Default Cover Image

Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on

June 27 2011 to June 29 2011

Jeju Island, Korea

ISBN: 978-0-7695-4454-0

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-viii
Papers
Message from Steering Committee ChairsFreely available from IEEE.pp. ix
Papers
Message from General ChairsFreely available from IEEE.pp. x
Papers
Message from Program ChairsFreely available from IEEE.pp. xi
Papers
CommitteesFreely available from IEEE.pp. xii-xv
Papers
Additional ReviewersFreely available from IEEE.pp. xvi
Papers
Towards Denotational Semantics for Verilog in PVSFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Synthesizing SRN Models from System Operations with SysML Diagrams for Availability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 5-6
Papers
A Learning Environment for Software Security EducationFull-text access may be available. Sign in or learn about subscription options.pp. 7-8
Papers
Feedback-Directed Test Case Generation Based on UML Activity DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 9-10
Papers
Formal Approaches to Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Papers
Case Study on Installing a Porting Process for Embedded Operating System in a Small TeamFull-text access may be available. Sign in or learn about subscription options.pp. 19-25
Papers
Secure Machine Learning, a Brief OverviewFull-text access may be available. Sign in or learn about subscription options.pp. 26-29
Papers
Verifying the Safety of Xen Security ModulesFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Papers
Study on Formal Specification of Automatic Train Protection and Block System for Local LineFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Papers
Static Data Race Detection for Interrupt-Driven Embedded SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Papers
Approximate Simulation for Metric Hybrid Input/Output AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 53-59
Papers
An Instrumentation Tool for Program Dynamic Analysis in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
Papers
A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
Papers
Multi-layered Adaptive Monitoring in Service RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 76-83
Papers
Challenges in Automatic TestingFull-text access may be available. Sign in or learn about subscription options.pp. 84
Papers
A Reliability Model for Complex SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Papers
A Scalability Framework for Reliable ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Papers
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Papers
Approximating Quantified SMT-Solving with SATFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
Using a DSL and Fine-Grained Model Transformations to Explore the Boundaries of Model VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
Papers
Coping with Complexity of Testing Models for Real-Time Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
Enhancing Use Cases with Subjective Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Papers
A UML Model Based White Box Reliability Prediction to Identify Unreliable ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 152-159
Papers
An Embedded Operating System Design for the Lunar Exploration RoverFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Papers
Automatic Regression Test Selection Based on Activity DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
A Model for Usage-Based Testing of Event-Driven SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 172-178
Papers
A Modelling Framework to Support Internal ControlFull-text access may be available. Sign in or learn about subscription options.pp. 187-193
Papers
DRiVeR: Diagnosing Runtime Property Violations Based on Dependency RulesFull-text access may be available. Sign in or learn about subscription options.pp. 194-201
Papers
Invited Talk - Engineering Self-Healing and Self-Improving SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 207
Papers
Author IndexFreely available from IEEE.pp. 208-209
Papers
Publisher's InformationFreely available from IEEE.pp. 210
Showing 41 out of 41