default search action
20th QRS 2020: Macau, SAR, China - Companion
- 20th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2020, Macau, China, December 11-14, 2020. IEEE 2020, ISBN 978-1-7281-8915-4
- Meng Li, Lijun Wang, Shiyu Yan, Xiaohua Yang, Jie Liu, Yaping Wan:
Metamorphic Relations Identification on Chebyshev Rational Approximation Method in the Nuclide Depletion Calculation Program. 1-6 - Zhuoliang Zou, Jun Ai:
Online Prediction of Server Crash Based on Running Data. 7-14 - Davrondzhon Gafurov, Arne Erik Hurum:
Efficiency Metrics and Test Case Design for Test Automation. 15-23 - Pavithra Perumal Kumaresen, Mirgita Frasheri, Eduard Paul Enoiu:
Agent-Based Software Testing: A Definition and Systematic Mapping Study. 24-31 - Xi Liu, Haifeng Li, Xuyang Xie:
Intelligent Radar Software Defect Prediction Approach and Its Application. 32-37 - Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong:
Graph-based Vulnerability Detection via Extracting Features from Sliced Code. 38-45 - Xiang Du, Liangze Yin, Peng Wu, Liyuan Jia, Wei Dong:
Vulnerability Analysis through Interface-based Checker Design. 46-52 - Tugkan Tuglular, Onur Leblebici:
Coverage Guided Multiple Base Choice Testing. 53-60 - Qian Ji, Chiya Xu, Ziyuan Wang:
Calculating Minimal Failure-causing Schema Based on Relational Tree Model Method. 61-64 - Xiaolei Sun, Tongyu Li, Jianfeng Xu:
UI Components Recognition System Based On Image Understanding. 65-71 - Chang Liu, Chunyan Ma, Tao Zhang:
Improving Spectrum-Based Fault Localization using quality assessment and optimization of a test suite. 72-78 - Canh Minh Do, Kazuhiro Ogata:
Parallel stratified random testing for concurrent programs. 79-86 - Soichiro Hidaka:
Trace-baed Error Prevention and Detection of Consistency Maintenance via Bidirectional Graph Transformations. 87-90 - Haibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao:
Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis. 91-97 - Yuji Sato:
Specification-based Test Case Generation with Constrained Genetic Programming. 98-103 - Shaoying Liu:
Range Partition Testing: Principle and Technique. 104-107 - Xudong He:
Modeling and Analyzing Smart Contracts using Predicate Transition Nets. 108-115 - Rui Ming, Haiping Xu:
Timely Publication of Transaction Records in a Private Blockchain. 116-123 - Qianwen Xu, Xiudi Chen, Shanshan Li, He Zhang, Muhammad Ali Babar, Nguyen Khoi Tran:
Blockchain-based Solutions for IoT: A Tertiary Study. 124-131 - Oliver Kattwinkel, Michael Rademacher:
Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions. 132-139 - Konstantinos Papadakis-Vlachopapadopoulos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini-Eleni Tsiropoulou, Ioanna Roussaki, Symeon Papavassiliou:
Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network Edge. 140-147 - Sang-Yoon Chang:
Mining Power Misestimation in PoW Blockchain. 148-152 - Dongcheng Li, W. Eric Wong, Man Zhao, Qiang Hou:
Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System. 153-159 - Songpon Teerakanok, Hiroaki Yasuki, Tetsutaro Uehara:
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum. 160-167 - Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. 168-175 - Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, Hiroshi Yoshiura:
Time-aware multi-resolutional approach to re-identifying location histories by using social networks. 176-183 - Haruki Kobayashi, Taiichi Saito, Ryôichi Sasaki:
Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations. 184-189 - Ryôichi Sasaki:
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function. 190-197 - Lei Wu, Di Wu:
Evaluating Interaction Content in Online Learning Using Deep Learning for Quality Classification. 198-203 - Mingwei Tang, Jiangping Chen, Haihua Chen:
SemOIR: An ontology-based semantic information retrieval system. 204-208 - Li Zhang, Yong Huang, Qikai Cheng, Wei Lu:
Mining Author Identifiers for PubMed by Linking to Open Bibliographic Databases. 209-212 - Mengqi Luo, Fengchang Yu, Haihua Chen:
Result Diversification in Clinical Case Reports Retrieval based on Main Finding. 213-220 - Yu Huang, Yue Chen:
Survey of State-of-Art Autonomous Driving Technologies with Deep Learning. 221-228 - Sanchu Han, Yong He, Yin Ding:
Enable an Open Software Defined Mobility Ecosystem through VEC-OF. 229-236 - Renzhi Tang, Zhihao Jiang:
Driver's Perception Model in Driving Assist. 237-240 - Xudong Zhang, Yan Cai, Zijiang Yang:
A Study on Testing Autonomous Driving Systems. 241-244 - Jiali Wei, Ming Fan, Xi Xu, Ang Jia, Zhou Xu, Lei Xue:
Interpretation Area-Guided Detection of Adversarial Samples. 245-248 - Rui Wang, Yong Guan, Xiaojuan Li, Rui Zhang:
Formal Verification of CAN Bus in Cyber Physical System. 249-255 - Changbo Hou, Xuejiao Zhao, Yun Lin:
Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional Network. 256-263 - Michael Y. Shoga, Celia Chen, Barry W. Boehm:
Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study. 264-271 - Eduard Enoiu, Gerald Tukseferi, Robert Feldt:
Towards a Model of Testers' Cognitive Processes: Software Testing as a Problem Solving Approach. 272-279 - Pu Wang, Zhiyi Zhang, Yuqian Zhou, Zhiqiu Huang:
Test Data Augmentation for Image Recognition Software. 280-284 - Subrota Kumar Mondal, Yu Pei, Hong-Ning Dai, Hussain Mohammed Dipu Kabir, Jyoti Prakash Sahoo:
Boosting UI Rendering in Android Applications. 285-286 - Di Wu, Rui Peng, Shaomin Wu, Ye Ma, Yingchun Li:
Optimal maintenance policy considering innovation replacement. 287-290 - Guozhen Gao, Zijun Que, Zhengguo Xu:
Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural Process. 291-296 - Wenqiang Zheng, Taotao Zhou, Yan-Fu Li:
An Overview of the EMUs Maintenance Scheduling in China. 297-300 - Zhibao Mian, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Yaqing Gao:
A Model-based RCM Analysis Method. 301-307 - Hongwei Tao, Yixiang Chen, Hengyang Wu:
Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches. 308-315 - Shubin Si, Ning Wang:
Resilience Evaluation of Complex Networks with Attack Intensity. 316 - Haotian Niu, Cunbao Ma, Pei Han, Siyuan Li, Qi Ma, Shenghui Zhang:
Research on Safety Modeling and Analysis to the Task Process of Airborne Weather System. 317-323 - Zhiqiang Cai, Mi Zhou, Shuai Zhang:
Reliability Analysis of Phased-Mission K-out-of-n Systems with Cascading Effect. 324-327 - Yang Liu, Hongwei Ma, Kuangdai Li, Hang Yi, Xiaotao Yan, Jian Kang:
Selection of Network Feature Attribute Based On Classification Discrimination And Correlation Analysis. 328-333 - Tyler Phillips, Timothy McJunkin, Craig Rieger, John Gardner, Hoda Mehrpouyan:
An Operational Resilience Metric for Modern Power Distribution Systems. 334-342 - Xiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian:
Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery. 343-349 - Yihang Bo, Zuqiang Yi, Xi Chen:
Intelligence and Emotion Application Framework in Interactive Art Design. 350-357 - Ying Wang, Yu Wang, Yongling Tan, Zhuojun Zhong, Mingli Zhang, Yixuan Zhang:
The Optimal Inverter DC/AC Value Selection Method Based on Big Data Technology. 358-363 - Xiao Yu, Wenhong Liu, Jun Yang:
An Improved Comprehensive Evaluation Method for Software Development Ability. 364-369 - Pradeep K. Mahato, Apurva Narayan:
QMine: A Framework for Mining Quantitative Regular Expressions from System Traces. 370-377 - Jinfeng Li, Yan Zhang, Jilong Bian, Tiejun Li, Baoying Ma:
Application of Improved Fault Localization Method to Stereo Matching Software. 378-381 - Godswill Lucky, Fred P. Jjunju, Alan Marshall:
A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks. 382-389 - Yong Yu, Ming Jing, Jie Li, Na Zhao, Jinzhuo Liu:
Decision Network: a New Network-Based Classifier. 390-397 - Hao Li, Tao Li, Sheng Zhong, Yan Kang, Tie Chen:
A Fusion of Java Domain Knowledge Base and Siamese Network for Java API Recommendation. 398-405 - Gefei Zhang:
Specifying and Model Checking Workflows of Single Page Applications with TLA+. 406-410 - Qianqian Duan:
An MILP-NLP decomposition approach applied to a refinery scheduling problem. 411-417 - Yingying Wang, Jun Zhao, Feng Li, Min Yu:
Construction of Knowledge Graph For Internal Control of Financial Enterprises. 418-425 - Carl Wilhjelm, Awad A. Younis:
A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems. 426-433 - Xing Oiao, Jie Luo:
Design Method of Banquet Intelligent Side Dishes System Based on Data Mining and Correlation Analysis. 434-437 - Fei Yin, Jinyi Xu, Yixiang Chen:
Research of Micro-expression Recognition Model based on Feature Unit. 438-444 - Shijian Mao, Min Zhang, Jia Yan, Yao Chen:
A general and efficient framework for improving Balanced Failure Biasing. 445-450 - Yating Zhang, Wei Dong, Daiyan Wang, Jiaxin Liu, Binbin Liu:
Probabilistic Synthesis for Program with Non-API Operations. 451-457 - Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu:
Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution Networks. 458-464 - Haining Feng, Liangze Yin, Wenfeng Lin, Xudong Zhao, Wei Dong:
Rchecker: A CBMC-based Data Race Detector for Interrupt-driven Programs. 465-471 - Xudong Zhao, Shaoxian Shu, Yutian Lan, Haining Feng, Wei Dong:
Security Controller Synthesis for ROS-based Robot. 472-477 - Xinyi Wang, Gaolei Yi, Yichen Wang:
An Empirical Study of Flight Control System Model Checking Integrated with FMEA. 478-484 - Martin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk:
Fuzzing of Mobile Application in the Banking Domain: a Case Study. 485-491 - Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi:
TTCN-3 based NG112 Test System and Playground for Emergency Communication. 492-497 - Theofanis Vassiliou-Gioles:
A simple, lightweight framework for testing RESTful services with TTCN-3. 498-505 - Ilie-Daniel Gheorghe-Pop, Alexander Kaiser, Axel Rennoch, Sascha Hackel:
A Performance Benchmarking Methodology for MQTT Broker Implementations. 506-513 - Philip Makedonski, Ilie-Daniel Gheorghe-Pop, Axel Rennoch, Finn Kristoffersen, Bostjan Pintar, Andreas Ulrich:
Using TDL for Standardised Test Purpose Definitions. 514-521 - Qian Zhao:
BIM Design for Reconstruction of Old Factory Building based on Sustainable Perspective. 522-526 - Lei Song, Sirirat Petsangsri:
Smart Scenic Area Construction Framework for Meeting Demands of Multiple Interests Based on Global Tourism Architecture: An Approach to Educating Smart Scenic Area Construction Framework. 527-534 - Fengbao Ma, Sicong Ma, Qinyun Liu:
Graphical Probability Model and Heritage Tourism Routine Design. 535-541 - Lu Zhang, Chi Zhang, Meiyu Shi:
Applying Mobile Technology for Developing Cultural and Creative Products in Tourism: A Case Study on The Forbidden City. 542-549 - Chi Zhang, Xiangjie Qiao, Xianfeng Chen:
A Big Data based Decision Framework for Public Management and Service in Tourism. 550-555 - Xianfeng Chen, Qing Liu, Xiangjie Qiao:
Approaching Another Tourism Recommender. 556-562 - Chuan Zhao, Yan Song, Min Zuo:
Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern. 563-570 - Min Zuo, Si-Yu He, Qingchuan Zhang, Qing-Bang Wang:
Character-word Double-dimensional Semantic Classification Model for Judging Illegal and Irregular Behaviors for Internet Food Safety. 571-577 - Jing Wang, Xiaoyue Yang, Chongchong Qu:
Sustainable Food Supply Chain Management and Firm Performance: The Mediating Effect of Food Safety Level. 578-588 - Tong-Qiang Jiang, Xue-Mei Xu, Qing-Chuan Zhang, Zheng Wang:
A Sentiment Classification Model Based on Bi-directional LSTM with Positional Attention for Fresh Food Consumer Reviews. 589-594 - Hao Zhang, An Lin:
Research on Demand Analysis Model of Hot Product in Food Industry. 595-602 - Chihhsiong Shih, Quanen Lai, Huanran Ho, William Cheng-Chung Chu:
Smart Feeder Robot for Severely Disabled Patients. 603-608 - Amit Sharma, Hongrui Liu, Hongwei Liu:
Best Seller Rank (BSR) to Sales: An empirical look at Amazon.com. 609-615 - Jie-Fu Huang, Sun-Yuan Hsieh:
Two Methods for Constructing Independent Spanning Trees in Alternating Group Networks. 616-621 - Fengbao Ma, Qinyun Liu, William Cheng-Chung Chu:
Loop Destroying Algorithm for Generating Creative Solutions Applying in Health Care Area. 622-628 - Guozhi Liu, Bi Huang, Zhihong Liang, Minmin Qin, Hua Zhou, Zhang Li:
Microservices: architecture, container, and challenges. 629-635 - Penggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing:
BCoV: a covergence of blockchain and IoV. 636-643 - Chong Zeng, Weihua Li, Hualong Guo, Tung-Lung Wu, Dennis Bumsoo Kim:
Development of A Real 3D Display System. 644-649 - Tian Liu, Hongji Yang, Feng-Jian Wang:
A Creative Approach to Humour Degree Calculation for Utterances. 650-656 - Tao Ma, Hongwei Liu, Hongji Yang:
Interactive Narrative Generation of Aesthetics of Violence in Films. 657-662 - Jie Jian, Xiaotong Zhang, Ping Ma:
Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding. 663-669 - Zhengkang Zuo, Yue Fang, Qing Huang, Yunyan Liao, Yuan Wang, Changjing Wang:
Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems. 670-671 - Halit Alptekin, Simge Demir, Sevval Simsek, Cemal Yilmaz:
Towards Prioritizing Vulnerability Testing. 672-673 - Omar Masmali, Omar Badreddin:
Comprehensive Model-Driven Complexity Metrics for Software Systems. 674-675 - Wenhua Yang:
API Parameter Recommendations Made Effective. 675-676 - Jiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang:
Effective Iterative Program Synthesis with Knowledge Searched from Internet. 678-679 - Ján Cegin, Karol Rástocný, Mária Bieliková:
Synthesized dataset for search-based test data generation methods focused on MC/DC criterion. 680-681 - Yi-Fan Chen, Ding-Hsiang Huang, Cheng-Fu Huang, Yi-Kuei Lin:
Reliability Evaluation for a Cloud Computer Network with Fog Computing. 682-683 - Iosif Itkin, Elena Treshcheva, Luba Konnova, Pavel Braslavski, Rostislav Yavorskiy:
Black-Box Testing of Financial Virtual Assistants. 684-685 - Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
Towards a Holistic Approach to Medical IoT Forensics. 686-687 - Sa Meng, Liang Luo, Peng Sun, Yuan Gao:
Reliability Service Assurance in Public Clouds based on Blockchain. 688-689 - Peng Sun, Liang Luo, Shangxin Liu, Weifeng Wu:
Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing. 690-691
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.