Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICECCS
ICECCS 2015
Generate Citations
2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)
Dec. 9 2015 to Dec. 12 2015
Gold Coast, Australia
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vii
Preface
Freely available from IEEE.
pp. viii-viii
Organizing Committee
Freely available from IEEE.
pp. ix-ix
Program Committee
Freely available from IEEE.
pp. x-xi
Doctoral Symposium Program Committee
Freely available from IEEE.
pp. xii-xii
Additional reviewers
Freely available from IEEE.
pp. xiii-xiii
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xiv-xvi
Architecture Exploration of Real-Time Systems Based on Multi-objective Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Rahma Bouaziz
,
Laurent Lemarchand
,
Frank Singhoff
,
Bechir Zalila
,
Mohamed Jmaiel
Fitness Landscape Characterisation for Constrained Software Architecture Optimisation Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Aldeida Aleti
,
Irene Moser
Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES)
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Smail Rahmoun
,
Etienne Borde
,
Laurent Pautet
A Make/Buy/Reuse Feature Development Framework for Product Line Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-39
by
Juha Savolainen
,
Mike Mannion
Combining Software Metrics and Text Features for Vulnerable File Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-49
by
Yun Zhang
,
David Lo
,
Xin Xia
,
Bowen Xu
,
Jianling Sun
,
Shanping Li
Hardened Flow-Sensitive Trace Formula for Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-59
by
Si-Mohamed Lamraoui
,
Shin Nakajima
,
Hiroshi Hosobe
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-69
by
Guangdong Bai
,
Jun Sun
,
Jianliang Wu
,
Quanqi Ye
,
Li Li
,
Jin Song Dong
,
Shanqing Guo
Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-79
by
Mohamed Almorsy Abdelrazek
,
John Grundy
,
Amani S. Ibrahim
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-89
by
Byungho Min
,
Vijay Varadharajan
Formal Analysis of a Single Sign-On Protocol Implementation for Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-99
by
Quanqi Ye
,
Guangdong Bai
,
Kailong Wang
,
Jin Song Dong
GPU Accelerated On-the-Fly Reachability Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-109
by
Zhimin Wu
,
Yang Liu
,
Jun Sun
,
Jianqi Shi
,
Shengchao Qin
The Complexity of Deadline Analysis for Workflow Graphs with a Single Resource
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-119
by
Mirela Botezatu
,
Hagen Vöelzer
,
Lothar Thiele
Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-129
by
David Sanán
,
Liu Yang
,
Zhao Yongwang
,
Xing Zhenchang
,
Mike Hinchey
Formal Development of a Real-Time Operating System Memory Manager
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-139
by
Wen Su
,
Jean-Raymond Abrial
,
Geguang Pu
,
Bin Fang
Towards a Session Logic for Communication Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-149
by
Florin Craciun
,
Tibor Kiss
,
Andreea Costea
A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-159
by
Qin Li
,
Jinxun Wang
,
Qiwen Xu
,
Yanhong Huang
,
Huibiao Zhu
Probabilistic Denotational Semantics for an Interrupt Modelling Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-169
by
Yanhong Huang
,
Yongxin Zhao
,
Shengchao Qin
,
Jifeng He
Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Roopak Sinha
SeBip: A Symbolic Executor for BIP
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Wang Qiang
,
Simon Bliudze
Improved Recovery for Proactive, Distributed Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-181
by
Mojgan Kamali
,
Luigia Petre
Sports Strategy Analytics Using Probabilistic Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Jin Song Dong
,
Ling Shi
,
Le Vu Nguyen Chuong
,
Kan Jiang
,
Jing Sun
Web Application Architecture Security Evaluation Method Based on AADL
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Shaoguang Geng
,
Xiaohong Li
,
Zhiyong Feng
,
Dazhi Sun
Security Concepts as Add-On for Process Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Jacob Geisel
,
Brahim Hamid
,
Jean-Michel Bruel
Semantic Network Model: A Reasoning Engine for Software Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-197
by
Kushal Ahmed
,
Lian Wen
,
Abdul Sattar
,
Reza Farid
Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-201
by
Roopak Sinha
,
Cheng Pang
,
Gerardo Santillán Martínez
,
Juha Kuronen
,
Valeriy Vyatkin
Formal Certification of Non-interferent Android Bytecode (DEX Bytecode)
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Hendra Gunadi
Comparing Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Mojgan Kamali
,
Luigia Petre
Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium)
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Zhimin Wu
Analyzing Security Property of Android Application Implementation Using Formal Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
Quanqi Ye
An Invariant Inference Framework by Active Learning and SVMs
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Li Jiaying
Author index
Freely available from IEEE.
pp. 222-222
[Publisher's information]
Freely available from IEEE.
pp. 224-224
Showing 42 out of 42