Default Cover Image

Engineering of Complex Computer Systems, IEEE International Conference on

July 18 2012 to July 20 2012

Paris, France France

ISBN: 978-1-4673-2156-3

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-viii
Message from General ChairFreely available from IEEE.pp. ix-ix
Message from Program Co-chairsFreely available from IEEE.pp. x-x
Organizing CommitteeFreely available from IEEE.pp. xi-xi
Program CommitteeFreely available from IEEE.pp. xii-xiv
ReviewersFreely available from IEEE.pp. xv-xvii
Non-intrusive Repair of Reactive ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 3-12
Bridging the Gap between User Requirements and Configuration RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 13-22
An Experimental Study on Collaborative Filtering for Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 23-28
Analysis of Use Case Requirements Using SFTA and SFMEA TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 29-38
Control Systems: Phenomena and Structuring Functional Requirement DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Improving Hardware Reuse through XML-based Interface EncapsulationFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Models and Methodology for Automated Business Continuity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 57-64
Design Patterns for Rule-Based Refinement of Safety Critical Embedded Systems ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 67-76
Merging UML2 Composite Structures of Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 77-85
Systematic Scenario-Based Analysis of UML Design Class ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 86-95
Performance Analysis of Data Gathering Protocol Using PRISMFull-text access may be available. Sign in or learn about subscription options.pp. 96-105
An Interaction-Driven Approach to Identifying Functional Behaviors of Service Robot SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 109-118
Dhara: A Service Abstraction-Based OS Kernel Design ModelFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Spatio-temporal UML Statechart for Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 137-146
A Deep Investigation for QoS-based Feedback at Design Time and RuntimeFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
Self-Explanation in Adaptive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 157-166
Formal Analysis of Pervasive Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 169-178
P/S-CoM+: A Formal Approach to Design Correct Publish/Subscribe Architectural StylesFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
A Case Study in Formal System Engineering with SysMLFull-text access may be available. Sign in or learn about subscription options.pp. 189-198
Heterogeneous Aviation Safety Cases: Integrating the Formal and the Non-formalFull-text access may be available. Sign in or learn about subscription options.pp. 199-208
xBIL -- A Hardware Resource Oriented Binary Intermediate LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 211-219
Efficient Algorithms for T-way Test Sequence GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 220-229
Translating PDDL into CSP# - The PAT ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 240-249
Parameter Synthesis for Hierarchical Concurrent Real-Time SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 253-262
A Design by Contract Approach to Verify Access Control PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 263-272
A Control Theoretic Approach for Workflow ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 280-289
ORIENTAIS: Formal Verified OSEK/VDX Real-Time Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 293-301
ViTAL: A Verification Tool for EAST-ADL Models Using UPPAAL PORTFull-text access may be available. Sign in or learn about subscription options.pp. 328-337
Reasoning About Adaptivity of Agents and Multi-agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 341-350
Extending and Evaluating Agent-Based Models of Algorithmic Trading StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 351-360
SMURF: Supporting Multi-tenancy Using Re-aspects FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 361-370
Author indexFreely available from IEEE.pp. 371-372
[Publisher's information]Freely available from IEEE.pp. 374-374
Showing 49 out of 49