Volume 30,Issue 6,2019 Table of Contents
Web Service QoS Forecasting Approach Using Multivariate Time SeriesZHANG Peng-Cheng, WANG Li-Yan, JI Shun-Hui and LI Wen-Rui2019,30(6):1742-1758 [Abstract(5062)] [View PDF(5525)1.76 M]Software Reliability Growth Model Based on Weibull Distribution Introduced FaultsWANG Jin-Yong, ZHANG Ce, MI Xiao-Ping, GUO Xin-Feng and LI Ji-Hong2019,30(6):1759-1777 [Abstract(2220)] [View PDF(3731)2.00 M]Code Obfuscation Based on Instructions SwappingPAN Yan, ZHU Yue-Fei and LIN Wei2019,30(6):1778-1792 [Abstract(2161)] [View PDF(4418)1.64 M]Interactive Exploration of Behavior Patterns from Check-in LogsLI Cong-Min, LI Jie, ZHANG Kang and TAO Wen-Yuan2019,30(6):1819-1834 [Abstract(2285)] [View PDF(4244)1.74 M]Mixed Particle Swarm Optimization Algorithm with Multistage DisturbancesXU Li-Feng, HUANG Zu-Sheng, YANG Zhong-Zhu and DING Wei-Long2019,30(6):1835-1852 [Abstract(2346)] [View PDF(4445)1.83 M]Node Evaluation Method Based on Importance Contribution in Scale-free NetworksYIN Rong-Rong, YIN Xue-Liang, CUI Meng-Di and XU Ying-Han2019,30(6):1875-1885 [Abstract(1999)] [View PDF(3725)1.08 M]Combined Filtering and DBM Reconstructing for Fingerprint EnhancementBIAN Wei-Xin, DING Shi-Fei, ZHANG Nan, ZHANG Jian and ZHAO Xing-Yu2019,30(6):1886-1900 [Abstract(2235)] [View PDF(3656)1.84 M]
区块链与数字货币技术专题前言斯雪明,陈文光2019,30(6):1575-1576 [Abstract(2851)] [View PDF(4946)279.26 K]Research on High-performance Consortium Blockchain TechnologyZHU Li, YU Huan, ZHAN Shi-Xiao, QIU Wei-Wei and LI Qi-Lei2019,30(6):1577-1593 [Abstract(5228)] [View PDF(8971)1.72 M]Distributed Framework of SWIFT System Based on Permissioned BlockchainZHU Jian-Ming, DING Qing-Yang and GAO Sheng2019,30(6):1594-1613 [Abstract(4549)] [View PDF(7327)2.01 M]Traceability Mechanism of Dynamic Data in Internet of Things Based on Consortium BlockchainQIAO Rui, CAO Yan and WANG Qing-Xian2019,30(6):1614-1631 [Abstract(3985)] [View PDF(8196)1.91 M]
Survey of Blockchain Access Control in Internet of ThingsSHI Jin-Shan and LI Ru2019,30(6):1632-1648 [Abstract(6261)] [View PDF(12162)1.65 M]Research on the Progress in Cross-chain Technology of BlockchainsLI Fang, LI Zhuo-Ran and ZHAO He2019,30(6):1649-1660 [Abstract(7143)] [View PDF(14553)1.15 M]
Model for Data Access Control and Sharing Based on BlockchainWANG Xiu-Li, JIANG Xiao-Zhou and LI Yang2019,30(6):1661-1669 [Abstract(5195)] [View PDF(10319)1.25 M]RepChain—A Permissioned Blockchain Toolkit Implemented by Reactive ProgrammingLI Chun-Xiao, CHEN Sheng, ZHENG Long-Shuai, ZUO Chun, JIANG Bu-Yun and LIANG Geng2019,30(6):1670-1680 [Abstract(4485)] [View PDF(6185)1.23 M]Mimic Blockchain—Solution to the Security of BlockchainXU Mi-Xue, YUAN Chao, WANG Yong-Juan, FU Jin-Hua and LI Bin2019,30(6):1681-1691 [Abstract(4479)] [View PDF(7900)1.12 M]Privacy Preserving Scheme in Block Chain with Provably Secure Based on SM9 AlgorithmYANG Ya-Tao, CAI Ju-Liang, ZHANG Xiao-Wei and YUAN Zheng2019,30(6):1692-1704 [Abstract(5394)] [View PDF(8429)1.37 M]Supervised Anonymous Authentication SchemeWANG Zhen, FAN Jia, CHENG Lin, AN Hong-Zhang, ZHENG Hai-Bin and NIU Jun-Xiang2019,30(6):1705-1720 [Abstract(4803)] [View PDF(7886)1.78 M]
Buffer Overflow Detection Techniques and Tools Based on Application PerspectiveSITU Ling-Yun, WANG Lin-Zhang, LI Xuan-Dong and LIU Yang2019,30(6):1721-1741 [Abstract(3938)] [View PDF(7084)2.30 M]Survey of Entity Relationship Extraction Based on Deep LearningE Hai-Hong, ZHANG Wen-Jing, XIAO Si-Qi, CHENG Rui, HU Ying-Xi, ZHOU Xiao-Song and NIU Pei-Qing2019,30(6):1793-1818 [Abstract(7129)] [View PDF(7420)2.75 M]Survey on Measurement Methods in Software-defined NetworkingDAI Mian, CHENG Guang and ZHOU Yu-Yang2019,30(6):1853-1874 [Abstract(3477)] [View PDF(8391)1.95 M]