Currently viewing:
-
Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis
Chuah, T., Jhumka, A., Alt, S., Villalobos, J., Fryman, J., Barth, B., Parashar, M.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00072
- Additional Links
-
http://dx.doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00072
-
A Stable Variational Autoencoder for Text Modelling
Li, R., Li, X., Lin, C., Collinson, M., Mao, R.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.18653/v1/W19-8673
- Additional Links
-
https://aclweb.org/anthology/
-
View publication in Scopus
-
A Stable Variational Autoencoder for Text Modelling
Li, R., Li, X., Lin, C., Collinson, M., Mao, R.
Contributions to Conferences
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/71a2c7ea-dee9-4d96-aceb-f0717f8b4f90/download
-
A Dual-Attention Hierarchical Recurrent Neural Network for Dialogue Act Classification
Li, R., Lin, C., Collinson, M., Li, X., Chen, G.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Online
-
https://www.aclweb.org/anthology/K19-1036.pdf
- Digital Object Identifier
-
https://doi.org/10.18653/v1/K19-1036
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/8d367dfa-014a-4a2f-96a2-94f1aa4b10ae/download
-
http://aura.abdn.ac.uk/bitstreams/2c4d61b7-f512-4b1d-982f-bbdb85e52c33/download
- Additional Links
-
https://www.aclweb.org/anthology/K19-1/
-
A logic of hypothetical conjunction
Collinson, M.
Journal of Logic and Computation, vol. 29, no. 6, pp. 975–1009
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1093/logcom/exz018
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/296a8b38-a68c-4cb8-84a0-558654b23980/download
-
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect
Li, W., Mitchell, C., Chen, T.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1145/3338500.3360331
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/807fecb1-50bb-4d35-87df-8adc6161059a/download
-
Underwater acoustic sensor networks node localization based on compressive sensing in water hydrology
Wang, S., Lin, Y., Tao, H., Sharma, P. K., Wang, J.
Sensors (Switzerland), vol. 19, no. 20, 4552
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.3390/s19204552
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/19443311-38c3-480b-9dbb-7927d23b6469/download
- Additional Links
-
View publication in Scopus
-
Automated Game-Theoretic Verification of Security Systems
Mu, C.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-3-030-30281-8_14
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/f09cc366-7ced-40e7-8401-c5d817f58156/download
-
Towards comprehensive dependability-driven resource use and message log-analysis for HPC systems diagnosis
Chuah, T., Jhumka, A., Alt, S., Balouek-Thomert, D., Browne, J., Parashar, M.
Journal of Parallel and Distributed Computing (JPDC), vol. 132, pp. 95-112
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.jpdc.2019.05.013
- Additional Links
-
http://dx.doi.org/10.1016/j.jpdc.2019.05.013
-
CCTV-based multi-factor authentication system
Kwon, B. W., Sharma, P. K., Park, J. H.
Journal of Information Processing Systems, vol. 15, no. 4, pp. 904-919
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.3745/JIPS.03.0127
- Additional Links
-
View publication in Scopus