


default search action
19th ICECCS 2014: Tianjin, China
- 2014 19th International Conference on Engineering of Complex Computer Systems, Tianjin, China, August 4-7, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5482-7

Security and Fault Tolerance
- Gabriel Ciobanu

, Thai Son Hoang, Alin Stefanescu:
From TiMo to Event-B: Event-Driven Timed Mobility. 1-10 - Li Li, Jun Pang, Yang Liu

, Jun Sun
, Jin Song Dong:
Symbolic Analysis of an Electric Vehicle Charging Protocol. 11-18 - Gang Shen, Xiaohong Li, Ruitao Feng

, Guangquan Xu, Jing Hu, Zhiyong Feng:
An Extended UML Method for the Verification of Security Protocols. 19-28
Security and Fault Tolerance
- Xiaolei Li, Hong Hu, Guangdong Bai

, Yaoqi Jia, Zhenkai Liang
, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. 29-38 - Xin Xia

, David Lo
, Xinyu Wang, Bo Zhou:
Automatic Defect Categorization Based on Fault Triggering Conditions. 39-48 - Ting Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang

:
Understanding Complex Binary Loading Behaviors. 49-58 - Byungho Min, Vijay Varadharajan

:
Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures. 59-68
Short Papers: Session 1
- Changlong Li, Hang Zhuang, Kun Lu, Mingming Sun, Jinhong Zhou, Dong Dai, Xuehai Zhou:

An Adaptive Auto-configuration Tool for Hadoop. 69-72 - Qing-Feng Zhang, Shan-Shan Li, Jing Xu:

QScheduler: A Tool for Parallel Query Processing in Database Systems. 73-76 - Hamza Samih, Hélène Le Guen, Ralf Bogusch, Mathieu Acher, Benoit Baudry:

Deriving Usage Model Variants for Model-Based Testing: An Industrial Case Study. 77-80
Adaptive, Self-Managing, and Multi-agent Systems
- Gabriel Le Breton, Nicolas Bergeron, Sylvain Hallé

:
A Reference Framework for the Automated Exploration of Web Applications. 81-90 - Zongwei Zhu, Xi Li, Hengchang Liu, Cheng Ji, Yuan Xu, Xuehai Zhou, Beilei Sun:

A Thread Behavior-Based Memory Management Framework on Multi-core Smartphone. 91-97 - Xin Peng, Yi Xie, Yijun Yu, John Mylopoulos, Wenyun Zhao:

Evolving Commitments for Self-Adaptive Socio-technical Systems. 98-107 - Liangze Yin, Fei He, Ming Gu, Jia-Guang Sun:

Clause Replication and Reuse in Incremental Temporal Induction. 108-115 - Judith Peters, Robert Wille

, Rolf Drechsler
:
Generating SystemC Implementations for Clock Constraints Specified in UML/MARTE CCSL. 116-125 - Pavneet Singh Kochhar, Ferdian Thung, David Lo

:
Automatic Fine-Grained Issue Report Reclassification. 126-135 - Wei Ding, Peng Liang

, Antony Tang
, Hans van Vliet, Mojtaba Shahin:
How Do Open Source Communities Document Software Architecture: An Exploratory Survey. 136-145
Short Papers: Session 2
- Beilei Sun, Xi Li, Zongwei Zhu, Xuehai Zhou:

Behavior Gaps and Relations between Operating System and Applications on Accessing DRAM. 146-149 - Xiaofei Wu, Xiaohong Li, Ruitao Feng

, Guangquan Xu, Jing Hu, Zhiyong Feng:
OOPN-SRAM: A Novel Method for Software Risk Assessment. 150-153 - Sai Sathyanarayan, Dawei Qi, Zhenkai Liang

, Abhik Roychoudary:
SQLR: Grammar-Guided Validation of SQL Injection Sanitizers. 154-157
Real-Time, Hybrid, and Embedded Systems
- Chenzhi Wu, Husheng Liao, Chenglong Yu, Hang Su:

A Trace-Based JIT Compilation Framework for XQuery. 158-165 - Sylvain Lamprier, Tewfik Ziadi

, Nicolas Baskiotis, Lom-Messan Hillah:
Exact and Efficient Temporal Steering of Software Behavioral Model Inference. 166-175 - Bin Gu, Liang Zou:

A Refinement Calculus for Hybrid Systems. 176-185
Short Papers: Session 3
- Pierfrancesco Bellini

, Paolo Nesi
, Nadia Rauch:
Knowledge Base Construction Process for Smart-City Services. 186-189 - Eric Lunaud Ngoupe, Sylvain Stoesel, Clément Parisot, Sylvain Hallé

, Petko Valtchev
, Omar Cherkaoui, Pierre Boucher:
A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness. 190-193 - Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane

:
A Behavior-Aware Systematic Approach for Merging Business Process Fragments. 194-197
Short Papers: Session 4
- Naiju Zeng, Wenhui Zhang:

An Executable Semantics of SystemC Transaction Level Models and Its Applications with VERDS. 198-201 - Jin Cui, Zhenhua Duan, Cong Tian:

Model Checking Rate-Monotonic Scheduler with TMSVL. 202-205 - Andrzej Mizera, Jun Pang, Qixia Yuan:

Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks. 206-209

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














