Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TASE
TASE 2015
Generate Citations
2015 International Symposium on Theoretical Aspects of Software Engineering (TASE)
Sept. 12 2015 to Sept. 14 2015
Nanjing, China
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vi
Message from the Program Committee Chairs
Freely available from IEEE.
pp. vii-vii
TASE 2015 Committees
Freely available from IEEE.
pp. viii-ix
List of additional reviewers
Freely available from IEEE.
pp. x-x
Modeling and Reasoning about Software Systems Containing Uncertainty and Variability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Marsha Chechik
On Various Abstract Understandings of Abstract Interpretation
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-3
by
Patrick Cousot
Event and strategy analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-6
by
Jin Song Dong
,
Jun Sun
,
Yang Liu
,
Yuan Fang Li
,
Jing Sun
,
Ling Shi
A Bottom-Up Approach to Check the Correctness of Interorganisational Workflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-14
by
Kais Klai
,
Hanen Ochi
A Framework for Off-Line Conformance Testing of Timed Connectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Shaodong Li
,
Xiaohong Chen
,
Yiwu Wang
,
Meng Sun
A SAT-Based Analysis of a Calculus for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Xi Wu
,
Hanne Riis Nielson
,
Huibiao Zhu
An Effective Approach to Measuring and Assessing the Risk of Android Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
Huikang Hao
,
Zhoujun Li
,
Haibo Yu
An Open Framework for Semantic Code Queries on Heterogeneous Repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-46
by
Tian Zhang
,
Minxue Pan
,
Jizhou Zhao
,
Yijun Yu
,
Xuandong Li
Evaluating Initial Inputs for Concolic Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Weiguang Wang
,
Qingkai Zeng
Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Conghua Zhou
,
Yong Wang
,
Meiling Cao
,
Jianqi Shi
,
Yang Liu
Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-70
by
Zhe Chen
,
Ou Wei
,
Zhiqiu Huang
,
Hongwei Xi
Formal Verification of PKMv3 Protocol Using DT-Spin
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-78
by
Xiaoran Zhu
,
Yuanmin Xu
,
Jian Guo
,
Xi Wu
,
Huibiao Zhu
,
Weikai Miao
Formal Verification of Plastic User Interfaces Exploiting Domain Ontologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Abdelkrim Chebieb
,
Yamine Ait-Ameur
Formally Modeling and Analyzing the Reliability of Composite Service Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
Guisheng Fan
,
Liqiong Chen
,
Huiqun Yu
,
Dongmei Liu
Polychronous Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Paul Le Guernic
,
Thierry Gautier
,
Jean-Pierre Talpin
,
Loic Besnard
QaSten: Integrating Quantitative Verification with Safety Analysis for AADL Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
Xiaomin Wei
,
Yunwei Dong
,
Hong Ye
Software Reliability Forecasting: Singular Spectrum Analysis and ARIMA Hybrid Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-118
by
Guoqiang Liu
,
Deping Zhang
,
Tingting Zhang
Verifying Interaction between Methods in Classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Tingting Hu
,
Shuling Wang
,
Zongyan Qiu
A Tool for Supporting Requirements Formalization Based on Specification Pattern Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-130
by
Weikai Miao
,
Xi Wang
,
Shaoying Liu
Modeling and Verification of Space-Air-Ground Integrated Networks on Requirement Level Using STeC
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-134
by
Zhihua Yang
,
Bo Xiao
,
Yixiang Chen
Probabilistic Model Checking of Pipe protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Kangli He
,
Min Zhang
,
Jia He
,
Yixiang Chen
Transferable Optimal-size Fair E-cash with Optimal Anonymity
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Jiangxiao Zhang
,
Lina Huo
,
Xia Liu
,
Chunrong Sui
,
Zhoujun Li
,
Jinxin Ma
Author Index
Freely available from IEEE.
pp. 143-143
[Publisher's information]
Freely available from IEEE.
pp. 144-144
Showing 31 out of 31