Volume 29,Issue 6,2018 Table of Contents
Static Analysis Method of Secure Privacy Information Flow for Service CompositionPENG Huan-Feng, HUANG Zhi-Qiu, LIU Lin-Yuan, LI Yong and KE Chang-Bo2018,29(6):1739-1755 [Abstract(3811)] [View PDF(4340)1.76 M]Fault Localization Method Based on Conditional Probability ModelSHU Ting, HUANG Ming-Xian, DING Zuo-Hua, WANG Lei and XIA Jin-Song2018,29(6):1756-1769 [Abstract(3521)] [View PDF(4649)1.97 M]Method for Subgraph Matching with Inclusion DegreeLI Rui-Yuan and HONG Liang2018,29(6):1792-1812 [Abstract(3496)] [View PDF(5717)2.27 M]
Preface on Theoretical Foundation of Formal MethodsFU Yu-Xi, LI Guo-Qiang and TAN Cun2018,29(6):1515-1516 [Abstract(3131)] [View PDF(4148)295.58 K]Extension and Implementation of the Quasi-Local Algorithm for Checking BisimilarityZHENG Xiao-Lin, DENG Yu-Xin, FU Chen and LEI Guo-Qing2018,29(6):1517-1526 [Abstract(3384)] [View PDF(4400)1.03 M]Automatically Analyzing Inductive Properties for Recursive Data StructuresTANG Zhen-Hao, LI Bin, ZHAI Juan and ZHAO Jian-Hua2018,29(6):1527-1543 [Abstract(3493)] [View PDF(4053)1.61 M]Automatic Invariant Synthesis for Array ProgramsLI Bin, ZHAI Juan, TANG Zhen-Hao, TANG En-Yi and ZHAO Jian-Hua2018,29(6):1544-1565 [Abstract(3859)] [View PDF(3396)2.23 M]State-of-the-Art Survey on Verification of Vector Addition SystemsZHANG Wen-Bo and LONG Huan2018,29(6):1566-1581 [Abstract(3554)] [View PDF(3756)1.71 M]Model-Checking for Heterogeneous Multi-Agent SystemsZHANG Ye-Di and SONG Fu2018,29(6):1582-1594 [Abstract(3618)] [View PDF(4185)1.36 M]SMT-Based Approach to Formal Analysis of CCSL with Tool SupportYING Yun-Hui and ZHANG Min2018,29(6):1595-1606 [Abstract(4124)] [View PDF(4685)1.35 M]Communication Mechanism and Its Implementation for MSVL Based on Message PassingWANG Xiao-Bing, GUO Wen-Xuan and DUAN Zhen-Hua2018,29(6):1607-1621 [Abstract(3660)] [View PDF(3964)2.01 M]Runtime Verification of Spatio-Temporal Properties for Pervasive Computing ApplicationsLI Xuan-Song, TAO Xian-Ping and SONG Wei2018,29(6):1622-1634 [Abstract(3413)] [View PDF(3922)1.47 M]Tool for Checking Satisfiability of APTL FormulasWANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong2018,29(6):1635-1646 [Abstract(3535)] [View PDF(3995)1.31 M]Type Theory Based Domain Data Modelling and Verification with Case StudyWUNIRI Qi-Qi-Ge, LI Xiao-Ping, MA Shi-Long and LÜ Jiang-Hua2018,29(6):1647-1669 [Abstract(3535)] [View PDF(4175)2.71 M]Modeling and Analysis of Nested Interrupt SystemsCUI Jin, DUAN Zhen-Hua, TIAN Cong and ZHANG Nan2018,29(6):1670-1680 [Abstract(3403)] [View PDF(3885)1.29 M]Response Time Analysis of Embedded Systems by Taking Interrupt and Context Switch Overheads into AccountYU Guang-Liang and YANG Meng-Fei2018,29(6):1681-1698 [Abstract(3429)] [View PDF(5072)2.15 M]Modeling and Verification for Robot Joint Bus Communication SystemMENG Yao, LI Xiao-Juan, GUAN Yong, WANG Rui and ZHANG Jie2018,29(6):1699-1715 [Abstract(3751)] [View PDF(5075)1.99 M]
Study on Key Issues in API UsageLI Zheng, WU Jing-Zheng and LI Ming-Shu2018,29(6):1716-1738 [Abstract(4281)] [View PDF(6404)2.41 M]Comparative Study on MapReduce and Spark for Big Data AnalyticsWU Xin-Dong and JI Sheng-Wei2018,29(6):1770-1791 [Abstract(5808)] [View PDF(9572)2.25 M]Study on 5G Mobile Communication Network SecurityFENG Deng-Guo, XU Jing and LAN Xiao2018,29(6):1813-1825 [Abstract(5956)] [View PDF(14265)1.55 M]