


default search action
24th ICECCS 2019: Guangzhou, China
- Jun Pang, Jing Sun:

24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, Guangzhou, China, November 10-13, 2019. IEEE 2019, ISBN 978-1-7281-4646-1 
Formal Methods
- Tayssir Touili, Xin Ye:

LTL Model Checking of Self Modifying Code. 1-10 - Li Huang, Tian Liang, Eun-Young Kang

:
Formal Verification of Dynamic and Stochastic Behaviors for Automotive Systems. 11-20 - Ran Chen, Wenhui Zhang:

Checking Multi-Agent Systems Against Temporal-Epistemic Specifications. 21-30 
Program Analysis
- Xi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Zhuobing Han:

Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. 31-40 - Xiao Cheng

, Haoyu Wang, Jiayi Hua, Miao Zhang, Guoai Xu, Li Yi, Yulei Sui
:
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding. 41-50 - Maria Spichkova:

Industry-Oriented Project-Based Learning of Software Engineering. 51-60 
Security
- Ruitao Feng

, Sen Chen, Xiaofei Xie
, Lei Ma, Guozhu Meng, Yang Liu
, Shang-Wei Lin
:
MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. 61-70 - Laure Petrucci

, Michal Knapik
, Wojciech Penczek, Teofil Sidoruk
:
Squeezing State Spaces of (Attack-Defence) Trees. 71-80 - Faheem Ullah, Muhammad Ali Babar:

QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics. 81-86 
Formal Methods
- Étienne André, Didier Lime, Mathias Ramparison:

On the Expressive Power of Invariants in Parametric Timed Automata. 87-96 - Michael J. Butler, Dana Dghaym, Thai Son Hoang, Tope Omitola, Colin F. Snook

, Andreas Fellner, Rupert Schlick, Thorsten Tarrach, Tomas Fischer, Peter Tummeltshammer:
Behaviour-Driven Formal Model Development of the ETCS Hybrid Level 3. 97-106 - Paulius Stankaitis, Guillaume Dupont, Neeraj Kumar Singh, Yamine Aït Ameur, Alexei Iliasov, Alexander B. Romanovsky

:
Modelling Hybrid Train Speed Controller using Proof and Refinement. 107-113 
Scheduling
- Hai Nam Tran, Alexandre Honorat, Jean-Pierre Talpin, Thierry Gautier, Loïc Besnard:

Efficient Contention-Aware Scheduling of SDF Graphs on Shared Multi-Bank Memory. 114-123 - Zan Wang, Dongdi Zhang, Shuang Liu, Jun Sun, Yingquan Zhao

:
Adaptive Randomized Scheduling for Concurrency Bug Detection. 124-133 - Xue-Yang Zhu

:
Efficient Retiming of Unfolded Synchronous Dataflow Graphs. 134-143 
Memory Management
- Ke Jiang, David Sanán

, Yongwang Zhao, Shuanglong Kan, Yang Liu
:
A Formally Verified Buddy Memory Allocation Model. 144-153 - Kaixin Huang, Yan Yan, Linpeng Huang:

EFLightPM: An Efficient and Lightweight Persistent Memory System. 154-163 - Sung-Shik Jongmans:

Toward New Unit-Testing Techniques for Shared-Memory Concurrent Programs. 164-169 
Testing
- Ciprian Paduraru, Miruna Paduraru:

Automatic Difficulty Management and Testing in Games using a Framework Based on Behavior Trees and Genetic Algorithms. 170-179 - Bai Xue, Yang Liu

, Lei Ma, Xiyue Zhang
, Meng Sun, Xiaofei Xie
:
Safe Inputs Approximation for Black-Box Systems. 180-189 - Xiao-Yi Zhang, Paolo Arcaini

, Fuyuki Ishikawa:
Assessing the Relation Between Hazards and Variability in Automotive Systems. 190-199 
Program Analysis
- Jun Gao

, Li Li, Tegawendé F. Bissyandé, Jacques Klein
:
On the Evolution of Mobile App Complexity. 200-209 - Zhengkang Zuo, Zhihao Liu, Changjing Wang, Zhen You, Qimin Hu:

Apla Generic Constraint Matching Detection and Verification. 210-219 - Christopher Curry, Quang Loc Le, Shengchao Qin:

Bi-Abductive Inference for Shape and Ordering Properties. 220-225 
Security
- Mohamed Lamine Kerdoudi, Tewfik Ziadi

, Chouki Tibermacine, Salah Sadou
:
Recovering Software Architecture Product Lines. 226-235 - Quentin Rouland

, Brahim Hamid
, Jean-Paul Bodeveix, Mamoun Filali:
A Formal Methods Approach to Security Requirements Specification and Verification. 236-241 - Amina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane

:
Measuring Opacity for Non-Probabilistic DES: a SOG-Based Approach. 242-247 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














