callback( { "result":{ "query":":facetid:toc:\"db/conf/qrs/qrs2016c.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.63" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"69", "@dc":"69", "@oc":"69", "@id":"43407677", "text":":facetid:toc:db/conf/qrs/qrs2016c.bht" } }, "hits":{ "@total":"69", "@computed":"69", "@sent":"69", "@first":"0", "hit":[{ "@score":"1", "@id":"3326307", "info":{"authors":{"author":[{"@pid":"186/6640","text":"Mohammed O. Alannsary"},{"@pid":"t/JeffTian","text":"Jeff Tian"}]},"title":"Measurement and Prediction of SaaS Reliability in the Cloud.","venue":"QRS Companion","pages":"123-130","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/AlannsaryT16","doi":"10.1109/QRS-C.2016.20","ee":"https://doi.org/10.1109/QRS-C.2016.20","url":"https://dblp.org/rec/conf/qrs/AlannsaryT16"}, "url":"URL#3326307" }, { "@score":"1", "@id":"3326308", "info":{"authors":{"author":[{"@pid":"186/6589","text":"Suleiman Onimisi Aliyu"},{"@pid":"21/3047-4","text":"Feng Chen 0004"},{"@pid":"07/1429","text":"Han Li"}]},"title":"A Self-Tuning Procedure for Resource Management in InterCloud Computing.","venue":"QRS Companion","pages":"326-333","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/AliyuCL16","doi":"10.1109/QRS-C.2016.50","ee":"https://doi.org/10.1109/QRS-C.2016.50","url":"https://dblp.org/rec/conf/qrs/AliyuCL16"}, "url":"URL#3326308" }, { "@score":"1", "@id":"3326309", "info":{"authors":{"author":[{"@pid":"21/1074","text":"Tolga Ayav"},{"@pid":"98/2704","text":"Hasan Sözer"}]},"title":"Moving Switching Functions to Continuous Domain.","venue":"QRS Companion","pages":"265-270","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/AyavS16","doi":"10.1109/QRS-C.2016.40","ee":"https://doi.org/10.1109/QRS-C.2016.40","url":"https://dblp.org/rec/conf/qrs/AyavS16"}, "url":"URL#3326309" }, { "@score":"1", "@id":"3326314", "info":{"authors":{"author":[{"@pid":"92/6995","text":"Alexandre Melo Braga"},{"@pid":"79/6780","text":"Ricardo Dahab"}]},"title":"Mining Cryptography Misuse in Online Forums.","venue":"QRS Companion","pages":"143-150","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/BragaD16","doi":"10.1109/QRS-C.2016.23","ee":"https://doi.org/10.1109/QRS-C.2016.23","url":"https://dblp.org/rec/conf/qrs/BragaD16"}, "url":"URL#3326314" }, { "@score":"1", "@id":"3326315", "info":{"authors":{"author":[{"@pid":"22/6904-3","text":"Rong Chen 0003"},{"@pid":"84/4529","text":"Shifeng Chen"},{"@pid":"28/6297","text":"Nan Zhang"}]},"title":"Iterative Path Clustering for Software Fault Localization.","venue":"QRS Companion","pages":"292-297","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ChenCZ16","doi":"10.1109/QRS-C.2016.85","ee":"https://doi.org/10.1109/QRS-C.2016.85","url":"https://dblp.org/rec/conf/qrs/ChenCZ16"}, "url":"URL#3326315" }, { "@score":"1", "@id":"3326316", "info":{"authors":{"author":[{"@pid":"171/2330","text":"Hsia-Hsiang Chen"},{"@pid":"186/6813","text":"Da-Qun Zheng"},{"@pid":"72/7017","text":"Shih-Kun Huang"}]},"title":"Automatic Defense through Fault Localization and Dynamic Patch Creation.","venue":"QRS Companion","pages":"408-409","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ChenZH16","doi":"10.1109/QRS-C.2016.65","ee":"https://doi.org/10.1109/QRS-C.2016.65","url":"https://dblp.org/rec/conf/qrs/ChenZH16"}, "url":"URL#3326316" }, { "@score":"1", "@id":"3326318", "info":{"authors":{"author":[{"@pid":"85/1180","text":"Richard Colbaugh"},{"@pid":"11/6549","text":"Kristin Glass"}]},"title":"Asymmetry in Coevolving Adversarial Systems.","venue":"QRS Companion","pages":"360-367","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ColbaughG16","doi":"10.1109/QRS-C.2016.55","ee":"https://doi.org/10.1109/QRS-C.2016.55","url":"https://dblp.org/rec/conf/qrs/ColbaughG16"}, "url":"URL#3326318" }, { "@score":"1", "@id":"3326319", "info":{"authors":{"author":[{"@pid":"46/10037","text":"Fei Deng"},{"@pid":"10/2674","text":"Feng Gao"}]},"title":"P2P-Based Full Digital Co-simulation and Verification System Design.","venue":"QRS Companion","pages":"222-227","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/DengG16","doi":"10.1109/QRS-C.2016.34","ee":"https://doi.org/10.1109/QRS-C.2016.34","url":"https://dblp.org/rec/conf/qrs/DengG16"}, "url":"URL#3326319" }, { "@score":"1", "@id":"3326320", "info":{"authors":{"author":[{"@pid":"75/157","text":"Zuohua Ding"},{"@pid":"66/4610","text":"Rong Wang"},{"@pid":"21/3437","text":"Jueliang Hu"},{"@pid":"51/3710-3","text":"Yang Liu 0003"}]},"title":"Detecting Bugs of Concurrent Programs with Program Invariants.","venue":"QRS Companion","pages":"412-413","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/DingWHL16","doi":"10.1109/QRS-C.2016.67","ee":"https://doi.org/10.1109/QRS-C.2016.67","url":"https://dblp.org/rec/conf/qrs/DingWHL16"}, "url":"URL#3326320" }, { "@score":"1", "@id":"3326321", "info":{"authors":{"author":[{"@pid":"133/3794","text":"Benedikt Eberhardinger"},{"@pid":"94/11109","text":"Axel Habermaier"},{"@pid":"52/6384","text":"Alwin Hoffmann"},{"@pid":"186/6799","text":"Alexander Poeppel"},{"@pid":"r/WolfgangReif","text":"Wolfgang Reif"}]},"title":"Toward Integrated Analysis & Testing of Component-Based, Adaptive Robot Systems.","venue":"QRS Companion","pages":"301-302","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/EberhardingerHH16","doi":"10.1109/QRS-C.2016.45","ee":"https://doi.org/10.1109/QRS-C.2016.45","url":"https://dblp.org/rec/conf/qrs/EberhardingerHH16"}, "url":"URL#3326321" }, { "@score":"1", "@id":"3326322", "info":{"authors":{"author":[{"@pid":"186/6524","text":"Cristiano De Faveri"},{"@pid":"m/AnaMoreira","text":"Ana Moreira 0001"}]},"title":"Designing Adaptive Deception Strategies.","venue":"QRS Companion","pages":"77-84","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/FaveriM16","doi":"10.1109/QRS-C.2016.15","ee":"https://doi.org/10.1109/QRS-C.2016.15","url":"https://dblp.org/rec/conf/qrs/FaveriM16"}, "url":"URL#3326322" }, { "@score":"1", "@id":"3326323", "info":{"authors":{"author":[{"@pid":"154/5696","text":"Lena Feinbube"},{"@pid":"77/871","text":"Daniel Richter"},{"@pid":"p/AndreasPolze","text":"Andreas Polze"}]},"title":"An Error Model for Multi-threaded Single-Node Applications, and Its Implementation.","venue":"QRS Companion","pages":"7-14","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/FeinbubeRP16","doi":"10.1109/QRS-C.2016.6","ee":"https://doi.org/10.1109/QRS-C.2016.6","url":"https://dblp.org/rec/conf/qrs/FeinbubeRP16"}, "url":"URL#3326323" }, { "@score":"1", "@id":"3326324", "info":{"authors":{"author":[{"@pid":"145/7715","text":"Hermann Felbinger"},{"@pid":"w/FranzWotawa","text":"Franz Wotawa"},{"@pid":"82/1677","text":"Mihai Nica"}]},"title":"Test-Suite Reduction Does Not Necessarily Require Executing the Program under Test.","venue":"QRS Companion","pages":"23-30","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/FelbingerWN16","doi":"10.1109/QRS-C.2016.8","ee":"https://doi.org/10.1109/QRS-C.2016.8","url":"https://dblp.org/rec/conf/qrs/FelbingerWN16"}, "url":"URL#3326324" }, { "@score":"1", "@id":"3326325", "info":{"authors":{"author":[{"@pid":"186/6551","text":"Yangzhen Fu"},{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"186/6594","text":"Yaxin Bai"},{"@pid":"186/6724","text":"Weixuan Sun"}]},"title":"An Under-sampling Method: Based on Principal Component Analysis and Comprehensive Evaluation Model.","venue":"QRS Companion","pages":"414-415","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/FuZBS16","doi":"10.1109/QRS-C.2016.68","ee":"https://doi.org/10.1109/QRS-C.2016.68","url":"https://dblp.org/rec/conf/qrs/FuZBS16"}, "url":"URL#3326325" }, { "@score":"1", "@id":"3326326", "info":{"authors":{"author":[{"@pid":"186/6814","text":"Ruijing Gao"},{"@pid":"86/541-1","text":"Zhenyu Chen 0001"},{"@pid":"124/0310","text":"Chunrong Fang"},{"@pid":"156/1840","text":"Tieke He"},{"@pid":"171/2322","text":"Peizhang Xie"},{"@pid":"171/2313","text":"Jungui Zhou"}]},"title":"Automated Evaluation for Performance Test Scripts.","venue":"QRS Companion","pages":"135-142","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/GaoCFHXZ16","doi":"10.1109/QRS-C.2016.22","ee":"https://doi.org/10.1109/QRS-C.2016.22","url":"https://dblp.org/rec/conf/qrs/GaoCFHXZ16"}, "url":"URL#3326326" }, { "@score":"1", "@id":"3326327", "info":{"authors":{"author":[{"@pid":"10/2674","text":"Feng Gao"},{"@pid":"46/10037","text":"Fei Deng"}]},"title":"Design of a Networked Embedded Software Test Platform Based on Software and Hardware Co-simulation.","venue":"QRS Companion","pages":"375-381","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/GaoD16","doi":"10.1109/QRS-C.2016.57","ee":"https://doi.org/10.1109/QRS-C.2016.57","url":"https://dblp.org/rec/conf/qrs/GaoD16"}, "url":"URL#3326327" }, { "@score":"1", "@id":"3326328", "info":{"authors":{"author":[{"@pid":"19/9308","text":"Ruizhi Gao"},{"@pid":"186/6811","text":"Linghuan Hu"},{"@pid":"w/WEricWong","text":"W. Eric Wong"},{"@pid":"117/5503","text":"Han-Lin Lu"},{"@pid":"72/7017","text":"Shih-Kun Huang"}]},"title":"Effective Test Generation for Combinatorial Decision Coverage.","venue":"QRS Companion","pages":"47-54","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/GaoHWLH16","doi":"10.1109/QRS-C.2016.11","ee":"https://doi.org/10.1109/QRS-C.2016.11","url":"https://dblp.org/rec/conf/qrs/GaoHWLH16"}, "url":"URL#3326328" }, { "@score":"1", "@id":"3326329", "info":{"authors":{"author":[{"@pid":"138/0558","text":"Ceren Sahin Gebizli"},{"@pid":"98/2704","text":"Hasan Sözer"}]},"title":"Model-Based Software Product Line Testing by Coupling Feature Models with Hierarchical Markov Chain Usage Models.","venue":"QRS Companion","pages":"278-283","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/GebizliS16","doi":"10.1109/QRS-C.2016.42","ee":"https://doi.org/10.1109/QRS-C.2016.42","url":"https://dblp.org/rec/conf/qrs/GebizliS16"}, "url":"URL#3326329" }, { "@score":"1", "@id":"3326332", "info":{"authors":{"author":[{"@pid":"186/6586","text":"Shikai Guo"},{"@pid":"22/6904-3","text":"Rong Chen 0003"},{"@pid":"66/3387-14","text":"Hui Li 0014"}]},"title":"A Real-Time Collaborative Testing Approach for Web Application: Via Multi-tasks Matching.","venue":"QRS Companion","pages":"61-68","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/GuoCL16","doi":"10.1109/QRS-C.2016.13","ee":"https://doi.org/10.1109/QRS-C.2016.13","url":"https://dblp.org/rec/conf/qrs/GuoCL16"}, "url":"URL#3326332" }, { "@score":"1", "@id":"3326333", "info":{"authors":{"author":{"@pid":"58/20","text":"Herman Hartmann"}},"title":"A Statistical Analysis of Operational Profile Driven Testing.","venue":"QRS Companion","pages":"109-116","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/Hartmann16","doi":"10.1109/QRS-C.2016.18","ee":"https://doi.org/10.1109/QRS-C.2016.18","url":"https://dblp.org/rec/conf/qrs/Hartmann16"}, "url":"URL#3326333" }, { "@score":"1", "@id":"3326334", "info":{"authors":{"author":[{"@pid":"62/6709","text":"Chad Heitzenrater"},{"@pid":"132/6125","text":"Justin King-Lacroix"},{"@pid":"s/AndrewCSimpson","text":"Andrew C. Simpson"}]},"title":"Motivating Security Engineering with Economics: A Utility Function Approach.","venue":"QRS Companion","pages":"352-359","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HeitzenraterKS16","doi":"10.1109/QRS-C.2016.54","ee":"https://doi.org/10.1109/QRS-C.2016.54","url":"https://dblp.org/rec/conf/qrs/HeitzenraterKS16"}, "url":"URL#3326334" }, { "@score":"1", "@id":"3326335", "info":{"authors":{"author":[{"@pid":"72/2302","text":"Kiyoshi Honda"},{"@pid":"18/2808","text":"Nobuhiro Nakamura"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"95/4020","text":"Yoshiaki Fukazawa"}]},"title":"Case Study: Project Management Using Cross Project Software Reliability Growth Model.","venue":"QRS Companion","pages":"39-46","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HondaNWF16","doi":"10.1109/QRS-C.2016.10","ee":"https://doi.org/10.1109/QRS-C.2016.10","url":"https://dblp.org/rec/conf/qrs/HondaNWF16"}, "url":"URL#3326335" }, { "@score":"1", "@id":"3326336", "info":{"authors":{"author":[{"@pid":"72/2302","text":"Kiyoshi Honda"},{"@pid":"18/2808","text":"Nobuhiro Nakamura"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"95/4020","text":"Yoshiaki Fukazawa"}]},"title":"An Industrial Case Study of Project Management Using Cross Project Software Reliability Growth Model.","venue":"QRS Companion","pages":"404-405","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HondaNWF16a","doi":"10.1109/QRS-C.2016.63","ee":"https://doi.org/10.1109/QRS-C.2016.63","url":"https://dblp.org/rec/conf/qrs/HondaNWF16a"}, "url":"URL#3326336" }, { "@score":"1", "@id":"3326337", "info":{"authors":{"author":[{"@pid":"40/6520","text":"Deqiang Hu"},{"@pid":"20/1448","text":"Yanzhong Dang"}]},"title":"The Effect of Interpersonal Trust on Interpersonal Knowledge Interaction: A New Thought.","venue":"QRS Companion","pages":"210-216","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HuD16","doi":"10.1109/QRS-C.2016.32","ee":"https://doi.org/10.1109/QRS-C.2016.32","url":"https://dblp.org/rec/conf/qrs/HuD16"}, "url":"URL#3326337" }, { "@score":"1", "@id":"3326339", "info":{"authors":{"author":[{"@pid":"13/8456","text":"Zhanwei Hui"},{"@pid":"29/159","text":"Song Huang"}]},"title":"Metamorphic Testing of a Superficial Area Calculation Program.","venue":"QRS Companion","pages":"406-407","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HuiH16","doi":"10.1109/QRS-C.2016.64","ee":"https://doi.org/10.1109/QRS-C.2016.64","url":"https://dblp.org/rec/conf/qrs/HuiH16"}, "url":"URL#3326339" }, { "@score":"1", "@id":"3326340", "info":{"authors":{"author":[{"@pid":"60/7385-1","text":"Shahid Hussain 0001"},{"@pid":"86/7853","text":"Jacky W. Keung"},{"@pid":"166/2442","text":"Arif Ali Khan"},{"@pid":"166/2603","text":"Kwabena Ebo Bennin"}]},"title":"Detection of Fault-Prone Classes Using Logistic Regression Based Object-Oriented Metrics Thresholds.","venue":"QRS Companion","pages":"93-100","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/HussainKKB16","doi":"10.1109/QRS-C.2016.16","ee":"https://doi.org/10.1109/QRS-C.2016.16","url":"https://dblp.org/rec/conf/qrs/HussainKKB16"}, "url":"URL#3326340" }, { "@score":"1", "@id":"3326341", "info":{"authors":{"author":[{"@pid":"47/10516","text":"Fehmi Jaafar"},{"@pid":"39/1586","text":"Gabriela Nicolescu"},{"@pid":"30/4838","text":"Christian Richard"}]},"title":"A Systematic Approach for Privilege Escalation Prevention.","venue":"QRS Companion","pages":"101-108","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/JaafarNR16","doi":"10.1109/QRS-C.2016.17","ee":"https://doi.org/10.1109/QRS-C.2016.17","url":"https://dblp.org/rec/conf/qrs/JaafarNR16"}, "url":"URL#3326341" }, { "@score":"1", "@id":"3326343", "info":{"authors":{"author":[{"@pid":"146/9102","text":"Jiahong Jiang"},{"@pid":"77/303","text":"Liqian Chen"},{"@pid":"28/3236","text":"Yanjun Wen"},{"@pid":"92/748-6","text":"Wei Dong 0006"},{"@pid":"71/9978","text":"Ling Wen"}]},"title":"Analyzing Math Library Functions via Summarization.","venue":"QRS Companion","pages":"259-264","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/JiangCWDW16","doi":"10.1109/QRS-C.2016.39","ee":"https://doi.org/10.1109/QRS-C.2016.39","url":"https://dblp.org/rec/conf/qrs/JiangCWDW16"}, "url":"URL#3326343" }, { "@score":"1", "@id":"3326346", "info":{"authors":{"author":[{"@pid":"88/2904","text":"Teemu Kanstrén"},{"@pid":"96/4243","text":"Antti Evesti"}]},"title":"A Study on the State of Practice in Security Situational Awareness.","venue":"QRS Companion","pages":"69-76","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/KanstrenE16","doi":"10.1109/QRS-C.2016.14","ee":"https://doi.org/10.1109/QRS-C.2016.14","url":"https://dblp.org/rec/conf/qrs/KanstrenE16"}, "url":"URL#3326346" }, { "@score":"1", "@id":"3326351", "info":{"authors":{"author":[{"@pid":"181/2868","text":"Wang Li"},{"@pid":"54/2696","text":"Dinghao Wu"},{"@pid":"21/6121-5","text":"Peng Liu 0005"}]},"title":"iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary.","venue":"QRS Companion","pages":"31-38","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/LiW016","doi":"10.1109/QRS-C.2016.9","ee":"https://doi.org/10.1109/QRS-C.2016.9","url":"https://dblp.org/rec/conf/qrs/LiW016"}, "url":"URL#3326351" }, { "@score":"1", "@id":"3326352", "info":{"authors":{"author":[{"@pid":"79/572","text":"Jinyang Li"},{"@pid":"11/3546","text":"Yuanrui Zhang"},{"@pid":"11/1917","text":"Yixiang Chen"}]},"title":"A Self-Adaptive Traffic Light Control System Based on Speed of Vehicles.","venue":"QRS Companion","pages":"382-388","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/LiZC16","doi":"10.1109/QRS-C.2016.58","ee":"https://doi.org/10.1109/QRS-C.2016.58","url":"https://dblp.org/rec/conf/qrs/LiZC16"}, "url":"URL#3326352" }, { "@score":"1", "@id":"3326354", "info":{"authors":{"author":[{"@pid":"83/6089","text":"Jinshuo Liu"},{"@pid":"186/6680","text":"Yusen Chen"},{"@pid":"181/9986","text":"Lanxin Zhang"},{"@pid":"124/0384","text":"Juan Deng"},{"@pid":"85/10900","text":"Weixin Zhang"}]},"title":"The Evaluation of the Embedded Software Quality Based on the Binary Code.","venue":"QRS Companion","pages":"167-170","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/LiuCZDZ16","doi":"10.1109/QRS-C.2016.26","ee":"https://doi.org/10.1109/QRS-C.2016.26","url":"https://dblp.org/rec/conf/qrs/LiuCZDZ16"}, "url":"URL#3326354" }, { "@score":"1", "@id":"3326355", "info":{"authors":{"author":[{"@pid":"168/6218","text":"Mengleng Liu"},{"@pid":"84/3210","text":"Pei Liu"},{"@pid":"168/6303","text":"Xiaoshuang Yang"},{"@pid":"87/734","text":"Lei Zhao"}]},"title":"Fault Localization Guided Execution Comparison for Failure Comprehension.","venue":"QRS Companion","pages":"163-166","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/LiuLYZ16","doi":"10.1109/QRS-C.2016.87","ee":"https://doi.org/10.1109/QRS-C.2016.87","url":"https://dblp.org/rec/conf/qrs/LiuLYZ16"}, "url":"URL#3326355" }, { "@score":"1", "@id":"3326356", "info":{"authors":{"author":[{"@pid":"34/5417","text":"Liang Luo"},{"@pid":"39/5544","text":"Hongwei Li"},{"@pid":"176/1097","text":"Xiwei Qiu"},{"@pid":"61/8360","text":"Yangyang Tang"}]},"title":"A Resource Optimization Algorithm of Cloud Data Center Based on Correlated Model of Reliability, Performance and Energy.","venue":"QRS Companion","pages":"416-417","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/LuoLQT16","doi":"10.1109/QRS-C.2016.69","ee":"https://doi.org/10.1109/QRS-C.2016.69","url":"https://dblp.org/rec/conf/qrs/LuoLQT16"}, "url":"URL#3326356" }, { "@score":"1", "@id":"3326357", "info":{"authors":{"author":[{"@pid":"18/6265","text":"Xin Ma"},{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"171/2322","text":"Peizhang Xie"},{"@pid":"171/2313","text":"Jungui Zhou"},{"@pid":"08/1043","text":"Xiaofang Zhang"},{"@pid":"124/0310","text":"Chunrong Fang"}]},"title":"An Automated Testing Platform for Mobile Applications.","venue":"QRS Companion","pages":"159-162","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/MaWXZZF16","doi":"10.1109/QRS-C.2016.25","ee":"https://doi.org/10.1109/QRS-C.2016.25","url":"https://dblp.org/rec/conf/qrs/MaWXZZF16"}, "url":"URL#3326357" }, { "@score":"1", "@id":"3326359", "info":{"authors":{"author":[{"@pid":"186/6788","text":"Chengyong Mao"},{"@pid":"61/5550","text":"Qiuying Li"}]},"title":"A Testing-Coverage Software Reliability Growth Model Considering the Randomness of the Field Environment.","venue":"QRS Companion","pages":"402-403","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/MaoL16","doi":"10.1109/QRS-C.2016.62","ee":"https://doi.org/10.1109/QRS-C.2016.62","url":"https://dblp.org/rec/conf/qrs/MaoL16"}, "url":"URL#3326359" }, { "@score":"1", "@id":"3326360", "info":{"authors":{"author":[{"@pid":"m/FMartinelli","text":"Fabio Martinelli"},{"@pid":"07/4404","text":"Artsiom Yautsiukhin"}]},"title":"Security by Insurance for Services.","venue":"QRS Companion","pages":"344-351","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/MartinelliY16","doi":"10.1109/QRS-C.2016.53","ee":"https://doi.org/10.1109/QRS-C.2016.53","url":"https://dblp.org/rec/conf/qrs/MartinelliY16"}, "url":"URL#3326360" }, { "@score":"1", "@id":"3326361", "info":{"authors":{"author":[{"@pid":"43/8292","text":"F. Meng"},{"@pid":"68/5133","text":"Yoshiteru Nakamori"},{"@pid":"69/4394","text":"Jing Tian"},{"@pid":"66/5911","text":"Jianwen Xiang"}]},"title":"An Evaluation Framework of Knowledge Management Activities.","venue":"QRS Companion","pages":"194-201","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/MengNTX16","doi":"10.1109/QRS-C.2016.30","ee":"https://doi.org/10.1109/QRS-C.2016.30","url":"https://dblp.org/rec/conf/qrs/MengNTX16"}, "url":"URL#3326361" }, { "@score":"1", "@id":"3326363", "info":{"authors":{"author":[{"@pid":"161/7729","text":"Hidenori Nakai"},{"@pid":"186/6723","text":"Naohiko Tsuda"},{"@pid":"72/2302","text":"Kiyoshi Honda"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"95/4020","text":"Yoshiaki Fukazawa"}]},"title":"Initial Framework for Software Quality Evaluation Based on ISO/IEC 25022 and ISO/IEC 25023.","venue":"QRS Companion","pages":"410-411","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/NakaiTHWF16","doi":"10.1109/QRS-C.2016.66","ee":"https://doi.org/10.1109/QRS-C.2016.66","url":"https://dblp.org/rec/conf/qrs/NakaiTHWF16"}, "url":"URL#3326363" }, { "@score":"1", "@id":"3326365", "info":{"authors":{"author":[{"@pid":"86/3398","text":"Quyen L. Nguyen"},{"@pid":"11/6638","text":"Arun K. Sood"}]},"title":"Improving Security Level via Velocity of Moving Target Defense.","venue":"QRS Companion","pages":"418-419","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/NguyenS16","doi":"10.1109/QRS-C.2016.70","ee":"https://doi.org/10.1109/QRS-C.2016.70","url":"https://dblp.org/rec/conf/qrs/NguyenS16"}, "url":"URL#3326365" }, { "@score":"1", "@id":"3326367", "info":{"authors":{"author":[{"@pid":"26/4148","text":"Donghua Pan"},{"@pid":"69/5181","text":"Xudong Wang"},{"@pid":"39/5229","text":"Haoxiang Xia"}]},"title":"Research on the DMC-Based Patent Analysis.","venue":"QRS Companion","pages":"217-221","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/PanWX16","doi":"10.1109/QRS-C.2016.33","ee":"https://doi.org/10.1109/QRS-C.2016.33","url":"https://dblp.org/rec/conf/qrs/PanWX16"}, "url":"URL#3326367" }, { "@score":"1", "@id":"3326368", "info":{"authors":{"author":[{"@pid":"171/2318","text":"Tianhao Pan"},{"@pid":"19/949-1","text":"Weifeng Zhang 0001"},{"@pid":"21/3543","text":"Ziyuan Wang"},{"@pid":"19/360-3","text":"Lei Xu 0003"}]},"title":"Recommendations Based on LDA Topic Model in Android Applications.","venue":"QRS Companion","pages":"151-158","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/PanZWX16","doi":"10.1109/QRS-C.2016.24","ee":"https://doi.org/10.1109/QRS-C.2016.24","url":"https://dblp.org/rec/conf/qrs/PanZWX16"}, "url":"URL#3326368" }, { "@score":"1", "@id":"3326371", "info":{"authors":{"author":[{"@pid":"180/3079","text":"Devanka Pathak"},{"@pid":"78/4510","text":"Hongji Yang"},{"@pid":"71/1407","text":"Tin-Kai Chen"}]},"title":"Neurofeedback and Creativity in Interceptive Human Movement: A Theoretical Model for Neurocybernetics Based Kinaesthetic Multimodal Learning Agent.","venue":"QRS Companion","pages":"318-325","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/PathakYC16","doi":"10.1109/QRS-C.2016.49","ee":"https://doi.org/10.1109/QRS-C.2016.49","url":"https://dblp.org/rec/conf/qrs/PathakYC16"}, "url":"URL#3326371" }, { "@score":"1", "@id":"3326376", "info":{"authors":{"author":[{"@pid":"176/1097","text":"Xiwei Qiu"},{"@pid":"34/5417","text":"Liang Luo"},{"@pid":"18/5175","text":"Yuan-Shun Dai"}]},"title":"Reliability-Performance-Energy Joint Modeling and Optimization for a Big Data Task.","venue":"QRS Companion","pages":"334-338","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/QiuLD16","doi":"10.1109/QRS-C.2016.51","ee":"https://doi.org/10.1109/QRS-C.2016.51","url":"https://dblp.org/rec/conf/qrs/QiuLD16"}, "url":"URL#3326376" }, { "@score":"1", "@id":"3326378", "info":{"authors":{"author":[{"@pid":"186/6752","text":"André Reichstaller"},{"@pid":"58/2631","text":"Alexander Knapp"}]},"title":"Hunting the Game - Towards a Game of Testing Adaptive Systems.","venue":"QRS Companion","pages":"303-304","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ReichstallerK16","doi":"10.1109/QRS-C.2016.46","ee":"https://doi.org/10.1109/QRS-C.2016.46","url":"https://dblp.org/rec/conf/qrs/ReichstallerK16"}, "url":"URL#3326378" }, { "@score":"1", "@id":"3326382", "info":{"authors":{"author":[{"@pid":"186/6656","text":"Zhipeng Shao"},{"@pid":"29/3873","text":"HanYong Hao"},{"@pid":"66/4603","text":"Yuanyuan Ma"},{"@pid":"82/4206","text":"Chen Wang"},{"@pid":"178/5613","text":"Jiaxuan Fei"}]},"title":"Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PAT.","venue":"QRS Companion","pages":"244-251","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ShaoHMWF16","doi":"10.1109/QRS-C.2016.37","ee":"https://doi.org/10.1109/QRS-C.2016.37","url":"https://dblp.org/rec/conf/qrs/ShaoHMWF16"}, "url":"URL#3326382" }, { "@score":"1", "@id":"3326383", "info":{"authors":{"author":[{"@pid":"59/6373","text":"Odair Jacinto da Silva"},{"@pid":"93/382","text":"Adalberto Nobiato Crespo"},{"@pid":"12/1105","text":"Mário Jino"}]},"title":"Experimental Comparison of Software Reliability Models Based on Code Coverage and on Time Domain.","venue":"QRS Companion","pages":"85-92","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SilvaCJ16","doi":"10.1109/QRS-C.2016.86","ee":"https://doi.org/10.1109/QRS-C.2016.86","url":"https://dblp.org/rec/conf/qrs/SilvaCJ16"}, "url":"URL#3326383" }, { "@score":"1", "@id":"3326385", "info":{"authors":{"author":[{"@pid":"51/4185","text":"Gerald Steinbauer"},{"@pid":"186/6719","text":"Stefan Loigge"},{"@pid":"145/5861","text":"Clemens Mühlbacher"}]},"title":"Supervision of Hardware, Software and Behavior of Autonomous Industrial Transport Robots.","venue":"QRS Companion","pages":"298-300","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SteinbauerLM16","doi":"10.1109/QRS-C.2016.44","ee":"https://doi.org/10.1109/QRS-C.2016.44","url":"https://dblp.org/rec/conf/qrs/SteinbauerLM16"}, "url":"URL#3326385" }, { "@score":"1", "@id":"3326388", "info":{"authors":{"author":[{"@pid":"186/6649","text":"Pengpeng Sun"},{"@pid":"63/1645","text":"Yunwei Dong"},{"@pid":"75/639","text":"Hong Ye"},{"@pid":"95/3474","text":"Hongbin Zhao"}]},"title":"A Wireless Power Transfer CPS Based on 2D Omni-directional Rotating Magnetic Field.","venue":"QRS Companion","pages":"252-258","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SunDYZ16","doi":"10.1109/QRS-C.2016.38","ee":"https://doi.org/10.1109/QRS-C.2016.38","url":"https://dblp.org/rec/conf/qrs/SunDYZ16"}, "url":"URL#3326388" }, { "@score":"1", "@id":"3326389", "info":{"authors":{"author":[{"@pid":"65/706","text":"Yanjun Sun"},{"@pid":"27/1392","text":"Gérard Memmi"},{"@pid":"49/6407","text":"Sylvie Vignes"}]},"title":"Model-Based Testing Directed by Structural Coverage and Functional Requirements.","venue":"QRS Companion","pages":"284-291","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SunMV16","doi":"10.1109/QRS-C.2016.43","ee":"https://doi.org/10.1109/QRS-C.2016.43","url":"https://dblp.org/rec/conf/qrs/SunMV16"}, "url":"URL#3326389" }, { "@score":"1", "@id":"3326390", "info":{"authors":{"author":[{"@pid":"181/2880","text":"Jing Sun"},{"@pid":"68/5133","text":"Yoshiteru Nakamori"},{"@pid":"69/4394","text":"Jing Tian"},{"@pid":"66/5911","text":"Jianwen Xiang"}]},"title":"Exploring Academic Knowledge Creation Models for Graduate Researches.","venue":"QRS Companion","pages":"202-209","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SunNTX16","doi":"10.1109/QRS-C.2016.31","ee":"https://doi.org/10.1109/QRS-C.2016.31","url":"https://dblp.org/rec/conf/qrs/SunNTX16"}, "url":"URL#3326390" }, { "@score":"1", "@id":"3326391", "info":{"authors":{"author":[{"@pid":"88/619","text":"Peng Sun"},{"@pid":"186/6522","text":"Demiao Wu"},{"@pid":"176/1097","text":"Xiwei Qiu"},{"@pid":"34/5417","text":"Liang Luo"},{"@pid":"39/5544","text":"Hongwei Li"}]},"title":"Performance Analysis of Cloud Service Considering Reliability.","venue":"QRS Companion","pages":"339-343","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SunWQLL16","doi":"10.1109/QRS-C.2016.52","ee":"https://doi.org/10.1109/QRS-C.2016.52","url":"https://dblp.org/rec/conf/qrs/SunWQLL16"}, "url":"URL#3326391" }, { "@score":"1", "@id":"3326392", "info":{"authors":{"author":[{"@pid":"186/6724","text":"Weixuan Sun"},{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"97/164","text":"Chao Feng"},{"@pid":"186/6551","text":"Yangzhen Fu"}]},"title":"A Method Based on Meta-model for the Translation from UML into Event-B.","venue":"QRS Companion","pages":"271-277","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/SunZFF16","doi":"10.1109/QRS-C.2016.41","ee":"https://doi.org/10.1109/QRS-C.2016.41","url":"https://dblp.org/rec/conf/qrs/SunZFF16"}, "url":"URL#3326392" }, { "@score":"1", "@id":"3326397", "info":{"authors":{"author":{"@pid":"11/4941","text":"Sergiy Vilkomir"}},"title":"Combinatorial Testing of Software with Binary Inputs: A State-of-the-Art Review.","venue":"QRS Companion","pages":"55-60","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/Vilkomir16","doi":"10.1109/QRS-C.2016.12","ee":"https://doi.org/10.1109/QRS-C.2016.12","url":"https://dblp.org/rec/conf/qrs/Vilkomir16"}, "url":"URL#3326397" }, { "@score":"1", "@id":"3326398", "info":{"authors":{"author":[{"@pid":"46/2632","text":"Brandon Wagner"},{"@pid":"11/6638","text":"Arun K. Sood"}]},"title":"Economics of Resilient Cloud Services.","venue":"QRS Companion","pages":"368-374","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/WagnerS16","doi":"10.1109/QRS-C.2016.56","ee":"https://doi.org/10.1109/QRS-C.2016.56","url":"https://dblp.org/rec/conf/qrs/WagnerS16"}, "url":"URL#3326398" }, { "@score":"1", "@id":"3326400", "info":{"authors":{"author":[{"@pid":"127/9829-4","text":"Ruoyu Wang 0004"},{"@pid":"l/GuoqiangLi1","text":"Guoqiang Li 0001"},{"@pid":"09/5042-4","text":"Daniel W. Sun"},{"@pid":"66/5911","text":"Jianwen Xiang"},{"@pid":"80/3998","text":"Hongming Cai"}]},"title":"CAT: A Customized Automata Toolkit.","venue":"QRS Companion","pages":"171-177","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/Wang0SXC16","doi":"10.1109/QRS-C.2016.27","ee":"https://doi.org/10.1109/QRS-C.2016.27","url":"https://dblp.org/rec/conf/qrs/Wang0SXC16"}, "url":"URL#3326400" }, { "@score":"1", "@id":"3326402", "info":{"authors":{"author":[{"@pid":"84/2694-8","text":"Yong Wang 0008"},{"@pid":"70/2080","text":"Zhiqiu Huang"}]},"title":"Weighted Control Flow Subgraph to Support Debugging Activities.","venue":"QRS Companion","pages":"131-134","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/WangH16","doi":"10.1109/QRS-C.2016.21","ee":"https://doi.org/10.1109/QRS-C.2016.21","url":"https://dblp.org/rec/conf/qrs/WangH16"}, "url":"URL#3326402" }, { "@score":"1", "@id":"3326404", "info":{"authors":{"author":{"@pid":"w/FranzWotawa","text":"Franz Wotawa"}},"title":"Testing Self-Adaptive Systems Using Fault Injection and Combinatorial Testing.","venue":"QRS Companion","pages":"305-310","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/Wotawa16","doi":"10.1109/QRS-C.2016.47","ee":"https://doi.org/10.1109/QRS-C.2016.47","url":"https://dblp.org/rec/conf/qrs/Wotawa16"}, "url":"URL#3326404" }, { "@score":"1", "@id":"3326406", "info":{"authors":{"author":[{"@pid":"26/2193","text":"Jianguo Wu"},{"@pid":"69/4394","text":"Jing Tian"},{"@pid":"48/4470","text":"Liping Lu"},{"@pid":"186/6689","text":"Caisheng Weng"},{"@pid":"66/5911","text":"Jianwen Xiang"}]},"title":"Surveys on Knowledge Management and Knowledge Creation in a Chinese Research University.","venue":"QRS Companion","pages":"186-193","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/WuTLWX16","doi":"10.1109/QRS-C.2016.29","ee":"https://doi.org/10.1109/QRS-C.2016.29","url":"https://dblp.org/rec/conf/qrs/WuTLWX16"}, "url":"URL#3326406" }, { "@score":"1", "@id":"3326409", "info":{"authors":{"author":[{"@pid":"25/10624-5","text":"Xian Yang 0005"},{"@pid":"05/1778","text":"Jiangning Wu"},{"@pid":"20/1448","text":"Yanzhong Dang"},{"@pid":"01/1034","text":"Lili Rong"}]},"title":"A Product Recommendation Approach Based on the Latent Social Trust Network Model for Collaborative Filtering.","venue":"QRS Companion","pages":"178-185","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/YangWDR16","doi":"10.1109/QRS-C.2016.28","ee":"https://doi.org/10.1109/QRS-C.2016.28","url":"https://dblp.org/rec/conf/qrs/YangWDR16"}, "url":"URL#3326409" }, { "@score":"1", "@id":"3326411", "info":{"authors":{"author":[{"@pid":"89/4721","text":"Qian Ye"},{"@pid":"14/2481","text":"Minyan Lu"},{"@pid":"37/2019","text":"Luyi Li"}]},"title":"Empirical Analysis of Factors Affecting Time-Leverage Nodes of Complex Software.","venue":"QRS Companion","pages":"15-22","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/YeLL16","doi":"10.1109/QRS-C.2016.7","ee":"https://doi.org/10.1109/QRS-C.2016.7","url":"https://dblp.org/rec/conf/qrs/YeLL16"}, "url":"URL#3326411" }, { "@score":"1", "@id":"3326414", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"16/3137","text":"Lejian Liao"},{"@pid":"97/2966-4","text":"Chang Xu 0004"},{"@pid":"186/6767","text":"Manzhi Yang"}]},"title":"Hierarchical Clustering of Group Behaviors in Cyber Situation Awareness.","venue":"QRS Companion","pages":"400-401","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhangLXY16","doi":"10.1109/QRS-C.2016.61","ee":"https://doi.org/10.1109/QRS-C.2016.61","url":"https://dblp.org/rec/conf/qrs/ZhangLXY16"}, "url":"URL#3326414" }, { "@score":"1", "@id":"3326415", "info":{"authors":{"author":[{"@pid":"11/3546","text":"Yuanrui Zhang"},{"@pid":"17/4237","text":"Yujing Ma"},{"@pid":"11/1917","text":"Yixiang Chen"}]},"title":"A UTP Refinement Model of the STeC Language.","venue":"QRS Companion","pages":"236-243","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhangMC16","doi":"10.1109/QRS-C.2016.36","ee":"https://doi.org/10.1109/QRS-C.2016.36","url":"https://dblp.org/rec/conf/qrs/ZhangMC16"}, "url":"URL#3326415" }, { "@score":"1", "@id":"3326416", "info":{"authors":{"author":[{"@pid":"186/6821","text":"Jihu Zhang"},{"@pid":"14/6633","text":"Haipeng Wang"},{"@pid":"31/4112","text":"Wu Liu"},{"@pid":"35/4532","text":"Yan Gong"},{"@pid":"63/1645","text":"Yunwei Dong"},{"@pid":"175/8917","text":"Xiaochuan Jing"},{"@pid":"10/4661","text":"Wei Zhang"}]},"title":"Safety Awareness Online Detection System of Driving Behavior Based on Software and Hardware Co-design.","venue":"QRS Companion","pages":"395-399","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhangWLGDJZ16","doi":"10.1109/QRS-C.2016.60","ee":"https://doi.org/10.1109/QRS-C.2016.60","url":"https://dblp.org/rec/conf/qrs/ZhangWLGDJZ16"}, "url":"URL#3326416" }, { "@score":"1", "@id":"3326418", "info":{"authors":{"author":[{"@pid":"186/6641","text":"Tiandu Zhao"},{"@pid":"96/4243","text":"Antti Evesti"},{"@pid":"88/2904","text":"Teemu Kanstrén"}]},"title":"A Tool for Security Measuring and Probe Management.","venue":"QRS Companion","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhaoEK16","doi":"10.1109/QRS-C.2016.5","ee":"https://doi.org/10.1109/QRS-C.2016.5","url":"https://dblp.org/rec/conf/qrs/ZhaoEK16"}, "url":"URL#3326418" }, { "@score":"1", "@id":"3326419", "info":{"authors":{"author":[{"@pid":"60/4818-2","text":"Jianwei Zheng 0002"},{"@pid":"186/6527","text":"Chunhang Xu"},{"@pid":"56/2415","text":"Donghui Guo"}]},"title":"A Programmable CNN Architecture and Its Hardware-Software Co-design Approach for Image Processing and Stimulating Visual Illusions.","venue":"QRS Companion","pages":"389-394","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhengXG16","doi":"10.1109/QRS-C.2016.59","ee":"https://doi.org/10.1109/QRS-C.2016.59","url":"https://dblp.org/rec/conf/qrs/ZhengXG16"}, "url":"URL#3326419" }, { "@score":"1", "@id":"3326420", "info":{"authors":{"author":[{"@pid":"28/2138","text":"Shulin Zhou"},{"@pid":"65/622-4","text":"Xiaodong Liu 0004"},{"@pid":"66/5479-1","text":"Shanshan Li 0001"},{"@pid":"92/748-6","text":"Wei Dong 0006"},{"@pid":"22/562","text":"Xiangke Liao"},{"@pid":"67/4330","text":"Yun Xiong"}]},"title":"ConfMapper: Automated Variable Finding for Configuration Items in Source Code.","venue":"QRS Companion","pages":"228-235","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZhouLLDLX16","doi":"10.1109/QRS-C.2016.35","ee":"https://doi.org/10.1109/QRS-C.2016.35","url":"https://dblp.org/rec/conf/qrs/ZhouLLDLX16"}, "url":"URL#3326420" }, { "@score":"1", "@id":"3326421", "info":{"authors":{"author":[{"@pid":"53/2732","text":"Lin Zou"},{"@pid":"78/4510","text":"Hongji Yang"},{"@pid":"19/360-3","text":"Lei Xu 0003"}]},"title":"An Approach to Controlling Context by Combining Game Theory and Control Theory for Self-Adaptive Software in Creative Computing.","venue":"QRS Companion","pages":"311-317","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/qrs/ZouY016","doi":"10.1109/QRS-C.2016.48","ee":"https://doi.org/10.1109/QRS-C.2016.48","url":"https://dblp.org/rec/conf/qrs/ZouY016"}, "url":"URL#3326421" }, { "@score":"1", "@id":"3360541", "info":{"title":"2016 IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, Companion, Vienna, Austria, August 1-3, 2016","venue":"QRS Companion","publisher":"IEEE","year":"2016","type":"Editorship","key":"conf/qrs/2016c","ee":"https://ieeexplore.ieee.org/xpl/conhome/7573452/proceeding","url":"https://dblp.org/rec/conf/qrs/2016c"}, "url":"URL#3360541" } ] } } } )