2009 | ||
---|---|---|
32 | EE | Soyeon Park, Shan Lu, Yuanyuan Zhou: CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36 |
2008 | ||
31 | EE | Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou: Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339 |
30 | Arthur Chou, Shan Lu: A Dynamic Programming Approach to the Study of Protein Sequence Variations. BIOCOMP 2008: 3-8 | |
29 | EE | Ruochen Wang, Zhiqiang He, Zheng Sun, Shan Lu, Kai Niu: A Revenue-Based Low-Delay and Efficient Downlink Scheduling Algorithm in OFDMA Systems. VTC Fall 2008: 1-5 |
2007 | ||
28 | EE | Shan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536 |
27 | EE | Shan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE (Companion) 2007: 533-536 |
26 | EE | Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 |
25 | EE | Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou: MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 |
24 | EE | Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou: Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 |
23 | EE | Shan Lu, Guixia Kang, Qiqu Zhu, Ping Zhang: A Orthogonal Superimposed Pilot for Channel Estimation in MIMO-OFDM systems. VTC Spring 2007: 2409-2413 |
22 | EE | Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) |
2006 | ||
21 | EE | Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai: Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 |
20 | EE | Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 |
19 | EE | Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas: PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52 |
18 | EE | Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev: Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. OSDI 2006: 117-130 |
17 | EE | Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee: Analyzing persistent state interactions to improve state management. SIGMETRICS/Performance 2006: 363-364 |
16 | EE | Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006) |
15 | EE | Zhaohui Zhu, Rong Zhang, Shan Lu: A characterization theorem for injective model classes axiomatized by general rules. Theor. Comput. Sci. 360(1-3): 147-171 (2006) |
2005 | ||
14 | EE | Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker, Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger: An Approach for Intent Identification by Building on Deception Detection. HICSS 2005 |
13 | EE | Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse: Blob Analysis of the Head and Hands: A Method for Deception Detection. HICSS 2005 |
12 | EE | Feng Qin, Shan Lu, Yuanyuan Zhou: SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302 |
2004 | ||
11 | EE | Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas: AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280 |
10 | EE | Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302 |
2003 | ||
9 | EE | Shan Lu, Dimitris N. Metaxas, Dimitris Samaras, John Oliensis: Using Multiple Cues for Hand Tracking and Model Refinement. CVPR (2) 2003: 443-450 |
2000 | ||
8 | EE | Kazuyuki Imagawa, Hideaki Matsuo, Rin-ichiro Taniguchi, Daisaku Arita, Shan Lu, Seiji Igi: Recognition of Local Features for Camera-Based Sign Language Recognition System. ICPR 2000: 4849-4853 |
1999 | ||
7 | EE | Shan Lu, Seiji Igi: Active Character: Dynamic Reaction to the User. Gesture Workshop 1999: 253-264 |
6 | Shan Lu, Hiroyuki Sakato, Tsuyoshi Uezono, Seiji Igi: A New Method to Synthesize Japanese Sign Language Based on Intuitive Motion Primitives. HCI (1) 1999: 441-445 | |
1998 | ||
5 | Kazuyuki Imagawa, Shan Lu, Seiji Igi: Real-Time Tracking of Human Hands from a Sign-Language Image Sequence. ACCV (1) 1998: 698-705 | |
4 | Kazuyuki Imagawa, Shan Lu, Seiji Igi: Color-Based Hands Tracking System for Sign Language Recognition. FG 1998: 462-467 | |
1997 | ||
3 | EE | Shan Lu, Seiji Igi, Hideaki Matsuo, Yuji Nagashima: Towards a Dialogue System Based on Recognition and Synthesis of Japanese Sign Language. Gesture Workshop 1997: 259-271 |
2 | EE | Hideaki Matsuo, Seiji Igi, Shan Lu, Yuji Nagashima, Yuji Takata, Terutaka Teshima: The Recognition Algorithm with Non-contact for Japanese Sign Language Using Morphological Analysis. Gesture Workshop 1997: 273-284 |
1 | Shan Lu, Kazuyuki Imagawa, Seiji Igi: An Active Gazing-Line System for Improving Sign-Language Conversation. HCI (2) 1997: 283-286 |