X hits on this document

171 views

0 shares

0 downloads

0 comments

35 / 40

On the Equivalence of Certain Fault Localization Techniques...................................................................1462 Vidroha Debroy, The University of Texas at Dallas, United States W. Eric Wong, The University of Texas at Dallas, United States

Identifying Properties of UML State Machine Diagrams that Affect Data and Control Dependence....1469 HyeonJeong Kim, Korea Advanced Institute of Science and Technology, Korea Vidroha Debroy, University of Texas at Dallas, United States DooHwan Bae, Korea Advanced Institute of Science and Technology, Korea

A Semantically Rich Approach for Collaborative Model Edition...............................................................1475 Jonathan Michaux, LIP6, France Xavier Blanc, Université de Bordeaux, France Marc Shapiro, LIP6 & INRIA, France Pierre Sutra, LIP6, France

On-line Scheduling of Real-Time Services with Profit and Penalty............................................................1481 Shuo Liu, Florida International University, United States Gang Quan, Florida International University, United States Shangping Ren, Illinois Institute of Technology, United States

Testing a Binary Space Partitioning Algorithm with Metamorphic Testing .............................................1487 Fei-Ching Kuo, Swinburne University of Technology, Australia Shuang Liu, Swinburne University of Technology, Australia T. Y. Chen, Swinburne University of Technology, Australia

Poster Papers

A GUI Bug Finding Framework for Android Applications.........................................................................1495 Cuixiong Hu, University of California, Riverside, United States Iulian Neamtiu, University of California, Riverside, United States

Computer Security Track

Track Co-Chairs:

Giampaolo Bella, Dip. Matematica e Informatica - Università di Catania, Italy

Helge Janicke, De Montfort University, United Kingdom Alessandro Sorniotti, Institut Eurécom, France

Track Editorial.................................................................................................................................................1497

Software Security Aspects of Java-Based Mobile Phones............................................................................1499 Karsten Sohr, Center for Computing Technologies, Universität Bremen, Germany Tanveer Mustafa, Center for Computing Technologies, Universität Bremen, Germany

Adrian Nowak, Otaris Interactive Services GmbH, Germany

Complexity of Fairness Constraints for the Dolev-Yao Attacker Model....................................................1507 Jan Cederquist, Instituto Superior Técnico, Portugal Mohammad Torabi Dashti, ETH Zürich, Switzerland

Document info
Document views171
Page views171
Page last viewedFri Jan 20 00:04:00 UTC 2017
Pages40
Paragraphs512
Words11014

Comments