


default search action
20th ICECCS 2015: Gold Coast, Australia
- 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015, Gold Coast, Australia, December 9-12, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8581-7

Session: Software Architecture and Optimisation
- Rahma Bouaziz

, Laurent Lemarchand, Frank Singhoff, Bechir Zalila
, Mohamed Jmaiel:
Architecture Exploration of Real-Time Systems Based on Multi-objective Optimization. 1-10 - Aldeida Aleti

, Irene Moser:
Fitness Landscape Characterisation for Constrained Software Architecture Optimisation Problems. 11-20 - Smail Rahmoun, Etienne Borde, Laurent Pautet:

Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES). 21-30
Session: Empirical Methods
- Juha Savolainen, Mike Mannion

:
A Make/Buy/Reuse Feature Development Framework for Product Line Evolution. 31-39 - Yun Zhang, David Lo

, Xin Xia
, Bowen Xu, Jianling Sun, Shanping Li:
Combining Software Metrics and Text Features for Vulnerable File Prediction. 40-49 - Si-Mohamed Lamraoui, Shin Nakajima, Hiroshi Hosobe:

Hardened Flow-Sensitive Trace Formula for Fault Localization. 50-59
Session: Security
- Guangdong Bai, Jun Sun

, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo:
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. 60-69 - Mohamed Almorsy Abdelrazek, John Grundy

, Amani S. Ibrahim:
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors. 70-79 - Byungho Min, Vijay Varadharajan

:
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). 80-89 - Quanqi Ye, Guangdong Bai, Kailong Wang

, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. 90-99
Session: Software Verification
- Zhimin Wu, Yang Liu

, Jun Sun
, Jianqi Shi, Shengchao Qin
:
GPU Accelerated On-the-Fly Reachability Checking. 100-109 - Mirela Botezatu, Hagen Völzer

, Lothar Thiele:
The Complexity of Deadline Analysis for Workflow Graphs with a Single Resource. 110-119 - David Sanán

, Yang Liu
, Yongwang Zhao, Zhenchang Xing, Mike Hinchey
:
Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code. 120-129 - Wen Su, Jean-Raymond Abrial, Geguang Pu, Bin Fang:

Formal Development of a Real-Time Operating System Memory Manager. 130-139
Session: Unifying Theories of Programming (UTP)
- Florin Craciun, Tibor Kiss, Andreea Costea

:
Towards a Session Logic for Communication Protocols. 140-149 - Qin Li, Jinxun Wang, Qiwen Xu, Yanhong Huang, Huibiao Zhu:

A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic Systems. 150-159 - Yanhong Huang, Yongxin Zhao, Shengchao Qin

, Jifeng He:
Probabilistic Denotational Semantics for an Interrupt Modelling Language. 160-169
Session: Short Papers
- Roopak Sinha

:
Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion. 170-173 - Qiang Wang, Simon Bliudze:

SeBip: A Symbolic Executor for BIP. 174-177 - Mojgan Kamali, Luigia Petre:

Improved Recovery for Proactive, Distributed Routing. 178-181 - Jin Song Dong, Ling Shi, Le Vu Nguyen Chuong, Kan Jiang

, Jing Sun
:
Sports Strategy Analytics Using Probabilistic Reasoning. 182-185 - Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun:

Web Application Architecture Security Evaluation Method Based on AADL. 186-189 - Jacob Geisel, Brahim Hamid

, Jean-Michel Bruel:
Security Concepts as Add-On for Process Models. 190-193 - Kushal Ahmed, Lian Wen, Abdul Sattar

, Reza Farid:
Semantic Network Model: A Reasoning Engine for Software Requirements. 194-197 - Roopak Sinha

, Cheng Pang, Gerardo Santillan Martinez, Juha Kuronen, Valeriy Vyatkin:
Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical Systems. 198-201
Session: Doctoral Symposium
- Hendra Gunadi:

Formal Certification of Non-interferent Android Bytecode (DEX Bytecode). 202-205 - Mojgan Kamali, Luigia Petre:

Comparing Routing Protocols. 206-209 - Zhimin Wu:

Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium). 210-213 - Quanqi Ye:

Analyzing Security Property of Android Application Implementation Using Formal Method. 214-217 - Jiaying Li:

An Invariant Inference Framework by Active Learning and SVMs. 218-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














