Your selections:
LS-sampling: An effective local search based sampling approach for achieving high t-wise coverage
- Luo, Chuan, Sun, Binqi, Qiao, Bo, Chen, Junjie, Zhang, Hongyu, Lin, Jinkun, Lin, Qingwei, Zhang, Dongmei
Microscopic image segmentation based on color pixels classification
- Park, Mira, Jin, Jesse S., Xu, Min, Wong, W. S. Felix, Luo, Suhuai, Cui, Yue
Music video affective understanding using feature importance analysis
- Cui, Yue, Jin, Jesse S., Zhang, Shiliang, Luo, Suhuai, Tian, Qi
Negotiating the maze of academic integrity in computing education
- Simon, Sheard, Judy, Morgan, Michael, Petersen, Andrew, Settle, Amber, Sinclair, Jane, Cross, Gerry, Riedesel, Charles
No more fine-tuning? an experimental evaluation of prompt tuning in code intelligence
- Wang, Chaozheng, Yang, Yuanhang, Gao, Cuiyun, Peng, Yun, Zhang, Hongyu, Lyu, Michael R.
NTAM: Neighborhood-temporal attention model for disk failure prediction in cloud platforms
- Luo, Chuan, Zhao, Pu, Zhang, Dongmei, Qiao, Bo, Wu, Youjiang, Zhang, Hongyu, Wu, Wei, Lu, Weihai, Dang, Yingnong, Rajmohan, Saravanakumar, Lin, Qingwei
Pass rates in introductory programming and in other STEM disciplines
- Simon,, Luxton-Reilly, Andrew, Ajanovski, Vangel V., Fouh, Eric, Gonsalvez, Christabel, Leinonen, Juho, Parkinson, Jack, Poole, Matthew, Thota, Neena
Representative names of computing degree programs worldwide
- Sabin, Mihaela, Snow, Paul, Simon,, Impagliazzo, John, Clear, Alison, Timanovsky, Yan
Reusing simulated evacuation behaviour in a game engine
- Xi, Mingze, Smith, Shamus P.
- Luo, Chuan, Zhao, Qiyuan, Cai, Shaowei, Zhang, Hongyu, Hu, Chunming
Strategies for maintaining academic integrity in first-year computing courses
- Sheard, Judy, Simon,, Butler, Matthew, Falkner, Katrina, Morgan, Michael, Weerasinghe, Amali
Teaching creative design: a challenging field
- Askland, Hedda Haugen, Williams, Anthony, Ostwald, Michael J.
The publishing game: an analysis of "Game" related academic publishing patterns
Theoretical underpinnings of computing education research - what is the evidence?
- Malmi, Lauri, Sheard, Judy, Simon,, Bednarik, Roman, Helminen, Juha, Kinnuen, Päivi, Korhonen, Ari, Myller, Niko, Sorva, Juha, Taherkhani, Ahmad
Towards More Efficient Meta-heuristic Algorithms for Combinatorial Test Generation
- Lin, Jinkun, Cai, Shaowei, Luo, Chuan, Lin, Qingwei, Zhang, Hongyu
You see what I want you to see: poisoning vulnerabilities in neural code search
- Wan, Yao, Zhang, Shijie, Zhang, Hongyu, Sui, Yulei, Xu, Guandong, Yao, Dezhong, Jin, Hai, Sun, Lichao
Are you sure you would like to clear your session, including search history and login status?