Volume 29,Issue 6,2018 Table of Contents
Static Analysis Method of Secure Privacy Information Flow for Service CompositionPENG Huan-Feng, HUANG Zhi-Qiu, LIU Lin-Yuan, LI Yong and KE Chang-Bo2018,29(6):1739-1755 [Abstract(3893)] [View PDF(5027)1.76 M]Fault Localization Method Based on Conditional Probability ModelSHU Ting, HUANG Ming-Xian, DING Zuo-Hua, WANG Lei and XIA Jin-Song2018,29(6):1756-1769 [Abstract(3595)] [View PDF(5397)1.97 M]Method for Subgraph Matching with Inclusion DegreeLI Rui-Yuan and HONG Liang2018,29(6):1792-1812 [Abstract(3626)] [View PDF(6670)2.27 M]
Preface on Theoretical Foundation of Formal MethodsFU Yu-Xi, LI Guo-Qiang and TAN Cun2018,29(6):1515-1516 [Abstract(3219)] [View PDF(5983)295.58 K]Extension and Implementation of the Quasi-Local Algorithm for Checking BisimilarityZHENG Xiao-Lin, DENG Yu-Xin, FU Chen and LEI Guo-Qing2018,29(6):1517-1526 [Abstract(3457)] [View PDF(5657)1.03 M]Automatically Analyzing Inductive Properties for Recursive Data StructuresTANG Zhen-Hao, LI Bin, ZHAI Juan and ZHAO Jian-Hua2018,29(6):1527-1543 [Abstract(3570)] [View PDF(5400)1.61 M]Automatic Invariant Synthesis for Array ProgramsLI Bin, ZHAI Juan, TANG Zhen-Hao, TANG En-Yi and ZHAO Jian-Hua2018,29(6):1544-1565 [Abstract(3924)] [View PDF(4495)2.23 M]State-of-the-Art Survey on Verification of Vector Addition SystemsZHANG Wen-Bo and LONG Huan2018,29(6):1566-1581 [Abstract(3648)] [View PDF(5088)1.71 M]Model-Checking for Heterogeneous Multi-Agent SystemsZHANG Ye-Di and SONG Fu2018,29(6):1582-1594 [Abstract(3765)] [View PDF(5615)1.36 M]SMT-Based Approach to Formal Analysis of CCSL with Tool SupportYING Yun-Hui and ZHANG Min2018,29(6):1595-1606 [Abstract(4215)] [View PDF(6051)1.35 M]Communication Mechanism and Its Implementation for MSVL Based on Message PassingWANG Xiao-Bing, GUO Wen-Xuan and DUAN Zhen-Hua2018,29(6):1607-1621 [Abstract(3781)] [View PDF(5386)2.01 M]Runtime Verification of Spatio-Temporal Properties for Pervasive Computing ApplicationsLI Xuan-Song, TAO Xian-Ping and SONG Wei2018,29(6):1622-1634 [Abstract(3547)] [View PDF(5227)1.47 M]Tool for Checking Satisfiability of APTL FormulasWANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong2018,29(6):1635-1646 [Abstract(3628)] [View PDF(5278)1.31 M]Type Theory Based Domain Data Modelling and Verification with Case StudyWUNIRI Qi-Qi-Ge, LI Xiao-Ping, MA Shi-Long and LÜ Jiang-Hua2018,29(6):1647-1669 [Abstract(3651)] [View PDF(5439)2.71 M]Modeling and Analysis of Nested Interrupt SystemsCUI Jin, DUAN Zhen-Hua, TIAN Cong and ZHANG Nan2018,29(6):1670-1680 [Abstract(3479)] [View PDF(5386)1.29 M]Response Time Analysis of Embedded Systems by Taking Interrupt and Context Switch Overheads into AccountYU Guang-Liang and YANG Meng-Fei2018,29(6):1681-1698 [Abstract(3495)] [View PDF(6748)2.15 M]Modeling and Verification for Robot Joint Bus Communication SystemMENG Yao, LI Xiao-Juan, GUAN Yong, WANG Rui and ZHANG Jie2018,29(6):1699-1715 [Abstract(3842)] [View PDF(6468)1.99 M]
Study on Key Issues in API UsageLI Zheng, WU Jing-Zheng and LI Ming-Shu2018,29(6):1716-1738 [Abstract(4411)] [View PDF(8688)2.41 M]Comparative Study on MapReduce and Spark for Big Data AnalyticsWU Xin-Dong and JI Sheng-Wei2018,29(6):1770-1791 [Abstract(6052)] [View PDF(11515)2.25 M]Study on 5G Mobile Communication Network SecurityFENG Deng-Guo, XU Jing and LAN Xiao2018,29(6):1813-1825 [Abstract(6301)] [View PDF(17546)1.55 M]