Volume 27,Issue 8,2016 Table of Contents

Other Issues:  
  
Contents

  • Model and Solution to Testing Resource Dynamic Allocation for Series-Parallel Software Systems
  • LU Yang, YUE Feng, ZHANG Guo-Fu, SU Zhao-Pin and WANG Yong-Qi
  • 2016,27(8):1964-1977 [Abstract(1846)]  [View PDF(1295)864.50 K]
  • Software Fault Location Based on Double-Times-Locating Strategy
  • ZONG Fang-Fang, HUANG Hong-Yun and DING Zuo-Hua
  • 2016,27(8):1993-2007 [Abstract(1924)]  [View PDF(1539)703.90 K]
  • Weak Mutation Testing and Its Transformation for Message Passing Parallel Programs
  • GONG Dun-Wei, CHEN Yong-Wei and TIAN Tian
  • 2016,27(8):2008-2024 [Abstract(1905)]  [View PDF(2614)843.29 K]
  • Topology Discovery with Incomplete Address Forwarding Table
  • ZHANG Bin, DIAO Xing-Chun, SUN Yan-Tao, DING Kun and YAN Hao
  • 2016,27(8):2086-2098 [Abstract(1952)]  [View PDF(1476)659.99 K]
  • Fusion-Based Cognitive Awareness-Control Model for Network Security Situation
  • LIU Xiao-Wu, WANG Hui-Qiang, Lü Hong-Wu, YU Ji-Guo and ZHANG Shu-Wen
  • 2016,27(8):2099-2114 [Abstract(2250)]  [View PDF(1951)1.48 M]
  • Method of Pushing Context-Aware Service of Augmented Reality by Scene Classification
  • LIN Yi, LIU Yue, WANG Yong-Tian and HE Chang-Yu
  • 2016,27(8):2115-2134 [Abstract(1843)]  [View PDF(2464)4.91 M]
  • Forward-Motion Blurring Kernel Based on Generalized Motion Blurring Model
  • JIANG Xin-Lan, WANG Liang, LUO Xiao-Yue, WANG Sheng-Chun and LUO Si-Wei
  • 2016,27(8):2135-2146 [Abstract(1795)]  [View PDF(1365)2.12 M]
  • Special Issue's Articles

  • 数据开放与隐私管理专题前言
  • 孟小峰,林东岱
  • 2016,27(8):1889-1890 [Abstract(3528)]  [View PDF(2175)281.76 K]
  • Information Entropy Models and Privacy Metrics Methods for Privacy Protection
  • PENG Chang-Gen, DING Hong-Fa, ZHU Yi-Jie, TIAN You-Liang and FU Zu-Feng
  • 2016,27(8):1891-1903 [Abstract(3413)]  [View PDF(2911)647.20 K]
  • Efficient Algorithm on Anonymizing Social Networks with Reachability Preservation
  • LIU Xiang-Yu, LI Jia-Jia, AN Yun-Zhe, ZHOU Da-Hai and XIA Xiu-Feng
  • 2016,27(8):1904-1921 [Abstract(3279)]  [View PDF(2176)902.93 K]
  • Preservation of Implicit Privacy in Spatio-Temporal Data Publication
  • WANG Lu, MENG Xiao-Feng and GUO Sheng-Na
  • 2016,27(8):1922-1933 [Abstract(4553)]  [View PDF(3524)1.29 M]
  • Review Articles

  • Survey on Log Research of Large Scale Software System
  • LIAO Xiang-Ke, LI Shan-Shan, Dong Wei, JIA Zhou-Yang, LIU Xiao-Dong and ZHOU Shu-Lin
  • 2016,27(8):1934-1947 [Abstract(6148)]  [View PDF(5373)995.37 K]
  • Contents

  • Specification and Verification of User Privacy Requirements for Service Composition
  • PENG Huan-Feng, HUANG Zhi-Qiu, FAN Da-Juan and ZHANG Yong-Long
  • 2016,27(8):1948-1963 [Abstract(2711)]  [View PDF(2071)894.22 K]
  • Web Service QoS Monitoring Approach Sensing to Environmental Factors
  • ZHUANG Yuan, ZHANG Peng-Cheng, LI Wen-Rui, FENG Jun and ZHU Yue-Long
  • 2016,27(8):1978-1992 [Abstract(2796)]  [View PDF(1976)992.66 K]
  • Review Articles

  • Survey on Incentive Mechanisms for Crowd Sensing
  • WU Yao, ZENG Ju-Ru, PENG Hui, CHEN Hong and LI Cui-Ping
  • 2016,27(8):2025-2047 [Abstract(5068)]  [View PDF(7292)1.41 M]
  • New Processor for Data-Intensive Computing
  • WANG He-Peng, WANG Hong-Zhi, LI Jia-Ning, KONG Xin-Xin, LI Jian-Zhong and GAO Hong
  • 2016,27(8):2048-2067 [Abstract(3731)]  [View PDF(2660)866.49 K]
  • Contents

  • Inconsistency Detection in Distributed Big Data
  • LI Wei-Bang, LI Zhan-Huai, CHEN Qun, YANG Jing-Ying and JIANG Tao
  • 2016,27(8):2068-2085 [Abstract(2605)]  [View PDF(2068)813.18 K]
  • Review Articles

  • Survey on In-Memory Computing Technology
  • LUO Le, LIU Yi and QIAN De-Pei
  • 2016,27(8):2147-2167 [Abstract(4912)]  [View PDF(6573)495.48 K]
  • Contents

  • Cross-Platform Data Layout Optimization Based on Relaxed Reuse Distance on Heterogeneous Architectures
  • LIU Ying, HUANG Lei, Lü Fang, CUI Hui-Min, WANG Lei and FENG Xiao-Bing
  • 2016,27(8):2168-2184 [Abstract(1766)]  [View PDF(1602)1.69 M]