Schwartz, Edward L.
1336  Ergebnisse:
Personensuche X
?
2

Superfluid spin transistor:

Schwartz, Edward ; Li, Bo ; Kovalev, Alexey A.
Physical Review Research.  4 (2022)  2 - p. , 2022
 
?
3

VarCLR : variable semantic representation pre-training v..:

, In: Proceedings of the 44th International Conference on Software Engineering,
Chen, Qibin ; Lacomis, Jeremy ; Schwartz, Edward J.... - p. 2327-2339 , 2022
 
?
 
?
5

VarCLR: Variable Semantic Representation Pre-training via C..:

, In: 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE),
Chen, Qibin ; Lacomis, Jeremy ; Schwartz, Edward J.... - p. 2327-2339 , 2022
 
?
6

The interaction of SKP2 with p27 enhances the progression a..:

Wang, Jichuan ; Aldahamsheh, Osama ; Ferrena, Alexander...
Annals of the New York Academy of Sciences.  1490 (2021)  1 - p. 90-104 , 2021
 
?
7

The Art, Science, and Engineering of Fuzzing: A Survey:

Manes, Valentin J.M. ; Han, HyungSeok ; Han, Choongwoo...
IEEE Transactions on Software Engineering.  47 (2021)  11 - p. 2312-2331 , 2021
 
?
8

A Generic Technique for Automatically Finding Defense-Aware..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
 
?
 
?
10

DIRE : a neural approach to decompiled identifier naming:

, In: Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering,
 
?
11

DIRE: A Neural Approach to Decompiled Identifier Naming:

, In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE),
Lacomis, Jeremy ; Yin, Pengcheng ; Schwartz, Edward... - p. 628-639 , 2019
 
?
12

Executable Counterexamples in Software Model Checking:

, In: Lecture Notes in Computer Science; Verified Software. Theories, Tools, and Experiments,
 
?
13

Meaningful variable names for decompiled code : a machin..:

, In: Proceedings of the 26th Conference on Program Comprehension,
 
?
14

Using Logic Programming to Recover C++ Classes and Methods ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
 
1-15