Zobrazeno 1 - 10
of 6 740
pro vyhledávání: '"Kalu On"'
Autor:
Patil, Parth V., Jiang, Wenxin, Peng, Huiyun, Lugo, Daniel, Kalu, Kelechi G., LeBlanc, Josh, Smith, Lawrence, Heo, Hyeonwoo, Aou, Nathanael, Davis, James C.
The availability of pre-trained models (PTMs) has enabled faster deployment of machine learning across applications by reducing the need for extensive training. Techniques like quantization and distillation have further expanded PTM applicability to
Externí odkaz:
http://arxiv.org/abs/2412.18972
Autor:
Schorlemmer, Taylor R., Burmane, Ethan H., Kalu, Kelechi G., Torres-Arias, Santiago, Davis, James C.
Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signat
Externí odkaz:
http://arxiv.org/abs/2407.03949
Many software products are composed by the recursive integration of components from other teams or external parties. Each additional link in a software product's supply chain increases the risk of the injection of malicious behavior. To improve suppl
Externí odkaz:
http://arxiv.org/abs/2406.08198
Autor:
Schorlemmer, Taylor R, Kalu, Kelechi G, Chigges, Luke, Ko, Kyung Myung, Isghair, Eman Abu, Baghi, Saurabh, Torres-Arias, Santiago, Davis, James C
Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software si
Externí odkaz:
http://arxiv.org/abs/2401.14635
Autor:
Uzoma Samuel NWIGWE, Makachi Anthony NCHEKWUBE, Kalu Divine ONUOHA, Jeremiah Ifeanyichukwu OKORO, Uchenna Emmanuel UDEKWE
Publikováno v:
European Journal of Materials Science and Engineering, Vol 9, Iss 4, Pp 295-308 (2024)
This research analyzed the mechanical properties of reinforcing steel bars used in Nigeria and compared them to four different standards (AISI 1018, ASTM A706, BS4449, and NST-65-Mn). This was done as a result of frequent building collapses in Nigeri
Externí odkaz:
https://doaj.org/article/b12a3e48a36a414aa5911eea8b95acf2
Publikováno v:
Discover Agriculture, Vol 2, Iss 1, Pp 1-14 (2024)
Abstract India has been identified as one of the most susceptible nations to the impacts of climate change. The present study made an attempt to examine the adaptive capacity of farmers living in the Gangetic Plains of India. This study creates an ad
Externí odkaz:
https://doaj.org/article/4efa41f9f0cf41fbb70e50b99ac6a907
Publikováno v:
Binus Business Review, Vol 7, Iss 3, Pp 213-219 (2016)
This article investigated the sensitivity of capital market development to public debt in Nigeria using descriptive statistic, regression analysis, and the Engle-Granger co integration techniques for the period ranging from 1981 to 2014. The estimate
Externí odkaz:
https://doaj.org/article/ee058c1274b846d396489621d93b3bdd
Autor:
Kalu, Kelechi G., Schorlemmer, Taylor R., Chen, Sophie, Robinson, Kyle, Kocinare, Erik, Davis, James C.
The primary theory of software engineering is that an organization's Policies and Processes influence the quality of its Products. We call this the PPP Theory. Although empirical software engineering research has grown common, it is unclear whether r
Externí odkaz:
http://arxiv.org/abs/2308.12387
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures
Autor:
Singla, Tanmay, Anandayuvaraj, Dharun, Kalu, Kelechi G., Schorlemmer, Taylor R., Davis, James C.
As we increasingly depend on software systems, the consequences of breaches in the software supply chain become more severe. High-profile cyber attacks like those on SolarWinds and ShadowHammer have resulted in significant financial and data losses,
Externí odkaz:
http://arxiv.org/abs/2308.04898
Autor:
Kalu, Chikezie Kennedy, author, Döngül, Esra Sipahi, author
Publikováno v:
VUCA and Other Analytics in Business Resilience, Part A