UACFinder: Mining Syntactic Carriers of Unspecified Assumptions in Medical Cyber-Physical System Design Models
暂无分享,去创建一个
Shangping Ren | Zhenyu Zhang | Zhicheng Fu | Chunhui Guo | Lui Sha | L. Sha | Shangping Ren | Chunhui Guo | Zhicheng Fu | Zhenyu Zhang
[1] AgrawalRakesh,et al. Mining association rules between sets of items in large databases , 1993 .
[2] Lui Sha,et al. Modeling and integrating physical environment assumptions in medical cyber-physical system design , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[3] Ahmed Amine Jerraya,et al. Modeling and rapid prototyping of avionics using STATEMATE , 1995, Proceedings Sixth IEEE International Workshop on Rapid System Prototyping. Shortening the Path from Specification to Prototype.
[4] Gösta Grahne,et al. Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.
[5] Gunnar Peterson,et al. Software Assumptions Lead to Preventable Errors , 2009, IEEE Security & Privacy.
[6] Lui Sha,et al. Pattern-Based Statechart Modeling Approach for Medical Best Practice Guidelines - A Case Study , 2017, 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS).
[7] Bart Goethals,et al. A primer to frequent itemset mining for bioinformatics , 2013, Briefings Bioinform..
[8] Lui Sha,et al. Transforming Medical Best Practice Guidelines to Executable and Verifiable Statechart Models , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[9] Воробьев Антон Александрович. Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .
[10] Lui Sha,et al. IAFinder: Identifying Potential Implicit Assumptions to Facilitate Validation in Medical Cyber-Physical System , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[11] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[12] Steven J. Landry. Human centered design in the air traffic control system , 2011, J. Intell. Manuf..
[13] S YuPhilip,et al. An effective hash-based algorithm for mining association rules , 1995 .
[14] David Harel,et al. Using the Statecharts paradigm for simulation of patient flow in surgical care , 2008, Health care management science.
[15] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[16] P. Lago,et al. Explicit assumptions enrich architectural models , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[17] Grace A. Lewis,et al. Assumptions Management in Software Development , 2004 .
[18] Insup Lee,et al. Safety-critical medical device development using the UPP2SF model translation tool , 2014, ACM Trans. Embed. Comput. Syst..
[19] Lui Sha,et al. An Organ-Centric Best Practice Assist System for Acute Care , 2016, 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS).
[20] J. Samet,et al. From the Food and Drug Administration. , 2002, JAMA.
[21] F. J. Corbató,et al. On building systems that will fail , 1991, CACM.
[22] Amnon Naamad,et al. The STATEMATE semantics of statecharts , 1996, TSEM.
[23] Lui Sha,et al. Study of Software-Related Causes in the FDA Medical Device Recalls , 2017, 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS).
[24] M. Smith,et al. Chronic renal insufficiency: a diagnostic and therapeutic approach. , 1998, Archives of internal medicine.
[25] Insup Lee,et al. From Verification to Implementation: A Model Translation Tool and a Pacemaker Case Study , 2012, 2012 IEEE 18th Real Time and Embedded Technology and Applications Symposium.
[26] Diana Bohm. Clinical Methods The History Physical And Laboratory Examinations , 2016 .
[27] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[28] Bjarne Stroustrup,et al. The C++ programming language (2nd ed.) , 1991 .
[29] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[30] Virendra Singh,et al. Blood gas analysis for bedside diagnosis , 2013, National journal of maxillofacial surgery.
[31] Craig D Smallwood,et al. Carbon Dioxide Elimination and Oxygen Consumption in Mechanically Ventilated Children , 2014, Respiratory Care.
[32] James D. Arthur,et al. Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[33] Yu Jiang,et al. Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).
[34] Yuriy Brun,et al. Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms , 2015, IEEE Transactions on Software Engineering.
[35] Tzeng-Ji Chen,et al. Application of Frequent Itemsets Mining to Analyze Patterns of One-Stop Visits in Taiwan , 2011, PloS one.
[36] Philip S. Yu,et al. An effective hash-based algorithm for mining association rules , 1995, SIGMOD '95.
[37] Lui Sha,et al. An Assumptions Management Framework for Systems Software , 2006 .
[38] Meir M. Lehman,et al. Rules and Tools for Software Evolution Planning and Management , 2001, Ann. Softw. Eng..
[39] Lui Sha,et al. Use Runtime Verification to Improve the Quality of Medical Care Practice , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).