


default search action
HASE 2011: Boca Raton, FL, USA
- Taghi M. Khoshgoftaar:

13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0107-7
Session A: Software Testing and Validation
- Andrea Ceccarelli

, Marco Vieira
, Andrea Bondavalli
:
A Testing Service for Lifelong Validation of Dynamic SOA. 1-8 - Wuliang Sun, Robert B. France, Indrakshi Ray:

Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models. 9-16 - Rui Yang, Zhenyu Chen, Baowen Xu

, W. Eric Wong, Jie Zhang:
Improve the Effectiveness of Test Case Generation on EFSM via Automatic Path Feasibility Analysis. 17-24 - André Pflüger, Wolfgang Golubski

, Stefan Queins:
Model Driven Validation of System Architectures. 25-28 - Chuanqi Tao, Bixin Li, Jerry Gao:

Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing. 29-32
Session B: Modeling Checking and Verification I
- Yongxin Zhao, Zheng Wang, Hao Xiao, Jing Ping, Geguang Pu, Jifeng He, Huibiao Zhu:

A Unifying Approach to Validating Specification-Oriented XML Constraints. 33-40 - Jianwen Li, Zheng Wang, Yongxin Zhao, Geguang Pu, Yanxia Qi, Bin Gu:

An Event-B Interpretation for SPARDL Model. 41-48 - Yingying Zhang, Emmanuel Rodriguez, Hao Zheng, Chris J. Myers

:
A Behavioral Analysis Approach for Efficient Partial Order Reduction. 49-56 - Qian Wang, Huibiao Zhu:

Animating the Approach of Deriving Operational Semantics from Algebraic Semantics for Web Services. 57-62
Session C: Applications and Technologies
- Mehrdad Sabetzadeh

, Davide Falessi, Lionel C. Briand, Stefano Di Alesio, Dag McGeorge, Vidar Åhjem, Jonas Borg:
Combining Goal Models, Expert Elicitation, and Probabilistic Simulation for Qualification of New Technology. 63-72 - Mladen A. Vouk, Pierre Mouallem:

On High-Assurance Scientific Workflows. 73-82 - Ali Kanso, Ferhat Khendek

, Anik Mishra, Maria Toeroe:
Integrating Legacy Applications for High Availability: A Case Study. 83-90 - Vishesh Ved, Vivek Tyagi, Ankur Agarwal, Abhijit S. Pandya:

Personal Health Record System and Integration Techniques with Various Electronic Medical Record Systems. 91-94
Session D: High Assurance Distributed Systems
- Stéphane Louise, Matthieu Lemerre, Christophe Aussaguès, Vincent David:

The OASIS Kernel: A Framework for High Dependability Real-Time Systems. 95-103 - Patrick Hein, Debmalya Biswas, Leonardo A. Martucci, Max Mühlhäuser

:
Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems. 104-111 - Mingjie Lin, Yu Bai, John Wawrzynek:

Discriminatively Fortified Computing with Reconfigurable Digital Fabric. 112-119 - Ingrid A. Buckley, Eduardo B. Fernández

:
Enumerating Software Failures to Build Dependable Distributed Applications. 120-123 - Wenbing Zhao, P. M. Melliar-Smith, Louise E. Moser:

Leader-Determined Membership Protocol. 124-129
Session E: Model Checking and Verification II
- Philippe Dhaussy, Jean-Charles Roger, Frédéric Boniol:

Reducing State Explosion with Context Modeling for Model-Checking. 130-137 - Atif Mashkoor

, Jean-Pierre Jacquot:
Guidelines for Formal Domain Modeling in Event-B. 138-145 - Ilya Lopatkin, Alexei Iliasov, Alexander B. Romanovsky

, Yuliya Prokhorova, Elena Troubitsyna:
Patterns for Representing FMEA in Formal Specification of Control Systems. 146-151 - Victor L. Winter, Jonathan Guerrero, Carl Reinke, James T. Perry:

Monarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator. 152-156
Session F: High Assurance Networked Systems and Services
- Si Liu

, Yongxin Zhao, Huibiao Zhu, Qin Li:
A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective. 157-162 - Sami S. Alwakeel, Shaker S. AlGhanmi:

A Real Time Window-Based Local Call Admission Control Algorithm for IP Networks. 163-167 - Hajime Fujita, Yutaka Ishikawa:

Anytime Available Single IP Address Cluster. 168-173
Poster Presentations
- Md. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori:

Autonomous Online Expansion Technology for ZigBee Wireless Sensor Networks. 174-175 - Antonio Maña

, José Fran. Ruiz
:
A Security Modelling Framework for Systems of Embedded Components. 176-177 - Kunming Nie, Li Zhang:

On the Relationship between Preprocessor-Based Software Variability and Software Defects. 178-179 - Simin Nadjm-Tehrani, Maria Vasilevskaya:

Towards a Security Domain Model for Embedded Systems. 180-181 - Mario Bernhart, Stefan Reiterer, Kilian Matt, Andreas Mauczka, Thomas Grechenig:

A Task-Based Code Review Process and Tool to Comply with the DO-278/ED-109 Standard for Air Traffic Managment Software Development: An Industrial Case Study. 182-187 - Hicham Assoudi, Hakim Lounis:

Self-Healing Data Exchange Process under Evolving Schemas: A New Mapping Adaptation Approach Based on Self-Optimization. 188-190 - Douglas Rodrigues, Daniel F. Pigatto

, Júlio Cezar Estrella, Kalinka Regina Lucas Jaquie Castelo Branco
:
Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services. 191-192
Session G: Safety-Critical Systems
- Mehrdad Sabetzadeh

, Shiva Nejati
, Lionel C. Briand, Anne-Heidi Evensen Mills:
Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience. 193-201 - Chetan Mutha, Carol S. Smidts:

An Early Design Stage UML-Based Safety Analysis Approach for High Assurrance Software Systems. 202-211 - Michaël Lauer, Jérôme Ermont

, Frédéric Boniol, Claire Pagetti:
Worst Case Temporal Consistency in Integrated Modular Avionics Systems. 212-219 - Manasi Peshave, Farokh B. Bastani, I-Ling Yen:

High-Assurance Reconfigurable Multicore Processor Based Systems. 220-226
Session H: High Assurance Ocean Systems
- John C. Sloan, Taghi M. Khoshgoftaar:

Ensemble Coordination for Discrete Event Control. 227-235 - Randall Wald, Taghi M. Khoshgoftaar, John C. Sloan:

Using Feature Selection to Determine Optimal Depth for Wavelet Packet Decomposition of Vibration Signals for Ocean System Reliability. 236-243 - Janell Duhaney, Taghi M. Khoshgoftaar, John C. Sloan, Bassem Alhalabi, Pierre P. Beaujean:

A Dynamometer for an Ocean Turbine Prototype: Reliability through Automated Monitoring. 244-251 - Mustapha Mjit, Pierre-Philippe J. Beaujean, David J. Vendittis:

Smart Vibration Monitoring System for an Ocean Turbine. 252-260
Session I: Performance, Reliability and Availability Analysis
- Ricardo Paharsingh, Olivia Das:

An Availability Model of a Virtual TMR System with Applications in Cloud/Cluster Computing. 261-268 - Lance Fiondella, Sanguthevar Rajasekaran, Swapna S. Gokhale:

Efficient System Reliability with Correlated Component Failures. 269-276 - Michael F. Siok, Jeff Tian:

Benchmarking Embedded Software Development Project Performance. 277-284 - Dongeun Lee, Heonshik Shin, Eunjeong Park:

Modeling Recovery Strategies in Service-Oriented Architecture Using a Markov Decision Process. 285-290
Session J: Monitoring
- Javier González, Antonio Muñoz, Antonio Maña

:
Multi-layer Monitoring for Cloud Computing. 291-298 - Ayman A. Amin

, Alan Colman
, Lars Grunske
:
Using Automated Control Charts for the Runtime Evaluation of QoS Attributes. 299-306 - Ying Wang, Chunming Hu, Bo Li:

VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison. 307-312 - Vivek Tyagi, Abhijit S. Pandya, Ankur Agarwal, Bassem Alhalabi:

Validation of Object Recognition Framework on Android Mobile Platform. 313-316
Session K: Bugs and Fault Localization
- Aritra Bandyopadhyay, Sudipto Ghosh:

On the Effectiveness of the Tarantula Fault Localization Technique for Different Fault Classes. 317-324 - Zhongxing Yu, Hai Hu, Chenggang Bai, Kai-Yuan Cai, W. Eric Wong:

GUI Software Fault Localization Using N-gram Analysis. 325-332 - Pratik Maheshwari, Byong-Su Seol, Jong-Sung Lee, Jae-Deok Lim, Sahra Sedigh

, David Pommerenke
:
Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge. 333-339 - David Lo

, Hong Cheng, Xiaoyin Wang:
Bug Signature Minimization and Fusion. 340-347 - Herbert Hecht:

So Much to Learn from One Accident Crash of 737 on 25 February 2009. 348-351
Session L: Security and Privacy
- Zahid A. Syed

, Sean Banerjee, Qi Cheng, Bojan Cukic
:
Effects of User Habituation in Keystroke Dynamics on Password Security Policy. 352-359 - Tushar Deshpande, Panagiotis Katsaros

, Stylianos Basagiannis
, Scott A. Smolka:
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking. 360-367 - Debmalya Biswas, Valtteri Niemi:

Transforming Privacy Policies to Auditing Specifications. 368-375 - Mazen El Maarabani, Ana R. Cavalli, Iksoon Hwang, Fatiha Zaïdi:

Verification of Interoperability Security Policies by Model Checking. 376-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














