標(biāo)題: Titlebook: Engineering of Complex Computer Systems; 28th International C Guangdong Bai,Fuyuki Ishikawa,George A. Papadopoul Conference proceedings 202 [打印本頁(yè)] 作者: 教條 時(shí)間: 2025-3-21 19:50
書(shū)目名稱Engineering of Complex Computer Systems影響因子(影響力)
書(shū)目名稱Engineering of Complex Computer Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱Engineering of Complex Computer Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Engineering of Complex Computer Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Engineering of Complex Computer Systems被引頻次
書(shū)目名稱Engineering of Complex Computer Systems被引頻次學(xué)科排名
書(shū)目名稱Engineering of Complex Computer Systems年度引用
書(shū)目名稱Engineering of Complex Computer Systems年度引用學(xué)科排名
書(shū)目名稱Engineering of Complex Computer Systems讀者反饋
書(shū)目名稱Engineering of Complex Computer Systems讀者反饋學(xué)科排名
作者: 只有 時(shí)間: 2025-3-22 00:04
https://doi.org/10.1007/978-3-319-58100-2ral Networks (DNN) has significantly improved detection accuracy in NIDS. Nonetheless, the inherent data imbalance between malicious and normal network traffic impairs the efficacy of DNN-based methods. Traditional approaches employ Generative Adversarial Networks (GANs) to mitigate this by generati作者: palpitate 時(shí)間: 2025-3-22 02:07
https://doi.org/10.1057/9780230288256rnal product configuration system to model its vehicle diversity. This system is based on the well-known knowledge compilation approach and is associated with a set of parameters. Different input parameters have a strong influence on the system’s performance. The parameters actually used are determi作者: podiatrist 時(shí)間: 2025-3-22 06:18
https://doi.org/10.1007/978-3-662-68448-1ion methods employing branch and bound technique have shown excellent performance for this task and are widely adopted to provide robustness assurance. A key component in branch and bound is the branching strategy, which determines how to split the feasible region. A good branching strategy can redu作者: GULF 時(shí)間: 2025-3-22 11:02
Migrant Masculinities in Women’s Writingility in DNNs, ensuring their prediction accuracy through robustness verification becomes imperative before deploying them in safety-critical applications. Neural Network Verification (NNV) approaches can broadly be categorized into exact and approximate solutions. Exact solutions are complete but t作者: 亞麻制品 時(shí)間: 2025-3-22 16:04
https://doi.org/10.1007/978-3-030-74369-7Linux operating system distribution images and packages, developers need to build and adapt the packages. Due to the complexity of software packages and the diversity of developer experience levels, the success of software package construction is uncertain. Existing research lacks automatic classifi作者: 亞麻制品 時(shí)間: 2025-3-22 17:46
International Political Economy Seriesy. This can lead to a lack of a comprehensive overview of the test architecture, hampering the reuse of test functions when implementing new test cases. To address this challenge, we propose ., an automated test architecture generation approach, which employs an optimization algorithm to retrieve hi作者: TEM 時(shí)間: 2025-3-22 22:53
Anna Triandafyllidou,Thanos Maroukisaches have shown promising results in TD prediction, but the imbalanced TD datasets can have a negative impact on ML model performance. Although previous TD studies have investigated various oversampling techniques that generates minority class instances to mitigate the imbalance, potentials of unde作者: 物種起源 時(shí)間: 2025-3-23 05:16
Sustainable Development Goals Seriese led to the loss of millions of dollars worth of assets. Since smart contract code cannot be updated to patch security flaws, reasoning about smart contract correctness to ensure the absence of vulnerabilities before their deployment is of the utmost importance. In this paper, we present a formal a作者: 闖入 時(shí)間: 2025-3-23 06:03 作者: 歌劇等 時(shí)間: 2025-3-23 10:45 作者: Synapse 時(shí)間: 2025-3-23 16:55 作者: 時(shí)間等 時(shí)間: 2025-3-23 19:32
https://doi.org/10.1007/978-981-13-1379-0 designed to facilitate the exchange of information about railway systems. Our approach allows syntactic and semantic validation against predefined and custom rules, using . and its integrated B-Rules?DSL. In addition, a B-model can be generated to animate the dynamic behaviour of the specification,作者: Accommodation 時(shí)間: 2025-3-23 23:38 作者: 白楊 時(shí)間: 2025-3-24 04:22
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/f/image/320640.jpg作者: 懲罰 時(shí)間: 2025-3-24 06:55
https://doi.org/10.1007/978-3-031-66456-4Embedded and cyber-physical systems; Real-time systems; fault-tolerant systems ; Dependable systems ; D作者: 600 時(shí)間: 2025-3-24 11:35 作者: 一罵死割除 時(shí)間: 2025-3-24 16:08 作者: 有權(quán) 時(shí)間: 2025-3-24 20:23
: A Metric Recommendation Service for?Online Systems Using Graph Learning online systems heavily rely on metrics, which are time series data that can describe the real-time state of a system from various perspectives. Typically, software engineers generate dashboards with metrics to aid software maintenance. Though several attempts have been devoted to metric analysis fo作者: LIMIT 時(shí)間: 2025-3-25 00:59 作者: Orchiectomy 時(shí)間: 2025-3-25 03:43
Automated Parameter Determination for?Enhancing the?Product Configuration System of?Renault: An Expernal product configuration system to model its vehicle diversity. This system is based on the well-known knowledge compilation approach and is associated with a set of parameters. Different input parameters have a strong influence on the system’s performance. The parameters actually used are determi作者: ferment 時(shí)間: 2025-3-25 08:36
Optimal Solution Guided Branching Strategy for?Neural Network Branch and?Bound Verificationion methods employing branch and bound technique have shown excellent performance for this task and are widely adopted to provide robustness assurance. A key component in branch and bound is the branching strategy, which determines how to split the feasible region. A good branching strategy can redu作者: 騷擾 時(shí)間: 2025-3-25 13:37
AccMILP: An Approach for?Accelerating Neural Network Verification Based on?Neuron Importanceility in DNNs, ensuring their prediction accuracy through robustness verification becomes imperative before deploying them in safety-critical applications. Neural Network Verification (NNV) approaches can broadly be categorized into exact and approximate solutions. Exact solutions are complete but t作者: 富足女人 時(shí)間: 2025-3-25 18:45 作者: OCTO 時(shí)間: 2025-3-25 21:01
Test Architecture Generation by?Leveraging BERT and?Control and?Data Flowsy. This can lead to a lack of a comprehensive overview of the test architecture, hampering the reuse of test functions when implementing new test cases. To address this challenge, we propose ., an automated test architecture generation approach, which employs an optimization algorithm to retrieve hi作者: Facet-Joints 時(shí)間: 2025-3-26 00:36 作者: Oration 時(shí)間: 2025-3-26 07:09
Modeling and?Verification of?Solidity Smart Contracts with?the?B Methode led to the loss of millions of dollars worth of assets. Since smart contract code cannot be updated to patch security flaws, reasoning about smart contract correctness to ensure the absence of vulnerabilities before their deployment is of the utmost importance. In this paper, we present a formal a作者: Venules 時(shí)間: 2025-3-26 11:39 作者: stress-test 時(shí)間: 2025-3-26 13:28 作者: 不開(kāi)心 時(shí)間: 2025-3-26 18:52 作者: SLAG 時(shí)間: 2025-3-26 22:02 作者: harpsichord 時(shí)間: 2025-3-27 01:34 作者: 無(wú)瑕疵 時(shí)間: 2025-3-27 05:40 作者: FLING 時(shí)間: 2025-3-27 11:09 作者: exigent 時(shí)間: 2025-3-27 14:39 作者: Debility 時(shí)間: 2025-3-27 18:32 作者: curriculum 時(shí)間: 2025-3-28 00:16 作者: 高歌 時(shí)間: 2025-3-28 03:50 作者: 收藏品 時(shí)間: 2025-3-28 09:03
Anna Triandafyllidou,Thanos Maroukisdersampling can significantly improve TD model performance compared to oversampling and no resampling; (ii) the combined application of undersampling and oversampling techniques leads to a synergy of further performance improvement compared to applying each technique exclusively. Based on these resu作者: Thymus 時(shí)間: 2025-3-28 14:20 作者: 恫嚇 時(shí)間: 2025-3-28 16:56 作者: 希望 時(shí)間: 2025-3-28 20:40 作者: 明確 時(shí)間: 2025-3-29 00:40 作者: 脫離 時(shí)間: 2025-3-29 05:14
: A Metric Recommendation Service for?Online Systems Using Graph Learningon mechanisms for them respectively. Graph learning techniques are employed in the automation of metric recommendation. Our experiments demonstrate that the proposed approach can achieve an F1-score of 0.912 in selecting metrics for anomaly detection, and an accuracy of 0.859 in retrieving metrics f作者: Munificent 時(shí)間: 2025-3-29 11:06 作者: Terrace 時(shí)間: 2025-3-29 13:53 作者: 纖細(xì) 時(shí)間: 2025-3-29 16:02
AccMILP: An Approach for?Accelerating Neural Network Verification Based on?Neuron Importanceelaxation methods to reduce the size of NNV models while ensuring verification accuracy. The experimental results indicate that AccMILP can reduce the size of the verification model by approximately 30% and decrease the solution time by at least 80% while maintaining performance equal to or greater 作者: Exonerate 時(shí)間: 2025-3-29 20:25
Word2Vec-BERT-bmu:Classification of RISC-V Architecture Software Package Build Failuresmarized. Secondly, the Word2Vec-BERT-bmu model is proposed to construct the failure classification using an automated software package with multi-feature concatenation. Experimental results show that the Macro F1 value is improved by 2–4% compared with other models. In addition, for real-world softw作者: Palliation 時(shí)間: 2025-3-30 02:46
Test Architecture Generation by?Leveraging BERT and?Control and?Data Flows coupling and . 28–50% cohesion of the original test architectures manually constructed by test engineers from our industrial partner. FunBERT achieves 97.9%, 98.3%, and 98.1% in Precision, Recall, and F1-score, and significantly outperforms the best baseline method BERT.作者: occult 時(shí)間: 2025-3-30 05:15 作者: 責(zé)問(wèn) 時(shí)間: 2025-3-30 11:59 作者: 較早 時(shí)間: 2025-3-30 14:49 作者: Crumple 時(shí)間: 2025-3-30 18:10 作者: Aboveboard 時(shí)間: 2025-3-30 20:53 作者: LASH 時(shí)間: 2025-3-31 01:37 作者: deciduous 時(shí)間: 2025-3-31 05:51
0302-9743 submissions. These papers have been categorized into the following sections:?Machine Learning and Complex Systems;?Neural Network Verification;?A.I. for Software Engineering;?Smart Contract;?Formal Methods; Security & Program Analysis..978-3-031-66455-7978-3-031-66456-4Series ISSN 0302-9743 Series E-ISSN 1611-3349