default search action
26th ICECCS 2022: Hiroshima, Japan
- 26th International Conference on Engineering of Complex Computer Systems, ICECCS 2022, Hiroshima, Japan, March 26-30, 2022. IEEE 2022, ISBN 978-1-6654-0162-3
- Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, Antoine Beugnard:
HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification. 1-6 - Jaime Arias, Laure Petrucci, Lukasz Masko, Wojciech Penczek, Teofil Sidoruk:
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees. 1-10 - Guanhong Chen, Shuang Liu:
Reducing Malware labeling Efforts Through Efficient Prototype Selection. 17-22 - Matteo Basso, Filippo Schiavio, Andrea Rosà, Walter Binder:
Optimizing Parallel Java Streams. 23-32 - Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi:
Parameterized Design and Formal Verification of Multi-ported Memory. 33-41 - Sree Ram Boyapati, Claudia Szabo:
Self-adaptation in Microservice Architectures: A Case Study. 42-51 - Xinyue Li, Wu Chen:
Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments. 52-61 - Camille Coti, Laure Petrucci, Daniel Alberto Torres González:
A Formal Model for Fault Tolerant Parallel Matrix Factorization. 62-70 - Peter Riviere, Neeraj Kumar Singh, Yamine Aït Ameur:
EB4EB: A Framework for Reflexive Event-B. 71-80 - Yepeng Ding, Hiroyuki Sato:
Formalism- Driven Development of Decentralized Systems. 81-90 - Meryem Afendi, Amel Mammar, Régine Laleau:
Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study. 91-96 - Wenhui Zhang, Ya Gao:
A Bounded Semantics for Improving the Efficiency of Bounded Model Checking. 97-106 - Sami Evangelista, Laure Petrucci, Lars Michael Kristensen:
Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks. 107-116 - Zhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza:
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks. 117-122 - Ran Li, Huibiao Zhu, Richard Banach:
Denotational and Algebraic Semantics for Cyber-physical Systems. 123-132 - Jiaqi Yin, Huibiao Zhu:
The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing. 133-142 - Eduardo Rosales, Andrea Rosà, Matteo Basso, Alex Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder:
Characterizing Java Streams in the Wild. 143-152 - Cong Zhou, Li Kuang:
Combining Global and Local Representations of Source Code for Method Naming. 153-161 - Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang:
Parameter Sensitive Pointer Analysis for Java. 162-167 - Weilin Wu, Na Wang, Yixiang Chen:
A Novel Intelligent-Building-Fire-Risk Classification Method. 168-172 - Penglong Chen, Zhen Li, Yu Wen, Lili Liu:
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations. 173-182 - Enze Ma:
DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning. 183-188 - Yanzhao Wang, Fei Xie:
Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores. 189-194 - Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong:
Extension-Compression Learning: A deep learning code search method that simulates reading habits. 195-200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.