default search action
23rd ICECCS 2018: Melbourne, Australia
- 23rd International Conference on Engineering of Complex Computer Systems, ICECCS 2018, Melbourne, Australia, December 12-14, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9341-4
Full Papers
- Hoang Gia Nguyen, Laure Petrucci, Jaco van de Pol:
Layered and Collecting NDFS with Subsumption for Parametric Timed Automata. 1-9 - Étienne André, Ichiro Hasuo, Masaki Waga:
Offline Timed Pattern Matching under Uncertainty. 10-20 - Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. 21-30 - Chenghao Cai, Jing Sun, Gillian Dobbie:
B-Repair: Repairing B-Models Using Machine Learning. 31-40 - Camille Coti, Sami Evangelista, Laure Petrucci:
State Compression Based on One-Sided Communications for Distributed Model Checking. 41-50 - Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li:
Towards Mining Comprehensive Android Sandboxes. 51-60 - Tawfeeq Alsanoosy, Maria Spichkova, James Harland:
Cultural Influences on the Requirements Engineering Process: Lessons Learned from Practice. 61-70 - Michele Sevegnani, Milan Kabác, Muffy Calder, Julie A. McCann:
Modelling and Verification of Large-Scale Sensor Network Infrastructures. 71-81 - Raghda Alqurashi, Tom Altman:
Multi-Level Multi-Stage Agent-Based Decision Support System for Simulation of Crowd Dynamics. 82-92 - Mahin Abbasipour, Ferhat Khendek, Maria Toeroe:
A Model-Based Approach for Design Time Elasticity Rules Generation. 93-103 - Yuhang Li, Shi Ying, Xiangyang Jia, Yisen Xu, Lily Zhao, Guoli Cheng, Bingming Wang, Jifeng Xuan:
EH-Recommender: Recommending Exception Handling Strategies Based on Program Context. 104-114 - Yibin Xu:
Section-Blockchain: A Storage Reduced Blockchain Protocol, the Foundation of an Autotrophic Decentralized Storage Architecture. 115-125 - Florin Craciun, Wei-Ngan Chin, Shengchao Qin:
Variant Region Types. 126-135 - Neeraj Kumar Singh, Yamine Aït Ameur, Dominique Méry:
Formal Ontology Driven Model Refactoring. 136-145 - Lionel N. Tidjon, Marc Frappier, Michael Leuschel, Amel Mammar:
Extended Algebraic State-Transition Diagrams. 146-155 - Maria Spichkova, Jesse Bartlett, Ryan Howard, Adrian Seddon, Xing Zhao, Yuanqing Jiang:
SMI: Stack Management Interface. 156-159 - Steve Jeffrey Tueno Fotso, Marc Frappier, Regine Laleau, Amel Mammar:
Back Propagating B System Updates on SysML/KAOS Domain Models. 160-169 - Rongjie Yan, Junjie Yang, Di Zhu, Kai Huang:
Design Verification and Validation for Reliable Safety-Critical Autonomous Control Systems. 170-179
Short Papers
- Thomas Brihaye, Gilles Geeraerts, Hsi-Ming Ho, Arthur Milchior, Benjamin Monmege:
Efficient Algorithms and Tools for MITL Model-Checking and Synthesis. 180-184 - Mohan Baruwal Chhetri, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk, Michael Docking, Hien P. Luong, Isuru Rajapakse, Surya Nepal:
AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems. 185-188 - Dana Dghaym, Colin F. Snook, Thai Son Hoang, Michael J. Butler:
Reusing Formal Models via Lifting. 189-192 - Emma Effa Bella, Marie-Pierre Gervais, Reda Bendraou, Laurent Wouters, Ali Koudri:
Semi-Supervised Approach for Recovering Traceability Links in Complex Systems. 193-196 - Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai, Jin Song Dong:
Formal Analysis of a Proof-of-Stake Blockchain. 197-200 - Yongxin Zhao, Xi Wu, Jing Liu, Yilong Yang:
Formal Modeling and Security Analysis for OpenFlow-Based Networks. 201-204 - Tianxin Liang, Xiaoping Yang, Liang Wang, Zhenyuan Han:
Kinship Determination in Mobile Social Networks. 205-208 - Sarah Benyagoub, Yamine Aït Ameur, Meriem Ouederni, Atif Mashkoor:
Scalable Correct-by-Construction Conversation Protocols with Event-B: Validation, Experiments and Benchmarks. 209-212 - Morayo Adedjouma, Gabriel Pedroza, Asma Smaoui, Trung Kien Dang:
Facilitating the Adoption of Standards through Model-Based Representation. 213-216 - Hui Zhao, Jianrong Hou:
Design Concerns for Industrial Big Data System in the Smart Factory Domain: From Product Lifecycle View. 217-220 - Tewfik Ziadi, Lom-Messan Hillah:
Software Product Line Extraction from Bytecode Based Applications. 221-225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.