Volume 28,Issue 5,2017 Table of Contents
Trade-Off Costs of Software Non-Functional RequirementsZHANG Xuan, WANG Xu, LI Tong, BAI Chuan and KANG Yan-Ni2017,28(5):1247-1270 [Abstract(3195)] [View PDF(5271)2.02 M]Overlapping Deep Web Data Source Selection Based on Stratified SamplingJIANG Jun-Yan, PENG Zhi-Yong, WU Xiao-Ying, PENG Cheng-Chen and WANG Min2017,28(5):1271-1295 [Abstract(2861)] [View PDF(4059)2.01 M]Congested Link Loss Rate Range Inference Algorithm in IP NetworkCHEN Yu, ZHOU Wei, DUAN Zhe-Min, QIAN Ye-Kui and ZHAO Xin2017,28(5):1296-1314 [Abstract(2618)] [View PDF(4412)888.88 K]Inter-Process Asynchronous Communication in Autonomous Vehicle Based on Shared MemoryCHEN Cun-Tong, ZHAO Jun-Qiao, YE Chen, DENG Rong, GUAN Lin-Ting and LI De-Yi2017,28(5):1315-1325 [Abstract(3739)] [View PDF(7226)2.34 M]
形式化方法与应用专题前言董威,赵建华,吕鸣松2017,28(5):1049-1050 [Abstract(3482)] [View PDF(6662)353.21 K]Automatic Approach of Generating Summaries for Common Loops and Its ApplicationZHAI Juan, TANG Zhen-Hao, LI Bin, ZHAO Jian-Hua and LI Xuan-Dong2017,28(5):1051-1069 [Abstract(4213)] [View PDF(6294)1.07 M]Temporal Definability of Regular Model ClassesWANG Shan-Xia, MA Ming-Hui, CHEN Wu and DENG Hui-Wen2017,28(5):1070-1079 [Abstract(3829)] [View PDF(5924)615.63 K]Coverability Problem of Asynchronous Multi-Process Timed AutomataLIU Li and LI Guo-Qiang2017,28(5):1080-1090 [Abstract(3719)] [View PDF(6317)627.50 K]Diagnosability of Discrete-Event Systems with Uncertain ObservationsWEN Xi-Ming, YU Quan, CHANG Liang and WANG Ju2017,28(5):1091-1106 [Abstract(3994)] [View PDF(6467)898.71 K]Convergence-Oriented Static Approach for Simplifying Execution Traces of Concurrent ProgramsCHANG Xi, XUE Jian-Xin, ZHANG Zhuo and MAO Xiao-Guang2017,28(5):1107-1117 [Abstract(4171)] [View PDF(5359)684.44 K]Safety Verification of Trajectory Planning for Multiple RobotsLIU Tao, WANG Shu-Ling and ZHAN Nai-Jun2017,28(5):1118-1127 [Abstract(4570)] [View PDF(6656)587.08 K]Self-Adaptive Statistical Model Checking Approach for CPSDU De-Hui, ZAN Hui, JIANG Kai-Qiang and CHENG Bei2017,28(5):1128-1143 [Abstract(4380)] [View PDF(7701)1.23 M]Co-Verification Approach to Control Software Program for CPSZHANG Yu, DONG Yun-Wei, FENG Wen-Long and HUANG Meng-Xing2017,28(5):1144-1166 [Abstract(4044)] [View PDF(8148)1.03 M]Specification and Runtime Verification for Activity-Oriented Context-Aware ApplicationsLI Xuan-Song, TAO Xian-Ping, LÜ Jian and SONG Wei2017,28(5):1167-1182 [Abstract(4310)] [View PDF(6277)685.17 K]Survey on Formal Method of Trustworthy Construction for Communication-Based Train Control SystemsCHEN Ming-Song, BAO Yong-Xiang, SUN Hai-Ying, MIAO Wei-Kai, CHEN Xiao-Hong and ZHOU Ting-Liang2017,28(5):1183-1203 [Abstract(4858)] [View PDF(12157)923.66 K]Formal Verification of Memory Management System in Spacecraft Using Event-BQIAO Lei, YANG Meng-Fei, TAN Yan-Liang, PU Ge-Guang and YANG Hua2017,28(5):1204-1220 [Abstract(4332)] [View PDF(7025)2.33 M]Partial Evaluator for peC and Its Application to Compiler ValidationGUO De-Gui, WANG Guan-Cheng, LÜ Shuai and LIU Lei2017,28(5):1221-1232 [Abstract(3837)] [View PDF(6176)700.98 K]Key Translations of the Trustworthy Compiler L2C and Its Design and ImplementationSHANG Shu, GAN Yuan-Ke, SHI Gang, WANG Sheng-Yuan and DONG Yuan2017,28(5):1233-1246 [Abstract(4369)] [View PDF(6997)772.48 K]