Volume 31,Issue 6,2020 Table of Contents

Other Issues:  
  
Contents

  • 信息物理系统软件设计自动化专题前言
  • 卜磊,陈铭松,朱祺,刘超
  • 2020,31(6):1585-1586 [Abstract(197)]  [View PDF(121)298.67 K]
  • Design Pattern Detection Approach Based on Stacked Generalization
  • FENG Tie, JIN Le, ZHANG Jia-Chen, WANG Hong-Yuan
  • 2020,31(6):1703-1722 [Abstract(130)]  [View PDF(180)2.54 M]
  • Chinese Sentence-Level Lip Reading Based on End-to-End Model
  • ZHANG Xiao-Bing, GONG Hai-Gang, YANG Fan, DAI Xi-Li
  • 2020,31(6):1747-1760 [Abstract(143)]  [View PDF(168)1.67 M]
  • Community Aware MSN Routing Scheme Based on ICN Architecture
  • SHI Jun-Ling, WANG Xing-Wei, HUANG Min
  • 2020,31(6):1786-1801 [Abstract(121)]  [View PDF(115)1.87 M]
  • Node Degree Estimation and Static Game Forwarding Strategy Based Routing Protocol for Ad Hoc Networks
  • WANG Qing-Wen, QI Qian, CHENG Wei, LI Dong
  • 2020,31(6):1802-1816 [Abstract(1206)]  [View PDF(589)1.60 M]
  • CP-ABE Scheme with Fast Decryption for Public Cloud
  • ZOU Li-Ping, FENG Chao-Sheng, QIN Zhi-Guang, YUAN Ding, LUO Wang-Ping, LI Min
  • 2020,31(6):1817-1828 [Abstract(128)]  [View PDF(152)1.29 M]
  • Improved Dynamic Cube Attack on Reduced MORUS
  • LI Jun-Zhi, GUAN Jie
  • 2020,31(6):1829-1838 [Abstract(116)]  [View PDF(96)973.57 K]
  • Applying Probabilistic Model Checking to the Quantitative Verification of Task Scheduling for Cloud Rendering System
  • GAO Hong-Hao, MIAO Huai-Kou, LIU Hao-Yu, XU Hua-Hu, YU Zhi-Ruo
  • 2020,31(6):1839-1859 [Abstract(121)]  [View PDF(203)2.38 M]
  • Heuristic Based Resource Provisioning Approach for Big Data Analytics in Cloud Environment
  • WU Yue-Wen, WU Heng, REN Jie, ZHANG Wen-Bo, WEI Jun, WANG Tao, ZHONG Hua
  • 2020,31(6):1860-1874 [Abstract(151)]  [View PDF(319)1.94 M]
  • Container Image Deduplication Method Based on Chunking Reuse of Multi-versions
  • LU Zhi-Gang, XU Ji-Wei, HUANG Tao
  • 2020,31(6):1875-1888 [Abstract(133)]  [View PDF(182)1.40 M]
  • Resource-Constrained Serial Task Offload Strategy in Mobile Edge Computing
  • LIU Wei, HUANG Yu-Cheng, DU Wei, WANG Wei
  • 2020,31(6):1889-1908 [Abstract(133)]  [View PDF(185)2.77 M]
  • Wear Attacks and Defense Mechanisms for Persistent In-memory File Systems
  • YANG Chao-Shu, ZHUGE Qing-Feng, Edwin H-M Sha, CHEN Xian-Zhang, WU Lin, WU Ting
  • 2020,31(6):1909-1929 [Abstract(93)]  [View PDF(107)2.31 M]
  • Special Issue's Articles

  • Towards Modeling and Simulating Behavior of CPS Based on SHML
  • DU De-Hui, GUAN Chun-Lin, WANG Yao, Guo Tong
  • 2020,31(6):1587-1599 [Abstract(541)]  [View PDF(631)1.70 M]
  • Detecting and Preventing Dangling Pointers
  • WANG Yu, GAO Feng-Juan, MA Ke-Xin, SITU Ling-Yun, WANG Lin-Zhang, CHEN Bi-Huan, LIU Yang, ZHAO Jian-Hua, LI Xuan-Dong
  • 2020,31(6):1600-1618 [Abstract(491)]  [View PDF(406)2.07 M]
  • Towards Software Architecture and Accompanying Behavior Mechanism of Autonomous Robotic Control Software Based on Multi-agent System
  • MAO Xin-Jun, YANG Shuo, HUANG Yu-Hong, WANG Shuo
  • 2020,31(6):1619-1637 [Abstract(566)]  [View PDF(1111)2.19 M]
  • Formalizing Railway Interlocking Domain Specific Language
  • ZHAO Meng-Yao, CHEN Xiao-Hong, SUN Hai-Ying, LIU Jing, CHEN Liang-Yu, ZHOU Ting-Liang
  • 2020,31(6):1638-1653 [Abstract(437)]  [View PDF(709)1.79 M]
  • Failure Probabilities Allocation and Safety Assessment Approaches Based on AADL
  • WEI Xiao-Min, DONG Ze-Qian, XIAO Ming-Rui, TIAN Cong
  • 2020,31(6):1654-1671 [Abstract(503)]  [View PDF(527)1.68 M]
  • Event-triggering Secure Control of Markov Jump Cyber-Pysical Systems Under Mode- dependent Denial of Service Attacks
  • MA Chao, WU Wei
  • 2020,31(6):1672-1680 [Abstract(493)]  [View PDF(192)942.57 K]
  • Review Articles

  • Survey of Dynamic Analysis Based Program Invariant Synthesis Techniques
  • WANG Bo, LU Si-Rui, JIANG Jia-Jun, XIONG Ying-Fei
  • 2020,31(6):1681-1702 [Abstract(725)]  [View PDF(1211)2.02 M]
  • Research Progress on Cross-domain Text Sentiment Classification
  • ZHAO Chuan-Jun, WANG Su-Ge, LI De-Yu
  • 2020,31(6):1723-1746 [Abstract(648)]  [View PDF(371)2.26 M]
  • Differential Privacy under Continual Observation
  • LIANG Wen-Juan, CHEN Hong, WU Yun-Cheng, ZHAO Dan, LI Cui-Ping
  • 2020,31(6):1761-1785 [Abstract(658)]  [View PDF(763)2.49 M]