Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SSIRI-C
SSIRI-C 2011
Generate Citations
Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on
June 27 2011 to June 29 2011
Jeju Island, Korea
ISBN: 978-0-7695-4454-0
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-viii
Papers
Message from Steering Committee Chairs
Freely available from IEEE.
pp. ix
Papers
Message from General Chairs
Freely available from IEEE.
pp. x
Papers
Message from Program Chairs
Freely available from IEEE.
pp. xi
Papers
Committees
Freely available from IEEE.
pp. xii-xv
Papers
Additional Reviewers
Freely available from IEEE.
pp. xvi
Papers
Towards Denotational Semantics for Verilog in PVS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Han Zhu
,
Huibiao Zhu
,
Si Liu
,
Jian Guo
Papers
Synthesizing SRN Models from System Operations with SysML Diagrams for Availability Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-6
by
Kumiko Tadano
,
Jianwen Xiang
,
Masahiro Kawato
,
Yoshiharu Maeno
Papers
A Learning Environment for Software Security Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-8
by
Atsuo Hazeyama
,
Hiroto Shimizu
Papers
Feedback-Directed Test Case Generation Based on UML Activity Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-10
by
Xin Chen
,
Nan Ye
,
Peng Jiang
,
Lei Bu
,
Xuandong Li
Papers
Formal Approaches to Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
Si Liu
,
Xiaofeng Wu
,
Qin Li
,
Huibiao Zhu
,
Qian Wang
Papers
Case Study on Installing a Porting Process for Embedded Operating System in a Small Team
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-25
by
DongSeok Cho
,
DooHwan Bae
Papers
Secure Machine Learning, a Brief Overview
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-29
by
Xiaofeng Liao
,
Liping Ding
,
Yongji Wang
Papers
Verifying the Safety of Xen Security Modules
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Wei Han
,
Yeping He
,
Liping Ding
Papers
Study on Formal Specification of Automatic Train Protection and Block System for Local Line
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Guo Xie
,
Akira Asano
,
Sei Takahashi
,
Hideo Nakamura
Papers
Static Data Race Detection for Interrupt-Driven Embedded Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Rui Chen
,
Xiangying Guo
,
Yonghao Duan
,
Bin Gu
,
Mengfei Yang
Papers
Approximate Simulation for Metric Hybrid Input/Output Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-59
by
Haiyu Pan
,
Min Zhang
,
Yixiang Chen
Papers
An Instrumentation Tool for Program Dynamic Analysis in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-67
by
Chen Huajie
,
Zhang Tian
,
Bu Lei
,
Li Xuandong
Papers
A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Sanghyun Yoon
,
Jaeyeon Jo
,
Junbeom Yoo
Papers
Multi-layered Adaptive Monitoring in Service Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-83
by
H. Kim
,
H. Yoon
,
Y. Cho
,
S. Park
,
Vijayan Sugumaran
Papers
Challenges in Automatic Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 84
by
Sunghun Kim
,
Ning Chen
Papers
A Reliability Model for Complex Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-94
by
Norm Schneidewind
,
Mike Hinchey
Papers
A Scalability Framework for Reliable Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Jae Yoo Lee
,
Soo Dong Kim
Papers
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Kenneth Kofi Fletcher
,
Xiaoqing (Frank) Liu
Papers
Approximating Quantified SMT-Solving with SAT
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Xianjin Fu
,
Wanwei Liu
,
Jing Li
Papers
Using a DSL and Fine-Grained Model Transformations to Explore the Boundaries of Model Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
M. F. van Amstel
,
M. G. J. van den Brand
,
L. J. P. Engelen
Papers
Coping with Complexity of Testing Models for Real-Time Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Ralf Mitsching
,
Carsten Weise
,
Dominik Franke
,
Thomas Gerlitz
,
Stefan Kowalewski
Papers
Enhancing Use Cases with Subjective Risk Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
O. T. Arogundade
,
Z. Jin
,
X. G. Yang
Papers
A UML Model Based White Box Reliability Prediction to Identify Unreliable Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-159
by
Daeeui Hong
,
Taewan Gu
,
Jongmoon Baik
Papers
An Embedded Operating System Design for the Lunar Exploration Rover
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Lei Qiao
,
Mengfei Yang
,
Bin Gu
,
Hua Yang
,
Bo Liu
Papers
Automatic Regression Test Selection Based on Activity Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Nan Ye
,
Xin Chen
,
Peng Jiang
,
Wenxu Ding
,
Xuandong Li
Papers
A Model for Usage-Based Testing of Event-Driven Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-178
by
Steffen Herbold
,
Jens Grabowski
,
Stephan Waack
Papers
A Modelling Framework to Support Internal Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-193
by
Takafumi Komoto
,
Kenji Taguchi
,
Haralambos Mouratidis
,
Nobukazu Yoshioka
,
Kokichi Futatsugi
Papers
DRiVeR: Diagnosing Runtime Property Violations Based on Dependency Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-201
by
Yanbin Liu
,
Ye Yang
,
Qiusong Yang
,
Mingshu Li
Papers
A SysML-Based Requirement Supporting Tool for Embedded Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-206
by
Chih-Hung Chang
,
Chih-Wei Lu
,
Kuo-Fong Kao
,
William C. Chu
,
Chao-Tung Yang
,
Nien-Lin Hsueh
,
Pao-Ann Hsiung
,
Chorng-Shiuh Koong
Papers
Invited Talk - Engineering Self-Healing and Self-Improving Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 207
by
David Garlan
Papers
Author Index
Freely available from IEEE.
pp. 208-209
Papers
Publisher's Information
Freely available from IEEE.
pp. 210
Showing 41 out of 41