Abstract is missing.
- Architecture Exploration of Real-Time Systems Based on Multi-objective OptimizationRahma Bouaziz 0002, Laurent Lemarchand, Frank Singhoff, Bechir Zalila, Mohamed Jmaiel. 1-10 [doi]
- Fitness Landscape Characterisation for Constrained Software Architecture Optimisation ProblemsAldeida Aleti, Irene Moser. 11-20 [doi]
- Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES)Smail Rahmoun, Etienne Borde, Laurent Pautet. 21-30 [doi]
- A Make/Buy/Reuse Feature Development Framework for Product Line EvolutionJuha Savolainen, Mike Mannion. 31-39 [doi]
- Combining Software Metrics and Text Features for Vulnerable File PredictionYun Zhang, David Lo, Xin Xia, Bowen Xu, Jianling Sun, Shanping Li. 40-49 [doi]
- Hardened Flow-Sensitive Trace Formula for Fault LocalizationSi-Mohamed Lamraoui, Shin Nakajima, Hiroshi Hosobe. 50-59 [doi]
- All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on AndroidGuangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo. 60-69 [doi]
- Improving Tenants' Trust in SaaS Applications Using Dynamic Security MonitorsMohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim. 70-79 [doi]
- Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)Byungho Min, Vijay Varadharajan. 80-89 [doi]
- Formal Analysis of a Single Sign-On Protocol Implementation for AndroidQuanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong. 90-99 [doi]
- GPU Accelerated On-the-Fly Reachability CheckingZhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin. 100-109 [doi]
- The Complexity of Deadline Analysis for Workflow Graphs with a Single ResourceMirela Botezatu, Hagen Völzer, Lothar Thiele. 110-119 [doi]
- Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine CodeDavid Sanán, Liu Yang, Yongwang Zhao, Zhenchang Xing, Mike Hinchey. 120-129 [doi]
- Formal Development of a Real-Time Operating System Memory ManagerWen Su, Jean-Raymond Abrial, Geguang Pu, Bin Fang. 130-139 [doi]
- Towards a Session Logic for Communication ProtocolsFlorin Craciun, Tibor Kiss, Andreea Costea. 140-149 [doi]
- A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic SystemsQin Li, Jinxun Wang, Qiwen Xu, Yanhong Huang, Huibiao Zhu. 150-159 [doi]
- Probabilistic Denotational Semantics for an Interrupt Modelling LanguageYanhong Huang, Yongxin Zhao, Shengchao Qin, Jifeng He. 160-169 [doi]
- Conversing at Many Layers: Multi-layer System-on-Chip Protocol ConversionRoopak Sinha. 170-173 [doi]
- SeBip: A Symbolic Executor for BIPWang Qiang, Simon Bliudze. 174-177 [doi]
- Improved Recovery for Proactive, Distributed RoutingMojgan Kamali, Luigia Petre. 178-181 [doi]
- Sports Strategy Analytics Using Probabilistic ReasoningJin Song Dong, Ling Shi, Le Vu Nguyen Chuong, Kan Jiang, Jing Sun 0002. 182-185 [doi]
- Web Application Architecture Security Evaluation Method Based on AADLShaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun. 186-189 [doi]
- Security Concepts as Add-On for Process ModelsJacob Geisel, Brahim Hamid, Jean-Michel Bruel. 190-193 [doi]
- Semantic Network Model: A Reasoning Engine for Software RequirementsKushal Ahmed, Lian Wen, Abdul Sattar, Reza Farid. 194-197 [doi]
- Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical SystemsRoopak Sinha, Cheng Pang, Gerardo Santillan Martinez, Juha Kuronen, Valeriy Vyatkin. 198-201 [doi]
- Formal Certification of Non-interferent Android Bytecode (DEX Bytecode)Hendra Gunadi. 202-205 [doi]
- Comparing Routing ProtocolsMojgan Kamali, Luigia Petre. 206-209 [doi]
- Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium)Zhimin Wu. 210-213 [doi]
- Analyzing Security Property of Android Application Implementation Using Formal MethodQuanqi Ye. 214-217 [doi]
- An Invariant Inference Framework by Active Learning and SVMsJiaying Li. 218-221 [doi]