411 results on '"G. Zorn"'
Search Results
2. Solving Data-centric Tasks using Large Language Models.
3. Participatory prompting: a user-centric research method for eliciting AI assistance opportunities in knowledge workflows.
4. ExceLint: automatically finding spreadsheet formula errors.
5. Diet composition and overlap for adult walleye, lake whitefish, and yellow perch in Green Bay, Lake Michigan
6. Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things.
7. Kizzle: A Signature Compiler for Detecting Exploit Kits.
8. Multimodel evaluation of longitudinal stream temperature gradient and dominant influencing factors in Michigan streams
9. User Interaction Models for Disambiguation in Programming by Example.
10. FlashRelate: extracting relational data from semi-structured spreadsheets using examples.
11. ExceLint: Automatically Finding Spreadsheet Formula Errors.
12. Evolving Academia/Industry Relations in Computing Research: Interim Report.
13. Stable Isotopes and Movement of Walleye Change Following Ecological Shifts Driven by Dreissenid Mussels
14. Rozzle: De-cloaking Internet Malware.
15. Hardware support for enforcing isolation in lock-based parallel programs.
16. Changes in Habitat Conditions, Fish Populations, and the Fishery in Northern Green Bay, Lake Michigan, 1989–2019
17. Flikker: saving DRAM refresh-power through critical data partitioning.
18. JavaScript Errors in the Wild: An Empirical Study.
19. Modular Protections against Non-control Data Attacks.
20. DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing.
21. Approaches and Applications of Inductive Programming (Dagstuhl Seminar 15442).
22. Inductive programming meets the real world.
23. Detecting and tolerating asymmetric races.
24. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks.
25. Efficiently and precisely locating memory leaks and bloat.
26. Archipelago: trading address space for reliability and security.
27. Samurai: protecting critical data in unsafe languages.
28. Exterminator: automatically correcting memory errors with high probability.
29. DieHard: probabilistic memory safety for unsafe languages.
30. Rating the Potential Suitability of Habitat in Michigan Stream Reaches for Arctic Grayling
31. Diet and trophic ecology of introduced salmonines at two south shore ports of Lake Superior, 2019
32. Modular protections against non-control data attacks.
33. Safety and Security for Intelligent Infrastructure.
34. A National Research Agenda for Intelligent Infrastructure.
35. Reconsidering custom memory allocation.
36. OOPSLA 2002: Reconsidering custom memory allocation.
37. Composing High-Performance Memory Allocators.
38. Efficient Runtime Detection and Toleration of Asymmetric Races.
39. Designing a Trace Format for Heap Allocation Events.
40. Hybridizing and Coalescing Load Value Predictors.
41. Exploring Last n Value Prediction.
42. Increasing connectivity of Great Lakes tributaries: Interspecific and intraspecific effects on resident brook trout and brown trout populations
43. Genetic Structure of Smallmouth Bass in the Lake Michigan and Upper Mississippi River Drainages Relates to Habitat, Distance, and Drainage Boundaries
44. Effects of White Sucker Removal and Stocking on Growth of Fishes in Northern Lakes
45. Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs.
46. Segregating Heap Objects by Reference Behavior and Lifetime.
47. Static Methods in Hybrid Branch Prediction.
48. Exterminator: Automatically correcting memory errors with high probability.
49. Systems Computing Challenges in the Internet of Things.
50. Smart Communities Internet of Things.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.