Volume 29,Issue 11,2018 Table of Contents
Trustworthiness Evidence Supporting Evaluation of Software Process TrustworthinessWANG De-Xin and WANG Qing2018,29(11):3412-3434 [Abstract(3339)] [View PDF(4674)3.05 M]Reusable and Customizable SaaS Software Development Approach Based on Variation ModelSUN Chang-Ai, ZHANG Zai-Xing and ZHANG Xin2018,29(11):3435-3454 [Abstract(2657)] [View PDF(4042)2.06 M]Data-Driven Bilayer Software Process MiningZHU Rui, LI Tong, MO Qi, HE Zhen-Li, YU Qian and WANG Yi-Quan2018,29(11):3455-3483 [Abstract(3391)] [View PDF(4775)2.97 M]Uncertainty Measures of Rough Set Based on Strictly Concave FunctionsHUANG Guo-Shun and WEN Han2018,29(11):3484-3499 [Abstract(2475)] [View PDF(3436)1.61 M]Personalized Map-Matching Algorithm Based on Driving PreferenceGAO Xu, WU Yan-Jun, GUO Li-Min, DING Zhi-Ming and CHEN Jun-Cheng2018,29(11):3500-3516 [Abstract(3096)] [View PDF(4124)2.17 M]#SAT Solving Algorithms Based on Extension Rule Using Heuristic StrategiesWANG Qiang, LIU Lei and LÜ Shuai2018,29(11):3517-3527 [Abstract(2408)] [View PDF(4264)1.26 M]Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central AuthorityLIU Xu-Dong, ZHANG Wen-Fang and WANG Xiao-Min2018,29(11):3528-3543 [Abstract(2682)] [View PDF(4003)1.73 M]Automatic Search Algorithm for Impossible Differential Trials and Zero-Correlation Linear Trials in SIMONZHANG Shi-Wei and CHEN Shao-Zhen2018,29(11):3544-3553 [Abstract(2607)] [View PDF(4390)1.07 M]Dynamically Scalable and Efficient Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2018,29(11):3554-3574 [Abstract(2734)] [View PDF(4125)3.56 M]Registration Based on Dual-Feature Gaussian Mixture Model and Dual-Constraint Spatial TransformationWEI Zi-Quan, YANG Yang, ZHANG Su and YANG Kun2018,29(11):3575-3593 [Abstract(3079)] [View PDF(4398)2.47 M]
面向智能制造的业务过程管理与服务技术专题前言王建民,刘建勋2018,29(11):3239-3240 [Abstract(3147)] [View PDF(4733)305.33 K]Parallel Retrieval Approach of Cloud Workflow Model Repositories Based on Data Set PartitioningHUANG Hua, PENG Rong and FENG Zai-Wen2018,29(11):3241-3259 [Abstract(5579)] [View PDF(5977)1.87 M]Adaptation Algorithm of Semantic Workflows Based on Behavioral CharacteristicsSUN Jin-Yong, GU Tian-Long, WEN Li-Jie, QIAN Jun-Yan and LIU Hua-Dong2018,29(11):3260-3277 [Abstract(5539)] [View PDF(6012)2.18 M]Approach to Mining Length-Two Loops From the Log Without “aba” PatternLIN Lei-Lei, ZHOU Hua, DAI Fei, ZHU Rui and LI Tong2018,29(11):3278-3294 [Abstract(5352)] [View PDF(5773)2.00 M]Optimized Topic Model for Clinical Pathway MiningXU Xiao, JIN Tao and WANG Jian-Min2018,29(11):3295-3305 [Abstract(5038)] [View PDF(6321)1.34 M]Multi-Objective Workflow Scheduling Based on Delay Transmission in Mobile Cloud ComputingZHOU Ye-Mao, LI Zhong-Jin, GE Ji-Dong, LI Chuan-Yi, ZHOU Xiao-Yu and LUO Bin2018,29(11):3306-3325 [Abstract(6257)] [View PDF(7070)2.67 M]Multi-Scientific Workflow Scheduling Algorithm Based on Multi-Objective in Cloud EnvironmentYUAN You-Wei, BAO Ze-Qian, YU Dong-Jin and LI Wan-Qing2018,29(11):3326-3339 [Abstract(5687)] [View PDF(6646)1.58 M]Approach to Optimal Staff Assignment in Workflows Based on Collaboration PatternsYU Dong-Jin, WANG Jiao-Jiao and LIU Cheng-Fei2018,29(11):3340-3354 [Abstract(5883)] [View PDF(6565)1.65 M]Manufacturing Service Composition Self-Adaptive Approach Based on Dynamic Matching NetworkZHANG Zhen-Jie, ZHANG Yuan-Ming, XU Xue-Song, GAO Fei and XIAO Gang2018,29(11):3355-3373 [Abstract(5420)] [View PDF(7059)2.16 M]Topic-Adaptive Web API Recommendation Method via Integrating Multidimensional InformationLI Hong-Chao, LIU Jian-Xun, CAO Bu-Qing and SHI Min2018,29(11):3374-3387 [Abstract(5466)] [View PDF(6424)1.63 M]Quality Prediction for Services Based on SOM Neural NetworkZHANG Yi-Wen, XIANG Tao, GUO Xing, JIA Zhao-Hong and HE Qiang2018,29(11):3388-3399 [Abstract(6466)] [View PDF(7104)1.54 M]
Design, Modeling and Verification of Security Protocols Based on Event-B MethodLI Meng-Jun, PAN Guo-Teng and OU Guo-Dong2018,29(11):3400-3411 [Abstract(3175)] [View PDF(5566)1.26 M]