98 results on '"Dong, Yukun"'
Search Results
2. A search-and-fill strategy to code generation for complex software requirements
3. Automatic detection of infeasible paths in large-scale program based on program summaries
4. Global feature capture and spatially-aware neural networks for predicting CO2-flooding performance in heterogeneous low-permeable reservoirs
5. An iterative 3D human body reconstruction method driven by personalized dimensional prior knowledge
6. A method to identify overfitting program repair patches based on expression tree
7. An Efficient Style Virtual Try on Network for Clothing Business Industry
8. DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code
9. SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding
10. Mesh2Measure: A Novel Body Dimensions Measurement Based on 3D Human Model
11. Three-Dimensional Human Body Reconstruction Using Dual-View Normal Maps.
12. Exploring the mechanism of Tengli Kangliu Decoction in the prevention and treatment of colorectal cancer precancerous based on network pharmacology
13. Automatic Repair of Semantic Defects Using Restraint Mechanisms
14. Flexible piezoelectric pressure sensor based on BaTiO3-CNT/RTV Composite Film with Filter Paper Microstructures for Monitoring Hand Motions
15. Microwelding of glass to silicon by green ultrafast laser pulses
16. Locally Differentially Private and Fair Key-Value Aggregation
17. JointMETRO: a 3D reconstruction model for human figures in works of art based on transformer
18. Location Inference under Temporal Correlation
19. An iterative 3D human body reconstruction method driven by personalized dimensional prior knowledge.
20. Continuous Indoor Tracking via Differential RSS Fingerprinting
21. Quality Evaluation Method of Automatic Software Repair Using Syntax Distance Metrics
22. Automatic Repair Method for Null Pointer Dereferences Guided by Program Dependency Graph
23. A deep learning-based intelligent analysis platform for fetal ultrasound four-chamber views
24. Prediction of Oil Saturation During Water and Gas Injection Using Controllable Convolutional Long Short-Term Memory
25. Research on an Optimization Method for Injection-Production Parameters Based on an Improved Particle Swarm Optimization Algorithm
26. An integrated multi-ratio fuzzy and uncertain data processed approach for fault diagnosis of transformers
27. MMDA: Disease Analysis Model Based on Anthropometric Measurement
28. Reservoir Production Prediction Model Based on a Stacked LSTM Network and Transfer Learning
29. Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects
30. Priority Measurement of Patches for Program Repair Based on Semantic Distance
31. Memory Leak Detection in IoT Program Based on an Abstract Memory Model SeqMM
32. Priority Measurement of Patches for Program Repair Based on Semantic Distance
33. Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects
34. Anthropometric Landmarks Extraction and Dimensions Measurement Based on ResNet
35. Automatic Repair of Semantic Defects Using Restraint Mechanisms
36. Automatic Repair of Semantic Defects Using Restraint Mechanisms
37. Design of Lean Management System for Equipment Assets Based on BOM Tree and RFID
38. Hybrid Sensorless Full Speed Range Control for Six-phase PMSM
39. Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis
40. Memory-based stag hunt game on regular lattices
41. Microwelding of glass to silicon by green ultrafast laser pulses
42. Memory Leak Detection in IoT Program Based on an Abstract Memory Model SeqMM
43. Detecting all potential null dereferences based on points-to property sound analysis.
44. Detecting all potential null dereferences based on points-to property sound analysis
45. A sound abstract memory model for static analysis of C programs
46. Location of Facility Based on Simulated Annealing and “ZKW” Algorithms
47. Fully Detection of Illegal Value Use Defects
48. Fully Detection of Illegal Memory Access Defects
49. RSTVL: A Sound Abstract Memory Model for Program Static Analysis
50. An Approach for Identifying Detecting Objects of Null Dereference
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.