Abstract is missing.
- An Object-Oriented Language for Modeling of Hybrid SystemsHuixing Fang, Huibiao Zhu, Jianqi Shi. 1-9 [doi]
- Effect of User Posture and Device Size on the Performance of Touch-Based Authentication SystemsZahid Syed, Jordan Helmick, Sean Banerjee, Bojan Cukic. 10-17 [doi]
- Modeling and Verifying the Ballooning in Xen with CSPLuyao Wang, Fengwei Sui, Yanhong Huang, Huibiao Zhu. 18-25 [doi]
- Verilog Synthesis in the Higher-Order Transformation Framework of TLVictor L. Winter, Shiraz Hussain. 26-35 [doi]
- Model-Checking and Game theory for Synthesis of Safety RulesMathilde Machin, Fanny Dufossé, Jérémie Guiochet, David Powell, Matthieu Roy, Hélène Waeselynck. 36-43 [doi]
- A Fixed-Point Algorithm for Automated Static Detection of Infinite LoopsAndreas Ibing, Alexandra Mai. 44-51 [doi]
- Formal Foundations for Hierarchical Safety CasesEwen Denney, Ganesh J. Pai, Iain Whiteside. 52-59 [doi]
- Enabling Decision Support for the Delivery of Real-Time ServicesDavid McKee, David Webster, Jie Xu. 60-67 [doi]
- Adaptive GC-Aware Load Balancing Strategy for High-Assurance Java Distributed SystemsA. Omar Portillo-Dominguez, Miao Wang, John Murphy, Damien Magoni. 68-75 [doi]
- Verification for OAuth Using ASLan++Haixing Yan, Huixing Fang, Christian Kuka, Huibiao Zhu. 76-84 [doi]
- Extending Contract theory with Safety Integrity LevelsJonas Westman, Mattias Nyberg. 85-92 [doi]
- A Methodology to Efficiently Compare Operating System StabilityErik van der Kouwe, Cristiano Giuffrida, Razvan Ghituletez, Andrew S. Tanenbaum. 93-100 [doi]
- A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical InfrastructuresZiad Ismail, Jean Leneutre, David Bateman, Lin Chen. 101-109 [doi]
- Weaving an Assurance Case from Design: A Model-Based ApproachRichard Hawkins, Ibrahim Habli, Dimitrios S. Kolovos, Richard F. Paige, Tim Kelly. 110-117 [doi]
- A Proxy Identifier Based on Patterns in Traffic FlowsVahid Aghaei Foroushani, A. Nur Zincir-Heywood. 118-125 [doi]
- Deriving Safety Contracts to Support Architecture Design of Safety Critical SystemsIrfan Sljivo, Omar Jaradat, Iain Bate, Patrick J. Graydon. 126-133 [doi]
- Strategy-Aware Mitigation Using Markov Games for Dynamic Application-Layer AttacksMahsa Emami-Taba, Mehdi Amoui, Ladan Tahvildari. 134-141 [doi]
- Adaptive Failure Prediction for Computer Systems: A Framework and a Case StudyIvano Irrera, Marco Vieira, João Durães. 142-149 [doi]
- Introducing Meta-Requirements for Describing System of SystemsAndrea Ceccarelli, Marco Mori, Paolo Lollini, Andrea Bondavalli. 150-157 [doi]
- Observation-Level-Driven Formal ModelingAtif Mashkoor, Jean-Pierre Jacquot. 158-165 [doi]
- Ontology of Secure Service Level AgreementChen-Yu Lee, Krishna M. Kavi, Raymond A. Paul, Mahadevan Gomathisankaran. 166-172 [doi]
- Modeling and Verification for Probabilistic Properties in Software Product LinesGenaína Nunes Rodrigues, Vander Alves, Vinicius Nunes, André Lanna, Maxime Cordy, Pierre-Yves Schobbens, Amir Molzam Sharifloo, Axel Legay. 173-180 [doi]
- MPISE: Symbolic Execution of MPI ProgramsXianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, Ji Wang. 181-188 [doi]
- Executable Models to Support Automated Software FMEAValentina Bonfiglio, Leonardo Montecchi, Francesco Rossi, Paolo Lollini, András Pataricza, Andrea Bondavalli. 189-196 [doi]
- Formalization and Verification of REST Architecture in ViewpointsYiting Tang, Xi Wu, Huibiao Zhu, Jian Guo. 197-206 [doi]
- Modeling and Verifying Google File SystemBo Li, Mengdi Wang, Yongxin Zhao, Geguang Pu, Huibiao Zhu, Fu Song. 207-214 [doi]
- A Diversity-Based Approach for Communication Integrity in Critical Embedded SystemsAmira Zammali, Agnan de Bonneval, Yves Crouzet. 215-222 [doi]
- A Calculus for Wireless Sensor Networks from Quality PerspectiveXi Wu, Huibiao Zhu. 223-231 [doi]
- CamAuth: Securing Web Authentication with CameraMengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, Jiang Bian. 232-239 [doi]
- There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANETJingmin Shi, Chao Peng, Qin Zhu, Pengfei Duan, Yu Bao, Mengjun Xie. 240-246 [doi]
- A Method for Validating Intent Model Behavior in DSVMsKarl A. Morris, Peter J. Clarke, Xudong He, Fábio M. Costa, Mengjun Allison. 247-254 [doi]
- Applying Safety Case Pattern to Generate Assurance Cases for Safety-Critical SystemsChung-Ling Lin, Wuwei Shen. 255-262 [doi]
- Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report RepositoriesSean Banerjee, Jordan Helmick, Zahid Syed, Bojan Cukic. 263-270 [doi]
- HCPN Modeling for ERTMS Requirements SpecificationZakaryae Boudi, El-Miloudi El-Koursi, Simon Collart Dutilleul. 271-272 [doi]
- The Need for a Confidence View of CPS Support Environments (Fast Abstract)Fredrik Asplund, Martin Törngren, Richard Hawkins, John A. McDermid. 273-274 [doi]
- Signal Processing Oriented Approach for Big Data PrivacyXiaohua Li, Thomas Yang. 275-276 [doi]
- Fidelity and Complexity in Passive Radar SimulationsWilliam C. Barott, Ted Dabrowski, Braham Himed. 277-278 [doi]
- Using Pairwise Testing to Verify Automatically-Generated Formal SpecificationsSalamah Salamah, Omar Ochoa, Yadira Jacquez. 279-280 [doi]