Abstract is missing.
- From TiMo to Event-B: Event-Driven Timed MobilityGabriel Ciobanu, Thai Son Hoang, Alin Stefanescu. 1-10 [doi]
- Symbolic Analysis of an Electric Vehicle Charging ProtocolLi Li, Jun Pang, Yang Liu, Jun Sun 0001, Jin Song Dong. 11-18 [doi]
- An Extended UML Method for the Verification of Security ProtocolsGang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng. 19-28 [doi]
- DroidVault: A Trusted Data Vault for Android DevicesXiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena. 29-38 [doi]
- Automatic Defect Categorization Based on Fault Triggering ConditionsXin Xia, David Lo, Xinyu Wang, Bo Zhou. 39-48 [doi]
- Understanding Complex Binary Loading BehaviorsTing Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang. 49-58 [doi]
- Design and Analysis of Security Attacks against Critical Smart Grid InfrastructuresByungho Min, Vijay Varadharajan. 59-68 [doi]
- An Adaptive Auto-configuration Tool for HadoopChanglong Li, Hang Zhuang, Kun Lu, Mingming Sun, Jinhong Zhou, Dong Dai, Xuehai Zhou. 69-72 [doi]
- QScheduler: A Tool for Parallel Query Processing in Database SystemsQing-Feng Zhang, Shan-Shan Li, Jing Xu. 73-76 [doi]
- Deriving Usage Model Variants for Model-Based Testing: An Industrial Case StudyHamza Samih, Hélène le Guen, Ralf Bogusch, Mathieu Acher, Benoit Baudry. 77-80 [doi]
- A Reference Framework for the Automated Exploration of Web ApplicationsGabriel Le Breton, Nicolas Bergeron, Sylvain Hallé. 81-90 [doi]
- A Thread Behavior-Based Memory Management Framework on Multi-core SmartphoneZongwei Zhu, Xi Li, Hengchang Liu, Cheng Ji, Yuan Xu, Xuehai Zhou, Beilei Sun. 91-97 [doi]
- Evolving Commitments for Self-Adaptive Socio-technical SystemsXin Peng, Yi Xie, Yijun Yu, John Mylopoulos, Wenyun Zhao. 98-107 [doi]
- Clause Replication and Reuse in Incremental Temporal InductionLiangze Yin, Fei He, Ming Gu, Jia-Guang Sun. 108-115 [doi]
- Generating SystemC Implementations for Clock Constraints Specified in UML/MARTE CCSLJudith Peters, Robert Wille, Rolf Drechsler. 116-125 [doi]
- Automatic Fine-Grained Issue Report ReclassificationPavneet Singh Kochhar, Ferdian Thung, David Lo. 126-135 [doi]
- How Do Open Source Communities Document Software Architecture: An Exploratory SurveyWei Ding, Peng Liang, Antony Tang, Hans van Vliet, Mojtaba Shahin. 136-145 [doi]
- Behavior Gaps and Relations between Operating System and Applications on Accessing DRAMBeilei Sun, Xi Li, Zongwei Zhu, Xuehai Zhou. 146-149 [doi]
- OOPN-SRAM: A Novel Method for Software Risk AssessmentXiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng. 150-153 [doi]
- SQLR: Grammar-Guided Validation of SQL Injection SanitizersSai Sathyanarayan, Dawei Qi, Zhenkai Liang, Abhik Roychoudary. 154-157 [doi]
- A Trace-Based JIT Compilation Framework for XQueryChenzhi Wu, Husheng Liao, Chenglong Yu, Hang Su. 158-165 [doi]
- Exact and Efficient Temporal Steering of Software Behavioral Model InferenceSylvain Lamprier, Tewfik Ziadi, Nicolas Baskiotis, Lom-Messan Hillah. 166-175 [doi]
- A Refinement Calculus for Hybrid SystemsBin Gu, Liang Zou. 176-185 [doi]
- Knowledge Base Construction Process for Smart-City ServicesPierfrancesco Bellini, Paolo Nesi, Nadia Rauch. 186-189 [doi]
- A Lazy Evaluation Strategy for Assessing Network Device Configuration CorrectnessEric Lunaud Ngoupe, Sylvain Stoesel, Clement Parisot, Sylvain Hallé, Petko Valtchev, Omar Cherkaoui, Pierre Boucher. 190-193 [doi]
- A Behavior-Aware Systematic Approach for Merging Business Process FragmentsMohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane. 194-197 [doi]
- An Executable Semantics of SystemC Transaction Level Models and Its Applications with VERDSNaiju Zeng, Wenhui Zhang. 198-201 [doi]
- Model Checking Rate-Monotonic Scheduler with TMSVLJin Cui, Zhenhua Duan, Cong Tian. 202-205 [doi]
- Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory NetworksAndrzej Mizera, Jun Pang, Qixia Yuan. 206-209 [doi]