Picture for Foutse Khomh

Foutse Khomh

Jack

An Efficient Model Maintenance Approach for MLOps

Add code
Dec 05, 2024
Viaarxiv icon

Fault Localization in Deep Learning-based Software: A System-level Approach

Add code
Nov 12, 2024
Figure 1 for Fault Localization in Deep Learning-based Software: A System-level Approach
Figure 2 for Fault Localization in Deep Learning-based Software: A System-level Approach
Figure 3 for Fault Localization in Deep Learning-based Software: A System-level Approach
Figure 4 for Fault Localization in Deep Learning-based Software: A System-level Approach
Viaarxiv icon

Towards Optimizing SQL Generation via LLM Routing

Add code
Nov 06, 2024
Viaarxiv icon

In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators

Add code
Oct 25, 2024
Figure 1 for In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators
Figure 2 for In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators
Figure 3 for In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators
Figure 4 for In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators
Viaarxiv icon

Toward Debugging Deep Reinforcement Learning Programs with RLExplorer

Add code
Oct 06, 2024
Figure 1 for Toward Debugging Deep Reinforcement Learning Programs with RLExplorer
Figure 2 for Toward Debugging Deep Reinforcement Learning Programs with RLExplorer
Figure 3 for Toward Debugging Deep Reinforcement Learning Programs with RLExplorer
Figure 4 for Toward Debugging Deep Reinforcement Learning Programs with RLExplorer
Viaarxiv icon

What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach

Add code
Sep 30, 2024
Figure 1 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 2 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 3 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 4 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Viaarxiv icon

Trimming the Risk: Towards Reliable Continuous Training for Deep Learning Inspection Systems

Add code
Sep 13, 2024
Viaarxiv icon

Assessing Programming Task Difficulty for Efficient Evaluation of Large Language Models

Add code
Jul 30, 2024
Viaarxiv icon

DeepCodeProbe: Towards Understanding What Models Trained on Code Learn

Add code
Jul 11, 2024
Figure 1 for DeepCodeProbe: Towards Understanding What Models Trained on Code Learn
Figure 2 for DeepCodeProbe: Towards Understanding What Models Trained on Code Learn
Figure 3 for DeepCodeProbe: Towards Understanding What Models Trained on Code Learn
Figure 4 for DeepCodeProbe: Towards Understanding What Models Trained on Code Learn
Viaarxiv icon

Mining Action Rules for Defect Reduction Planning

Add code
May 22, 2024
Figure 1 for Mining Action Rules for Defect Reduction Planning
Figure 2 for Mining Action Rules for Defect Reduction Planning
Figure 3 for Mining Action Rules for Defect Reduction Planning
Figure 4 for Mining Action Rules for Defect Reduction Planning
Viaarxiv icon