120 results on '"Lei Qiao"'
Search Results
2. What's Wrong With Low-Code Development Platforms? An Empirical Study of Low-Code Development Platform Bugs.
3. Terrain-Aided Navigation of Long-Range AUV Based on Cubature Particle Filter.
4. Sequential detection with feedback information for two-way cooperative spectrum sensing in cognitive internet of things.
5. LCSim: A Large-Scale Controllable Traffic Simulator.
6. HoloVIC: Large-scale Dataset and Benchmark for Multi-Sensor Holographic Intersection and Vehicle-Infrastructure Cooperative.
7. Dynamic sliding window-cooperative spectrum sensing against massive SSDF attack in interweave cognitive internet of things.
8. DHIFS: A Dynamic and Hybrid Index Method with Low Memory Overhead and Efficient File Access.
9. Detecting C++ Compiler Front-End Bugs via Grammar Mutation and Differential Testing.
10. Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization.
11. Assessment of the performance of GPS-PWV and rainfall event prediction by using precise products from different analysis centers.
12. Scheduling Parallel Real-Time Tasks on Virtual Processors.
13. SiamSampler: Video-Guided Sampling for Siamese Visual Tracking.
14. Joint DNN Partition and Resource Allocation Optimization for Energy-Constrained Hierarchical Edge-Cloud Systems.
15. Personal relative deprivation impairs the ability to inhibit impulsive responses: an exploratory ERP study.
16. ViroISDC: a method for calling integration sites of hepatitis B virus based on feature encoding.
17. Predictions of Aeroengines' Infrared Radiation Characteristics Based on HKELM Optimized by the Improved Dung Beetle Optimizer.
18. Unsupervised Learning of Accurate Siamese Tracking.
19. Terrain-assisted navigation of long-range AUV based on intelligent particle filter.
20. Surrogate-Assisted Multi-objective Optimization for Compiler Optimization Sequence Selection.
21. Optimizing CoW-based File Systems on Open-Channel SSDs with Persistent Memory.
22. Backbone is All Your Need: A Simplified Architecture for Visual Object Tracking.
23. Hierarchical memory-constrained operator scheduling of neural architecture search networks.
24. Global Fixed-Priority Scheduling for Parallel Real-Time Tasks with Constrained Parallelism.
25. LocSeq: Automated Localization for Compiler Optimization Sequence Bugs of LLVM.
26. Horae: A Hybrid I/O Request Scheduling Technique for Near-Data Processing-Based SSD.
27. Event-Triggered Adaptive Formation Keeping and Interception Scheme for Autonomous Surface Vehicles Under Malicious Attacks.
28. Detecting Compiler Bugs Via a Deep Learning-Based Framework.
29. A Schedulability Test for Sporadic Task DM Scheduling Based on Density Upper Bound.
30. ELOFS: An Extensible Low-Overhead Flash File System for Resource-Scarce Embedded Devices.
31. Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.
32. DPWord2Vec: Better Representation of Design Patterns in Semantics.
33. ORBBuf: A Robust Buffering Method for Remote Visual SLAM.
34. State-of-Health Estimation of Satellite Lithium-Ion Batteries Using Improved Particle Filtering.
35. Virtually-Federated Scheduling of Parallel Real-Time Tasks.
36. Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning Systems.
37. STUaNet: Understanding Uncertainty in Spatiotemporal Collective Human Mobility.
38. Sound and efficient concurrency bug prediction.
39. Control Strategies for Target-Attacker-Defender Games of USVs.
40. Small Signal Voltage-frequency Conversion Processing Method for SF6 Sensor.
41. Hybrid Algorithm for Multi-beam Synthesis Based on Time Modulated Antenna Array.
42. Learning Path Recommendation for MOOC Platforms Based on a Knowledge Graph.
43. Scale-Adaptive Pothole Detection and Tracking from 3-D Road Point Clouds.
44. A Finer-Grained Blocking Analysis for Parallel Real-Time Tasks with Spin-Locks.
45. Simulation of Passenger Behavior in Virtual Subway Station Based on Multi-Agent.
46. Pipe Stress Optimization Analysis Based on MIGA Algorithm.
47. AdaBoost-based Refused Bequest Code Smell Detection with Synthetic Instances.
48. Memory State Verification Based on Inductive and Deductive Reasoning.
49. Verification of Real Time Operating System Exception Management Based on SPARCv8.
50. A Hierarchical Hybrid Locking Protocol for Parallel Real-Time Tasks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.