Volume 29,Issue 11,2018 Table of Contents
Trustworthiness Evidence Supporting Evaluation of Software Process TrustworthinessWANG De-Xin and WANG Qing2018,29(11):3412-3434 [Abstract(3344)] [View PDF(4773)3.05 M]Reusable and Customizable SaaS Software Development Approach Based on Variation ModelSUN Chang-Ai, ZHANG Zai-Xing and ZHANG Xin2018,29(11):3435-3454 [Abstract(2662)] [View PDF(4117)2.06 M]Data-Driven Bilayer Software Process MiningZHU Rui, LI Tong, MO Qi, HE Zhen-Li, YU Qian and WANG Yi-Quan2018,29(11):3455-3483 [Abstract(3423)] [View PDF(4890)2.97 M]Uncertainty Measures of Rough Set Based on Strictly Concave FunctionsHUANG Guo-Shun and WEN Han2018,29(11):3484-3499 [Abstract(2478)] [View PDF(3494)1.61 M]Personalized Map-Matching Algorithm Based on Driving PreferenceGAO Xu, WU Yan-Jun, GUO Li-Min, DING Zhi-Ming and CHEN Jun-Cheng2018,29(11):3500-3516 [Abstract(3101)] [View PDF(4189)2.17 M]#SAT Solving Algorithms Based on Extension Rule Using Heuristic StrategiesWANG Qiang, LIU Lei and LÜ Shuai2018,29(11):3517-3527 [Abstract(2417)] [View PDF(4344)1.26 M]Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central AuthorityLIU Xu-Dong, ZHANG Wen-Fang and WANG Xiao-Min2018,29(11):3528-3543 [Abstract(2700)] [View PDF(4090)1.73 M]Automatic Search Algorithm for Impossible Differential Trials and Zero-Correlation Linear Trials in SIMONZHANG Shi-Wei and CHEN Shao-Zhen2018,29(11):3544-3553 [Abstract(2613)] [View PDF(4482)1.07 M]Dynamically Scalable and Efficient Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2018,29(11):3554-3574 [Abstract(2742)] [View PDF(4252)3.56 M]Registration Based on Dual-Feature Gaussian Mixture Model and Dual-Constraint Spatial TransformationWEI Zi-Quan, YANG Yang, ZHANG Su and YANG Kun2018,29(11):3575-3593 [Abstract(3095)] [View PDF(4468)2.47 M]
面向智能制造的业务过程管理与服务技术专题前言王建民,刘建勋2018,29(11):3239-3240 [Abstract(3155)] [View PDF(5042)305.33 K]Parallel Retrieval Approach of Cloud Workflow Model Repositories Based on Data Set PartitioningHUANG Hua, PENG Rong and FENG Zai-Wen2018,29(11):3241-3259 [Abstract(5596)] [View PDF(6378)1.87 M]Adaptation Algorithm of Semantic Workflows Based on Behavioral CharacteristicsSUN Jin-Yong, GU Tian-Long, WEN Li-Jie, QIAN Jun-Yan and LIU Hua-Dong2018,29(11):3260-3277 [Abstract(5551)] [View PDF(6415)2.18 M]Approach to Mining Length-Two Loops From the Log Without “aba” PatternLIN Lei-Lei, ZHOU Hua, DAI Fei, ZHU Rui and LI Tong2018,29(11):3278-3294 [Abstract(5364)] [View PDF(6244)2.00 M]Optimized Topic Model for Clinical Pathway MiningXU Xiao, JIN Tao and WANG Jian-Min2018,29(11):3295-3305 [Abstract(5049)] [View PDF(6693)1.34 M]Multi-Objective Workflow Scheduling Based on Delay Transmission in Mobile Cloud ComputingZHOU Ye-Mao, LI Zhong-Jin, GE Ji-Dong, LI Chuan-Yi, ZHOU Xiao-Yu and LUO Bin2018,29(11):3306-3325 [Abstract(6270)] [View PDF(7508)2.67 M]Multi-Scientific Workflow Scheduling Algorithm Based on Multi-Objective in Cloud EnvironmentYUAN You-Wei, BAO Ze-Qian, YU Dong-Jin and LI Wan-Qing2018,29(11):3326-3339 [Abstract(5693)] [View PDF(7021)1.58 M]Approach to Optimal Staff Assignment in Workflows Based on Collaboration PatternsYU Dong-Jin, WANG Jiao-Jiao and LIU Cheng-Fei2018,29(11):3340-3354 [Abstract(5891)] [View PDF(6950)1.65 M]Manufacturing Service Composition Self-Adaptive Approach Based on Dynamic Matching NetworkZHANG Zhen-Jie, ZHANG Yuan-Ming, XU Xue-Song, GAO Fei and XIAO Gang2018,29(11):3355-3373 [Abstract(5427)] [View PDF(7523)2.16 M]Topic-Adaptive Web API Recommendation Method via Integrating Multidimensional InformationLI Hong-Chao, LIU Jian-Xun, CAO Bu-Qing and SHI Min2018,29(11):3374-3387 [Abstract(5480)] [View PDF(6911)1.63 M]Quality Prediction for Services Based on SOM Neural NetworkZHANG Yi-Wen, XIANG Tao, GUO Xing, JIA Zhao-Hong and HE Qiang2018,29(11):3388-3399 [Abstract(6487)] [View PDF(7508)1.54 M]
Design, Modeling and Verification of Security Protocols Based on Event-B MethodLI Meng-Jun, PAN Guo-Teng and OU Guo-Dong2018,29(11):3400-3411 [Abstract(3187)] [View PDF(5955)1.26 M]