Volume 33,Issue 8,2022 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Hierarchical Refined Modeling and Verification Method of Airborne Software Using SysML
  • XIAO Si-Hui, LIU Qi, HUANG Yan-Hong, SHI Jian-Qi, GUO Xin
  • Published August 06, 2022 (24 pages)
  • 2022,33(8):2851-2874 [Abstract(688)]  [View PDF(1799)5.15 M]
  • Model-free Safe Reinforcement Learning Method Based on Constrained Markov Decision Processes
  • ZHU Fei, GE Yang-Yang, LING Xing-Hong, LIU Quan
  • Published August 06, 2022 (17 pages)
  • 2022,33(8):3086-3102 [Abstract(746)]  [View PDF(1643)1.66 M]
  • Multi-rule Shortest Path Query Algorithm in Time-dependent Networks
  • LI Yan-Hong, WANG Meng, LI Guo-Hui, LUO Chang-Yin, DU Xiao-Kun
  • Published August 06, 2022 (22 pages)
  • 2022,33(8):3115-3136 [Abstract(646)]  [View PDF(1553)2.09 M]
  • Special Issue's Articles

  • 形式化方法与应用专题前言
  • 陈立前,孙猛
  • Published August 06, 2022 (2 pages)
  • 2022,33(8):2753-2754 [Abstract(613)]  [View PDF(1659)359.56 K]
  • Parallel Runtime Verification for Calling Sequences of SQLite3 Database APIs
  • YU Bin, LU Xu, TIAN Cong, DUAN Zhen-Hua, ZHANG Nan
  • Published August 06, 2022 (17 pages)
  • 2022,33(8):2755-2768 [Abstract(1283)]  [View PDF(2529)1.77 M]
  • LTL Synthesis via Non-deterministic Planning
  • LU Xu, YU Bin, TIAN Cong, DUAN Zhen-Hua
  • Published August 06, 2022 (13 pages)
  • 2022,33(8):2769-2781 [Abstract(1031)]  [View PDF(2147)1.40 M]
  • Verification Method of Asynchronously Communicating Programs Based on Basic Parallel Processes
  • ZHAO Ying, TAN Jin-Hao, LI Guo-Qiang
  • Published August 06, 2022 (15 pages)
  • 2022,33(8):2782-2796 [Abstract(1016)]  [View PDF(2375)1.66 M]
  • Learning Deterministic One-clock Timed Automata Based on Timed Classification Tree
  • MI Jun-Ri, ZHANG Miao-Miao, AN Jie, DU Bo-Wen
  • Published August 06, 2022 (19 pages)
  • 2022,33(8):2797-2814 [Abstract(915)]  [View PDF(2249)2.05 M]
  • Modeling and Safety Verification Method for CPS Time and Topology Constrained Resources
  • CHEN Xiao-Ying, ZHU Yi, ZHAO Yu, WANG Jin-Yong
  • Published August 06, 2022 (27 pages)
  • 2022,33(8):2815-2838 [Abstract(1233)]  [View PDF(2460)2.75 M]
  • Predicting Propositional Satisfiability via Message Passing Relation Network
  • BAO Dong-Qing, GE Ning, ZHAI Shu-Mao, ZHANG Li
  • Published August 06, 2022 (12 pages)
  • 2022,33(8):2839-2850 [Abstract(865)]  [View PDF(2065)1.23 M]
  • Time Constraint Patterns of Smart Contracts and Their Formal Verification
  • ZHAO Ying-Qi, ZHU Xue-Yang, LI Guang-Yuan, BAO Yu-Long
  • Published August 06, 2022 (22 pages)
  • 2022,33(8):2875-2895 [Abstract(1427)]  [View PDF(2720)2.41 M]
  • Decidability of Bounded Linearizability on TSO Memory Model
  • WANG Chao, Lü Yi, WU Peng, JIA Qiao-Wen
  • Published August 06, 2022 (23 pages)
  • 2022,33(8):2896-2917 [Abstract(1056)]  [View PDF(2005)2.00 M]
  • Ranking Function Synthesis for Loop Programs via Counterexample Guided Deep Learning
  • LIN Kai-Peng, MEI Guo-Quan, LIN Wang, DING Zuo-Hua
  • Published August 06, 2022 (13 pages)
  • 2022,33(8):2918-2929 [Abstract(903)]  [View PDF(2037)1.19 M]
  • Model Checking for Real-time Branching-time Temporal Logic Based on Temporal Testers
  • LUO Xiang-Yu, HUANG Xin-Yue, GU Tian-Long, SU Kai-Le, CHEN Zu-Xi, ZHENG Li-Xiao
  • Published August 06, 2022 (19 pages)
  • 2022,33(8):2930-2946 [Abstract(993)]  [View PDF(2136)1.86 M]
  • Time-point-interval Prioritized Time Petri Nets Modelling Real-time Systems and TCTL Checking
  • HE Lei-Feng, LIU Guan-Jun
  • Published August 06, 2022 (17 pages)
  • 2022,33(8):2947-2963 [Abstract(1066)]  [View PDF(2096)1.75 M]
  • Optimization Technique for Interprocedual Analysis Using Function Inlining in Abstract Interpretation
  • CHEN Tao-Qing, FAN Guang-Sheng, YIN Bang-Hu, CHEN Li-Qian, WANG Ji
  • Published August 06, 2022 (16 pages)
  • 2022,33(8):2964-2979 [Abstract(1091)]  [View PDF(2057)1.51 M]
  • Verification of Termination for File System Based on Lock Coupling Traversal
  • ZOU Mo, XIE Hao-Tong, WEI Zhuo-Ran, CHEN Hai-Bo
  • Published August 06, 2022 (15 pages)
  • 2022,33(8):2980-2994 [Abstract(811)]  [View PDF(1800)1.53 M]
  • Hardware-software Integrated Reliability Modeling and Analysis Using AADL
  • LU Yin, QIN Shu-Dong, GUO Peng, DONGYun-Wei
  • Published August 06, 2022 (21 pages)
  • 2022,33(8):2995-3014 [Abstract(1171)]  [View PDF(2296)2.07 M]
  • Review Articles

  • Research Progress of Code Naturalness and Its Application
  • CHEN Zhe-Zhe, YAN Meng, XIA Xin, LIU Zhong-Xin, XU Zhou, LEI Yan
  • Published August 06, 2022 (22 pages)
  • 2022,33(8):3015-3034 [Abstract(1821)]  [View PDF(3192)2.16 M]
  • Contents

  • Study of Open-source Software License Compliance
  • WANG Zhi-Qiang, WU Sheng, XIAO Guo-Qiang, ZHANG Zi-Li, LIU Zhi-You, PENG Jing
  • Published August 06, 2022 (25 pages)
  • 2022,33(8):3035-3058 [Abstract(1704)]  [View PDF(3078)2.80 M]
  • Review Articles

  • Smart Contract Vulnerability Detection Technique: A Survey
  • QIAN Peng, LIU Zhen-Guang, HE Qin-Ming, HUANG Bu-Tian, TIAN Duan-Zheng, WANG Xun
  • Published August 06, 2022 (27 pages)
  • 2022,33(8):3059-3085 [Abstract(5143)]  [View PDF(8012)2.63 M]
  • Contents

  • Diffusion Network Inference Based on Infection Results
  • SAI Ying-Hui, WANG Ming-Xin, CHEN Chang, LEI Bo-Han, HOU Ye-Qiao, LI Xiang-Xiang, SUN Yue-Ming, CHEN Xu
  • Published August 06, 2022 (12 pages)
  • 2022,33(8):3103-3114 [Abstract(864)]  [View PDF(1925)1.53 M]