Alert button
Picture for Foutse Khomh

Foutse Khomh

Alert button

Quality Issues in Machine Learning Software Systems

Add code
Bookmark button
Alert button
Jun 26, 2023
Pierre-Olivier Côté, Amin Nikanjam, Rached Bouchoucha, Ilan Basta, Mouna Abidi, Foutse Khomh

Viaarxiv icon

Responsible Design Patterns for Machine Learning Pipelines

Add code
Bookmark button
Alert button
Jun 07, 2023
Saud Hakem Al Harbi, Lionel Nganyewou Tidjon, Foutse Khomh

Figure 1 for Responsible Design Patterns for Machine Learning Pipelines
Figure 2 for Responsible Design Patterns for Machine Learning Pipelines
Figure 3 for Responsible Design Patterns for Machine Learning Pipelines
Figure 4 for Responsible Design Patterns for Machine Learning Pipelines
Viaarxiv icon

Leveraging Data Mining Algorithms to Recommend Source Code Changes

Add code
Bookmark button
Alert button
Apr 29, 2023
AmirHossein Naghshzan, Saeed Khalilazar, Pierre Poilane, Olga Baysal, Latifa Guerrouj, Foutse Khomh

Figure 1 for Leveraging Data Mining Algorithms to Recommend Source Code Changes
Figure 2 for Leveraging Data Mining Algorithms to Recommend Source Code Changes
Figure 3 for Leveraging Data Mining Algorithms to Recommend Source Code Changes
Figure 4 for Leveraging Data Mining Algorithms to Recommend Source Code Changes
Viaarxiv icon

On Codex Prompt Engineering for OCL Generation: An Empirical Study

Add code
Bookmark button
Alert button
Mar 28, 2023
Seif Abukhalaf, Mohammad Hamdaqa, Foutse Khomh

Figure 1 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 2 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 3 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 4 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Viaarxiv icon

Mutation Testing of Deep Reinforcement Learning Based on Real Faults

Add code
Bookmark button
Alert button
Jan 13, 2023
Florian Tambon, Vahid Majdinasab, Amin Nikanjam, Foutse Khomh, Giuliano Antonio

Figure 1 for Mutation Testing of Deep Reinforcement Learning Based on Real Faults
Figure 2 for Mutation Testing of Deep Reinforcement Learning Based on Real Faults
Figure 3 for Mutation Testing of Deep Reinforcement Learning Based on Real Faults
Figure 4 for Mutation Testing of Deep Reinforcement Learning Based on Real Faults
Viaarxiv icon

AmbieGen: A Search-based Framework for Autonomous Systems Testing

Add code
Bookmark button
Alert button
Jan 01, 2023
Dmytro Humeniuk, Foutse Khomh, Giuliano Antoniol

Figure 1 for AmbieGen: A Search-based Framework for Autonomous Systems Testing
Figure 2 for AmbieGen: A Search-based Framework for Autonomous Systems Testing
Figure 3 for AmbieGen: A Search-based Framework for Autonomous Systems Testing
Figure 4 for AmbieGen: A Search-based Framework for Autonomous Systems Testing
Viaarxiv icon

Can Ensembling Pre-processing Algorithms Lead to Better Machine Learning Fairness?

Add code
Bookmark button
Alert button
Dec 05, 2022
Khaled Badran, Pierre-Olivier Côté, Amanda Kolopanis, Rached Bouchoucha, Antonio Collante, Diego Elias Costa, Emad Shihab, Foutse Khomh

Figure 1 for Can Ensembling Pre-processing Algorithms Lead to Better Machine Learning Fairness?
Figure 2 for Can Ensembling Pre-processing Algorithms Lead to Better Machine Learning Fairness?
Figure 3 for Can Ensembling Pre-processing Algorithms Lead to Better Machine Learning Fairness?
Viaarxiv icon

An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks

Add code
Bookmark button
Alert button
Nov 28, 2022
Mohamed Raed El aoun, Lionel Nganyewou Tidjon, Ben Rombaut, Foutse Khomh, Ahmed E. Hassan

Figure 1 for An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks
Figure 2 for An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks
Figure 3 for An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks
Figure 4 for An Empirical Study of Library Usage and Dependency in Deep Learning Frameworks
Viaarxiv icon

Reliable Malware Analysis and Detection using Topology Data Analysis

Add code
Bookmark button
Alert button
Nov 08, 2022
Lionel Nganyewou Tidjon, Foutse Khomh

Figure 1 for Reliable Malware Analysis and Detection using Topology Data Analysis
Figure 2 for Reliable Malware Analysis and Detection using Topology Data Analysis
Figure 3 for Reliable Malware Analysis and Detection using Topology Data Analysis
Figure 4 for Reliable Malware Analysis and Detection using Topology Data Analysis
Viaarxiv icon