Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 6Pages 6112–6125https://doi.org/10.1109/TNSM.2024.3461875Communication overhead is a significant challenge in distributed deep learning (DDL) training, often hindering efficiency. While existing solutions like gradient compression, compute/communication overlap, and layer-wise flow scheduling have been proposed,...
- research-articleOctober 2024
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 944–956https://doi.org/10.1145/3691620.3695476The prominent role of mobile apps in daily life has underscored the need for robust quality assurance, leading to the development of various automated Android Graphical User Interface (GUI) testing approaches. Code coverage and fault detection are two ...
- research-articleJune 2024
DCCS: A dual congestion control signals based TCP for datacenter networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 247, Issue Chttps://doi.org/10.1016/j.comnet.2024.110457AbstractAs cloud computing advances, datacenter networks (DCNs) face unprecedented pressure due to the increasing prevalence of high bandwidth and low delay applications. Current reliable transmission protocols such as TCP harness packet loss, network ...
- research-articleApril 2024
Understanding and Finding Java Decompiler Bugs
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 143, Pages 1380–1406https://doi.org/10.1145/3649860Java decompilers are programs that perform the reverse process of Java compilers, i.e., they translate Java bytecode to Java source code. They are essential for reverse engineering purposes and have become more sophisticated and reliable over the years. ...
- research-articleApril 2024
Mitigating the impact of mislabeled data on deep predictive models: an empirical study of learning with noise approaches in software engineering tasks
Automated Software Engineering (KLU-AUSE), Volume 31, Issue 1https://doi.org/10.1007/s10515-024-00435-yAbstractDeep predictive models have been widely employed in software engineering (SE) tasks due to their remarkable success in artificial intelligence (AI). Most of these models are trained in a supervised manner, and their performance heavily relies on ...
-
- research-articleFebruary 2024
Deeply Reinforcing Android GUI Testing with Deep Reinforcement Learning
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 71, Pages 1–13https://doi.org/10.1145/3597503.3623344As the scale and complexity of Android applications continue to grow in response to increasing market and user demands, quality assurance challenges become more significant. While previous studies have demonstrated the superiority of Reinforcement ...
- research-articleSeptember 2024
Valar: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 1940–1951https://doi.org/10.1109/ASE56229.2023.00098Static analyzers play a critical role in program defects and security vulnerabilities detection. Despite their importance, the widespread adoption of static analysis techniques in industrial development faces numerous obstacles, among which the high rate ...
- research-articleSeptember 2023
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks
Computer Communications (COMS), Volume 209, Issue CPages 415–428https://doi.org/10.1016/j.comcom.2023.07.018AbstractIn current Data center Networks (DCNs), Equal-Cost Multipath (ECMP) is a default load-balancing scheme. However, using ECMP may result in the rapid growth of Flow Completion Time (FCT) due to its well-known drawbacks. In order to solve ...
- research-articleJuly 2023
A3DCT: A cubic acceleration TCP for data center networks
Journal of Network and Computer Applications (JNCA), Volume 216, Issue Chttps://doi.org/10.1016/j.jnca.2023.103654AbstractIn recent years, online data-intensive (OLDI) applications have become particularly common in data center networks (DCNs), such as web search, advertisement systems, and distributed machine learning. OLDI applications have strict ...
- research-articleFebruary 2023
Preference-wise Testing of Android Apps via Test Amplification
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 32, Issue 1Article No.: 4, Pages 1–37https://doi.org/10.1145/3511804Preferences, the setting options provided by Android, are an essential part of Android apps. Preferences allow users to change app features and behaviors dynamically, and therefore their impacts need to be considered when testing the apps. Unfortunately, ...
Detecting resource utilization bugs induced by variant lifecycles in Android
ISSTA 2022: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 642–653https://doi.org/10.1145/3533767.3534413The lifecycle models of Android components such as Activities and Fragments predefine the possible orders in which the components' callback methods will be invoked during app executions. Correspondingly, resource utilization operations performed by ...
- research-articleOctober 2021
Choose a correct marking position: ECN should be freed from tail mark
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 197, Issue Chttps://doi.org/10.1016/j.comnet.2021.108329AbstractExplicit Congestion Notification (ECN) has been widely employed in production datacenter networks (DCNs) to deliver high throughput and low latency communications. Despite being successful, the drawback of ECN-based transports is that ...
- research-articleJanuary 2021
ETCC: Encrypted Two-Label Classification Using CNN
Due to the increasing variety of encryption protocols and services in the network, the characteristics of the application are very different under different protocols. However, there are very few existing studies on encrypted application classification ...
- research-articleJanuary 2020
Effective testing of Android apps using extended IFML models
Journal of Systems and Software (JSSO), Volume 159, Issue Chttps://doi.org/10.1016/j.jss.2019.110433Highlights- Human knowledge is valuable for generating tests to exercise complex functionalities.
The last decade has seen a vast proliferation of mobile apps. To improve the reliability of such apps, various techniques have been developed to automatically generate tests for them. While such techniques have been proven to be useful ...
- research-articleAugust 2019
Preference-wise testing for Android applications
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 268–278https://doi.org/10.1145/3338906.3338980Preferences, the setting options provided by Android, are an essential part of Android apps. Preferences allow users to change app features and behaviors dynamically, and therefore, need to be thoroughly tested. Unfortunately, the specific preferences ...
- ArticleSeptember 2018
Deep Active Self-paced Learning for Accurate Pulmonary Nodule Segmentation
Medical Image Computing and Computer Assisted Intervention – MICCAI 2018Pages 723–731https://doi.org/10.1007/978-3-030-00934-2_80AbstractAutomatic and accurate pulmonary nodule segmentation in lung Computed Tomography (CT) volumes plays an important role in computer-aided diagnosis of lung cancer. However, this task is challenging due to target/background voxel imbalance and the ...
- ArticleDecember 2015
SDN-based TCP congestion control in data center networks
IPCCC '15: Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)Pages 1–7https://doi.org/10.1109/PCCC.2015.7410275TCP incast usually happens when a receiver requests the data from multiple senders simultaneously. This many-to-one communication pattern constantly appears in the data center networks due to the data are stored at multiple servers. With Software ...
- ArticleJuly 2015
Combining eye movements and EEG to enhance emotion recognition
IJCAI'15: Proceedings of the 24th International Conference on Artificial IntelligencePages 1170–1176In this paper, we adopt a multimodal emotion recognition framework by combining eye movements and electroencephalography (EEG) to enhance emotion recognition. The main contributions of this paper are twofold. a) We investigate sixteen eye movements ...
- research-articleSeptember 2013
Asymmetric signature schemes for efficient exact edit similarity query processing
ACM Transactions on Database Systems (TODS), Volume 38, Issue 3Article No.: 16, Pages 1–44https://doi.org/10.1145/2508020.2508023Given a query string Q, an edit similarity search finds all strings in a database whose edit distance with Q is no more than a given threshold τ. Most existing methods answering edit similarity queries employ schemes to generate string subsequences as ...