


default search action
26th ICECCS 2022: Hiroshima, Japan
- 26th International Conference on Engineering of Complex Computer Systems, ICECCS 2022, Hiroshima, Japan, March 26-30, 2022. IEEE 2022, ISBN 978-1-6654-0162-3

- Paul Perrotin, Nicolas Belloir

, Salah Sadou, David Hairion, Antoine Beugnard:
HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification. 1-6 - Jaime Arias

, Laure Petrucci, Lukasz Masko, Wojciech Penczek, Teofil Sidoruk:
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees. 1-10 - Guanhong Chen, Shuang Liu:

Reducing Malware labeling Efforts Through Efficient Prototype Selection. 17-22 - Matteo Basso, Filippo Schiavio

, Andrea Rosà
, Walter Binder
:
Optimizing Parallel Java Streams. 23-32 - Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi:

Parameterized Design and Formal Verification of Multi-ported Memory. 33-41 - Sree Ram Boyapati, Claudia Szabo

:
Self-adaptation in Microservice Architectures: A Case Study. 42-51 - Xinyue Li, Wu Chen:

Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments. 52-61 - Camille Coti, Laure Petrucci, Daniel Alberto Torres González:

A Formal Model for Fault Tolerant Parallel Matrix Factorization. 62-70 - Peter Riviere

, Neeraj Kumar Singh, Yamine Aït Ameur:
EB4EB: A Framework for Reflexive Event-B. 71-80 - Yepeng Ding

, Hiroyuki Sato:
Formalism- Driven Development of Decentralized Systems. 81-90 - Meryem Afendi, Amel Mammar, Régine Laleau:

Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study. 91-96 - Wenhui Zhang, Ya Gao:

A Bounded Semantics for Improving the Efficiency of Bounded Model Checking. 97-106 - Sami Evangelista, Laure Petrucci, Lars Michael Kristensen:

Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks. 107-116 - Zhé Hóu

, Qinyi Li, Ernest Foo
, Jin Song Dong, Paulo de Souza:
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks. 117-122 - Ran Li

, Huibiao Zhu, Richard Banach:
Denotational and Algebraic Semantics for Cyber-physical Systems. 123-132 - Jiaqi Yin, Huibiao Zhu:

The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing. 133-142 - Eduardo Rosales, Andrea Rosà

, Matteo Basso, Alex Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder
:
Characterizing Java Streams in the Wild. 143-152 - Cong Zhou, Li Kuang:

Combining Global and Local Representations of Source Code for Method Naming. 153-161 - Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang:

Parameter Sensitive Pointer Analysis for Java. 162-167 - Weilin Wu, Na Wang, Yixiang Chen:

A Novel Intelligent-Building-Fire-Risk Classification Method. 168-172 - Penglong Chen, Zhen Li, Yu Wen, Lili Liu:

Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations. 173-182 - Enze Ma:

DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning. 183-188 - Yanzhao Wang

, Fei Xie:
Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores. 189-194 - Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong:

Extension-Compression Learning: A deep learning code search method that simulates reading habits. 195-200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














