Siddharth
|
Agarwal
| Profile |
Serverless computing optimization: reducing cold starts
|
Kasun | Amarasinghe | Profile | Learning index structure for multi-dimensional spatial data |
Philip
|
Cervenjak
| Profile |
Approximation algorithms for submodular optimisation
|
Ming
|
Chen
| Profile |
A heterogeneous stream processing system based on online learning and blockchain in IoT
|
Zhuo (Zoey) | Chen | Profile | A Verified Cost Model for Call-By-Push-Value Lambda Calculus |
Louis
|
Cheung
| Profile |
Formally Verified Data Compression Algorithms
|
Qifan | Deng | Profile | An Energy-Efficient Distributed System for Integration of Heterogeneous Resources |
Luxin
|
Fang
| Profile |
Estimation of distribution power network topology from smart meter measurements
|
Duneesha | Fernando | Profile | Performance Anomaly-aware Management of Serverless Applications deployed in CaaS (Container as a Service) platforms |
Wentao | Gao | Profile | Human-in-the-loop fuzzing for effective vulnerability discovery |
Reyhaneh | Goli | Profile | User Search Modelling in Complex Querying Environments |
Shuzhi
|
Gong
| Profile |
Social Media Fake News Detection Through Graph Based Deep Learning
|
Zifeng (Peaker)
|
Guo
| Profile |
Efficient structures for recency and string-searching queries in data streams
|
Yulun
|
Huang
| Profile |
Resource Management and Application Scheduling in Big Data Cloud
|
Zuo
|
Huang
| Profile |
Real-time hot-spot detection for the environmental sciences through deep learning, sensor networks and data fusion
|
Vincent
|
Jackson
| Profile |
Mechanised High-Level Verification for Concurrent Low-level Programs
|
Amanda
|
Jayanetti
| Profile |
Understanding User Attention in Mobile Augmented Reality
|
Jiankai
|
Jin
| Profile |
Analysing utility and tradeoffs of multi-party machine learning
|
Vinay
|
Kabadi
| Profile | Automated software regression bug fixing |
Zhenzhi | Lai | Profile | Security of Post-Quantum Algorithms for IoT |
Rabindra
|
Lamsal
| Profile |
Social media analytics: a real-time machine learning approach
|
Cong Thanh | Le | Profile | Automated Software Bug Fixing |
Alex Jacey
|
Ligthart-Smith
| Profile |
Preserving data privacy with semi-trusted adversaries
|
Pilar Selene | Linares Arévalo | Profile | Refinement types to simplify verification |
Xing | Li | Profile | Type-Based Complexity Analysis for Higher-Order Functional Programs |
Han
|
Liu
| Profile |
Enhancing Scientific Document Categorization with Taxonomy Information
|
Anupama Ruwanthika
|
Mampage
| Profile |
Context-aware dynamic resource management in fog/edge computing environments
|
Tharindu Lakmal
|
Muthugama
| Profile |
Spatiotemporal data and future transportation systems
|
Saeed
| Nasehibasharzad | Profile | A high performance and near real-time integrated driving navigation and traffic controlling system |
Mak
|
Nazecic-Andrlon
| Profile | Efficient interval reasoning for floating-point arithmetic |
Huy | Nguyen | Profile | Encoding additional natural language artefacts for better code representation |
Thanh-Dat
|
Nguyen
| Profile |
Machine learning for program synthesis
|
Thanh Hoa
|
Nguyen
| Profile |
Serverless Quantum Cloud Computing
|
Lianglu
|
Pan
| Profile |
Automated vulnerability and flaw detection in network communications
|
Kalyani
|
Penyala
| Profile |
Machine learning-based Management of Data Centre Resources for Green Cloud Computing
|
Tianyu | Qi | Profile | Optimization of Data Processing and Resource Management for Distributed Stream Processing Systems |
Landadinee | Rathuwadu | Profile | Self-Driving Databases: Statistical Sampling for Efficient Cost Estimation |
Larissa
|
Salerno
| Profile |
Software installation in third-party software ecosystems
|
Tharindu Bandara
|
Saryakara Hewage
| Profile |
Learning-centric Resource Management in Energy-efficient Cloud Computing
|
Elisa | Shioji | Profile | Rules as code: Can privacy be automated? |
Kwangsuk
|
Song
| Profile | Storage systems management in cloud computing environments |
Kanwal Aslam
|
Syed
| Profile |
Hash based post quantum cryptography on FPGA
|
Samuel | Thomas | Profile | Designing Efficient Algorithms for Big Data |
Chenhao
|
Tong
| Profile |
Multi-agent Distributed Autonomous System Optimisation using Reinforcement Learning
|
Faxing
|
Wang
| Profile | Removing trust assumptions for distributed zero-knowledge proofs |
Lingfei
|
Wang
| Profile |
High performance event detection and tracking in social media
|
Peiyong
|
Wang
| Profile |
Quantum Computing
|
Zhe
|
Wang
| Profile |
Privacy-oriented Deployment of Health Application in Distributed Clouds
|
Zhiyu
|
Wang
| Profile |
A New Approach for Efficient Deployment of Applications in Edge Cloud
|
Ziren
|
Xiao
| Profile |
Runtime optimisation of distributed systems using reinforcement learning
|
Pengbo
|
Yan
| Profile |
Scalable, Principled Vulnerability Detection via Insecurity Logics
|
Hongwei | Yin | Profile | Real-time Action Recognition in Sports Games through Deep Learning on Mobile Devices |
Zhiyuan | Zhang | Profile | Investigating and mitigating performance interference of shared execution in browsers |
Zhuo
|
Zhang
| Profile |
Efficient algorithms for solving problems on massive data
|
Jie
|
Zhao
| Profile |
Autonomous workload management in federated cloud computing environments
|
Zihan
|
Yang
| Profile |
Deep learning in applications with limited data and computation resources
|
Zhuowei
|
Zhao
| Profile |
Learning-based algorithms with non-trivial theoretical guarantees for solving problems on massive data |
Mike | Zhuang | Profile | Does the law make sense? Behavioral-Psychological tests of the Social Media Addiction Reduction (SMART) Act |