ICECCS B

25 papers

YearTitle / Authors
202226th International Conference on Engineering of Complex Computer Systems, ICECCS 2022, Hiroshima, Japan, March 26-30, 2022
2022A Bounded Semantics for Improving the Efficiency of Bounded Model Checking.
Wenhui Zhang, Ya Gao
2022A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
Zhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza
2022A Formal Model for Fault Tolerant Parallel Matrix Factorization.
Camille Coti, Laure Petrucci, Daniel Alberto Torres González
2022A Novel Intelligent-Building-Fire-Risk Classification Method.
Weilin Wu, Na Wang, Yixiang Chen
2022Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study.
Meryem Afendi, Amel Mammar, Régine Laleau
2022Characterizing Java Streams in the Wild.
Eduardo Rosales, Andrea Rosà, Matteo Basso, Alex Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder
2022Combining Global and Local Representations of Source Code for Method Naming.
Cong Zhou, Li Kuang
2022DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning.
Enze Ma
2022Denotational and Algebraic Semantics for Cyber-physical Systems.
Ran Li, Huibiao Zhu, Richard Banach
2022Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks.
Sami Evangelista, Laure Petrucci, Lars Michael Kristensen
2022EB4EB: A Framework for Reflexive Event-B.
Peter Riviere, Neeraj Kumar Singh, Yamine Aït Ameur
2022Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores.
Yanzhao Wang, Fei Xie
2022Extension-Compression Learning: A deep learning code search method that simulates reading habits.
Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong
2022Formalism- Driven Development of Decentralized Systems.
Yepeng Ding, Hiroyuki Sato
2022Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations.
Penglong Chen, Zhen Li, Yu Wen, Lili Liu
2022HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification.
Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, Antoine Beugnard
2022Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees.
Jaime Arias, Laure Petrucci, Lukasz Masko, Wojciech Penczek, Teofil Sidoruk
2022Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments.
Xinyue Li, Wu Chen
2022Optimizing Parallel Java Streams.
Matteo Basso, Filippo Schiavio, Andrea Rosà, Walter Binder
2022Parameter Sensitive Pointer Analysis for Java.
Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang
2022Parameterized Design and Formal Verification of Multi-ported Memory.
Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi
2022Reducing Malware labeling Efforts Through Efficient Prototype Selection.
Guanhong Chen, Shuang Liu
2022Self-adaptation in Microservice Architectures: A Case Study.
Sree Ram Boyapati, Claudia Szabo
2022The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing.
Jiaqi Yin, Huibiao Zhu