default search action
HASE 2011: Boca Raton, FL, USA
- Taghi M. Khoshgoftaar:
13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0107-7
Session A: Software Testing and Validation
- Andrea Ceccarelli, Marco Vieira, Andrea Bondavalli:
A Testing Service for Lifelong Validation of Dynamic SOA. 1-8 - Wuliang Sun, Robert B. France, Indrakshi Ray:
Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models. 9-16 - Rui Yang, Zhenyu Chen, Baowen Xu, W. Eric Wong, Jie Zhang:
Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis. 17-24 - André Pflüger, Wolfgang Golubski, Stefan Queins:
Model Driven Validation of System Architectures. 25-28 - Chuanqi Tao, Bixin Li, Jerry Gao:
Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing. 29-32
Session B: Modeling Checking and Verification I
- Yongxin Zhao, Zheng Wang, Hao Xiao, Jing Ping, Geguang Pu, Jifeng He, Huibiao Zhu:
A Unifying Approach to Validating Specification-Oriented XML Constraints. 33-40 - Jianwen Li, Zheng Wang, Yongxin Zhao, Geguang Pu, Yanxia Qi, Bin Gu:
An Event-B Interpretation for SPARDL Model. 41-48 - Yingying Zhang, Emmanuel Rodriguez, Hao Zheng, Chris J. Myers:
A Behavioral Analysis Approach for Efficient Partial Order Reduction. 49-56 - Qian Wang, Huibiao Zhu:
Animating the Approach of Deriving Operational Semantics from Algebraic Semantics for Web Services. 57-62
Session C: Applications and Technologies
- Mehrdad Sabetzadeh, Davide Falessi, Lionel C. Briand, Stefano Di Alesio, Dag McGeorge, Vidar Åhjem, Jonas Borg:
Combining Goal Models, Expert Elicitation, and Probabilistic Simulation for Qualification of New Technology. 63-72 - Mladen A. Vouk, Pierre Mouallem:
On High-Assurance Scientific Workflows. 73-82 - Ali Kanso, Ferhat Khendek, Anik Mishra, Maria Toeroe:
Integrating Legacy Applications for High Availability: A Case Study. 83-90 - Vishesh Ved, Vivek Tyagi, Ankur Agarwal, Abhijit S. Pandya:
Personal Health Record System and Integration Techniques with Various Electronic Medical Record Systems. 91-94
Session D: High Assurance Distributed Systems
- Stéphane Louise, Matthieu Lemerre, Christophe Aussaguès, Vincent David:
The OASIS Kernel: A Framework for High Dependability Real-Time Systems. 95-103 - Patrick Hein, Debmalya Biswas, Leonardo A. Martucci, Max Mühlhäuser:
Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems. 104-111 - Mingjie Lin, Yu Bai, John Wawrzynek:
Discriminatively Fortified Computing with Reconfigurable Digital Fabric. 112-119 - Ingrid A. Buckley, Eduardo B. Fernández:
Enumerating Software Failures to Build Dependable Distributed Applications. 120-123 - Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser:
Leader-Determined Membership Protocol. 124-129
Session E: Model Checking and Verification II
- Philippe Dhaussy, Jean-Charles Roger, Frédéric Boniol:
Reducing State Explosion with Context Modeling for Model-Checking. 130-137 - Atif Mashkoor, Jean-Pierre Jacquot:
Guidelines for Formal Domain Modeling in Event-B. 138-145 - Ilya Lopatkin, Alexei Iliasov, Alexander B. Romanovsky, Yuliya Prokhorova, Elena Troubitsyna:
Patterns for Representing FMEA in Formal Specification of Control Systems. 146-151 - Victor L. Winter, Jonathan Guerrero, Carl Reinke, James T. Perry:
Monarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator. 152-156
Session F: High Assurance Networked Systems and Services
- Si Liu, Yongxin Zhao, Huibiao Zhu, Qin Li:
A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective. 157-162 - Sami S. Alwakeel, Shaker S. AlGhanmi:
A Real Time Window-Based Local Call Admission Control Algorithm for IP Networks. 163-167 - Hajime Fujita, Yutaka Ishikawa:
Anytime Available Single IP Address Cluster. 168-173
Poster Presentations
- Md. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori:
Autonomous Online Expansion Technology for ZigBee Wireless Sensor Networks. 174-175 - Antonio Maña, José Fran. Ruiz:
A Security Modelling Framework for Systems of Embedded Components. 176-177 - Kunming Nie, Li Zhang:
On the Relationship between Preprocessor-Based Software Variability and Software Defects. 178-179 - Simin Nadjm-Tehrani, Maria Vasilevskaya:
Towards a Security Domain Model for Embedded Systems. 180-181 - Mario Bernhart, Stefan Reiterer, Kilian Matt, Andreas Mauczka, Thomas Grechenig:
A Task-Based Code Review Process and Tool to Comply with the DO-278/ED-109 Standard for Air Traffic Managment Software Development: An Industrial Case Study. 182-187 - Hicham Assoudi, Hakim Lounis:
Self-Healing Data Exchange Process under Evolving Schemas: A New Mapping Adaptation Approach Based on Self-Optimization. 188-190 - Douglas Rodrigues, Daniel F. Pigatto, Júlio Cezar Estrella, Kalinka Regina Lucas Jaquie Castelo Branco:
Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services. 191-192
Session G: Safety-Critical Systems
- Mehrdad Sabetzadeh, Shiva Nejati, Lionel C. Briand, Anne-Heidi Evensen Mills:
Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience. 193-201 - Chetan Mutha, Carol S. Smidts:
An Early Design Stage UML-Based Safety Analysis Approach for High Assurrance Software Systems. 202-211 - Michaël Lauer, Jérôme Ermont, Frédéric Boniol, Claire Pagetti:
Worst Case Temporal Consistency in Integrated Modular Avionics Systems. 212-219 - Manasi Peshave, Farokh B. Bastani, I-Ling Yen:
High-Assurance Reconfigurable Multicore Processor Based Systems. 220-226
Session H: High Assurance Ocean Systems
- John C. Sloan, Taghi M. Khoshgoftaar:
Ensemble Coordination for Discrete Event Control. 227-235 - Randall Wald, Taghi M. Khoshgoftaar, John C. Sloan:
Using Feature Selection to Determine Optimal Depth for Wavelet Packet Decomposition of Vibration Signals for Ocean System Reliability. 236-243 - Janell Duhaney, Taghi M. Khoshgoftaar, John C. Sloan, Bassem Alhalabi, Pierre P. Beaujean:
A Dynamometer for an Ocean Turbine Prototype: Reliability through Automated Monitoring. 244-251 - Mustapha Mjit, Pierre-Philippe J. Beaujean, David J. Vendittis:
Smart Vibration Monitoring System for an Ocean Turbine. 252-260
Session I: Performance, Reliability and Availability Analysis
- Ricardo Paharsingh, Olivia Das:
An Availability Model of a Virtual TMR System with Applications in Cloud/Cluster Computing. 261-268 - Lance Fiondella, Sanguthevar Rajasekaran, Swapna S. Gokhale:
Efficient System Reliability with Correlated Component Failures. 269-276 - Michael F. Siok, Jeff Tian:
Benchmarking Embedded Software Development Project Performance. 277-284 - Dongeun Lee, Heonshik Shin, Eunjeong Park:
Modeling Recovery Strategies in Service-Oriented Architecture Using a Markov Decision Process. 285-290
Session J: Monitoring
- Javier González, Antonio Muñoz, Antonio Maña:
Multi-layer Monitoring for Cloud Computing. 291-298 - Ayman A. Amin, Alan Colman, Lars Grunske:
Using Automated Control Charts for the Runtime Evaluation of QoS Attributes. 299-306 - Ying Wang, Chunming Hu, Bo Li:
VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison. 307-312 - Vivek Tyagi, Abhijit S. Pandya, Ankur Agarwal, Bassem Alhalabi:
Validation of Object Recognition Framework on Android Mobile Platform. 313-316
Session K: Bugs and Fault Localization
- Aritra Bandyopadhyay, Sudipto Ghosh:
On the Effectiveness of the Tarantula Fault Localization Technique for Different Fault Classes. 317-324 - Zhongxing Yu, Hai Hu, Chenggang Bai, Kai-Yuan Cai, W. Eric Wong:
GUI Software Fault Localization Using N-gram Analysis. 325-332 - Pratik Maheshwari, Byong-Su Seol, Jong-Sung Lee, Jae-Deok Lim, Sahra Sedigh, David Pommerenke:
Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge. 333-339 - David Lo, Hong Cheng, Xiaoyin Wang:
Bug Signature Minimization and Fusion. 340-347 - Herbert Hecht:
So Much to Learn from One Accident Crash of 737 on 25 February 2009. 348-351
Session L: Security and Privacy
- Zahid A. Syed, Sean Banerjee, Qi Cheng, Bojan Cukic:
Effects of User Habituation in Keystroke Dynamics on Password Security Policy. 352-359 - Tushar Deshpande, Panagiotis Katsaros, Stylianos Basagiannis, Scott A. Smolka:
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking. 360-367 - Debmalya Biswas, Valtteri Niemi:
Transforming Privacy Policies to Auditing Specifications. 368-375 - Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha Zaïdi:
Verification of Interoperability Security Policies by Model Checking. 376-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.