default search action
28th ICECCS 2024: Limassol, Cyprus
- Guangdong Bai
, Fuyuki Ishikawa
, Yamine Aït-Ameur
, George A. Papadopoulos
:
Engineering of Complex Computer Systems - 28th International Conference, ICECCS 2024, Limassol, Cyprus, June 19-21, 2024, Proceedings. Lecture Notes in Computer Science 14784, Springer 2025, ISBN 978-3-031-66455-7
Machine Learning and Complex Systems
- Zilong He, Tao Huang, Pengfei Chen, Ruipeng Li, Rui Wang, Zibin Zheng:
DashChef: A Metric Recommendation Service for Online Systems Using Graph Learning. 3-22 - Wuxia Bai, Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, Ning Zhang:
SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection. 23-42 - Hao Xu
, Souheib Baarir
, Tewfik Ziadi
, Siham Essodaigui
, Yves Bossu
:
Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An Experience Report. 43-63
Neural Network Verification
- Xiaoyong Xue
, Meng Sun
:
Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification. 67-87 - Fei Zheng, Qingguo Xu, Zhou Lei, Huaikou Miao:
AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance. 88-107
A.I. for Software Engineering
- Shitian Ma, Hui Li, Jiaxin Zhu, Xiaohui He, Shuyang Zhang, Junfeng Zeng:
Word2Vec-BERT-bmu:Classification of RISC-V Architecture Software Package Build Failures. 111-124 - Guangyu Wang, Ji Wu, Haiyan Yang, Qing Sun, Tao Yue
:
Test Architecture Generation by Leveraging BERT and Control and Data Flows. 125-145 - Gichan Lee
, Scott Uk-Jin Lee
:
Less is More: An Empirical Study of Undersampling Techniques for Technical Debt Prediction. 146-156
Smart Contract
- Fayçal Baba
, Amel Mammar
, Marc Frappier
, Régine Laleau
:
Modeling and Verification of Solidity Smart Contracts with the B Method. 159-178 - Xufeng Zhao, Qiuyang Wei, Xue-Yang Zhu
, Wenhui Zhang:
Template-Based Smart Contract Verification: A Case Study on Maritime Transportation Domain. 179-198
Formal Methods
- Yiwei Zhu, Jing Liu, Haiying Sun, Wei Yin, Jiexiang Kang:
QuanSafe: A DTBN-Based Framework of Quantitative Safety Analysis for AADL Models. 201-222 - Jiale Quan, Qin Li
:
A Event-B-Based Approach for Schedulability Analysis For Real-Time Scheduling Algorithms through Deadlock Detection. 223-244 - Jan Gruteser
, Michael Leuschel
:
Validation of RailML Using ProB. 245-256 - Walid Messahel, Tayssir Touili:
Reachability Analysis of Concurrent Self-modifying Code. 257-271 - Asfand Yar
, Akram Idani
, Yves Ledru
, Simon Collart Dutilleul
, Amel Mammar
, Germán Vega
:
An Iterative Formal Model-Driven Approach to Railway Systems Validation. 272-289 - Fang Qi, Rui Wang, Yong Guan, Xiaoyu Song:
An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control. 290-300
Security
- Michel Bourdellès
, Jamal El Hachem
, Salah Sadou
:
Confidentiality Management in Complex Systems Design. 303-322 - Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang:
Analyzing Excessive Permission Requests in Google Workspace Add-Ons. 323-345 - Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou
, Dongxi Liu:
Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review. 346-366
Program Analysis
- Haining Meng, Haofeng Li, Jie Lu, Chenghang Shi, Liqing Cao, Lian Li, Lin Gao:
AutoWeb: Automatically Inferring Web Framework Semantics via Configuration Mutation. 369-389 - LiLie Chen
, JunYu Wu
, Yuan Liu
:
SafePtrX: Research on Mitigation of Heap-Based Memory Safety Violations for Intel x86-64. 390-408 - Omar I. Al-Bataineh:
Towards Efficiently Parallelizing Patch-Space Exploration in Automated Program Repair. 409-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.