Cited By
View all- Xu XLiu HTao GXuan ZZhang XCrnkovic I(2022)Checkpointing and deterministic training for deep learningProceedings of the 1st International Conference on AI Engineering: Software Engineering for AI10.1145/3522664.3528605(65-76)Online publication date: 16-May-2022
- Huang Z(2022)Runtime Recovery for Integer Overflows2022 6th International Conference on System Reliability and Safety (ICSRS)10.1109/ICSRS56243.2022.10067783(324-330)Online publication date: 23-Nov-2022
- Oyama YKokubo H(2022)Forced continuation of malware execution beyond exceptionsJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00457-819:4(483-501)Online publication date: 15-Dec-2022
- Show More Cited By