| 2022 | 26th International Conference on Engineering of Complex Computer Systems, ICECCS 2022, Hiroshima, Japan, March 26-30, 2022 |
| 2022 | A Bounded Semantics for Improving the Efficiency of Bounded Model Checking. Wenhui Zhang, Ya Gao |
| 2022 | A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks. Zhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza |
| 2022 | A Formal Model for Fault Tolerant Parallel Matrix Factorization. Camille Coti, Laure Petrucci, Daniel Alberto Torres González |
| 2022 | A Novel Intelligent-Building-Fire-Risk Classification Method. Weilin Wu, Na Wang, Yixiang Chen |
| 2022 | Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study. Meryem Afendi, Amel Mammar, Régine Laleau |
| 2022 | Characterizing Java Streams in the Wild. Eduardo Rosales, Andrea Rosà, Matteo Basso, Alex Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder |
| 2022 | Combining Global and Local Representations of Source Code for Method Naming. Cong Zhou, Li Kuang |
| 2022 | DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning. Enze Ma |
| 2022 | Denotational and Algebraic Semantics for Cyber-physical Systems. Ran Li, Huibiao Zhu, Richard Banach |
| 2022 | Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks. Sami Evangelista, Laure Petrucci, Lars Michael Kristensen |
| 2022 | EB4EB: A Framework for Reflexive Event-B. Peter Riviere, Neeraj Kumar Singh, Yamine Aït Ameur |
| 2022 | Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores. Yanzhao Wang, Fei Xie |
| 2022 | Extension-Compression Learning: A deep learning code search method that simulates reading habits. Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong |
| 2022 | Formalism- Driven Development of Decentralized Systems. Yepeng Ding, Hiroyuki Sato |
| 2022 | Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations. Penglong Chen, Zhen Li, Yu Wen, Lili Liu |
| 2022 | HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification. Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, Antoine Beugnard |
| 2022 | Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees. Jaime Arias, Laure Petrucci, Lukasz Masko, Wojciech Penczek, Teofil Sidoruk |
| 2022 | Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments. Xinyue Li, Wu Chen |
| 2022 | Optimizing Parallel Java Streams. Matteo Basso, Filippo Schiavio, Andrea Rosà, Walter Binder |
| 2022 | Parameter Sensitive Pointer Analysis for Java. Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang |
| 2022 | Parameterized Design and Formal Verification of Multi-ported Memory. Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi |
| 2022 | Reducing Malware labeling Efforts Through Efficient Prototype Selection. Guanhong Chen, Shuang Liu |
| 2022 | Self-adaptation in Microservice Architectures: A Case Study. Sree Ram Boyapati, Claudia Szabo |
| 2022 | The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing. Jiaqi Yin, Huibiao Zhu |