Volume 29,Issue 6,2018 Table of Contents

Other Issues:  
  
Contents

  • Static Analysis Method of Secure Privacy Information Flow for Service Composition
  • PENG Huan-Feng, HUANG Zhi-Qiu, LIU Lin-Yuan, LI Yong and KE Chang-Bo
  • 2018,29(6):1739-1755 [Abstract(1669)]  [View PDF(1278)1.76 M]
  • Fault Localization Method Based on Conditional Probability Model
  • SHU Ting, HUANG Ming-Xian, DING Zuo-Hua, WANG Lei and XIA Jin-Song
  • 2018,29(6):1756-1769 [Abstract(1502)]  [View PDF(1533)1.97 M]
  • Method for Subgraph Matching with Inclusion Degree
  • LI Rui-Yuan and HONG Liang
  • 2018,29(6):1792-1812 [Abstract(1748)]  [View PDF(2014)2.27 M]
  • Special Issue's Articles

  • Preface on Theoretical Foundation of Formal Methods
  • FU Yu-Xi, LI Guo-Qiang and TAN Cun
  • 2018,29(6):1515-1516 [Abstract(779)]  [View PDF(647)295.58 K]
  • Extension and Implementation of the Quasi-Local Algorithm for Checking Bisimilarity
  • ZHENG Xiao-Lin, DENG Yu-Xin, FU Chen and LEI Guo-Qing
  • 2018,29(6):1517-1526 [Abstract(1184)]  [View PDF(779)1.03 M]
  • Automatically Analyzing Inductive Properties for Recursive Data Structures
  • TANG Zhen-Hao, LI Bin, ZHAI Juan and ZHAO Jian-Hua
  • 2018,29(6):1527-1543 [Abstract(1171)]  [View PDF(805)1.61 M]
  • Automatic Invariant Synthesis for Array Programs
  • LI Bin, ZHAI Juan, TANG Zhen-Hao, TANG En-Yi and ZHAO Jian-Hua
  • 2018,29(6):1544-1565 [Abstract(1334)]  [View PDF(690)2.23 M]
  • State-of-the-Art Survey on Verification of Vector Addition Systems
  • ZHANG Wen-Bo and LONG Huan
  • 2018,29(6):1566-1581 [Abstract(1354)]  [View PDF(687)1.71 M]
  • Model-Checking for Heterogeneous Multi-Agent Systems
  • ZHANG Ye-Di and SONG Fu
  • 2018,29(6):1582-1594 [Abstract(1127)]  [View PDF(882)1.36 M]
  • SMT-Based Approach to Formal Analysis of CCSL with Tool Support
  • YING Yun-Hui and ZHANG Min
  • 2018,29(6):1595-1606 [Abstract(1361)]  [View PDF(869)1.35 M]
  • Communication Mechanism and Its Implementation for MSVL Based on Message Passing
  • WANG Xiao-Bing, GUO Wen-Xuan and DUAN Zhen-Hua
  • 2018,29(6):1607-1621 [Abstract(1228)]  [View PDF(686)2.01 M]
  • Runtime Verification of Spatio-Temporal Properties for Pervasive Computing Applications
  • LI Xuan-Song, TAO Xian-Ping and SONG Wei
  • 2018,29(6):1622-1634 [Abstract(1105)]  [View PDF(745)1.47 M]
  • Tool for Checking Satisfiability of APTL Formulas
  • WANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong
  • 2018,29(6):1635-1646 [Abstract(1198)]  [View PDF(771)1.31 M]
  • Type Theory Based Domain Data Modelling and Verification with Case Study
  • WUNIRI Qi-Qi-Ge, LI Xiao-Ping, MA Shi-Long and LÜ Jiang-Hua
  • 2018,29(6):1647-1669 [Abstract(1108)]  [View PDF(770)2.71 M]
  • Modeling and Analysis of Nested Interrupt Systems
  • CUI Jin, DUAN Zhen-Hua, TIAN Cong and ZHANG Nan
  • 2018,29(6):1670-1680 [Abstract(1151)]  [View PDF(695)1.29 M]
  • Response Time Analysis of Embedded Systems by Taking Interrupt and Context Switch Overheads into Account
  • YU Guang-Liang and YANG Meng-Fei
  • 2018,29(6):1681-1698 [Abstract(1089)]  [View PDF(1139)2.15 M]
  • Modeling and Verification for Robot Joint Bus Communication System
  • MENG Yao, LI Xiao-Juan, GUAN Yong, WANG Rui and ZHANG Jie
  • 2018,29(6):1699-1715 [Abstract(1294)]  [View PDF(956)1.99 M]
  • Review Articles

  • Study on Key Issues in API Usage
  • LI Zheng, WU Jing-Zheng and LI Ming-Shu
  • 2018,29(6):1716-1738 [Abstract(1418)]  [View PDF(1445)2.41 M]
  • Comparative Study on MapReduce and Spark for Big Data Analytics
  • WU Xin-Dong and JI Sheng-Wei
  • 2018,29(6):1770-1791 [Abstract(2268)]  [View PDF(3032)2.25 M]
  • Study on 5G Mobile Communication Network Security
  • FENG Deng-Guo, XU Jing and LAN Xiao
  • 2018,29(6):1813-1825 [Abstract(1905)]  [View PDF(4210)1.55 M]