Volume 27,Issue 8,2016 Table of Contents

Other Issues:  
  
Contents

  • Model and Solution to Testing Resource Dynamic Allocation for Series-Parallel Software Systems
  • LU Yang, YUE Feng, ZHANG Guo-Fu, SU Zhao-Pin and WANG Yong-Qi
  • 2016,27(8):1964-1977 [Abstract(1163)]  [View PDF(1030)864.50 K]
  • Software Fault Location Based on Double-Times-Locating Strategy
  • ZONG Fang-Fang, HUANG Hong-Yun and DING Zuo-Hua
  • 2016,27(8):1993-2007 [Abstract(1242)]  [View PDF(1130)703.90 K]
  • Weak Mutation Testing and Its Transformation for Message Passing Parallel Programs
  • GONG Dun-Wei, CHEN Yong-Wei and TIAN Tian
  • 2016,27(8):2008-2024 [Abstract(1142)]  [View PDF(1483)843.29 K]
  • Topology Discovery with Incomplete Address Forwarding Table
  • ZHANG Bin, DIAO Xing-Chun, SUN Yan-Tao, DING Kun and YAN Hao
  • 2016,27(8):2086-2098 [Abstract(1275)]  [View PDF(1069)659.99 K]
  • Fusion-Based Cognitive Awareness-Control Model for Network Security Situation
  • LIU Xiao-Wu, WANG Hui-Qiang, Lü Hong-Wu, YU Ji-Guo and ZHANG Shu-Wen
  • 2016,27(8):2099-2114 [Abstract(1452)]  [View PDF(1576)1.48 M]
  • Method of Pushing Context-Aware Service of Augmented Reality by Scene Classification
  • LIN Yi, LIU Yue, WANG Yong-Tian and HE Chang-Yu
  • 2016,27(8):2115-2134 [Abstract(1138)]  [View PDF(1385)4.91 M]
  • Forward-Motion Blurring Kernel Based on Generalized Motion Blurring Model
  • JIANG Xin-Lan, WANG Liang, LUO Xiao-Yue, WANG Sheng-Chun and LUO Si-Wei
  • 2016,27(8):2135-2146 [Abstract(1138)]  [View PDF(1039)2.12 M]
  • Special Issue's Articles

  • 数据开放与隐私管理专题前言
  • 孟小峰,林东岱
  • 2016,27(8):1889-1890 [Abstract(2524)]  [View PDF(1761)281.76 K]
  • Information Entropy Models and Privacy Metrics Methods for Privacy Protection
  • PENG Chang-Gen, DING Hong-Fa, ZHU Yi-Jie, TIAN You-Liang and FU Zu-Feng
  • 2016,27(8):1891-1903 [Abstract(2073)]  [View PDF(2167)647.20 K]
  • Efficient Algorithm on Anonymizing Social Networks with Reachability Preservation
  • LIU Xiang-Yu, LI Jia-Jia, AN Yun-Zhe, ZHOU Da-Hai and XIA Xiu-Feng
  • 2016,27(8):1904-1921 [Abstract(2167)]  [View PDF(1497)902.93 K]
  • Preservation of Implicit Privacy in Spatio-Temporal Data Publication
  • WANG Lu, MENG Xiao-Feng and GUO Sheng-Na
  • 2016,27(8):1922-1933 [Abstract(3688)]  [View PDF(3095)1.29 M]
  • Review Articles

  • Survey on Log Research of Large Scale Software System
  • LIAO Xiang-Ke, LI Shan-Shan, Dong Wei, JIA Zhou-Yang, LIU Xiao-Dong and ZHOU Shu-Lin
  • 2016,27(8):1934-1947 [Abstract(4598)]  [View PDF(4018)995.37 K]
  • Contents

  • Specification and Verification of User Privacy Requirements for Service Composition
  • PENG Huan-Feng, HUANG Zhi-Qiu, FAN Da-Juan and ZHANG Yong-Long
  • 2016,27(8):1948-1963 [Abstract(1882)]  [View PDF(1607)894.22 K]
  • Web Service QoS Monitoring Approach Sensing to Environmental Factors
  • ZHUANG Yuan, ZHANG Peng-Cheng, LI Wen-Rui, FENG Jun and ZHU Yue-Long
  • 2016,27(8):1978-1992 [Abstract(1970)]  [View PDF(1346)992.66 K]
  • Review Articles

  • Survey on Incentive Mechanisms for Crowd Sensing
  • WU Yao, ZENG Ju-Ru, PENG Hui, CHEN Hong and LI Cui-Ping
  • 2016,27(8):2025-2047 [Abstract(3879)]  [View PDF(5136)1.41 M]
  • New Processor for Data-Intensive Computing
  • WANG He-Peng, WANG Hong-Zhi, LI Jia-Ning, KONG Xin-Xin, LI Jian-Zhong and GAO Hong
  • 2016,27(8):2048-2067 [Abstract(2854)]  [View PDF(1835)866.49 K]
  • Contents

  • Inconsistency Detection in Distributed Big Data
  • LI Wei-Bang, LI Zhan-Huai, CHEN Qun, YANG Jing-Ying and JIANG Tao
  • 2016,27(8):2068-2085 [Abstract(1925)]  [View PDF(1703)813.18 K]
  • Review Articles

  • Survey on In-Memory Computing Technology
  • LUO Le, LIU Yi and QIAN De-Pei
  • 2016,27(8):2147-2167 [Abstract(3664)]  [View PDF(4292)495.48 K]
  • Contents

  • Cross-Platform Data Layout Optimization Based on Relaxed Reuse Distance on Heterogeneous Architectures
  • LIU Ying, HUANG Lei, Lü Fang, CUI Hui-Min, WANG Lei and FENG Xiao-Bing
  • 2016,27(8):2168-2184 [Abstract(1185)]  [View PDF(1284)1.69 M]