Microsoft Research
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
21 | Chao Liu, Fan Guo, Christos Faloutsos: BBM: bayesian browsing model from petabyte-scale data. KDD 2009: 537-546 | |
20 | Fan Guo, Chao Liu, Yi Min Wang: Efficient multiple-click models in web search. WSDM 2009: 124-131 | |
19 | Fan Guo, Chao Liu, Anitha Kannan, Tom Minka, Michael J. Taylor, Yi Min Wang, Christos Faloutsos: Click chain model in web search. WWW 2009: 11-20 | |
18 | Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu: Data Mining for Software Engineering. IEEE Computer 42(8): 55-62 (2009) | |
2008 | ||
17 | David Lo, Siau-Cheng Khoo, Chao Liu: Efficient Mining of Recurrent Rules from a Sequence Database. DASFAA 2008: 67-83 | |
16 | Ming Zhang, Chenglong Gong, Yuan Feng, Chao Liu: Energy-Predicted Shortest Routing Tree Algorithm in Wireless Sensor Networks. ISICA 2008: 117-124 | |
15 | David Lo, Siau-Cheng Khoo, Chao Liu: Mining past-time temporal rules from execution traces. WODA 2008: 50-56 | |
14 | Chao Liu, Xiangyu Zhang, Jiawei Han: A Systematic Study of Failure Proximity. IEEE Trans. Software Eng. 34(6): 826-843 (2008) | |
13 | David Lo, Siau-Cheng Khoo, Chao Liu: Mining temporal rules for software maintenance. Journal of Software Maintenance 20(4): 227-247 (2008) | |
2007 | ||
12 | David Lo, Siau-Cheng Khoo, Chao Liu: Efficient mining of iterative patterns for software specification discovery. KDD 2007: 460-469 | |
2006 | ||
11 | Chao Liu, Zeng Lian, Jiawei Han: How Bayesians Debug. ICDM 2006: 382-393 | |
10 | Bo Zhao, Chao Liu: Efficient SIP-Specific Event Notification. ICN/ICONS/MCL 2006: 1 | |
9 | Chao Liu, Chen Chen, Jiawei Han, Philip S. Yu: GPLAG: detection of software plagiarism by program dependence graph analysis. KDD 2006: 872-881 | |
8 | Chao Liu, Xifeng Yan, Jiawei Han: Mining Control Flow Abnormality for Logic Error Isolation. SDM 2006 | |
7 | Chao Liu, Jiawei Han: Failure proximity: a fault localization-based approach. SIGSOFT FSE 2006: 46-56 | |
6 | Qiaozhu Mei, Chao Liu, Hang Su, ChengXiang Zhai: A probabilistic approach to spatiotemporal theme pattern mining on weblogs. WWW 2006: 533-542 | |
5 | Chao Liu, Long Fei, Xifeng Yan, Jiawei Han, Samuel P. Midkiff: Statistical Debugging: A Hypothesis Testing-Based Approach. IEEE Trans. Software Eng. 32(10): 831-848 (2006) | |
2005 | ||
4 | William Yurcik, Chao Liu: A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID 2005: 111-120 | |
3 | Chao Liu, Xifeng Yan, Long Fei, Jiawei Han, Samuel P. Midkiff: SOBER: statistical model-based bug localization. ESEC/SIGSOFT FSE 2005: 286-295 | |
2 | Chao Liu, Xifeng Yan, Hwanjo Yu, Jiawei Han, Philip S. Yu: Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs. SDM 2005 | |
2003 | ||
1 | Chao Liu, Ming Zhang, Minrui Zheng, Yixin Chen: Step-by-Step Regression: A More Efficient Alternative for Polynomial Multiple Linear Regression in Stream Cube. PAKDD 2003: 437-448 |
1 | Chen Chen | [9] |
2 | Yixin Chen | [1] |
3 | Christos Faloutsos | [19] [21] |
4 | Long Fei | [3] [5] |
5 | Yuan Feng | [16] |
6 | Chenglong Gong | [16] |
7 | Fan Guo | [19] [20] [21] |
8 | Jiawei Han | [2] [3] [5] [7] [8] [9] [11] [14] |
9 | Anitha Kannan | [19] |
10 | Siau-Cheng Khoo | [12] [13] [15] [17] |
11 | Zeng Lian | [11] |
12 | David Lo | [12] [13] [15] [17] [18] |
13 | Qiaozhu Mei | [6] |
14 | Samuel P. Midkiff | [3] [5] |
15 | Thomas P. Minka (Tom Minka) | [19] |
16 | Hang Su | [6] |
17 | Michael J. Taylor | [19] |
18 | Suresh Thummalapenta | [18] |
19 | Yi Min Wang | [19] [20] |
20 | Tao Xie | [18] |
21 | Xifeng Yan | [2] [3] [5] [8] |
22 | Hwanjo Yu | [2] |
23 | Philip S. Yu | [2] [9] |
24 | William Yurcik | [4] |
25 | ChengXiang Zhai (Chengxiang Zhai) | [6] |
26 | Ming Zhang | [1] [16] |
27 | Xiangyu Zhang | [14] |
28 | Bo Zhao | [10] |
29 | Minrui Zheng | [1] |