| 2014 | 2014 19th International Conference on Engineering of Complex Computer Systems, Tianjin, China, August 4-7, 2014 |
| 2014 | A Behavior-Aware Systematic Approach for Merging Business Process Fragments. Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane |
| 2014 | A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness. Eric Lunaud Ngoupe, Sylvain Stoesel, Clément Parisot, Sylvain Hallé, Petko Valtchev, Omar Cherkaoui, Pierre Boucher |
| 2014 | A Reference Framework for the Automated Exploration of Web Applications. Gabriel Le Breton, Nicolas Bergeron, Sylvain Hallé |
| 2014 | A Refinement Calculus for Hybrid Systems. Bin Gu, Liang Zou |
| 2014 | A Thread Behavior-Based Memory Management Framework on Multi-core Smartphone. Zongwei Zhu, Xi Li, Hengchang Liu, Cheng Ji, Yuan Xu, Xuehai Zhou, Beilei Sun |
| 2014 | A Trace-Based JIT Compilation Framework for XQuery. Chenzhi Wu, Husheng Liao, Chenglong Yu, Hang Su |
| 2014 | An Adaptive Auto-configuration Tool for Hadoop. Changlong Li, Hang Zhuang, Kun Lu, Mingming Sun, Jinhong Zhou, Dong Dai, Xuehai Zhou |
| 2014 | An Executable Semantics of SystemC Transaction Level Models and Its Applications with VERDS. Naiju Zeng, Wenhui Zhang |
| 2014 | An Extended UML Method for the Verification of Security Protocols. Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng |
| 2014 | Automatic Defect Categorization Based on Fault Triggering Conditions. Xin Xia, David Lo, Xinyu Wang, Bo Zhou |
| 2014 | Automatic Fine-Grained Issue Report Reclassification. Pavneet Singh Kochhar, Ferdian Thung, David Lo |
| 2014 | Behavior Gaps and Relations between Operating System and Applications on Accessing DRAM. Beilei Sun, Xi Li, Zongwei Zhu, Xuehai Zhou |
| 2014 | Clause Replication and Reuse in Incremental Temporal Induction. Liangze Yin, Fei He, Ming Gu, Jia-Guang Sun |
| 2014 | Deriving Usage Model Variants for Model-Based Testing: An Industrial Case Study. Hamza Samih, Hélène Le Guen, Ralf Bogusch, Mathieu Acher, Benoit Baudry |
| 2014 | Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures. Byungho Min, Vijay Varadharajan |
| 2014 | DroidVault: A Trusted Data Vault for Android Devices. Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena |
| 2014 | Evolving Commitments for Self-Adaptive Socio-technical Systems. Xin Peng, Yi Xie, Yijun Yu, John Mylopoulos, Wenyun Zhao |
| 2014 | Exact and Efficient Temporal Steering of Software Behavioral Model Inference. Sylvain Lamprier, Tewfik Ziadi, Nicolas Baskiotis, Lom-Messan Hillah |
| 2014 | From TiMo to Event-B: Event-Driven Timed Mobility. Gabriel Ciobanu, Thai Son Hoang, Alin Stefanescu |
| 2014 | Generating SystemC Implementations for Clock Constraints Specified in UML/MARTE CCSL. Judith Peters, Robert Wille, Rolf Drechsler |
| 2014 | How Do Open Source Communities Document Software Architecture: An Exploratory Survey. Wei Ding, Peng Liang, Antony Tang, Hans van Vliet, Mojtaba Shahin |
| 2014 | Knowledge Base Construction Process for Smart-City Services. Pierfrancesco Bellini, Paolo Nesi, Nadia Rauch |
| 2014 | Model Checking Rate-Monotonic Scheduler with TMSVL. Jin Cui, Zhenhua Duan, Cong Tian |
| 2014 | Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks. Andrzej Mizera, Jun Pang, Qixia Yuan |
| 2014 | OOPN-SRAM: A Novel Method for Software Risk Assessment. Xiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng |
| 2014 | QScheduler: A Tool for Parallel Query Processing in Database Systems. Qing-Feng Zhang, Shan-Shan Li, Jing Xu |
| 2014 | SQLR: Grammar-Guided Validation of SQL Injection Sanitizers. Sai Sathyanarayan, Dawei Qi, Zhenkai Liang, Abhik Roychoudary |
| 2014 | Symbolic Analysis of an Electric Vehicle Charging Protocol. Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong |
| 2014 | Understanding Complex Binary Loading Behaviors. Ting Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang |