Volume 28,Issue 7,2017 Table of Contents

Other Issues:  
  
Contents

  • Verification Based Decision-Making for Self-Adaptive Systems: A Model-Driven Approach
  • YANG Zhuo-Qun and JIN Zhi
  • Published 7月 25日, 2017
  • 2017,28(7):1676-1697 [Abstract(859)]  [View PDF(814)2.42 M]
  • Contents

  • Theory and Property of Γ-k Truth Degree on Axiomatic Extension of Goguen Propositional Logic System
  • GAO Xiao-Li, HUI Xiao-Jing and ZHU Nai-Diao
  • Published 7月 25日, 2017
  • 2017,28(7):1629-1639 [Abstract(779)]  [View PDF(475)1.13 M]
  • Heuristic Search Algorithm for the Rectangular Fixed-Size Guillotine Bin Packing Problem
  • WANG Lei, LIU Qiang and CHEN Xin
  • Published 7月 25日, 2017
  • 2017,28(7):1640-1654 [Abstract(995)]  [View PDF(791)1.32 M]
  • ParaC: A Domain Programming Framework of Image Processing on GPU Accelerators
  • LU Xing-Jing, LIU Lei, JIA Hai-Peng, FENG Xiao-Bing and WU Cheng-Gang
  • Published 7月 25日, 2017
  • 2017,28(7):1655-1675 [Abstract(1432)]  [View PDF(1175)2.08 M]
  • Parallel Code Generation from Synchronous Specification
  • HU Kai, ZHANG Teng, SHANG Li-Hong, YANG Zhi-Bin and Jean-Pierre TALPIN
  • Published 7月 25日, 2017
  • 2017,28(7):1698-1712 [Abstract(1973)]  [View PDF(2530)1.39 M]
  • Evidence-Based Software Process Trustworthiness Model and Evaluation Method
  • WANG De-Xin, WANG Qing and HE Jie
  • Published 7月 25日, 2017
  • 2017,28(7):1713-1731 [Abstract(1335)]  [View PDF(799)1.82 M]
  • Kernel Code Reuse Attack Detection Technique for Linux
  • CHEN Zhi-Feng, LI Qing-Bao, ZHANG Ping and WANG Ye
  • Published 7月 25日, 2017
  • 2017,28(7):1732-1745 [Abstract(1560)]  [View PDF(1100)1.49 M]
  • Characterizing Uncertainty of Software Reliability Growth Model
  • XU Jia-Jun and YAO Shu-Zhen
  • Published 7月 25日, 2017
  • 2017,28(7):1746-1758 [Abstract(1134)]  [View PDF(581)410.61 K]
  • Greedy Default Logic
  • CHEN Bo, CAO Cun-Gen and SUI Yue-Fei
  • Published 7月 25日, 2017
  • 2017,28(7):1759-1772 [Abstract(1440)]  [View PDF(698)1.37 M]
  • Evolutionary Community Detection in Dynamic Networks
  • NIU Xin-Zheng, SI Wei-Yu and SHE Kun
  • Published 7月 25日, 2017
  • 2017,28(7):1773-1789 [Abstract(1266)]  [View PDF(1115)1.72 M]
  • Multiple Feedback Control Model and Algorithm for Energy Efficient Virtual Network Embedding
  • CHEN Xiao-Hua, LI Chun-Zhi, CHEN Liang-Yu, ZENG Zhen-Bing and JIANG Yun-Liang
  • Published 7月 25日, 2017
  • 2017,28(7):1790-1814 [Abstract(1598)]  [View PDF(634)2.66 M]
  • Algorithm for Large Scale IP Network Multiple Link Congestion Inference
  • CHEN Yu, WEN Xin-Ling, DUAN Zhe-Min and LI Yu-Chong
  • Published 7月 25日, 2017
  • 2017,28(7):1815-1834 [Abstract(1141)]  [View PDF(698)2.04 M]
  • Copy-Move Forgery Detection for Pre-Printing Image Using Digital Halftoning Technology
  • XIE Wei, WAN Xiao-Xia, YE Song-Tao and JIN Guo-Nian
  • Published 7月 25日, 2017
  • 2017,28(7):1835-1846 [Abstract(1484)]  [View PDF(907)1.23 M]
  • Image Classification Based on Bag of Visual Words Model with Triangle Constraint
  • WANG Rong-Gui, DING Kai, YANG Juan, XUE Li-Xia and ZHANG Qing-Yang
  • Published 7月 25日, 2017
  • 2017,28(7):1847-1861 [Abstract(1668)]  [View PDF(952)1.48 M]
  • Enhanced Deep Automatic Image Annotation Based on Data Equalization
  • ZHOU Ming-Ke, KE Xiao and DU Ming-Zhi
  • Published 7月 25日, 2017
  • 2017,28(7):1862-1880 [Abstract(1206)]  [View PDF(926)1.96 M]
  • Runtime Model Based Approach to Managing Hybrid Clouds
  • CHEN Xing, LAN Xing-Tu, LI Ai-Peng, GUO Wen-Zhong and HUANG Gang
  • Published 7月 25日, 2017
  • 2017,28(7):1881-1897 [Abstract(1009)]  [View PDF(676)1.77 M]
  • Research on Task Allocation Based Trust Degree for Social Network of Syncretic System
  • WU Dan-Feng, YU Si-Miao, ZHANG Sheng-Yu and ZHANG Rui-Wen
  • Published 7月 25日, 2017
  • 2017,28(7):1898-1925 [Abstract(965)]  [View PDF(789)2.83 M]