481 results on '"Jiaguang Sun"'
Search Results
52. Stochastic optimization of program obfuscation.
53. Dependable integrated clinical system architecture with runtime verification.
54. A Constraint-Pattern Based Method for Reachability Determination.
55. Assertion Recommendation for Formal Program Verification.
56. Vertex-Weighted Hypergraph Learning for Multi-View Object Classification.
57. IntPTI: automatic integer error repair with proper-type inference.
58. A static analysis tool with optimizations for reachability determination.
59. A language model for statements of software code.
60. Temporal Coverage Analysis for Dynamic Verification.
61. Parallelizing SMT solving: Lazy decomposition and conciliation.
62. Constructing Cost-Aware Functional Test-Suites Using Nested Differential Evolution Algorithm.
63. Beyond Pairwise Matching: Person Reidentification via High-Order Relevance Learning.
64. Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios
65. RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems
66. MDD: A Unified Model-Driven Design Framework for Embedded Control Software
67. Safety-Assured Formal Model-Driven Design of the Multifunction Vehicle Bus Controller.
68. Taming Interrupts for Verifying Industrial Multifunction Vehicle Bus Controllers.
69. Automatic Fix for C Integer Errors by Precision Improvement.
70. Tsmart-BIPEX: An Integrated Graphical Design Toolkit for Software Systems.
71. C Code Verification based on the Extended Labeled Transition System Model.
72. Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System.
73. Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude.
74. Representative band selection for hyperspectral image classification.
75. EVMFuzz: Differential Fuzz Testing of Ethereum Virtual Machine.
76. RNN-Test: Adversarial Testing Framework for Recurrent Neural Network Systems.
77. GasFuzz: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability.
78. PLC programs' checking method and strategy based on module state transfer.
79. Efficient Recovery of Missing Events.
80. Matching heterogeneous events with patterns.
81. Transfer Joint Matching for Unsupervised Domain Adaptation.
82. Application-Specific Architecture Selection for Embedded Systems via Schedulability Analysis.
83. Code Synthesis for Dataflow-Based Embedded Software Design
84. QuanFuzz: Fuzz Testing of Quantum Program.
85. Semantic Learning and Emulation Based Cross-platform Binary Vulnerability Seeker
86. Scalable Verification of a Generic End-Around-Carry Adder for Floating-Point Units by Coq.
87. Generalized interface automata with multicast synchronization.
88. Identifying and constructing elemental parts of shafts based on conditional random fields model.
89. Mechanism Design for Finding Experts Using Locally Constructed Social Referral Web.
90. Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks.
91. First, Debug the Test Oracle.
92. Transfer Feature Learning with Joint Distribution Adaptation.
93. Transfer Sparse Coding for Robust Image Representation.
94. System reliability calculation based on the run-time analysis of ladder program.
95. Design and optimization of multi-clocked embedded systems using formal technique.
96. Verification and Implementation of the Protocol Standard in Train Control System.
97. Sequential dependency and reliability analysis of embedded systems.
98. Modeling and Validation of PLC-Controlled Systems: A Case Study.
99. Automatic image annotation using tag-related random search over visual neighbors.
100. Uncertain Model and Algorithm for Hardware/Software Partitioning.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.