


default search action
23rd ICECCS 2018: Melbourne, Australia
- 23rd International Conference on Engineering of Complex Computer Systems, ICECCS 2018, Melbourne, Australia, December 12-14, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9341-4

Full Papers
- Hoang Gia Nguyen, Laure Petrucci

, Jaco van de Pol:
Layered and Collecting NDFS with Subsumption for Parametric Timed Automata. 1-9 - Étienne André, Ichiro Hasuo

, Masaki Waga
:
Offline Timed Pattern Matching under Uncertainty. 10-20 - Kulani Tharaka Mahadewa

, Kailong Wang
, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. 21-30 - Chenghao Cai, Jing Sun, Gillian Dobbie:

B-Repair: Repairing B-Models Using Machine Learning. 31-40 - Camille Coti, Sami Evangelista, Laure Petrucci

:
State Compression Based on One-Sided Communications for Distributed Model Checking. 41-50 - Tien-Duy B. Le, Lingfeng Bao, David Lo

, Debin Gao
, Li Li:
Towards Mining Comprehensive Android Sandboxes. 51-60 - Tawfeeq Alsanoosy, Maria Spichkova, James Harland

:
Cultural Influences on the Requirements Engineering Process: Lessons Learned from Practice. 61-70 - Michele Sevegnani

, Milan Kabác, Muffy Calder, Julie A. McCann:
Modelling and Verification of Large-Scale Sensor Network Infrastructures. 71-81 - Raghda Alqurashi, Tom Altman:

Multi-Level Multi-Stage Agent-Based Decision Support System for Simulation of Crowd Dynamics. 82-92 - Mahin Abbasipour, Ferhat Khendek

, Maria Toeroe:
A Model-Based Approach for Design Time Elasticity Rules Generation. 93-103 - Yuhang Li, Shi Ying, Xiangyang Jia, Yisen Xu, Lily Zhao, Guoli Cheng, Bingming Wang, Jifeng Xuan

:
EH-Recommender: Recommending Exception Handling Strategies Based on Program Context. 104-114 - Yibin Xu

:
Section-Blockchain: A Storage Reduced Blockchain Protocol, the Foundation of an Autotrophic Decentralized Storage Architecture. 115-125 - Florin Craciun, Wei-Ngan Chin, Shengchao Qin

:
Variant Region Types. 126-135 - Neeraj Kumar Singh, Yamine Aït Ameur, Dominique Méry:

Formal Ontology Driven Model Refactoring. 136-145 - Lionel N. Tidjon

, Marc Frappier, Michael Leuschel, Amel Mammar:
Extended Algebraic State-Transition Diagrams. 146-155 - Maria Spichkova, Jesse Bartlett, Ryan Howard, Adrian Seddon, Xing Zhao, Yuanqing Jiang:

SMI: Stack Management Interface. 156-159 - Steve Jeffrey Tueno Fotso, Marc Frappier, Regine Laleau, Amel Mammar:

Back Propagating B System Updates on SysML/KAOS Domain Models. 160-169 - Rongjie Yan, Junjie Yang

, Di Zhu, Kai Huang:
Design Verification and Validation for Reliable Safety-Critical Autonomous Control Systems. 170-179
Short Papers
- Thomas Brihaye, Gilles Geeraerts, Hsi-Ming Ho

, Arthur Milchior, Benjamin Monmege
:
Efficient Algorithms and Tools for MITL Model-Checking and Synthesis. 180-184 - Mohan Baruwal Chhetri

, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk
, Michael Docking, Hien P. Luong, Isuru Rajapakse, Surya Nepal
:
AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems. 185-188 - Dana Dghaym, Colin F. Snook

, Thai Son Hoang
, Michael J. Butler
:
Reusing Formal Models via Lifting. 189-192 - Emma Effa Bella, Marie-Pierre Gervais, Reda Bendraou

, Laurent Wouters, Ali Koudri:
Semi-Supervised Approach for Recovering Traceability Links in Complex Systems. 193-196 - Wai Yan Maung Maung Thin, Naipeng Dong

, Guangdong Bai
, Jin Song Dong:
Formal Analysis of a Proof-of-Stake Blockchain. 197-200 - Yongxin Zhao, Xi Wu, Jing Liu, Yilong Yang

:
Formal Modeling and Security Analysis for OpenFlow-Based Networks. 201-204 - Tianxin Liang, Xiaoping Yang, Liang Wang, Zhenyuan Han:

Kinship Determination in Mobile Social Networks. 205-208 - Sarah Benyagoub, Yamine Aït Ameur, Meriem Ouederni, Atif Mashkoor:

Scalable Correct-by-Construction Conversation Protocols with Event-B: Validation, Experiments and Benchmarks. 209-212 - Morayo Adedjouma, Gabriel Pedroza

, Asma Smaoui, Trung Kien Dang:
Facilitating the Adoption of Standards through Model-Based Representation. 213-216 - Hui Zhao, Jianrong Hou:

Design Concerns for Industrial Big Data System in the Smart Factory Domain: From Product Lifecycle View. 217-220 - Tewfik Ziadi

, Lom-Messan Hillah:
Software Product Line Extraction from Bytecode Based Applications. 221-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














