaplan, Roman

    Published: ACM 01.09.2016
    “…This paper studied a new technology and approach - Processing-in-Storage (PrinS). Resistive technologies have shown high-density, high-endurance and low…”
    Get full text
    Conference Proceeding
  18. 18

    Execution-based prediction using speculative slices by Zilles, Craig, Sohi, Gurindar

    ISBN: 0769511627, 9780769511627
    Published: New York, NY, USA ACM 01.01.2001
    “…A relatively small set of static instructions has significant leverage on program execution performance. These problem instructions contribute a…”
    Get full text
    Conference Proceeding
  19. 19

    Top-Down Microarchitecture Analysis Approximation Based on Performance Counter Architecture for SiFive RISC-V Processors by Mou, Chan-Yu, Hsiao, Chao-Chieh, Chou, Jerry

    Published: IEEE 17.11.2024
    “…Modern Out-of-Order RISC-V CPUs have complex mechanisms, making microarchitecture-level performance analysis challenging. Despite increasing Performance…”
    Get full text
    Conference Proceeding
  20. 20

    Ponte Vecchio Across the Atlantic: Single-Node Benchmarking of Two Intel GPU Systems by Applencourt, Thomas, Sadawarte, Aditya, Muralidharan, Servesh, Bertoni, Colleen, Kwack, JaeHyuk, Luo, Ye, Rangel, Esteban, Tramm, John, Ghadar, Yasaman, Tamerus, Arjen, Edsall, Chris, Deakin, Tom

    Published: IEEE 17.11.2024
    “…Intel Data Center GPU Max 1550, known as Ponte Vecchio (PVC), is a new Intel GPU architecture for high-performance computing. It is the basis of two systems on…”
    Get full text
    Conference Proceeding