Volume 28,Issue 4,2017 Table of Contents
NuTL2PFG: Checking Satisfiability of νTL FormulasLIU Yao, DUAN Zhen-Hua and TIAN Cong2017,28(4):898-906 [Abstract(3444)] [View PDF(4276)1.18 M]Randomized Approach to Software Model GenerationHE Xiao, LI Wen-Feng, ZHANG Tian, MA Zhi-Yi, SHAO Wei-Zhong and HU Chang-Jun2017,28(4):907-924 [Abstract(3817)] [View PDF(4326)2.14 M]Loop Vectorization Method Guided by SIMD ParallelismGAO Wei, HAN Lin, ZHAO Rong-Cai, XU Jin-Long and CHEN Chao-Ran2017,28(4):925-939 [Abstract(4055)] [View PDF(6259)1.69 M]Fast and Reliable Fault-Tolerance Approach for Service Composition in Integration NetworksZHANG Jun-Na, WANG Shang-Guang, SUN Qi-Bo and YANG Fang-Chun2017,28(4):940-958 [Abstract(3681)] [View PDF(4973)2.17 M]Trajectory Big Data: A Review of Key Technologies in Data ProcessingGAO Qiang, ZHANG Feng-Li, WANG Rui-Jin and ZHOU Fan2017,28(4):959-992 [Abstract(9590)] [View PDF(30082)3.58 M]Research Survey on Team Formation in Social NetworksHUANG Jian-Bin, SUN Xiao-Jing, ZHOU Yu, LÜ Ze, SUN He-Li and JIA Xiao-Lin2017,28(4):993-1009 [Abstract(5465)] [View PDF(5301)2.26 M]Survey of Network Security Situation AwarenessGONG Jian, ZANG Xiao-Dong, SU Qi, HU Xiao-Yan and XU Jie2017,28(4):1010-1026 [Abstract(9205)] [View PDF(15818)1.93 M]Survey on Cache Coherence Protocol and Performance Optimization for Chip Multi-ProcessorHU Sen-Sen, JI Wei-Xing, WANG Yi-Zhuo, CHEN Xu, FU Wen-Fei and SHI Feng2017,28(4):1027-1047 [Abstract(4511)] [View PDF(8416)2.45 M]
程序设计语言与系统前沿专题前言冯新宇,陈海波2017,28(4):745-746 [Abstract(3737)] [View PDF(5883)385.43 K]Approaches to Obtaining Shared Memory Dependences for Dynamic Analysis of Concurrent Programs: A SurveyJIANG Yan-Yan, XU Chang, MA Xiao-Xing and LÜ Jian2017,28(4):747-763 [Abstract(4340)] [View PDF(7665)1.89 M]Design and Implementation of Parallel C Programming Language for Domestic Heterogeneous Many-Core SystemsHE Wang-Quan, LIU Yong, FANG Yan-Fei, WEI Di and QI Feng-Bin2017,28(4):764-785 [Abstract(4199)] [View PDF(6742)4.97 M]Verification of Concrete Programs with Respect to Abstract ProgramsLI Bin, TANG Zhen-Hao, ZHAI Juan and ZHAO Jian-Hua2017,28(4):786-803 [Abstract(4069)] [View PDF(6108)2.10 M]Model on Asynchronous Communication Program Verification Based on Communicating Petri NetsYANG Qi-Zhe and LI Guo-Qiang2017,28(4):804-818 [Abstract(3932)] [View PDF(6886)1.69 M]Design and Implementation of Coq Tactics Based on Z3ZHANG Heng-Ruo and FU Ming2017,28(4):819-826 [Abstract(4783)] [View PDF(7288)1.03 M]Automatically Validating Static Memory Leak Warnings for C/C++ ProgramsLI Xiao, ZHOU Yan, LI Meng-Chen, CHEN Yuan-Jun, XU Guo-Qing, WANG Lin-Zhang and LI Xuan-Dong2017,28(4):827-844 [Abstract(4826)] [View PDF(9381)2.02 M]Modeling the Impact of DVFS on Performance of Applications in DatacenterLI Deng-Hui, ZHAO Jia-Cheng, CUI Hui-Min and FENG Xiao-Bing2017,28(4):845-859 [Abstract(3700)] [View PDF(6726)1.96 M]Principle and Practice of Taint AnalysisWANG Lei, LI Feng, LI Lian and FENG Xiao-Bing2017,28(4):860-882 [Abstract(6189)] [View PDF(21431)2.49 M]Design and Implementation of Mimic Defense Web ServerTONG Qing, ZHANG Zheng, ZHANG Wei-Hua and WU Jiang-Xing2017,28(4):883-897 [Abstract(5114)] [View PDF(10660)1.75 M]