ICECCS B

30 papers

YearTitle / Authors
20142014 19th International Conference on Engineering of Complex Computer Systems, Tianjin, China, August 4-7, 2014
2014A Behavior-Aware Systematic Approach for Merging Business Process Fragments.
Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane
2014A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness.
Eric Lunaud Ngoupe, Sylvain Stoesel, Clément Parisot, Sylvain Hallé, Petko Valtchev, Omar Cherkaoui, Pierre Boucher
2014A Reference Framework for the Automated Exploration of Web Applications.
Gabriel Le Breton, Nicolas Bergeron, Sylvain Hallé
2014A Refinement Calculus for Hybrid Systems.
Bin Gu, Liang Zou
2014A Thread Behavior-Based Memory Management Framework on Multi-core Smartphone.
Zongwei Zhu, Xi Li, Hengchang Liu, Cheng Ji, Yuan Xu, Xuehai Zhou, Beilei Sun
2014A Trace-Based JIT Compilation Framework for XQuery.
Chenzhi Wu, Husheng Liao, Chenglong Yu, Hang Su
2014An Adaptive Auto-configuration Tool for Hadoop.
Changlong Li, Hang Zhuang, Kun Lu, Mingming Sun, Jinhong Zhou, Dong Dai, Xuehai Zhou
2014An Executable Semantics of SystemC Transaction Level Models and Its Applications with VERDS.
Naiju Zeng, Wenhui Zhang
2014An Extended UML Method for the Verification of Security Protocols.
Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng
2014Automatic Defect Categorization Based on Fault Triggering Conditions.
Xin Xia, David Lo, Xinyu Wang, Bo Zhou
2014Automatic Fine-Grained Issue Report Reclassification.
Pavneet Singh Kochhar, Ferdian Thung, David Lo
2014Behavior Gaps and Relations between Operating System and Applications on Accessing DRAM.
Beilei Sun, Xi Li, Zongwei Zhu, Xuehai Zhou
2014Clause Replication and Reuse in Incremental Temporal Induction.
Liangze Yin, Fei He, Ming Gu, Jia-Guang Sun
2014Deriving Usage Model Variants for Model-Based Testing: An Industrial Case Study.
Hamza Samih, Hélène Le Guen, Ralf Bogusch, Mathieu Acher, Benoit Baudry
2014Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures.
Byungho Min, Vijay Varadharajan
2014DroidVault: A Trusted Data Vault for Android Devices.
Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena
2014Evolving Commitments for Self-Adaptive Socio-technical Systems.
Xin Peng, Yi Xie, Yijun Yu, John Mylopoulos, Wenyun Zhao
2014Exact and Efficient Temporal Steering of Software Behavioral Model Inference.
Sylvain Lamprier, Tewfik Ziadi, Nicolas Baskiotis, Lom-Messan Hillah
2014From TiMo to Event-B: Event-Driven Timed Mobility.
Gabriel Ciobanu, Thai Son Hoang, Alin Stefanescu
2014Generating SystemC Implementations for Clock Constraints Specified in UML/MARTE CCSL.
Judith Peters, Robert Wille, Rolf Drechsler
2014How Do Open Source Communities Document Software Architecture: An Exploratory Survey.
Wei Ding, Peng Liang, Antony Tang, Hans van Vliet, Mojtaba Shahin
2014Knowledge Base Construction Process for Smart-City Services.
Pierfrancesco Bellini, Paolo Nesi, Nadia Rauch
2014Model Checking Rate-Monotonic Scheduler with TMSVL.
Jin Cui, Zhenhua Duan, Cong Tian
2014Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks.
Andrzej Mizera, Jun Pang, Qixia Yuan
2014OOPN-SRAM: A Novel Method for Software Risk Assessment.
Xiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng
2014QScheduler: A Tool for Parallel Query Processing in Database Systems.
Qing-Feng Zhang, Shan-Shan Li, Jing Xu
2014SQLR: Grammar-Guided Validation of SQL Injection Sanitizers.
Sai Sathyanarayan, Dawei Qi, Zhenkai Liang, Abhik Roychoudary
2014Symbolic Analysis of an Electric Vehicle Charging Protocol.
Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong
2014Understanding Complex Binary Loading Behaviors.
Ting Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang