Abstract is missing.
- Minimal Schedule with Minimal Number of Agents in Attack-Defence TreesJaime Arias, Laure Petrucci, Lukasz Masko, Wojciech Penczek, Teofil Sidoruk. 1-10 [doi]
- HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability IdentificationPaul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, Antoine Beugnard. 1-6 [doi]
- Reducing Malware labeling Efforts Through Efficient Prototype SelectionGuanhong Cher, Shuang Liu 0007. 17-22 [doi]
- Optimizing Parallel Java StreamsMatteo Basso, Filippo Schiavio, Andrea Rosà, Walter Binder. 23-32 [doi]
- Parameterized Design and Formal Verification of Multi-ported MemoryMufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi. 33-41 [doi]
- Self-adaptation in Microservice Architectures: A Case StudySree Ram Boyapati, Claudia Szabo. 42-51 [doi]
- Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain EnvironmentsXinyue Li, Wu Chen. 52-61 [doi]
- A Formal Model for Fault Tolerant Parallel Matrix FactorizationCamille Coti, Laure Petrucci, Daniel Alberto Torres González. 62-70 [doi]
- EB4EB: A Framework for Reflexive Event-BPeter Riviere, Neeraj Kumar Singh, Yamine Aït Ameur. 71-80 [doi]
- Formalism- Driven Development of Decentralized SystemsYepeng Ding, Hiroyuki Sato. 81-90 [doi]
- Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case StudyMeryem Afendi, Amel Mammar, Régine Laleau. 91-96 [doi]
- A Bounded Semantics for Improving the Efficiency of Bounded Model CheckingWenhui Zhang, Ya Gao. 97-106 [doi]
- Distributed Explicit State Space Exploration with State Reconstruction for RDMA NetworksSami Evangelista, Laure Petrucci, Lars Michael Kristensen. 107-116 [doi]
- A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber AttacksZhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza. 117-122 [doi]
- Denotational and Algebraic Semantics for Cyber-physical SystemsRan Li, Huibiao Zhu, Richard Banach. 123-132 [doi]
- The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge ComputingJiaqi Yin, Huibiao Zhu. 133-142 [doi]
- Characterizing Java Streams in the WildEduardo Rosales 0001, Andrea Rosà, Matteo Basso, Alex Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder. 143-152 [doi]
- Combining Global and Local Representations of Source Code for Method NamingCong Zhou, Li Kuang. 153-161 [doi]
- Parameter Sensitive Pointer Analysis for JavaYulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang. 162-167 [doi]
- A Novel Intelligent-Building-Fire-Risk Classification MethodWeilin Wu, Na Wang 0007, Yixiang Chen. 168-172 [doi]
- Generating Adversarial Source Programs Using Important Tokens-based Structural TransformationsPenglong Chen, Zhen Li 0027, Yu Wen, Lili Liu. 173-182 [doi]
- DLGR: A Rule-Based Approach to Graph Replacement for Deep LearningEnze Ma. 183-188 [doi]
- Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution CoresYanzhao Wang, Fei Xie. 189-194 [doi]
- Extension-Compression Learning: A deep learning code search method that simulates reading habitsLian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong 0006. 195-200 [doi]