Abstract is missing.
- Probabilistic Programming With Coordination and CompensationJifeng He. 1 [doi]
- Security Engineering: Developments and DirectionsBhavani M. Thuraisingham. 2-3 [doi]
- Automatic Test Data Generation : Who, When and Where ?Jeff Offutt. 4 [doi]
- Reliability for Software-Based SystemsFrances Paulisch. 5 [doi]
- Complexity - Interoperability - Deployment of SoftwareRudolf Siebenhofer. 6 [doi]
- Automated Web Service Composition System on Enterprise Service BusXinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen. 9-13 [doi]
- Architectural Availability Analysis of Software Decomposition for Local RecoveryHichem Boudali, Hasan Sözer, Mariëlle Stoelinga. 14-22 [doi]
- Recursive Decomposition of Progress GraphsDavid A. Cape, Bruce M. McMillin, Benjamin W. Passer, Mayur Thakur. 23-31 [doi]
- CacheBit: A Multisource-Multitarget Cache Instrumentation ToolChao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan. 35-39 [doi]
- FiLM: A Runtime Monitoring Tool for Distributed SystemsFuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang. 40-46 [doi]
- Scheduling and Controlling Semantics for Distributed Resource Based Computing EnginesPradeep Varma, Vijay K. Naik. 47-56 [doi]
- A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender SystemsQiang Zhang, Yuan Luo, Chuliang Weng, Minglu Li. 59-64 [doi]
- Detection of Multiple-Duty-Related Security Leakage in Access Control PoliciesJeeHyun Hwang, Tao Xie, Vincent C. Hu. 65-74 [doi]
- A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and DefenseJin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien. 75-81 [doi]
- Verifying Aspect-Oriented Programs Using Open Temporal LogicJia Lv, Jing Ying, Minghui Wu, Tao Jiang, Fanwei Zhu. 85-92 [doi]
- Anchored Text for Software Weaving and MergingPradeep Varma. 93-100 [doi]
- A Classification of Aspect Composition ProblemsKun Tian, Kendra Cooper, Kang Zhang, Huiqun Yu. 101-109 [doi]
- Visualizing Multiple Program Executions to Assist Behavior VerificationChunying Zhao, Kang Zhang, Jie Hao, W. Eric Wong. 113-122 [doi]
- On the Verification of Strong Atomicity in Programs Using STMYong Li, Yu Zhang, Yiyun Chen, Ming Fu. 123-131 [doi]
- State Space Reduction for Verifying NoninterferenceConghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu. 132-138 [doi]
- An Analysis for Understanding Software Security Requirement MethodologiesJing Du, Ye Yang, Qing Wang. 141-149 [doi]
- A DSL Framework for Policy-Based Security of Distributed SystemsHédi Hamdi, Mohamed Mosbah. 150-158 [doi]
- Environmental Metrics for Software Security Based on a Vulnerability OntologyJu An Wang, Minzhe Guo, Hao Wang, Min Xia, Linfeng Zhou. 159-168 [doi]
- Performance Testing of Mobile Applications at the Unit Test LevelHeejin Kim, Byoungju Choi, W. Eric Wong. 171-180 [doi]
- Analyzing Relation between Software Architecture Testing Criteria on Test SequencesLijun Lun, Xuemei Ding. 181-186 [doi]
- Six-Sigma Based Performance Verification in Early Development of Automatic Test EquipmentMadhu Kilari, Qiyu Huang, Tongdan Jin. 187-192 [doi]
- A Graph-Model-Based Testing Method Compared with the Classification Tree Method for Test Case GenerationFevzi Belli, Axel Hollmann, Markus Kleinselbeck. 193-200 [doi]
- A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination SemanticsChunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang. 203-211 [doi]
- Software Reliability Prediction and Analysis Using Queueing Models with Multiple Change-PointsChin-Yu Huang, Tsui-Ying Hung, Chao Jung Hsu. 212-221 [doi]
- ReconBin: Reconstructing Binary File from Execution for Software AnalysisLingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu. 222-229 [doi]
- A Comparative Study of Forensic Science and Computer ForensicsRyan Q. Hankins, Tetsutaro Uehara, Jigang Liu. 230-239 [doi]
- Provable Secure AKA Scheme with Reliable Key Delegation in UMTSYu-Lun Huang, C. Y. Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin. 243-252 [doi]
- An Efficient and Secure Multi-secret Image Sharing Scheme with General Access StructureChing-Fan Lee, Justie Su-tzu Juan. 253-259 [doi]
- Efficient Multi-secret Sharing Scheme Using Room SquareMing-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan. 260-266 [doi]
- Checking Service Instance Protection for AMF ConfigurationsPejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi. 269-274 [doi]
- Security Variability Design and Analysis in an Aspect Oriented Software ArchitectureLirong Dai. 275-280 [doi]
- Test-Data Generation for Web Services Based on Contract MutationYing Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang. 281-286 [doi]
- A Turing Machine-Based Model for Computer Forensic ReconstructionRyan Q. Hankins, Tetsutaro Uehara, Jigang Liu. 289-290 [doi]
- Implementation of the Privacy Protection in Video Surveillance SystemHae-Min Moon, Sung Bum Pan. 291-292 [doi]
- An Approach to Improving Reliability for Distributed Video-Based Monitoring SystemsMichael Jiang, Yaping Liu, Xinzheng Gu. 293-294 [doi]
- Research and Evaluation on Modularity Modeling in Community Detecting of Complex Network Based on Information EntropyXiaolong Deng, Bai Wang, Bin Wu, Shengqi Yang. 297-302 [doi]
- Semantic ACP2P Information Retrieval MethodHaibo Yu, Tsunenori Mine, Makoto Amamiya. 303-308 [doi]
- A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based SimulationsDavid Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr. 309-314 [doi]
- Panel Description: Evolving Software Models for Global OrganizationsRajesh Subramanyan. 317 [doi]
- Message from T4CIA Workshop Co-chairsJun Pang, Bao Tang. 323 [doi]
- Systematic Cooperation between Industry and Universities Rudolf Siebenhofer. 324 [doi]
- Improving Test Quality by a Test Type Analysis Based MethodQin Liu, Wenqiang Zheng, Junfei Ma. 325-328 [doi]
- A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and NormalLili Diao, Hao Wang. 329-334 [doi]
- Adaptation Strategies for Performance Failure AvoindanceHong Sun, Vincenzo De Florio, Ning Gui, Raf Hens, Bert Vankeirsbilck, Bart Dhoedt, Chris Blondia. 337-341 [doi]
- Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field LocalityJohannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. 342-347 [doi]
- Generating Test Cases for Timed Systems from Controlled Natural Language SpecificationsMatthias Schnelte. 348-353 [doi]
- Automatic Test Data Generation for C ProgramsPrasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh. 359-368 [doi]
- Reliability Prediction of Web Service Composition Based on DTMCYingxin Ren, Qing Gu, Jingxian Qi, Daoxu Chen. 369-375 [doi]
- Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry ApplicationsBao Tang. 376 [doi]
- Temporal Specification and Deductive Verification of a Distributed Component Model and Its EnvironmentAlessandro Basso, Alexander Bolotov, Vladimir Getov. 379-386 [doi]
- Communication Sequence Graphs for Mutation-Oriented Integration TestingFevzi Belli, Axel Hollmann, Sascha Padberg. 387-392 [doi]
- Directed Acyclic Graph Modeling of Security Policies for Firewall TestingTugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli. 393-398 [doi]
- A New Method to Generate Attack GraphsAnmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen, Jian-bin Hu. 401-406 [doi]
- A Comparative Study of Access Control LanguagesSathish Pinagapani, Dianxiang Xu, Jun Kong. 407-412 [doi]
- JPEG 2000 and Digital Watermarking Technique Using in Medical ImageSung Jin Lim, Hae-Min Moon, Seung-Hoon Chae, Yongwha Chung, Sung Bum Pan. 413-416 [doi]
- A Developed Dynamic Environment Fault Injection Tool for Component Security TestingBinbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu. 417-422 [doi]
- Multidimensional Approach to Quality Analysis of IPSec and HTTPS ApplicationsMarcin Barylski, Henryk Krawczyk. 425-430 [doi]
- Extending Model Driven Architecture with Software Security AssessmentXucheng Tang, Beijun Shen. 436-441 [doi]
- Path-Based Approach to Integration TestingJueliang Hu, Zuohua Ding, Geguang Pu. 445-446 [doi]
- Simplifying Parametrization of Bayesian Networks in Prediction of System QualityAida Omerovic, Ketil Stølen. 447-448 [doi]
- Reliability Computing for Service CompositionZuohua Ding, Mingyue Jiang. 449-450 [doi]
- Improvement of QoS in Process Centric Software Development Using ANPAjit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma. 451-452 [doi]