Volume 29,Issue 6,2018 Table of Contents

Other Issues:  
  
Contents

  • Static Analysis Method of Secure Privacy Information Flow for Service Composition
  • PENG Huan-Feng, HUANG Zhi-Qiu, LIU Lin-Yuan, LI Yong and KE Chang-Bo
  • 2018,29(6):1739-1755 [Abstract(3811)]  [View PDF(4340)1.76 M]
  • Fault Localization Method Based on Conditional Probability Model
  • SHU Ting, HUANG Ming-Xian, DING Zuo-Hua, WANG Lei and XIA Jin-Song
  • 2018,29(6):1756-1769 [Abstract(3521)]  [View PDF(4649)1.97 M]
  • Method for Subgraph Matching with Inclusion Degree
  • LI Rui-Yuan and HONG Liang
  • 2018,29(6):1792-1812 [Abstract(3496)]  [View PDF(5717)2.27 M]
  • Special Issue's Articles

  • Preface on Theoretical Foundation of Formal Methods
  • FU Yu-Xi, LI Guo-Qiang and TAN Cun
  • 2018,29(6):1515-1516 [Abstract(3131)]  [View PDF(4148)295.58 K]
  • Extension and Implementation of the Quasi-Local Algorithm for Checking Bisimilarity
  • ZHENG Xiao-Lin, DENG Yu-Xin, FU Chen and LEI Guo-Qing
  • 2018,29(6):1517-1526 [Abstract(3384)]  [View PDF(4400)1.03 M]
  • Automatically Analyzing Inductive Properties for Recursive Data Structures
  • TANG Zhen-Hao, LI Bin, ZHAI Juan and ZHAO Jian-Hua
  • 2018,29(6):1527-1543 [Abstract(3493)]  [View PDF(4053)1.61 M]
  • Automatic Invariant Synthesis for Array Programs
  • LI Bin, ZHAI Juan, TANG Zhen-Hao, TANG En-Yi and ZHAO Jian-Hua
  • 2018,29(6):1544-1565 [Abstract(3859)]  [View PDF(3396)2.23 M]
  • State-of-the-Art Survey on Verification of Vector Addition Systems
  • ZHANG Wen-Bo and LONG Huan
  • 2018,29(6):1566-1581 [Abstract(3554)]  [View PDF(3756)1.71 M]
  • Model-Checking for Heterogeneous Multi-Agent Systems
  • ZHANG Ye-Di and SONG Fu
  • 2018,29(6):1582-1594 [Abstract(3618)]  [View PDF(4185)1.36 M]
  • SMT-Based Approach to Formal Analysis of CCSL with Tool Support
  • YING Yun-Hui and ZHANG Min
  • 2018,29(6):1595-1606 [Abstract(4124)]  [View PDF(4685)1.35 M]
  • Communication Mechanism and Its Implementation for MSVL Based on Message Passing
  • WANG Xiao-Bing, GUO Wen-Xuan and DUAN Zhen-Hua
  • 2018,29(6):1607-1621 [Abstract(3660)]  [View PDF(3964)2.01 M]
  • Runtime Verification of Spatio-Temporal Properties for Pervasive Computing Applications
  • LI Xuan-Song, TAO Xian-Ping and SONG Wei
  • 2018,29(6):1622-1634 [Abstract(3413)]  [View PDF(3922)1.47 M]
  • Tool for Checking Satisfiability of APTL Formulas
  • WANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong
  • 2018,29(6):1635-1646 [Abstract(3535)]  [View PDF(3995)1.31 M]
  • Type Theory Based Domain Data Modelling and Verification with Case Study
  • WUNIRI Qi-Qi-Ge, LI Xiao-Ping, MA Shi-Long and LÜ Jiang-Hua
  • 2018,29(6):1647-1669 [Abstract(3535)]  [View PDF(4175)2.71 M]
  • Modeling and Analysis of Nested Interrupt Systems
  • CUI Jin, DUAN Zhen-Hua, TIAN Cong and ZHANG Nan
  • 2018,29(6):1670-1680 [Abstract(3403)]  [View PDF(3885)1.29 M]
  • Response Time Analysis of Embedded Systems by Taking Interrupt and Context Switch Overheads into Account
  • YU Guang-Liang and YANG Meng-Fei
  • 2018,29(6):1681-1698 [Abstract(3429)]  [View PDF(5072)2.15 M]
  • Modeling and Verification for Robot Joint Bus Communication System
  • MENG Yao, LI Xiao-Juan, GUAN Yong, WANG Rui and ZHANG Jie
  • 2018,29(6):1699-1715 [Abstract(3751)]  [View PDF(5075)1.99 M]
  • Review Articles

  • Study on Key Issues in API Usage
  • LI Zheng, WU Jing-Zheng and LI Ming-Shu
  • 2018,29(6):1716-1738 [Abstract(4281)]  [View PDF(6404)2.41 M]
  • Comparative Study on MapReduce and Spark for Big Data Analytics
  • WU Xin-Dong and JI Sheng-Wei
  • 2018,29(6):1770-1791 [Abstract(5808)]  [View PDF(9572)2.25 M]
  • Study on 5G Mobile Communication Network Security
  • FENG Deng-Guo, XU Jing and LAN Xiao
  • 2018,29(6):1813-1825 [Abstract(5956)]  [View PDF(14265)1.55 M]