default search action
20th ICECCS 2015: Gold Coast, Australia
- 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015, Gold Coast, Australia, December 9-12, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8581-7
Session: Software Architecture and Optimisation
- Rahma Bouaziz, Laurent Lemarchand, Frank Singhoff, Bechir Zalila, Mohamed Jmaiel:
Architecture Exploration of Real-Time Systems Based on Multi-objective Optimization. 1-10 - Aldeida Aleti, Irene Moser:
Fitness Landscape Characterisation for Constrained Software Architecture Optimisation Problems. 11-20 - Smail Rahmoun, Etienne Borde, Laurent Pautet:
Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES). 21-30
Session: Empirical Methods
- Juha Savolainen, Mike Mannion:
A Make/Buy/Reuse Feature Development Framework for Product Line Evolution. 31-39 - Yun Zhang, David Lo, Xin Xia, Bowen Xu, Jianling Sun, Shanping Li:
Combining Software Metrics and Text Features for Vulnerable File Prediction. 40-49 - Si-Mohamed Lamraoui, Shin Nakajima, Hiroshi Hosobe:
Hardened Flow-Sensitive Trace Formula for Fault Localization. 50-59
Session: Security
- Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo:
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. 60-69 - Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim:
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors. 70-79 - Byungho Min, Vijay Varadharajan:
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). 80-89 - Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. 90-99
Session: Software Verification
- Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin:
GPU Accelerated On-the-Fly Reachability Checking. 100-109 - Mirela Botezatu, Hagen Völzer, Lothar Thiele:
The Complexity of Deadline Analysis for Workflow Graphs with a Single Resource. 110-119 - David Sanán, Yang Liu, Yongwang Zhao, Zhenchang Xing, Mike Hinchey:
Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code. 120-129 - Wen Su, Jean-Raymond Abrial, Geguang Pu, Bin Fang:
Formal Development of a Real-Time Operating System Memory Manager. 130-139
Session: Unifying Theories of Programming (UTP)
- Florin Craciun, Tibor Kiss, Andreea Costea:
Towards a Session Logic for Communication Protocols. 140-149 - Qin Li, Jinxun Wang, Qiwen Xu, Yanhong Huang, Huibiao Zhu:
A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic Systems. 150-159 - Yanhong Huang, Yongxin Zhao, Shengchao Qin, Jifeng He:
Probabilistic Denotational Semantics for an Interrupt Modelling Language. 160-169
Session: Short Papers
- Roopak Sinha:
Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion. 170-173 - Qiang Wang, Simon Bliudze:
SeBip: A Symbolic Executor for BIP. 174-177 - Mojgan Kamali, Luigia Petre:
Improved Recovery for Proactive, Distributed Routing. 178-181 - Jin Song Dong, Ling Shi, Le Vu Nguyen Chuong, Kan Jiang, Jing Sun:
Sports Strategy Analytics Using Probabilistic Reasoning. 182-185 - Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun:
Web Application Architecture Security Evaluation Method Based on AADL. 186-189 - Jacob Geisel, Brahim Hamid, Jean-Michel Bruel:
Security Concepts as Add-On for Process Models. 190-193 - Kushal Ahmed, Lian Wen, Abdul Sattar, Reza Farid:
Semantic Network Model: A Reasoning Engine for Software Requirements. 194-197 - Roopak Sinha, Cheng Pang, Gerardo Santillan Martinez, Juha Kuronen, Valeriy Vyatkin:
Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical Systems. 198-201
Session: Doctoral Symposium
- Hendra Gunadi:
Formal Certification of Non-interferent Android Bytecode (DEX Bytecode). 202-205 - Mojgan Kamali, Luigia Petre:
Comparing Routing Protocols. 206-209 - Zhimin Wu:
Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium). 210-213 - Quanqi Ye:
Analyzing Security Property of Android Application Implementation Using Formal Method. 214-217 - Jiaying Li:
An Invariant Inference Framework by Active Learning and SVMs. 218-221
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.