Abstract is missing.
- Metamorphic Relations Identification on Chebyshev Rational Approximation Method in the Nuclide Depletion Calculation ProgramMeng Li, Lijun Wang, ShiYu Yan, Xiaohua Yang, Jie Liu, Yapin Wan. 1-6 [doi]
- Online Prediction of Server Crash Based on Running DataZhuoliang Zou, Jun Ai. 7-14 [doi]
- Efficiency Metrics and Test Case Design for Test AutomationDavrondzhon Gafurov, Arne Erik Hurum. 15-23 [doi]
- Agent-Based Software Testing: A Definition and Systematic Mapping StudyPavithra Perumal Kumaresen, Mirgita Frasheri, Eduard Paul Enoiu. 24-31 [doi]
- Intelligent Radar Software Defect Prediction Approach and Its ApplicationXi Liu, Haifeng Li, Xuyang Xie. 32-37 [doi]
- Graph-based Vulnerability Detection via Extracting Features from Sliced CodePeng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong 0006. 38-45 [doi]
- Vulnerability Analysis through Interface-based Checker DesignXiang Du, Liangze Yin, Peng Wu, Liyuan Jia, Wei Dong 0006. 46-52 [doi]
- Coverage Guided Multiple Base Choice TestingTugkan Tuglular, Onur Leblebici. 53-60 [doi]
- Calculating Minimal Failure-causing Schema Based on Relational Tree Model MethodQian Ji, Chiya Xu, Ziyuan Wang. 61-64 [doi]
- UI Components Recognition System Based On Image UnderstandingXiaolei Sun, Tongyu Li, Jianfeng Xu. 65-71 [doi]
- Improving Spectrum-Based Fault Localization using quality assessment and optimization of a test suiteChang Liu, Chunyan Ma, Tao Zhang. 72-78 [doi]
- Parallel stratified random testing for concurrent programsCanh Minh Do, Kazuhiro Ogata 0001. 79-86 [doi]
- Trace-baed Error Prevention and Detection of Consistency Maintenance via Bidirectional Graph TransformationsSoichiro Hidaka. 87-90 [doi]
- Parallelizing Flow-Sensitive Demand-Driven Points-to AnalysisHaibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao. 91-97 [doi]
- Specification-based Test Case Generation with Constrained Genetic ProgrammingYuji Sato. 98-103 [doi]
- Range Partition Testing: Principle and TechniqueShaoying Liu. 104-107 [doi]
- Modeling and Analyzing Smart Contracts using Predicate Transition NetsXudong He. 108-115 [doi]
- Timely Publication of Transaction Records in a Private BlockchainRui Ming, Haiping Xu. 116-123 [doi]
- Blockchain-based Solutions for IoT: A Tertiary StudyQianwen Xu, Xiudi Chen, Shanshan Li, He Zhang, Muhammad Ali Babar, Nguyen Khoi Tran 0001. 124-131 [doi]
- Exchange of Preparatory Information for Secure and Usable Cryptocurrency TransactionsOliver Kattwinkel, Michael Rademacher. 132-139 [doi]
- Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network EdgeKonstantinos Papadakis-Vlachopapadopoulos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini-Eleni Tsiropoulou, Ioanna Roussaki, Symeon Papavassiliou. 140-147 [doi]
- Mining Power Misestimation in PoW BlockchainSang-Yoon Chang. 148-152 [doi]
- Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File SystemDongcheng Li, W. Eric Wong, Man Zhao, Qiang Hou. 153-159 [doi]
- A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice ChecksumSongpon Teerakanok, Hiroaki Yasuki, Tetsutaro Uehara. 160-167 [doi]
- STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoTTomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki. 168-175 [doi]
- Time-aware multi-resolutional approach to re-identifying location histories by using social networksTakuto Ohka, Shun Matsumoto, Masatsugu Ichino, Hiroshi Yoshiura. 176-183 [doi]
- Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other OrganizationsHaruki Kobayashi, Taiichi Saito, Ryôichi Sasaki. 184-189 [doi]
- Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance FunctionRyôichi Sasaki. 190-197 [doi]
- Evaluating Interaction Content in Online Learning Using Deep Learning for Quality ClassificationLei Wu, Di Wu. 198-203 [doi]
- SemOIR: An ontology-based semantic information retrieval systemMingwei Tang, Jiangping Chen, Haihua Chen. 204-208 [doi]
- Mining Author Identifiers for PubMed by Linking to Open Bibliographic DatabasesLi Zhang, Yong Huang 0008, Qikai Cheng, Wei Lu. 209-212 [doi]
- Result Diversification in Clinical Case Reports Retrieval based on Main FindingMengqi Luo, Fengchang Yu, Haihua Chen. 213-220 [doi]
- Survey of State-of-Art Autonomous Driving Technologies with Deep LearningYu Huang, Yue Chen. 221-228 [doi]
- Enable an Open Software Defined Mobility Ecosystem through VEC-OFSanchu Han, Yong He, Yin Ding. 229-236 [doi]
- Driver's Perception Model in Driving AssistRenzhi Tang, Zhihao Jiang. 237-240 [doi]
- A Study on Testing Autonomous Driving SystemsXudong Zhang, Yan Cai 0001, Zijiang Yang. 241-244 [doi]
- Interpretation Area-Guided Detection of Adversarial SamplesJiaLi Wei, Ming Fan, Xi Xu, Ang Jia, Zhou Xu, Lei Xue. 245-248 [doi]
- Formal Verification of CAN Bus in Cyber Physical SystemRui Wang, Yong Guan, Xiaojuan Li, Rui Zhang. 249-255 [doi]
- Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional NetworkChangbo Hou, Xuejiao Zhao, Yun Lin 0005. 256-263 [doi]
- Recent Trends in Software Quality Interrelationships: A Systematic Mapping StudyMichael Y. Shoga, Celia Chen, Barry W. Boehm. 264-271 [doi]
- Towards a Model of Testers' Cognitive Processes: Software Testing as a Problem Solving ApproachEduard Enoiu, Gerald Tukseferi, Robert Feldt. 272-279 [doi]
- Test Data Augmentation for Image Recognition SoftwarePu Wang, Zhiyi Zhang, YuQian Zhou, Zhiqiu Huang. 280-284 [doi]
- Boosting UI Rendering in Android ApplicationsSubrota Kumar Mondal, Yu Pei, Hong-Ning Dai, Hussain Mohammed Dipu Kabir, Jyoti Prakash Sahoo. 285-286 [doi]
- Optimal maintenance policy considering innovation replacementDi Wu, Rui Peng 0001, Shaomin Wu, Ye Ma, Yingchun Li. 287-290 [doi]
- Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural ProcessGuozhen Gao, Zijun Que, Zhengguo Xu. 291-296 [doi]
- An Overview of the EMUs Maintenance Scheduling in ChinaWenqiang Zheng, Taotao Zhou, Yan-fu Li. 297-300 [doi]
- A Model-based RCM Analysis MethodZhibao Mian, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Yaqing Gao. 301-307 [doi]
- Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic ApproachesHongwei Tao, Yixiang Chen, Hengyang Wu. 308-315 [doi]
- Resilience Evaluation of Complex Networks with Attack IntensityShu-Bin Si, Ning Wang. 316 [doi]
- Research on Safety Modeling and Analysis to the Task Process of Airborne Weather SystemHaotian Niu, Cunbao Ma, Pei Han, Siyuan Li, Qi Ma, Shenghui Zhang. 317-323 [doi]
- Reliability Analysis of Phased-Mission K-out-of-n Systems with Cascading EffectZhiqiang Cai, Mi Zhou, Shuai Zhang. 324-327 [doi]
- Selection of Network Feature Attribute Based On Classification Discrimination And Correlation AnalysisYang Liu, Hongwei Ma, Kuangdai Li, Hang Yi, Xiaotao Yan, Jian Kang. 328-333 [doi]
- An Operational Resilience Metric for Modern Power Distribution SystemsTyler Phillips, Timothy McJunkin, Craig Rieger, John Gardner, Hoda Mehrpouyan. 334-342 [doi]
- Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge DiscoveryXiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian. 343-349 [doi]
- Intelligence and Emotion Application Framework in Interactive Art DesignYihang Bo, Zuqiang Yi, Xi Chen. 350-357 [doi]
- The Optimal Inverter DC/AC Value Selection Method Based on Big Data TechnologyYing Wang, Yu Wang, Yongling Tan, Zhuojun Zhong, Mingli Zhang, Yixuan Zhang. 358-363 [doi]
- An Improved Comprehensive Evaluation Method for Software Development AbilityXiao Yu, Wenhong Liu, Jun Yang. 364-369 [doi]
- QMine: A Framework for Mining Quantitative Regular Expressions from System TracesPradeep K. Mahato, Apurva Narayan. 370-377 [doi]
- Application of Improved Fault Localization Method to Stereo Matching SoftwareJinfeng Li, Yan Zhang, Jilong Bian, Tiejun Li, Baoying Ma. 378-381 [doi]
- A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacksGodswill Lucky, Fred Jjunju, Alan Marshall. 382-389 [doi]
- Decision Network: a New Network-Based ClassifierYong Yu 0009, Ming Jing, Jie Li, Na Zhao, Jinzhuo Liu. 390-397 [doi]
- A Fusion of Java Domain Knowledge Base and Siamese Network for Java API RecommendationHao Li, Tao Li, Sheng Zhong, Yan Kang, Tie Chen. 398-405 [doi]
- +Gefei Zhang. 406-410 [doi]
- An MILP-NLP decomposition approach applied to a refinery scheduling problemQianqian Duan. 411-417 [doi]
- Construction of Knowledge Graph For Internal Control of Financial EnterprisesYingying Wang, Jun Zhao, Feng Li, Min Yu. 418-425 [doi]
- A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based SystemsCarl Wilhjelm, Awad A. Younis. 426-433 [doi]
- Design Method of Banquet Intelligent Side Dishes System Based on Data Mining and Correlation AnalysisXing Oiao, Jie Luo. 434-437 [doi]
- Research of Micro-expression Recognition Model based on Feature UnitFei Yin, Jinyi Xu, Yixiang Chen. 438-444 [doi]
- A general and efficient framework for improving Balanced Failure BiasingShijian Mao, Min Zhang, Jia Yan, Yao Chen. 445-450 [doi]
- Probabilistic Synthesis for Program with Non-API OperationsYating Zhang, Wei Dong, Daiyan Wang, Jiaxin Liu, Binbin Liu. 451-457 [doi]
- Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution NetworksChong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu. 458-464 [doi]
- Rchecker: A CBMC-based Data Race Detector for Interrupt-driven ProgramsHaining Feng, Liangze Yin, Wenfeng Lin, Xudong Zhao 0006, Wei Dong 0006. 465-471 [doi]
- Security Controller Synthesis for ROS-based RobotXudong Zhao 0006, Shaoxian Shu, Yutian Lan, Haining Feng, Wei Dong 0006. 472-477 [doi]
- An Empirical Study of Flight Control System Model Checking Integrated with FMEAXinyi Wang, Gaolei Yi, Yichen Wang. 478-484 [doi]
- Fuzzing of Mobile Application in the Banking Domain: a Case StudyMartin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk. 485-491 [doi]
- TTCN-3 based NG112 Test System and Playground for Emergency CommunicationRamon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi. 492-497 [doi]
- A simple, lightweight framework for testing RESTful services with TTCN-3Theofanis Vassiliou-Gioles. 498-505 [doi]
- A Performance Benchmarking Methodology for MQTT Broker ImplementationsIlie-Daniel Gheorghe-Pop, Alexander Kaiser, Axel Rennoch, Sascha Hackel. 506-513 [doi]
- Using TDL for Standardised Test Purpose DefinitionsPhilip Makedonski, Ilie-Daniel Gheorghe-Pop, Axel Rennoch, Finn Kristoffersen, Bostjan Pintar, Andreas Ulrich. 514-521 [doi]
- BIM Design for Reconstruction of Old Factory Building based on Sustainable PerspectiveQian Zhao. 522-526 [doi]
- Smart Scenic Area Construction Framework for Meeting Demands of Multiple Interests Based on Global Tourism Architecture: An Approach to Educating Smart Scenic Area Construction FrameworkLei Song, Sirirat Petsangsri. 527-534 [doi]
- Graphical Probability Model and Heritage Tourism Routine DesignFengbao Ma, Sicong Ma, Qinyun Liu. 535-541 [doi]
- Applying Mobile Technology for Developing Cultural and Creative Products in Tourism: A Case Study on The Forbidden CityLu Zhang, Chi Zhang, Meiyu Shi. 542-549 [doi]
- A Big Data based Decision Framework for Public Management and Service in TourismChi Zhang, Xiangjie Qiao, Xianfeng Chen. 550-555 [doi]
- Approaching Another Tourism RecommenderXianfeng Chen, Qing Liu, Xiangjie Qiao. 556-562 [doi]
- Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness ConcernChuan Zhao, Yan Song, Min Zuo. 563-570 [doi]
- Character-word Double-dimensional Semantic Classification Model for Judging Illegal and Irregular Behaviors for Internet Food SafetyMin Zuo, Si-Yu He, Qingchuan Zhang, Qing-Bang Wang. 571-577 [doi]
- Sustainable Food Supply Chain Management and Firm Performance: The Mediating Effect of Food Safety LevelJing Wang, Xiaoyue Yang, Chongchong Qu. 578-588 [doi]
- A Sentiment Classification Model Based on Bi-directional LSTM with Positional Attention for Fresh Food Consumer ReviewsTong-Qiang Jiang, Xue-Mei Xu, Qing-Chuan Zhang, Zheng Wang. 589-594 [doi]
- Research on Demand Analysis Model of Hot Product in Food IndustryHao Zhang, An Lin. 595-602 [doi]
- Smart Feeder Robot for Severely Disabled PatientsChihhsiong Shih, Quanen Lai, Huanran Ho, William Cheng-Chung Chu. 603-608 [doi]
- Best Seller Rank (BSR) to Sales: An empirical look at Amazon.comAmit Sharma, Hongrui Liu, Hongwei Liu. 609-615 [doi]
- Two Methods for Constructing Independent Spanning Trees in Alternating Group NetworksJie-Fu Huang, Sun-Yuan Hsieh. 616-621 [doi]
- Loop Destroying Algorithm for Generating Creative Solutions Applying in Health Care AreaFengbao Ma, Qinyun Liu, William Cheng-Chung Chu. 622-628 [doi]
- Microservices: architecture, container, and challengesGuozhi Liu, Bi Huang, Zhihong Liang, Minmin Qin, Hua Zhou, Zhang Li. 629-635 [doi]
- BCoV: a covergence of blockchain and IoVPenggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing. 636-643 [doi]
- Development of A Real 3D Display SystemChong Zeng, Weihua Li, Hualong Guo, Tung-Lung Wu, Dennis Bumsoo Kim. 644-649 [doi]
- A Creative Approach to Humour Degree Calculation for UtterancesTian Liu, Hongji Yang, Feng-Jian Wang. 650-656 [doi]
- Interactive Narrative Generation of Aesthetics of Violence in FilmsTao Ma, Hongwei Liu, Hongji Yang. 657-662 [doi]
- Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention UnderstandingJie Jian, Xiaotong Zhang, Ping Ma. 663-669 [doi]
- Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class ProblemsZhengkang Zuo, Yue Fang, Qing Huang, Yunyan Liao, Yuan Wang, Changjing Wang. 670-671 [doi]
- Towards Prioritizing Vulnerability TestingHalit Alptekin, Simge Demir, Sevval Simsek, Cemal Yilmaz. 672-673 [doi]
- Comprehensive Model-Driven Complexity Metrics for Software SystemsOmar Masmali, Omar Badreddin. 674-675 [doi]
- API Parameter Recommendations Made EffectiveWenhua Yang. 675-676 [doi]
- Effective Iterative Program Synthesis with Knowledge Searched from InternetJiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang. 678-679 [doi]
- Synthesized dataset for search-based test data generation methods focused on MC/DC criterionJán Cegin, Karol Rástocný, Mária Bieliková. 680-681 [doi]
- Reliability Evaluation for a Cloud Computer Network with Fog ComputingYi-Fan Chen, Ding-Hsiang Huang, Cheng-Fu Huang, Yi-Kuei Lin. 682-683 [doi]
- Black-Box Testing of Financial Virtual AssistantsIosif Itkin, Elena Treshcheva, Luba Konnova, Pavel Braslavski, Rostislav Yavorskiy. 684-685 [doi]
- Towards a Holistic Approach to Medical IoT ForensicsJigang Liu, Ryôichi Sasaki, Tetsutaro Uehara. 686-687 [doi]
- Reliability Service Assurance in Public Clouds based on BlockchainSa Meng, Liang Luo, Peng Sun, Yuan Gao. 688-689 [doi]
- Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge ComputingPenz Sun, Liang Luo, Shangxin Liu, Weifeng Wu. 690-691 [doi]