Default Cover Image

2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)

Dec. 9 2015 to Dec. 12 2015

Gold Coast, Australia

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-vii
PrefaceFreely available from IEEE.pp. viii-viii
Organizing CommitteeFreely available from IEEE.pp. ix-ix
Program CommitteeFreely available from IEEE.pp. x-xi
Doctoral Symposium Program CommitteeFreely available from IEEE.pp. xii-xii
Additional reviewersFreely available from IEEE.pp. xiii-xiii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xiv-xvi
Fitness Landscape Characterisation for Constrained Software Architecture Optimisation ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES)Full-text access may be available. Sign in or learn about subscription options.pp. 21-30
A Make/Buy/Reuse Feature Development Framework for Product Line EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 31-39
Combining Software Metrics and Text Features for Vulnerable File PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 40-49
Hardened Flow-Sensitive Trace Formula for Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 50-59
Improving Tenants' Trust in SaaS Applications Using Dynamic Security MonitorsFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)Full-text access may be available. Sign in or learn about subscription options.pp. 80-89
Formal Analysis of a Single Sign-On Protocol Implementation for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 90-99
GPU Accelerated On-the-Fly Reachability CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 100-109
The Complexity of Deadline Analysis for Workflow Graphs with a Single ResourceFull-text access may be available. Sign in or learn about subscription options.pp. 110-119
Formal Development of a Real-Time Operating System Memory ManagerFull-text access may be available. Sign in or learn about subscription options.pp. 130-139
Towards a Session Logic for Communication ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 140-149
A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 150-159
Probabilistic Denotational Semantics for an Interrupt Modelling LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 160-169
Conversing at Many Layers: Multi-layer System-on-Chip Protocol ConversionFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
SeBip: A Symbolic Executor for BIPFull-text access may be available. Sign in or learn about subscription options.pp. 174-177
Improved Recovery for Proactive, Distributed RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 178-181
Sports Strategy Analytics Using Probabilistic ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
Web Application Architecture Security Evaluation Method Based on AADLFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Security Concepts as Add-On for Process ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 190-193
Semantic Network Model: A Reasoning Engine for Software RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 194-197
Formal Certification of Non-interferent Android Bytecode (DEX Bytecode)Full-text access may be available. Sign in or learn about subscription options.pp. 202-205
Comparing Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium)Full-text access may be available. Sign in or learn about subscription options.pp. 210-213
Analyzing Security Property of Android Application Implementation Using Formal MethodFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
An Invariant Inference Framework by Active Learning and SVMsFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Author indexFreely available from IEEE.pp. 222-222
[Publisher's information]Freely available from IEEE.pp. 224-224
Showing 42 out of 42