Volume 29,Issue 11,2018 Table of Contents
Trustworthiness Evidence Supporting Evaluation of Software Process TrustworthinessWANG De-Xin and WANG Qing2018,29(11):3412-3434 [Abstract(3374)] [View PDF(5009)3.05 M]Reusable and Customizable SaaS Software Development Approach Based on Variation ModelSUN Chang-Ai, ZHANG Zai-Xing and ZHANG Xin2018,29(11):3435-3454 [Abstract(2697)] [View PDF(4270)2.06 M]Data-Driven Bilayer Software Process MiningZHU Rui, LI Tong, MO Qi, HE Zhen-Li, YU Qian and WANG Yi-Quan2018,29(11):3455-3483 [Abstract(3468)] [View PDF(5127)2.97 M]Uncertainty Measures of Rough Set Based on Strictly Concave FunctionsHUANG Guo-Shun and WEN Han2018,29(11):3484-3499 [Abstract(2499)] [View PDF(3641)1.61 M]Personalized Map-Matching Algorithm Based on Driving PreferenceGAO Xu, WU Yan-Jun, GUO Li-Min, DING Zhi-Ming and CHEN Jun-Cheng2018,29(11):3500-3516 [Abstract(3125)] [View PDF(4361)2.17 M]#SAT Solving Algorithms Based on Extension Rule Using Heuristic StrategiesWANG Qiang, LIU Lei and LÜ Shuai2018,29(11):3517-3527 [Abstract(2449)] [View PDF(4516)1.26 M]Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central AuthorityLIU Xu-Dong, ZHANG Wen-Fang and WANG Xiao-Min2018,29(11):3528-3543 [Abstract(2743)] [View PDF(4231)1.73 M]Automatic Search Algorithm for Impossible Differential Trials and Zero-Correlation Linear Trials in SIMONZHANG Shi-Wei and CHEN Shao-Zhen2018,29(11):3544-3553 [Abstract(2647)] [View PDF(4720)1.07 M]Dynamically Scalable and Efficient Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2018,29(11):3554-3574 [Abstract(2766)] [View PDF(4458)3.56 M]Registration Based on Dual-Feature Gaussian Mixture Model and Dual-Constraint Spatial TransformationWEI Zi-Quan, YANG Yang, ZHANG Su and YANG Kun2018,29(11):3575-3593 [Abstract(3136)] [View PDF(4653)2.47 M]
面向智能制造的业务过程管理与服务技术专题前言王建民,刘建勋2018,29(11):3239-3240 [Abstract(3187)] [View PDF(5205)305.33 K]Parallel Retrieval Approach of Cloud Workflow Model Repositories Based on Data Set PartitioningHUANG Hua, PENG Rong and FENG Zai-Wen2018,29(11):3241-3259 [Abstract(5636)] [View PDF(6635)1.87 M]Adaptation Algorithm of Semantic Workflows Based on Behavioral CharacteristicsSUN Jin-Yong, GU Tian-Long, WEN Li-Jie, QIAN Jun-Yan and LIU Hua-Dong2018,29(11):3260-3277 [Abstract(5588)] [View PDF(6641)2.18 M]Approach to Mining Length-Two Loops From the Log Without “aba” PatternLIN Lei-Lei, ZHOU Hua, DAI Fei, ZHU Rui and LI Tong2018,29(11):3278-3294 [Abstract(5399)] [View PDF(6492)2.00 M]Optimized Topic Model for Clinical Pathway MiningXU Xiao, JIN Tao and WANG Jian-Min2018,29(11):3295-3305 [Abstract(5089)] [View PDF(6928)1.34 M]Multi-Objective Workflow Scheduling Based on Delay Transmission in Mobile Cloud ComputingZHOU Ye-Mao, LI Zhong-Jin, GE Ji-Dong, LI Chuan-Yi, ZHOU Xiao-Yu and LUO Bin2018,29(11):3306-3325 [Abstract(6314)] [View PDF(7733)2.67 M]Multi-Scientific Workflow Scheduling Algorithm Based on Multi-Objective in Cloud EnvironmentYUAN You-Wei, BAO Ze-Qian, YU Dong-Jin and LI Wan-Qing2018,29(11):3326-3339 [Abstract(5734)] [View PDF(7262)1.58 M]Approach to Optimal Staff Assignment in Workflows Based on Collaboration PatternsYU Dong-Jin, WANG Jiao-Jiao and LIU Cheng-Fei2018,29(11):3340-3354 [Abstract(5917)] [View PDF(7163)1.65 M]Manufacturing Service Composition Self-Adaptive Approach Based on Dynamic Matching NetworkZHANG Zhen-Jie, ZHANG Yuan-Ming, XU Xue-Song, GAO Fei and XIAO Gang2018,29(11):3355-3373 [Abstract(5459)] [View PDF(7757)2.16 M]Topic-Adaptive Web API Recommendation Method via Integrating Multidimensional InformationLI Hong-Chao, LIU Jian-Xun, CAO Bu-Qing and SHI Min2018,29(11):3374-3387 [Abstract(5523)] [View PDF(7147)1.63 M]Quality Prediction for Services Based on SOM Neural NetworkZHANG Yi-Wen, XIANG Tao, GUO Xing, JIA Zhao-Hong and HE Qiang2018,29(11):3388-3399 [Abstract(6532)] [View PDF(7694)1.54 M]
Design, Modeling and Verification of Security Protocols Based on Event-B MethodLI Meng-Jun, PAN Guo-Teng and OU Guo-Dong2018,29(11):3400-3411 [Abstract(3247)] [View PDF(6243)1.26 M]