Abstract is missing.
- Towards Denotational Semantics for Verilog in PVSHan Zhu, Huibiao Zhu, Si Liu, Jian Guo. 1-2 [doi]
- A Method of Analysis and Verification for Safety-Critical Software Based on Modelling and TestingDan Yu, Shilong Ma. 3-4 [doi]
- Synthesizing SRN Models from System Operations with SysML Diagrams for Availability AnalysisKumiko Tadano, Jianwen Xiang, Masahiro Kawato, Yoshiharu Maeno. 5-6 [doi]
- A Learning Environment for Software Security EducationAtsuo Hazeyama, Hiroto Shimizu. 7-8 [doi]
- Feedback-Directed Test Case Generation Based on UML Activity DiagramsXin Chen, Nan Ye, Peng Jiang, Lei Bu, Xuandong Li. 9-10 [doi]
- Formal Approaches to Wireless Sensor NetworksSi Liu, Xiaofeng Wu, Qin Li, Huibiao Zhu, Qian Wang. 11-18 [doi]
- Case Study on Installing a Porting Process for Embedded Operating System in a Small TeamDongSeok Cho, Doo-Hwan Bae. 19-25 [doi]
- Secure Machine Learning, a Brief OverviewXiaofeng Liao, Liping Ding, Yongji Wang. 26-29 [doi]
- Verifying the Safety of Xen Security ModulesWei Han, Yeping He, Liping Ding. 30-34 [doi]
- Study on Formal Specification of Automatic Train Protection and Block System for Local LineGuo Xie, Akira Asano, Sei Takahashi, Hideo Nakamura. 35-40 [doi]
- Specification and Verification of UML2.0 Sequence Diagrams Using Event Deterministic Finite AutomataChen Zhang, Zhenhua Duan. 41-46 [doi]
- Static Data Race Detection for Interrupt-Driven Embedded SoftwareRui Chen, Xiangying Guo, Yonghao Duan, Bin Gu, Mengfei Yang. 47-52 [doi]
- Approximate Simulation for Metric Hybrid Input/Output AutomataHaiyu Pan, Min Zhang, Yixiang Chen. 53-59 [doi]
- An Instrumentation Tool for Program Dynamic Analysis in JavaHuajie Chen, Tian Zhang, Lei Bu, Xuandong Li. 60-67 [doi]
- A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection SystemsSanghyun Yoon, Jae Yeon Jo, Junbeom Yoo. 68-75 [doi]
- Multi-layered Adaptive Monitoring in Service RobotsH. Kim, H. Yoon, Y. Cho, S. Park, Vijayan Sugumaran. 76-83 [doi]
- Challenges in Automatic TestingSunghun Kim, Ning Chen. 84 [doi]
- A Reliability Model for Complex SystemsNorman F. Schneidewind, Mike Hinchey. 85-94 [doi]
- A Scalability Framework for Reliable ServicesJae Yoo Lee, Soo Dong Kim. 95-98 [doi]
- A Methodology of Model-Based Testing for AADL Flow Latency in CPSYufeng Zhu, Yunwei Dong, Chunyan Ma, Fan Zhang. 99-105 [doi]
- Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical SystemsKenneth K. Fletcher, Xiaoqing (Frank) Liu. 106-113 [doi]
- Approximating Quantified SMT-Solving with SATXianjin Fu, Wanwei Liu, Jing Li. 114-119 [doi]
- Using a DSL and Fine-Grained Model Transformations to Explore the Boundaries of Model VerificationM. F. van Amstel, M. G. J. van den Brand, Luc J. P. Engelen. 120-127 [doi]
- Coping with Complexity of Testing Models for Real-Time Embedded SystemsRalf Mitsching, Carsten Weise, Dominik Franke, Thomas Gerlitz, Stefan Kowalewski. 128-135 [doi]
- Integrating DSL-CBI and NuSMV for Modeling and Verifiying Interlocking SystemsYan Cao, Qiuzi Lu, Tianhua Xu, Tao Tang, Haifeng Wang, Yongcheng Xu. 136-143 [doi]
- Enhancing Use Cases with Subjective Risk AssessmentO. T. Arogundade, Z. Jin, X. G. Yang. 144-151 [doi]
- A UML Model Based White Box Reliability Prediction to Identify Unreliable ComponentsDaeeui Hong, Taewan Gu, Jongmoon Baik. 152-159 [doi]
- An Embedded Operating System Design for the Lunar Exploration RoverLei Qiao, Mengfei Yang, Bin Gu, Hua Yang, Bo Liu. 160-165 [doi]
- Automatic Regression Test Selection Based on Activity DiagramsNan Ye, Xin Chen, Peng Jiang, Wenxu Ding, Xuandong Li. 166-171 [doi]
- A Model for Usage-Based Testing of Event-Driven SoftwareSteffen Herbold, Jens Grabowski, Stephan Waack. 172-178 [doi]
- Handling Periodic Properties: Deductive Verification for Quantified Temporal Logic SpecificationsAlexander Bolotov. 179-186 [doi]
- A Modelling Framework to Support Internal ControlTakafumi Komoto, Kenji Taguchi 0001, Haralambos Mouratidis, Nobukazu Yoshioka, Kokichi Futatsugi. 187-193 [doi]
- DRiVeR: Diagnosing Runtime Property Violations Based on Dependency RulesYanbin Liu, Ye Yang, Qiusong Yang, Mingshu Li. 194-201 [doi]
- A SysML-Based Requirement Supporting Tool for Embedded SoftwareChih-Hung Chang, Chih-Wei Lu, Kuo-Fong Kao, William C. Chu, Chao-Tung Yang, Nien-Lin Hsueh, Pao-Ann Hsiung, Chorng-Shiuh Koong. 202-206 [doi]
- Invited Talk - Engineering Self-Healing and Self-Improving SystemsDavid Garlan. 207 [doi]