Abstract is missing.
- DashChef: A Metric Recommendation Service for Online Systems Using Graph LearningZilong He, Tao Huang 0021, Pengfei Chen 0002, Ruipeng Li, Rui Wang, Zibin Zheng. 3-22 [doi]
- SC-WGAN: GAN-Based Oversampling Method for Network Intrusion DetectionWuxia Bai, Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, Ning Zhang. 23-42 [doi]
- Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An Experience ReportHao Xu, Souheib Baarir, Tewfik Ziadi, Siham Essodaigui, Yves Bossu. 43-63 [doi]
- Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound VerificationXiaoyong Xue, Meng Sun 0002. 67-87 [doi]
- AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron ImportanceFei Zheng, Qingguo Xu, Zhou Lei, Huaikou Miao. 88-107 [doi]
- Word2Vec-BERT-bmu:Classification of RISC-V Architecture Software Package Build FailuresShitian Ma, Hui Li, Jiaxin Zhu, Xiaohui He, Shuyang Zhang, Junfeng Zeng. 111-124 [doi]
- Test Architecture Generation by Leveraging BERT and Control and Data FlowsGuangyu Wang, Ji Wu 0003, Haiyan Yang, Qing Sun 0004, Tao Yue 0002. 125-145 [doi]
- Less is More: An Empirical Study of Undersampling Techniques for Technical Debt PredictionGichan Lee, Scott Uk-Jin Lee. 146-156 [doi]
- Modeling and Verification of Solidity Smart Contracts with the B MethodFayçal Baba, Amel Mammar, Marc Frappier, Régine Laleau. 159-178 [doi]
- Template-Based Smart Contract Verification: A Case Study on Maritime Transportation DomainXufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, Wenhui Zhang. 179-198 [doi]
- QuanSafe: A DTBN-Based Framework of Quantitative Safety Analysis for AADL ModelsYiwei Zhu, Jing Liu 0012, Haiying Sun, Wei Yin, Jiexiang Kang. 201-222 [doi]
- A Event-B-Based Approach for Schedulability Analysis For Real-Time Scheduling Algorithms through Deadlock DetectionJiale Quan, Qin Li 0002. 223-244 [doi]
- Validation of RailML Using ProBJan Gruteser, Michael Leuschel. 245-256 [doi]
- Reachability Analysis of Concurrent Self-modifying CodeWalid Messahel, Tayssir Touili. 257-271 [doi]
- An Iterative Formal Model-Driven Approach to Railway Systems ValidationAsfand Yar, Akram Idani, Yves Ledru, Simon Collart Dutilleul, Amel Mammar, Germán Vega. 272-289 [doi]
- An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic ControlFang Qi, Rui Wang 0024, Yong Guan, Xiaoyu Song. 290-300 [doi]
- Confidentiality Management in Complex Systems DesignMichel Bourdellès, Jamal El Hachem, Salah Sadou. 303-322 [doi]
- Analyzing Excessive Permission Requests in Google Workspace Add-OnsLiuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang 0001. 323-345 [doi]
- Formal Verification Techniques for Post-quantum Cryptography: A Systematic ReviewYuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou, Dongxi Liu. 346-366 [doi]
- AutoWeb: Automatically Inferring Web Framework Semantics via Configuration MutationHaining Meng, Haofeng Li, Jie Lu 0009, Chenghang Shi, Liqing Cao, Lian Li 0002, Lin Gao 0002. 369-389 [doi]
- SafePtrX: Research on Mitigation of Heap-Based Memory Safety Violations for Intel x86-64LiLie Chen, Junyu Wu, Yuan Liu 0021. 390-408 [doi]
- Towards Efficiently Parallelizing Patch-Space Exploration in Automated Program RepairOmar I. Al-Bataineh. 409-419 [doi]