Xiao Yu
Citata da
Citata da
CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs
X Yu, P Joshi, J Xu, G Jin, H Zhang, G Jiang
Proceedings of the Twenty-First International Conference on Architectural …, 2016
Comprehending performance from real-world execution traces: A device-driver case
X Yu, S Han, D Zhang, T Xie
Proceedings of the 19th international conference on Architectural support …, 2014
Test data generation for derived types in C program
Z Wang, X Yu, T Sun, G Pu, Z Ding, JL Hu
2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009
The verification of rCOS using Spin
X Yu, Z Wang, G Pu, D Mao, J Liu
Electronic Notes in Theoretical Computer Science 207, 49-67, 2008
CloudSeer: using logs to detect errors in the cloud infrastructure
P Joshi, H Zhang, XU Jianwu, X Yu, G Jiang
US Patent 9,720,753, 2017
Adversarial defense framework for graph neural network
S Wang, Z Chen, J Ni, X Yu, Z Li, H Chen, PS Yu
arXiv preprint arXiv:1905.03679, 2019
Towards scalable compositional test generation
T Sun, Z Wang, G Pu, X Yu, Z Qiu, B Gu
2009 Ninth International Conference on Quality Software, 353-358, 2009
A parallel approach to concolic testing with low-cost synchronization
X Yu, S Sun, G Pu, S Jiang, Z Wang
Electronic Notes in Theoretical Computer Science 274, 83-96, 2011
You are what you do: Hunting stealthy malware via data provenance analysis
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
Proc. of the Symposium on Network and Distributed System Security (NDSS), 2020
Execution semantics for rCOS
Z Wang, X Yu, G Pu, L Feng, H Zhu, J He
2008 15th Asia-Pacific Software Engineering Conference, 119-126, 2008
Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications
X Yu, G Jin
Proceedings of the 40th International Conference on Software Engineering …, 2018
Run-time discovery of Java design patterns
K Miao, S Jiang, X Yu, J Zhao
2011 2nd International Conference on Artificial Intelligence, Management …, 2011
Heterogeneous Graph Matching Networks for Unknown Malware Detection
S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu
Proceedings of the Twenty-Eighth International Joint Conference on …, 2019
Java design pattern recognition based on relational calculus
K Miao, X Yu, J Zhao, Y Shen
Jisuanji Yingyong Yanjiu 27 (9), 3425-3430, 2010
Property Checking for Design Patterns
L Feng, X Yu, G Pu, S Jiang, H Zhu, B Gu
Proceedings of the IASTED International Conference 677 (065), 87, 2010
BARRIERFINDER: Recognizing Ad Hoc Barriers
T Wang, X Yu, Z Qiu, G Jin, F Mueller
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
Understanding and Debugging Complex Software Systems: A Data-Driven Perspective
X Yu
North Carolina State University, 2018
AT-EASE: A Tool for Early and Quick Usability Evaluation of Smartphone Application
W Yang, X Yu
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–18