Volume 28,Issue 4,2017 Table of Contents

Other Issues:  
  
Contents

  • NuTL2PFG: Checking Satisfiability of νTL Formulas
  • LIU Yao, DUAN Zhen-Hua and TIAN Cong
  • 2017,28(4):898-906 [Abstract(1722)]  [View PDF(973)1.18 M]
  • Randomized Approach to Software Model Generation
  • HE Xiao, LI Wen-Feng, ZHANG Tian, MA Zhi-Yi, SHAO Wei-Zhong and HU Chang-Jun
  • 2017,28(4):907-924 [Abstract(2031)]  [View PDF(910)2.14 M]
  • Loop Vectorization Method Guided by SIMD Parallelism
  • GAO Wei, HAN Lin, ZHAO Rong-Cai, XU Jin-Long and CHEN Chao-Ran
  • 2017,28(4):925-939 [Abstract(1972)]  [View PDF(1415)1.69 M]
  • Fast and Reliable Fault-Tolerance Approach for Service Composition in Integration Networks
  • ZHANG Jun-Na, WANG Shang-Guang, SUN Qi-Bo and YANG Fang-Chun
  • 2017,28(4):940-958 [Abstract(1948)]  [View PDF(1316)2.17 M]
  • Trajectory Big Data: A Review of Key Technologies in Data Processing
  • GAO Qiang, ZHANG Feng-Li, WANG Rui-Jin and ZHOU Fan
  • 2017,28(4):959-992 [Abstract(4819)]  [View PDF(8249)3.58 M]
  • Research Survey on Team Formation in Social Networks
  • HUANG Jian-Bin, SUN Xiao-Jing, ZHOU Yu, LÜ Ze, SUN He-Li and JIA Xiao-Lin
  • 2017,28(4):993-1009 [Abstract(3401)]  [View PDF(1777)2.26 M]
  • Survey of Network Security Situation Awareness
  • GONG Jian, ZANG Xiao-Dong, SU Qi, HU Xiao-Yan and XU Jie
  • 2017,28(4):1010-1026 [Abstract(4101)]  [View PDF(5299)1.93 M]
  • Survey on Cache Coherence Protocol and Performance Optimization for Chip Multi-Processor
  • HU Sen-Sen, JI Wei-Xing, WANG Yi-Zhuo, CHEN Xu, FU Wen-Fei and SHI Feng
  • 2017,28(4):1027-1047 [Abstract(2213)]  [View PDF(1948)2.45 M]
  • Special Issue's Articles

  • 程序设计语言与系统前沿专题前言
  • 冯新宇,陈海波
  • 2017,28(4):745-746 [Abstract(1402)]  [View PDF(1204)385.43 K]
  • Approaches to Obtaining Shared Memory Dependences for Dynamic Analysis of Concurrent Programs: A Survey
  • JIANG Yan-Yan, XU Chang, MA Xiao-Xing and LÜ Jian
  • 2017,28(4):747-763 [Abstract(1589)]  [View PDF(1401)1.89 M]
  • Design and Implementation of Parallel C Programming Language for Domestic Heterogeneous Many-Core Systems
  • HE Wang-Quan, LIU Yong, FANG Yan-Fei, WEI Di and QI Feng-Bin
  • 2017,28(4):764-785 [Abstract(1751)]  [View PDF(1125)4.97 M]
  • Verification of Concrete Programs with Respect to Abstract Programs
  • LI Bin, TANG Zhen-Hao, ZHAI Juan and ZHAO Jian-Hua
  • 2017,28(4):786-803 [Abstract(1651)]  [View PDF(1051)2.10 M]
  • Model on Asynchronous Communication Program Verification Based on Communicating Petri Nets
  • YANG Qi-Zhe and LI Guo-Qiang
  • 2017,28(4):804-818 [Abstract(1419)]  [View PDF(1518)1.69 M]
  • Design and Implementation of Coq Tactics Based on Z3
  • ZHANG Heng-Ruo and FU Ming
  • 2017,28(4):819-826 [Abstract(1769)]  [View PDF(1533)1.03 M]
  • Automatically Validating Static Memory Leak Warnings for C/C++ Programs
  • LI Xiao, ZHOU Yan, LI Meng-Chen, CHEN Yuan-Jun, XU Guo-Qing, WANG Lin-Zhang and LI Xuan-Dong
  • 2017,28(4):827-844 [Abstract(1781)]  [View PDF(1435)2.02 M]
  • Modeling the Impact of DVFS on Performance of Applications in Datacenter
  • LI Deng-Hui, ZHAO Jia-Cheng, CUI Hui-Min and FENG Xiao-Bing
  • 2017,28(4):845-859 [Abstract(1457)]  [View PDF(1128)1.96 M]
  • Principle and Practice of Taint Analysis
  • WANG Lei, LI Feng, LI Lian and FENG Xiao-Bing
  • 2017,28(4):860-882 [Abstract(1847)]  [View PDF(5059)2.49 M]
  • Design and Implementation of Mimic Defense Web Server
  • TONG Qing, ZHANG Zheng, ZHANG Wei-Hua and WU Jiang-Xing
  • 2017,28(4):883-897 [Abstract(1700)]  [View PDF(2612)1.75 M]