Mithun P. Acharya
Mithun P. Acharya
Senior Manager of Artificial Intellgence / Principal Data Scientist, LexisNexis
Dirección de correo verificada de - Página principal
Citado por
Citado por
Mining API patterns as partial orders from source code: from usage scenarios to specifications
M Acharya, T Xie, J Pei, J Xu
Proceedings of the the 6th joint meeting of the European software …, 2007
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
D Westhoff, J Girao, M Acharya
IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
D Thuente, M Acharya
Proc. of MILCOM 6, 100, 2006
Practical change impact analysis based on static program slicing for industrial software systems
M Acharya, B Robinson
Proceedings of the 33rd international conference on software engineering …, 2011
Secure comparison of encrypted data in wireless sensor networks
M Acharya, J Girao, D Westhoff
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005
Mining API error-handling specifications from source code
M Acharya, T Xie
International Conference on Fundamental Approaches to Software Engineering …, 2009
Intelligent jamming attacks, counterattacks and (counter) 2 attacks in 802.11 b wireless networks
M Acharya, D Thuente
Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, 2005
Mining interface specifications for generating checkable robustness properties
M Acharya, T Xie, J Xu
2006 17th International Symposium on Software Reliability Engineering, 311-320, 2006
Impact analysis of configuration changes for test case selection
X Qu, M Acharya, B Robinson
2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011
Intelligent jamming in 802.11 b wireless networks
M Acharya, T Sharma, D Thuente, D Sizemore
Proceedings of OPNETWORK. Washington DC, USA: OPNET, 2004
Configuration selection using code change impact analysis for regression testing
X Qu, M Acharya, B Robinson
2012 28th IEEE International Conference on Software Maintenance (ICSM), 129-138, 2012
Jamming vulnerabilities of IEEE 802.11 e
DJ Thuente, B Newlin, M Acharya
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network
J Girao, D Westhoff, MP Acharya
US Patent 7,702,905, 2010
Neighborhood structure assisted non-negative matrix factorization and its application in unsupervised point-wise anomaly detection
I Ahmed, XB Hu, MP Acharya, Y Ding
Journal of Machine Learning Research 22 (34), 1-32, 2021
Oracle-based regression test selection
T Yu, X Qu, M Acharya, G Rothermel
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
Improving software reliability and productivity via mining program source code
T Xie, M Acharya, S Thummalapenta, K Taneja
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-5, 2008
Effective generation of interface robustness properties for static analysis
M Acharya, T Sharma, J Xu, T Xie
21st IEEE/ACM International Conference on Automated Software Engineering …, 2006
Mining health models for performance monitoring of services
M Acharya, V Kommineni
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
Code drones
MP Acharya, C Parnin, NA Kraft, A Dagnino, X Qu
Proceedings of the 38th International Conference on Software Engineering …, 2016
Machine learning enhanced real-time intrusion detection using timing information
H Xu, F Mueller
International Workshop on Trustworthy & Real-time Edge Computing for Cyber …, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20