Volume 28,Issue 4,2017 Table of Contents

Other Issues:  
  
Contents

  • NuTL2PFG: Checking Satisfiability of νTL Formulas
  • LIU Yao, DUAN Zhen-Hua and TIAN Cong
  • 2017,28(4):898-906 [Abstract(3444)]  [View PDF(4276)1.18 M]
  • Randomized Approach to Software Model Generation
  • HE Xiao, LI Wen-Feng, ZHANG Tian, MA Zhi-Yi, SHAO Wei-Zhong and HU Chang-Jun
  • 2017,28(4):907-924 [Abstract(3817)]  [View PDF(4326)2.14 M]
  • Loop Vectorization Method Guided by SIMD Parallelism
  • GAO Wei, HAN Lin, ZHAO Rong-Cai, XU Jin-Long and CHEN Chao-Ran
  • 2017,28(4):925-939 [Abstract(4055)]  [View PDF(6259)1.69 M]
  • Fast and Reliable Fault-Tolerance Approach for Service Composition in Integration Networks
  • ZHANG Jun-Na, WANG Shang-Guang, SUN Qi-Bo and YANG Fang-Chun
  • 2017,28(4):940-958 [Abstract(3681)]  [View PDF(4973)2.17 M]
  • Trajectory Big Data: A Review of Key Technologies in Data Processing
  • GAO Qiang, ZHANG Feng-Li, WANG Rui-Jin and ZHOU Fan
  • 2017,28(4):959-992 [Abstract(9590)]  [View PDF(30082)3.58 M]
  • Research Survey on Team Formation in Social Networks
  • HUANG Jian-Bin, SUN Xiao-Jing, ZHOU Yu, LÜ Ze, SUN He-Li and JIA Xiao-Lin
  • 2017,28(4):993-1009 [Abstract(5465)]  [View PDF(5301)2.26 M]
  • Survey of Network Security Situation Awareness
  • GONG Jian, ZANG Xiao-Dong, SU Qi, HU Xiao-Yan and XU Jie
  • 2017,28(4):1010-1026 [Abstract(9205)]  [View PDF(15818)1.93 M]
  • Survey on Cache Coherence Protocol and Performance Optimization for Chip Multi-Processor
  • HU Sen-Sen, JI Wei-Xing, WANG Yi-Zhuo, CHEN Xu, FU Wen-Fei and SHI Feng
  • 2017,28(4):1027-1047 [Abstract(4511)]  [View PDF(8416)2.45 M]
  • Special Issue's Articles

  • 程序设计语言与系统前沿专题前言
  • 冯新宇,陈海波
  • 2017,28(4):745-746 [Abstract(3737)]  [View PDF(5883)385.43 K]
  • Approaches to Obtaining Shared Memory Dependences for Dynamic Analysis of Concurrent Programs: A Survey
  • JIANG Yan-Yan, XU Chang, MA Xiao-Xing and LÜ Jian
  • 2017,28(4):747-763 [Abstract(4340)]  [View PDF(7665)1.89 M]
  • Design and Implementation of Parallel C Programming Language for Domestic Heterogeneous Many-Core Systems
  • HE Wang-Quan, LIU Yong, FANG Yan-Fei, WEI Di and QI Feng-Bin
  • 2017,28(4):764-785 [Abstract(4199)]  [View PDF(6742)4.97 M]
  • Verification of Concrete Programs with Respect to Abstract Programs
  • LI Bin, TANG Zhen-Hao, ZHAI Juan and ZHAO Jian-Hua
  • 2017,28(4):786-803 [Abstract(4069)]  [View PDF(6108)2.10 M]
  • Model on Asynchronous Communication Program Verification Based on Communicating Petri Nets
  • YANG Qi-Zhe and LI Guo-Qiang
  • 2017,28(4):804-818 [Abstract(3932)]  [View PDF(6886)1.69 M]
  • Design and Implementation of Coq Tactics Based on Z3
  • ZHANG Heng-Ruo and FU Ming
  • 2017,28(4):819-826 [Abstract(4783)]  [View PDF(7288)1.03 M]
  • Automatically Validating Static Memory Leak Warnings for C/C++ Programs
  • LI Xiao, ZHOU Yan, LI Meng-Chen, CHEN Yuan-Jun, XU Guo-Qing, WANG Lin-Zhang and LI Xuan-Dong
  • 2017,28(4):827-844 [Abstract(4826)]  [View PDF(9381)2.02 M]
  • Modeling the Impact of DVFS on Performance of Applications in Datacenter
  • LI Deng-Hui, ZHAO Jia-Cheng, CUI Hui-Min and FENG Xiao-Bing
  • 2017,28(4):845-859 [Abstract(3700)]  [View PDF(6726)1.96 M]
  • Principle and Practice of Taint Analysis
  • WANG Lei, LI Feng, LI Lian and FENG Xiao-Bing
  • 2017,28(4):860-882 [Abstract(6189)]  [View PDF(21431)2.49 M]
  • Design and Implementation of Mimic Defense Web Server
  • TONG Qing, ZHANG Zheng, ZHANG Wei-Hua and WU Jiang-Xing
  • 2017,28(4):883-897 [Abstract(5114)]  [View PDF(10660)1.75 M]