


default search action
20th QRS 2020: Macau, SAR, China - Companion
- 20th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2020, Macau, China, December 11-14, 2020. IEEE 2020, ISBN 978-1-7281-8915-4

- Meng Li, Lijun Wang, Shiyu Yan, Xiaohua Yang, Jie Liu, Yaping Wan:

Metamorphic Relations Identification on Chebyshev Rational Approximation Method in the Nuclide Depletion Calculation Program. 1-6 - Zhuoliang Zou, Jun Ai:

Online Prediction of Server Crash Based on Running Data. 7-14 - Davrondzhon Gafurov, Arne Erik Hurum:

Efficiency Metrics and Test Case Design for Test Automation. 15-23 - Pavithra Perumal Kumaresen, Mirgita Frasheri, Eduard Paul Enoiu:

Agent-Based Software Testing: A Definition and Systematic Mapping Study. 24-31 - Xi Liu, Haifeng Li, Xuyang Xie:

Intelligent Radar Software Defect Prediction Approach and Its Application. 32-37 - Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong:

Graph-based Vulnerability Detection via Extracting Features from Sliced Code. 38-45 - Xiang Du, Liangze Yin, Peng Wu, Liyuan Jia, Wei Dong:

Vulnerability Analysis through Interface-based Checker Design. 46-52 - Tugkan Tuglular, Onur Leblebici:

Coverage Guided Multiple Base Choice Testing. 53-60 - Qian Ji, Chiya Xu, Ziyuan Wang:

Calculating Minimal Failure-causing Schema Based on Relational Tree Model Method. 61-64 - Xiaolei Sun, Tongyu Li, Jianfeng Xu:

UI Components Recognition System Based On Image Understanding. 65-71 - Chang Liu, Chunyan Ma, Tao Zhang:

Improving Spectrum-Based Fault Localization using quality assessment and optimization of a test suite. 72-78 - Canh Minh Do

, Kazuhiro Ogata:
Parallel stratified random testing for concurrent programs. 79-86 - Soichiro Hidaka:

Trace-baed Error Prevention and Detection of Consistency Maintenance via Bidirectional Graph Transformations. 87-90 - Haibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao:

Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis. 91-97 - Yuji Sato

:
Specification-based Test Case Generation with Constrained Genetic Programming. 98-103 - Shaoying Liu:

Range Partition Testing: Principle and Technique. 104-107 - Xudong He:

Modeling and Analyzing Smart Contracts using Predicate Transition Nets. 108-115 - Rui Ming, Haiping Xu:

Timely Publication of Transaction Records in a Private Blockchain. 116-123 - Qianwen Xu, Xiudi Chen, Shanshan Li, He Zhang, Muhammad Ali Babar, Nguyen Khoi Tran:

Blockchain-based Solutions for IoT: A Tertiary Study. 124-131 - Oliver Kattwinkel, Michael Rademacher

:
Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions. 132-139 - Konstantinos Papadakis-Vlachopapadopoulos, Ioannis Dimolitsas, Dimitrios Dechouniotis

, Eirini-Eleni Tsiropoulou
, Ioanna Roussaki, Symeon Papavassiliou:
Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network Edge. 140-147 - Sang-Yoon Chang:

Mining Power Misestimation in PoW Blockchain. 148-152 - Dongcheng Li, W. Eric Wong, Man Zhao, Qiang Hou:

Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System. 153-159 - Songpon Teerakanok

, Hiroaki Yasuki, Tetsutaro Uehara
:
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum. 160-167 - Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:

STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. 168-175 - Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, Hiroshi Yoshiura:

Time-aware multi-resolutional approach to re-identifying location histories by using social networks. 176-183 - Haruki Kobayashi, Taiichi Saito, Ryôichi Sasaki:

Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations. 184-189 - Ryôichi Sasaki:

Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function. 190-197 - Lei Wu, Di Wu:

Evaluating Interaction Content in Online Learning Using Deep Learning for Quality Classification. 198-203 - Mingwei Tang, Jiangping Chen, Haihua Chen

:
SemOIR: An ontology-based semantic information retrieval system. 204-208 - Li Zhang

, Yong Huang, Qikai Cheng, Wei Lu:
Mining Author Identifiers for PubMed by Linking to Open Bibliographic Databases. 209-212 - Mengqi Luo, Fengchang Yu, Haihua Chen

:
Result Diversification in Clinical Case Reports Retrieval based on Main Finding. 213-220 - Yu Huang, Yue Chen:

Survey of State-of-Art Autonomous Driving Technologies with Deep Learning. 221-228 - Sanchu Han, Yong He, Yin Ding:

Enable an Open Software Defined Mobility Ecosystem through VEC-OF. 229-236 - Renzhi Tang

, Zhihao Jiang
:
Driver's Perception Model in Driving Assist. 237-240 - Xudong Zhang, Yan Cai, Zijiang Yang:

A Study on Testing Autonomous Driving Systems. 241-244 - Jiali Wei, Ming Fan, Xi Xu, Ang Jia, Zhou Xu, Lei Xue:

Interpretation Area-Guided Detection of Adversarial Samples. 245-248 - Rui Wang, Yong Guan, Xiaojuan Li, Rui Zhang:

Formal Verification of CAN Bus in Cyber Physical System. 249-255 - Changbo Hou, Xuejiao Zhao, Yun Lin:

Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional Network. 256-263 - Michael Y. Shoga, Celia Chen, Barry W. Boehm:

Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study. 264-271 - Eduard Enoiu, Gerald Tukseferi, Robert Feldt:

Towards a Model of Testers' Cognitive Processes: Software Testing as a Problem Solving Approach. 272-279 - Pu Wang, Zhiyi Zhang, Yuqian Zhou, Zhiqiu Huang:

Test Data Augmentation for Image Recognition Software. 280-284 - Subrota Kumar Mondal, Yu Pei

, Hong-Ning Dai
, Hussain Mohammed Dipu Kabir
, Jyoti Prakash Sahoo
:
Boosting UI Rendering in Android Applications. 285-286 - Di Wu, Rui Peng, Shaomin Wu

, Ye Ma, Yingchun Li:
Optimal maintenance policy considering innovation replacement. 287-290 - Guozhen Gao, Zijun Que, Zhengguo Xu:

Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural Process. 291-296 - Wenqiang Zheng

, Taotao Zhou
, Yan-Fu Li:
An Overview of the EMUs Maintenance Scheduling in China. 297-300 - Zhibao Mian

, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Yaqing Gao:
A Model-based RCM Analysis Method. 301-307 - Hongwei Tao, Yixiang Chen, Hengyang Wu:

Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches. 308-315 - Shubin Si, Ning Wang:

Resilience Evaluation of Complex Networks with Attack Intensity. 316 - Haotian Niu, Cunbao Ma, Pei Han, Siyuan Li, Qi Ma, Shenghui Zhang:

Research on Safety Modeling and Analysis to the Task Process of Airborne Weather System. 317-323 - Zhiqiang Cai, Mi Zhou, Shuai Zhang:

Reliability Analysis of Phased-Mission K-out-of-n Systems with Cascading Effect. 324-327 - Yang Liu, Hongwei Ma, Kuangdai Li, Hang Yi, Xiaotao Yan, Jian Kang:

Selection of Network Feature Attribute Based On Classification Discrimination And Correlation Analysis. 328-333 - Tyler Phillips

, Timothy McJunkin, Craig Rieger, John Gardner, Hoda Mehrpouyan:
An Operational Resilience Metric for Modern Power Distribution Systems. 334-342 - Xiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian:

Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery. 343-349 - Yihang Bo, Zuqiang Yi, Xi Chen:

Intelligence and Emotion Application Framework in Interactive Art Design. 350-357 - Ying Wang, Yu Wang, Yongling Tan, Zhuojun Zhong, Mingli Zhang, Yixuan Zhang:

The Optimal Inverter DC/AC Value Selection Method Based on Big Data Technology. 358-363 - Xiao Yu, Wenhong Liu, Jun Yang:

An Improved Comprehensive Evaluation Method for Software Development Ability. 364-369 - Pradeep K. Mahato

, Apurva Narayan:
QMine: A Framework for Mining Quantitative Regular Expressions from System Traces. 370-377 - Jinfeng Li, Yan Zhang, Jilong Bian, Tiejun Li, Baoying Ma:

Application of Improved Fault Localization Method to Stereo Matching Software. 378-381 - Godswill Lucky, Fred P. Jjunju, Alan Marshall:

A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks. 382-389 - Yong Yu, Ming Jing, Jie Li, Na Zhao, Jinzhuo Liu:

Decision Network: a New Network-Based Classifier. 390-397 - Hao Li, Tao Li, Sheng Zhong, Yan Kang, Tie Chen:

A Fusion of Java Domain Knowledge Base and Siamese Network for Java API Recommendation. 398-405 - Gefei Zhang:

Specifying and Model Checking Workflows of Single Page Applications with TLA+. 406-410 - Qianqian Duan:

An MILP-NLP decomposition approach applied to a refinery scheduling problem. 411-417 - Yingying Wang, Jun Zhao, Feng Li, Min Yu:

Construction of Knowledge Graph For Internal Control of Financial Enterprises. 418-425 - Carl Wilhjelm, Awad A. Younis:

A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems. 426-433 - Xing Oiao, Jie Luo:

Design Method of Banquet Intelligent Side Dishes System Based on Data Mining and Correlation Analysis. 434-437 - Fei Yin, Jinyi Xu, Yixiang Chen:

Research of Micro-expression Recognition Model based on Feature Unit. 438-444 - Shijian Mao, Min Zhang, Jia Yan, Yao Chen:

A general and efficient framework for improving Balanced Failure Biasing. 445-450 - Yating Zhang, Wei Dong, Daiyan Wang, Jiaxin Liu, Binbin Liu:

Probabilistic Synthesis for Program with Non-API Operations. 451-457 - Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu:

Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution Networks. 458-464 - Haining Feng, Liangze Yin, Wenfeng Lin, Xudong Zhao, Wei Dong:

Rchecker: A CBMC-based Data Race Detector for Interrupt-driven Programs. 465-471 - Xudong Zhao, Shaoxian Shu, Yutian Lan, Haining Feng, Wei Dong:

Security Controller Synthesis for ROS-based Robot. 472-477 - Xinyi Wang, Gaolei Yi, Yichen Wang:

An Empirical Study of Flight Control System Model Checking Integrated with FMEA. 478-484 - Martin A. Schneider

, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk:
Fuzzing of Mobile Application in the Banking Domain: a Case Study. 485-491 - Ramon Barakat

, Faruk Catal, Nikolay Tcholtchev
, Yacine Rebahi:
TTCN-3 based NG112 Test System and Playground for Emergency Communication. 492-497 - Theofanis Vassiliou-Gioles

:
A simple, lightweight framework for testing RESTful services with TTCN-3. 498-505 - Ilie-Daniel Gheorghe-Pop, Alexander Kaiser, Axel Rennoch, Sascha Hackel

:
A Performance Benchmarking Methodology for MQTT Broker Implementations. 506-513 - Philip Makedonski, Ilie-Daniel Gheorghe-Pop, Axel Rennoch, Finn Kristoffersen, Bostjan Pintar, Andreas Ulrich:

Using TDL for Standardised Test Purpose Definitions. 514-521 - Qian Zhao:

BIM Design for Reconstruction of Old Factory Building based on Sustainable Perspective. 522-526 - Lei Song, Sirirat Petsangsri

:
Smart Scenic Area Construction Framework for Meeting Demands of Multiple Interests Based on Global Tourism Architecture: An Approach to Educating Smart Scenic Area Construction Framework. 527-534 - Fengbao Ma, Sicong Ma, Qinyun Liu:

Graphical Probability Model and Heritage Tourism Routine Design. 535-541 - Lu Zhang, Chi Zhang, Meiyu Shi:

Applying Mobile Technology for Developing Cultural and Creative Products in Tourism: A Case Study on The Forbidden City. 542-549 - Chi Zhang, Xiangjie Qiao, Xianfeng Chen:

A Big Data based Decision Framework for Public Management and Service in Tourism. 550-555 - Xianfeng Chen, Qing Liu, Xiangjie Qiao:

Approaching Another Tourism Recommender. 556-562 - Chuan Zhao, Yan Song, Min Zuo:

Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern. 563-570 - Min Zuo, Si-Yu He, Qingchuan Zhang, Qing-Bang Wang:

Character-word Double-dimensional Semantic Classification Model for Judging Illegal and Irregular Behaviors for Internet Food Safety. 571-577 - Jing Wang, Xiaoyue Yang, Chongchong Qu:

Sustainable Food Supply Chain Management and Firm Performance: The Mediating Effect of Food Safety Level. 578-588 - Tong-Qiang Jiang, Xue-Mei Xu, Qing-Chuan Zhang, Zheng Wang:

A Sentiment Classification Model Based on Bi-directional LSTM with Positional Attention for Fresh Food Consumer Reviews. 589-594 - Hao Zhang, An Lin:

Research on Demand Analysis Model of Hot Product in Food Industry. 595-602 - Chihhsiong Shih, Quanen Lai, Huanran Ho, William Cheng-Chung Chu:

Smart Feeder Robot for Severely Disabled Patients. 603-608 - Amit Sharma, Hongrui Liu, Hongwei Liu:

Best Seller Rank (BSR) to Sales: An empirical look at Amazon.com. 609-615 - Jie-Fu Huang, Sun-Yuan Hsieh:

Two Methods for Constructing Independent Spanning Trees in Alternating Group Networks. 616-621 - Fengbao Ma, Qinyun Liu, William Cheng-Chung Chu:

Loop Destroying Algorithm for Generating Creative Solutions Applying in Health Care Area. 622-628 - Guozhi Liu

, Bi Huang, Zhihong Liang, Minmin Qin, Hua Zhou, Zhang Li:
Microservices: architecture, container, and challenges. 629-635 - Penggui Huang

, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing:
BCoV: a covergence of blockchain and IoV. 636-643 - Chong Zeng, Weihua Li, Hualong Guo, Tung-Lung Wu, Dennis Bumsoo Kim

:
Development of A Real 3D Display System. 644-649 - Tian Liu, Hongji Yang, Feng-Jian Wang:

A Creative Approach to Humour Degree Calculation for Utterances. 650-656 - Tao Ma, Hongwei Liu, Hongji Yang:

Interactive Narrative Generation of Aesthetics of Violence in Films. 657-662 - Jie Jian, Xiaotong Zhang, Ping Ma:

Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding. 663-669 - Zhengkang Zuo, Yue Fang, Qing Huang, Yunyan Liao, Yuan Wang, Changjing Wang:

Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems. 670-671 - Halit Alptekin

, Simge Demir, Sevval Simsek, Cemal Yilmaz:
Towards Prioritizing Vulnerability Testing. 672-673 - Omar Masmali, Omar Badreddin:

Comprehensive Model-Driven Complexity Metrics for Software Systems. 674-675 - Wenhua Yang:

API Parameter Recommendations Made Effective. 675-676 - Jiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang:

Effective Iterative Program Synthesis with Knowledge Searched from Internet. 678-679 - Ján Cegin

, Karol Rástocný
, Mária Bieliková:
Synthesized dataset for search-based test data generation methods focused on MC/DC criterion. 680-681 - Yi-Fan Chen, Ding-Hsiang Huang

, Cheng-Fu Huang
, Yi-Kuei Lin:
Reliability Evaluation for a Cloud Computer Network with Fog Computing. 682-683 - Iosif Itkin, Elena Treshcheva

, Luba Konnova, Pavel Braslavski
, Rostislav Yavorskiy:
Black-Box Testing of Financial Virtual Assistants. 684-685 - Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara

:
Towards a Holistic Approach to Medical IoT Forensics. 686-687 - Sa Meng

, Liang Luo, Peng Sun, Yuan Gao:
Reliability Service Assurance in Public Clouds based on Blockchain. 688-689 - Peng Sun, Liang Luo, Shangxin Liu, Weifeng Wu:

Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing. 690-691

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














