Volume 27,Issue 8,2016 Table of Contents
Model and Solution to Testing Resource Dynamic Allocation for Series-Parallel Software SystemsLU Yang, YUE Feng, ZHANG Guo-Fu, SU Zhao-Pin and WANG Yong-Qi2016,27(8):1964-1977 [Abstract(2823)] [View PDF(3206)864.50 K]Software Fault Location Based on Double-Times-Locating StrategyZONG Fang-Fang, HUANG Hong-Yun and DING Zuo-Hua2016,27(8):1993-2007 [Abstract(3012)] [View PDF(3673)703.90 K]Weak Mutation Testing and Its Transformation for Message Passing Parallel ProgramsGONG Dun-Wei, CHEN Yong-Wei and TIAN Tian2016,27(8):2008-2024 [Abstract(2900)] [View PDF(4605)843.29 K]Topology Discovery with Incomplete Address Forwarding TableZHANG Bin, DIAO Xing-Chun, SUN Yan-Tao, DING Kun and YAN Hao2016,27(8):2086-2098 [Abstract(3192)] [View PDF(3475)659.99 K]Fusion-Based Cognitive Awareness-Control Model for Network Security SituationLIU Xiao-Wu, WANG Hui-Qiang, Lü Hong-Wu, YU Ji-Guo and ZHANG Shu-Wen2016,27(8):2099-2114 [Abstract(3561)] [View PDF(4671)1.48 M]Method of Pushing Context-Aware Service of Augmented Reality by Scene ClassificationLIN Yi, LIU Yue, WANG Yong-Tian and HE Chang-Yu2016,27(8):2115-2134 [Abstract(2792)] [View PDF(5021)4.91 M]Forward-Motion Blurring Kernel Based on Generalized Motion Blurring ModelJIANG Xin-Lan, WANG Liang, LUO Xiao-Yue, WANG Sheng-Chun and LUO Si-Wei2016,27(8):2135-2146 [Abstract(2789)] [View PDF(3419)2.12 M]
数据开放与隐私管理专题前言孟小峰,林东岱2016,27(8):1889-1890 [Abstract(4921)] [View PDF(4416)281.76 K]Information Entropy Models and Privacy Metrics Methods for Privacy ProtectionPENG Chang-Gen, DING Hong-Fa, ZHU Yi-Jie, TIAN You-Liang and FU Zu-Feng2016,27(8):1891-1903 [Abstract(5589)] [View PDF(7451)647.20 K]Efficient Algorithm on Anonymizing Social Networks with Reachability PreservationLIU Xiang-Yu, LI Jia-Jia, AN Yun-Zhe, ZHOU Da-Hai and XIA Xiu-Feng2016,27(8):1904-1921 [Abstract(4927)] [View PDF(4747)902.93 K]Preservation of Implicit Privacy in Spatio-Temporal Data PublicationWANG Lu, MENG Xiao-Feng and GUO Sheng-Na2016,27(8):1922-1933 [Abstract(5965)] [View PDF(6479)1.29 M]
Survey on Log Research of Large Scale Software SystemLIAO Xiang-Ke, LI Shan-Shan, Dong Wei, JIA Zhou-Yang, LIU Xiao-Dong and ZHOU Shu-Lin2016,27(8):1934-1947 [Abstract(9018)] [View PDF(9859)995.37 K]
Specification and Verification of User Privacy Requirements for Service CompositionPENG Huan-Feng, HUANG Zhi-Qiu, FAN Da-Juan and ZHANG Yong-Long2016,27(8):1948-1963 [Abstract(3859)] [View PDF(4196)894.22 K]Web Service QoS Monitoring Approach Sensing to Environmental FactorsZHUANG Yuan, ZHANG Peng-Cheng, LI Wen-Rui, FENG Jun and ZHU Yue-Long2016,27(8):1978-1992 [Abstract(3929)] [View PDF(4370)992.66 K]
Survey on Incentive Mechanisms for Crowd SensingWU Yao, ZENG Ju-Ru, PENG Hui, CHEN Hong and LI Cui-Ping2016,27(8):2025-2047 [Abstract(7318)] [View PDF(13837)1.41 M]New Processor for Data-Intensive ComputingWANG He-Peng, WANG Hong-Zhi, LI Jia-Ning, KONG Xin-Xin, LI Jian-Zhong and GAO Hong2016,27(8):2048-2067 [Abstract(5157)] [View PDF(5891)866.49 K]
Inconsistency Detection in Distributed Big DataLI Wei-Bang, LI Zhan-Huai, CHEN Qun, YANG Jing-Ying and JIANG Tao2016,27(8):2068-2085 [Abstract(3798)] [View PDF(4234)813.18 K]
Survey on In-Memory Computing TechnologyLUO Le, LIU Yi and QIAN De-Pei2016,27(8):2147-2167 [Abstract(6868)] [View PDF(11259)495.48 K]
Cross-Platform Data Layout Optimization Based on Relaxed Reuse Distance on Heterogeneous ArchitecturesLIU Ying, HUANG Lei, Lü Fang, CUI Hui-Min, WANG Lei and FENG Xiao-Bing2016,27(8):2168-2184 [Abstract(2670)] [View PDF(3618)1.69 M]