Volume 29,Issue 11,2018 Table of Contents
Trustworthiness Evidence Supporting Evaluation of Software Process TrustworthinessWANG De-Xin and WANG Qing2018,29(11):3412-3434 [Abstract(3350)] [View PDF(4807)3.05 M]Reusable and Customizable SaaS Software Development Approach Based on Variation ModelSUN Chang-Ai, ZHANG Zai-Xing and ZHANG Xin2018,29(11):3435-3454 [Abstract(2670)] [View PDF(4142)2.06 M]Data-Driven Bilayer Software Process MiningZHU Rui, LI Tong, MO Qi, HE Zhen-Li, YU Qian and WANG Yi-Quan2018,29(11):3455-3483 [Abstract(3433)] [View PDF(4977)2.97 M]Uncertainty Measures of Rough Set Based on Strictly Concave FunctionsHUANG Guo-Shun and WEN Han2018,29(11):3484-3499 [Abstract(2483)] [View PDF(3519)1.61 M]Personalized Map-Matching Algorithm Based on Driving PreferenceGAO Xu, WU Yan-Jun, GUO Li-Min, DING Zhi-Ming and CHEN Jun-Cheng2018,29(11):3500-3516 [Abstract(3109)] [View PDF(4224)2.17 M]#SAT Solving Algorithms Based on Extension Rule Using Heuristic StrategiesWANG Qiang, LIU Lei and LÜ Shuai2018,29(11):3517-3527 [Abstract(2425)] [View PDF(4372)1.26 M]Multi-Authority Attribute-Based Alterable Threshold Ring Signature without Central AuthorityLIU Xu-Dong, ZHANG Wen-Fang and WANG Xiao-Min2018,29(11):3528-3543 [Abstract(2711)] [View PDF(4125)1.73 M]Automatic Search Algorithm for Impossible Differential Trials and Zero-Correlation Linear Trials in SIMONZHANG Shi-Wei and CHEN Shao-Zhen2018,29(11):3544-3553 [Abstract(2620)] [View PDF(4581)1.07 M]Dynamically Scalable and Efficient Approach for Single-Packet TracebackLU Ning, WANG Shang-Guang, LI Feng, SHI Wen-Bo and YANG Fang-Chun2018,29(11):3554-3574 [Abstract(2746)] [View PDF(4318)3.56 M]Registration Based on Dual-Feature Gaussian Mixture Model and Dual-Constraint Spatial TransformationWEI Zi-Quan, YANG Yang, ZHANG Su and YANG Kun2018,29(11):3575-3593 [Abstract(3100)] [View PDF(4490)2.47 M]
面向智能制造的业务过程管理与服务技术专题前言王建民,刘建勋2018,29(11):3239-3240 [Abstract(3163)] [View PDF(5062)305.33 K]Parallel Retrieval Approach of Cloud Workflow Model Repositories Based on Data Set PartitioningHUANG Hua, PENG Rong and FENG Zai-Wen2018,29(11):3241-3259 [Abstract(5601)] [View PDF(6408)1.87 M]Adaptation Algorithm of Semantic Workflows Based on Behavioral CharacteristicsSUN Jin-Yong, GU Tian-Long, WEN Li-Jie, QIAN Jun-Yan and LIU Hua-Dong2018,29(11):3260-3277 [Abstract(5562)] [View PDF(6456)2.18 M]Approach to Mining Length-Two Loops From the Log Without “aba” PatternLIN Lei-Lei, ZHOU Hua, DAI Fei, ZHU Rui and LI Tong2018,29(11):3278-3294 [Abstract(5370)] [View PDF(6286)2.00 M]Optimized Topic Model for Clinical Pathway MiningXU Xiao, JIN Tao and WANG Jian-Min2018,29(11):3295-3305 [Abstract(5057)] [View PDF(6721)1.34 M]Multi-Objective Workflow Scheduling Based on Delay Transmission in Mobile Cloud ComputingZHOU Ye-Mao, LI Zhong-Jin, GE Ji-Dong, LI Chuan-Yi, ZHOU Xiao-Yu and LUO Bin2018,29(11):3306-3325 [Abstract(6283)] [View PDF(7534)2.67 M]Multi-Scientific Workflow Scheduling Algorithm Based on Multi-Objective in Cloud EnvironmentYUAN You-Wei, BAO Ze-Qian, YU Dong-Jin and LI Wan-Qing2018,29(11):3326-3339 [Abstract(5701)] [View PDF(7076)1.58 M]Approach to Optimal Staff Assignment in Workflows Based on Collaboration PatternsYU Dong-Jin, WANG Jiao-Jiao and LIU Cheng-Fei2018,29(11):3340-3354 [Abstract(5896)] [View PDF(6989)1.65 M]Manufacturing Service Composition Self-Adaptive Approach Based on Dynamic Matching NetworkZHANG Zhen-Jie, ZHANG Yuan-Ming, XU Xue-Song, GAO Fei and XIAO Gang2018,29(11):3355-3373 [Abstract(5436)] [View PDF(7555)2.16 M]Topic-Adaptive Web API Recommendation Method via Integrating Multidimensional InformationLI Hong-Chao, LIU Jian-Xun, CAO Bu-Qing and SHI Min2018,29(11):3374-3387 [Abstract(5487)] [View PDF(6949)1.63 M]Quality Prediction for Services Based on SOM Neural NetworkZHANG Yi-Wen, XIANG Tao, GUO Xing, JIA Zhao-Hong and HE Qiang2018,29(11):3388-3399 [Abstract(6498)] [View PDF(7544)1.54 M]
Design, Modeling and Verification of Security Protocols Based on Event-B MethodLI Meng-Jun, PAN Guo-Teng and OU Guo-Dong2018,29(11):3400-3411 [Abstract(3197)] [View PDF(5991)1.26 M]