The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Engineering of Complex Computer Systems (iceccs)
2005 (conf/iceccs/2005)


  1. Welcome from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:- [Conf]

  2. Message from the General Chairs. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:- [Conf]

  3. Organizing Committee. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:- [Conf]

  4. Additional Reviewers. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:- [Conf]
  5. J. S. Dong, D. Dan
    Software Engineering Approaches to Semantic Web. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:2- [Conf]
  6. Paolo Nesi
    Multimedia Content Distribution and Protection. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:3- [Conf]
  7. Luciano Baresi, Sam Guinea
    An Introduction to Self-Healing Web Services. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:4- [Conf]
  8. Yuting Chen, Shaoying Liu, Fumiko Nagoya
    A Framework for SOFL-Based Program Review. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:6-7 [Conf]
  9. Jianping Yao
    An Introduction to Three Perspectives on Formal Specification Review. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:8-9 [Conf]
  10. Fumiko Nagoya, Shaoying Liu, Yuting Chen
    Design of a Tool for Specification-Based Program Review. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:10-11 [Conf]
  11. Xiang Xue
    A Formal Specification Constructing Tool for SOFL. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:12-13 [Conf]
  12. Yao Shen, Haopeng Chen
    Extending SOFL Features for AOP Modeling. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:14-15 [Conf]
  13. Haopeng Chen, Yao Shen, Jian-wei Jiang
    Extended SOFL Features for the Modeling of Middleware-Based Transaction Management. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:16-17 [Conf]
  14. Cesar Gonzalez-Perez
    Tools for an Extended Object Modelling Environment. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:20-23 [Conf]
  15. Jun Kong, Kang Zhang, Jing Dong
    Grammar-Specified Model-Driven Architectures. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:24-25 [Conf]
  16. Jing Liu, Huaikou Miao
    A Strategy for Component-Based Modeling and Refinement. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:26-27 [Conf]
  17. Jean Bézivin, Frédéric Jouault, David Touzet
    Principles, Standards and Tools for Model Engineering. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:28-29 [Conf]
  18. Dae-Kyoo Kim
    Evaluating Conformance of UML Models to Design Patterns. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:30-31 [Conf]
  19. Yali Zhu
    Modeling Diverse and Complex Interactions Enabled by Middleware as Connectors in Software Architectures. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:37-46 [Conf]
  20. Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Gao
    Secure Software Architectures Design by Aspect Orientation. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:47-55 [Conf]
  21. Yali Zhu, Gang Huang, Hong Mei
    Modeling Architecture Based Development in UML. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:56-65 [Conf]
  22. Guido Menkhaus, Urs Frei, Jorg Wuthrich
    Analysis and Verification of the Interaction Model in Software Design. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:67-75 [Conf]
  23. Rafael Ramirez, Andrew E. Santosa
    Formal Verification of Concurrent and Distributed Constraint-Based Java Programs. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:76-84 [Conf]
  24. Oystein Hallaraker, Giovanni Vigna
    Detecting Malicious JavaScript Code in Mozilla. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:85-94 [Conf]
  25. Jun Sun, Jin Song Dong
    Extracting FSMs from Object-Z Specifications with History Invariants. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:96-105 [Conf]
  26. Peiyi Tang
    Formal Methods to Generate Parallel Iterative Codes for PDE-Based Applications. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:106-115 [Conf]
  27. James L. Rash, Michael G. Hinchey, Christopher Rouff, Denis Gracanin
    Formal Requirements-Based Programming for Complex Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:116-125 [Conf]
  28. Lei Wang, Zhiping P. Chen, Xinhua H. Jiang
    Ringed Petersen Spheres Connected Hypercube Interconnection Networks. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:127-131 [Conf]
  29. Wen Chen, Feiyu Lei, Weinong Wang
    A General Model for Non-Markovian Stochastic Decision Discrete-Event Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:132-137 [Conf]
  30. Yingzhou Zhang, Baowen Xu
    A Slice Monad Transformer and Its Applications in Program Slicing. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:147-154 [Conf]
  31. Yajuan Pan, Dai Pan, Mei-Hwa Chen
    Slicing Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:155-164 [Conf]
  32. Piotr Tomaszewski, Lars Lundberg, Jim Håkansson, Daniel Häggander
    A Cost-Efficient Server Architecture for Real-Time Credit-Control. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:166-175 [Conf]
  33. Jun Li, Fumin Yang, Yansheng Lu
    A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:176-183 [Conf]
  34. Anton Wijs, Wan Fokkink
    From chi-t to µCRL: Combining Performance and Functional Analysis. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:184-193 [Conf]
  35. Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens
    Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:195-204 [Conf]
  36. Pierfrancesco Bellini, Ivan Bruno, Paolo Nesi, Davide Rogai
    Comparing Fault-Proneness Estimation Models. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:205-214 [Conf]
  37. Gansen Zhao, David W. Chadwick
    Evolving Messaging Systems for Secure Role Based Messaging. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:216-223 [Conf]
  38. Jan Jürjens, Markus Lehrhuber, Guido Wimmel
    Model-Based Design and Analysis of Permission-Based Security. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:224-233 [Conf]
  39. Viktoria Felmetsger, Giovanni Vigna
    Exploiting OS-Level Mechanisms to Implement Mobile Code Security. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:234-243 [Conf]
  40. Gaoliang Peng, Wenjian Liu, Xutang Zhang
    An Internet-Based System for Setup Planning in Machining Operations. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:245-251 [Conf]
  41. Juan Miguel Gómez, Giner Alor-Hernández, José Oscar Olmedo-Aguirre, Christoph Bussler
    A B2B Conversational Architecture for Semantic Web Services Based on BPIMS-WS. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:252-259 [Conf]
  42. Tetsuo Tamai
    Conquering the Eight-Tailed Dragon - An Attempt to Deal with Structural and Behavioral Complexities. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:261-272 [Conf]
  43. Ching-Cheng Lee, Sudeshna Ghosh
    A Component-Based Approach for JavaCard Runtime System Development. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:274-282 [Conf]
  44. Minghui Zhou, Wenpin Jiao, Hong Mei
    Customizable Framework for Managing Trusted Components Deployed on Middleware. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:283-291 [Conf]
  45. Leonardo Mariani, Mauro Pezzè
    Behavior Capture and Test: Automated Analysis of Component Integration. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:292-301 [Conf]
  46. Jing Sun, Hongyu Zhang, Yuan-Fang Li, Hai H. Wang
    Formal Semantics and Verification for Feature Modeling. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:303-312 [Conf]
  47. Maty Sylla, Frank A. Stomp, Willem P. de Roever
    Verifying Parameterized Refinement. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:313-321 [Conf]
  48. Li Yang, Raimund K. Ege, Huiqun Yu
    Mediation Systems Modeling and Verification. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:322-331 [Conf]
  49. Zhihong Huo, Huajing Fang
    Robust H-infinity Filter Design for Networked Control System with Random Time Delays. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:333-340 [Conf]
  50. Li Wang, Zeng-zhi Li, Yanping Chen, Ke Xue
    Fluid-Based Stability Analysis of Mixed TCP and UDP Traffic under RED. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:341-348 [Conf]
  51. Deqing Zou, Weizhong Qiang, Xuanhua Shi
    A Formal General Framework and Service Access Model for Service Grid. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:349-356 [Conf]
  52. Baolin Sun, Hua Chen, Layuan Li
    An Intrusion Detection System for AODV. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:358-365 [Conf]
  53. Zhiming Zhao, G. Dick van Albada, Peter M. A. Sloot
    Rapid Prototyping of Complex Interactive Simulation Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:366-375 [Conf]
  54. Zhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan
    A Study of Secure Communications between Mobile Objects. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:377-383 [Conf]
  55. Mohammad Zib Beiroumi, Villy Bæk Iversen
    Recovery Method Based on Communicating Extended Finite State Machine (CEFSM) for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:384-393 [Conf]
  56. Zhigang Zhao, Changqing Gong, Guangxing Wang
    Identification of Faulty Links in LEO/MEO Satellite Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:394-400 [Conf]
  57. Xuefeng Zhu, Zhi Jin
    Inconsistency Measurement of Software Requirements Specifications: An Ontology-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:402-410 [Conf]
  58. Xiaoshan Li, Zhiming Liu, Jifeng He
    Consistency Checking of UML Requirements. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:411-420 [Conf]
  59. Wuwei Shen, Weng Liong Low
    Using the Metamodel Mechanism to Support Class Refinement. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:421-430 [Conf]
  60. Cheng-Ying Mao, Yan-Sheng Lu
    Improving the Robustness and Reliability of Object-Oriented Programs through Exception Analysis and Testing. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:432-439 [Conf]
  61. Xin Wang, Zhi-Chang Qi, Shuhao Li
    An Optimized Method for Automatic Test Oracle Generation from Real-Time Specification. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:440-449 [Conf]
  62. Hui Liang
    Regression Testing of Classes Based on TCOZ Specification. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:450-457 [Conf]
  63. P. Mattias Weckstén, Magnus Jonsson, Jonas Vasell
    Derivation of Implementation Constraints - Implementation Simulation and Treatment of Multiple Design Choices. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:459-466 [Conf]
  64. Alexander Lau, Rudolph E. Seviora
    Design Patterns for Software Health Monitoring. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:467-476 [Conf]
  65. Wenpin Jiao, Hong Mei
    Dynamic Architectural Connectors in Cooperative Software Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:477-486 [Conf]
  66. J. S. Dong, R. Duke, P. Hao
    Integrating Object-Z with Timed Automata. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:488-497 [Conf]
  67. Ling Liu, Huaikou Miao
    Mutation Operators for Object-Z Specification. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:498-506 [Conf]
  68. Robert Colvin, Lindsay Groves
    Formal Verification of an Array-Based Nonblocking Queue. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:507-516 [Conf]
  69. Trung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh, Robert B. France, Anneliese Amschler Andrews
    A Tool-Supported Approach to Testing UML Design Models. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:519-528 [Conf]
  70. Jun Sun, Jin Song Dong
    Model Checking Live Sequence Charts. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:529-538 [Conf]
  71. W. Eric Wong, Yu Lei, Xiao Ma
    Effective Generation of Test Sequences for Structural Testing of Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:539-548 [Conf]
  72. Frans Mårtensson, Håkan Grahn, Michael Mattsson
    Evaluating Software Quality Attributes of Communication Components in an Automated Guided Vehicle System. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:550-558 [Conf]
  73. Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge
    Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:559-568 [Conf]
  74. Mauro Pezzè, Davide Tosi, Gian Pietro Picco
    Scavenging Complex Genomic Information Using Mobile Code: An Evaluation. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:569-578 [Conf]
  75. Jianmin Jiang, Jinzhao Wu
    The Preservation of Interleaving Equivalences. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:580-589 [Conf]
  76. Mahadevan Subramaniam
    Preserving Consistency of Runtime Monitors across Protocol Changes. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:590-599 [Conf]
  77. Lei Wu, Houari A. Sahraoui, Petko Valtchev
    Coping with Legacy System Migration Complexity. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:600-609 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002