default search action
16th HASE 2015: Daytona Beach, FL, USA
- 16th IEEE International Symposium on High Assurance Systems Engineering, HASE 2015, Daytona Beach, FL, USA, January 8-10, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8110-6
Full Papers
- Huixing Fang, Huibiao Zhu, Jianqi Shi:
An Object-Oriented Language for Modeling of Hybrid Systems. 1-9 - Zahid A. Syed, Jordan Helmick, Sean Banerjee, Bojan Cukic:
Effect of User Posture and Device Size on the Performance of Touch-Based Authentication Systems. 10-17 - Luyao Wang, Fengwei Sui, Yanhong Huang, Huibiao Zhu:
Modeling and Verifying the Ballooning in Xen with CSP. 18-25 - Victor L. Winter, Shiraz Hussain:
Verilog Synthesis in the Higher-Order Transformation Framework of TL. 26-35 - Mathilde Machin, Fanny Dufossé, Jérémie Guiochet, David Powell, Matthieu Roy, Hélène Waeselynck:
Model-Checking and Game theory for Synthesis of Safety Rules. 36-43 - Andreas Ibing, Alexandra Mai:
A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops. 44-51 - Ewen Denney, Ganesh J. Pai, Iain Whiteside:
Formal Foundations for Hierarchical Safety Cases. 52-59 - David McKee, David Webster, Jie Xu:
Enabling Decision Support for the Delivery of Real-Time Services. 60-67 - A. Omar Portillo-Dominguez, Miao Wang, John Murphy, Damien Magoni:
Adaptive GC-Aware Load Balancing Strategy for High-Assurance Java Distributed Systems. 68-75 - Haixing Yan, Huixing Fang, Christian Kuka, Huibiao Zhu:
Verification for OAuth Using ASLan++. 76-84 - Jonas Westman, Mattias Nyberg:
Extending Contract theory with Safety Integrity Levels. 85-92 - Erik van der Kouwe, Cristiano Giuffrida, Razvan Ghituletez, Andrew S. Tanenbaum:
A Methodology to Efficiently Compare Operating System Stability. 93-100 - Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures. 101-109 - Richard Hawkins, Ibrahim Habli, Dimitrios S. Kolovos, Richard F. Paige, Tim Kelly:
Weaving an Assurance Case from Design: A Model-Based Approach. 110-117 - Vahid Aghaei Foroushani, Nur Zincir-Heywood:
A Proxy Identifier Based on Patterns in Traffic Flows. 118-125 - Irfan Sljivo, Omar Jaradat, Iain Bate, Patrick J. Graydon:
Deriving Safety Contracts to Support Architecture Design of Safety Critical Systems. 126-133 - Mahsa Emami-Taba, Mehdi Amoui, Ladan Tahvildari:
Strategy-Aware Mitigation Using Markov Games for Dynamic Application-Layer Attacks. 134-141 - Ivano Irrera, Marco Vieira, João Durães:
Adaptive Failure Prediction for Computer Systems: A Framework and a Case Study. 142-149 - Andrea Ceccarelli, Marco Mori, Paolo Lollini, Andrea Bondavalli:
Introducing Meta-Requirements for Describing System of Systems. 150-157 - Atif Mashkoor, Jean-Pierre Jacquot:
Observation-Level-Driven Formal Modeling. 158-165 - Chen-Yu Lee, Krishna M. Kavi, Raymond A. Paul, Mahadevan Gomathisankaran:
Ontology of Secure Service Level Agreement. 166-172 - Genaína Nunes Rodrigues, Vander Alves, Vinicius Nunes, André Lanna, Maxime Cordy, Pierre-Yves Schobbens, Amir Molzam Sharifloo, Axel Legay:
Modeling and Verification for Probabilistic Properties in Software Product Lines. 173-180 - Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, Ji Wang:
MPISE: Symbolic Execution of MPI Programs. 181-188 - Valentina Bonfiglio, Leonardo Montecchi, Francesco Rossi, Paolo Lollini, András Pataricza, Andrea Bondavalli:
Executable Models to Support Automated Software FMEA. 189-196 - Yiting Tang, Xi Wu, Huibiao Zhu, Jian Guo:
Formalization and Verification of REST Architecture in Viewpoints. 197-206 - Bo Li, Mengdi Wang, Yongxin Zhao, Geguang Pu, Huibiao Zhu, Fu Song:
Modeling and Verifying Google File System. 207-214 - Amira Zammali, Agnan de Bonneval, Yves Crouzet:
A Diversity-Based Approach for Communication Integrity in Critical Embedded Systems. 215-222 - Xi Wu, Huibiao Zhu:
A Calculus for Wireless Sensor Networks from Quality Perspective. 223-231 - Mengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, Jiang Bian:
CamAuth: Securing Web Authentication with Camera. 232-239 - Jingmin Shi, Chao Peng, Qin Zhu, Pengfei Duan, Yu Bao, Mengjun Xie:
There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET. 240-246 - Karl A. Morris, Peter J. Clarke, Xudong He, Fábio M. Costa, Mengjun Allison:
A Method for Validating Intent Model Behavior in DSVMs. 247-254 - Chung-Ling Lin, Wuwei Shen:
Applying Safety Case Pattern to Generate Assurance Cases for Safety-Critical Systems. 255-262 - Sean Banerjee, Jordan Helmick, Zahid A. Syed, Bojan Cukic:
Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories. 263-270
Short Papers
- Zakaryae Boudi, El-Miloudi El-Koursi, Simon Collart Dutilleul:
HCPN Modeling for ERTMS Requirements Specification. 271-272 - Fredrik Asplund, Martin Törngren, Richard Hawkins, John A. McDermid:
The Need for a Confidence View of CPS Support Environments (Fast Abstract). 273-274 - Xiaohua Li, Thomas Yang:
Signal Processing Oriented Approach for Big Data Privacy. 275-276 - William C. Barott, Ted Dabrowski, Braham Himed:
Fidelity and Complexity in Passive Radar Simulations. 277-278 - Salamah Salamah, Omar Ochoa, Yadira Jacquez:
Using Pairwise Testing to Verify Automatically-Generated Formal Specifications. 279-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.