Volume 30,Issue 6,2019 Table of Contents
Web Service QoS Forecasting Approach Using Multivariate Time SeriesZHANG Peng-Cheng, WANG Li-Yan, JI Shun-Hui and LI Wen-Rui2019,30(6):1742-1758 [Abstract(5115)] [View PDF(5740)1.76 M]Software Reliability Growth Model Based on Weibull Distribution Introduced FaultsWANG Jin-Yong, ZHANG Ce, MI Xiao-Ping, GUO Xin-Feng and LI Ji-Hong2019,30(6):1759-1777 [Abstract(2280)] [View PDF(4003)2.00 M]Code Obfuscation Based on Instructions SwappingPAN Yan, ZHU Yue-Fei and LIN Wei2019,30(6):1778-1792 [Abstract(2200)] [View PDF(4698)1.64 M]Interactive Exploration of Behavior Patterns from Check-in LogsLI Cong-Min, LI Jie, ZHANG Kang and TAO Wen-Yuan2019,30(6):1819-1834 [Abstract(2327)] [View PDF(4524)1.74 M]Mixed Particle Swarm Optimization Algorithm with Multistage DisturbancesXU Li-Feng, HUANG Zu-Sheng, YANG Zhong-Zhu and DING Wei-Long2019,30(6):1835-1852 [Abstract(2391)] [View PDF(4752)1.83 M]Node Evaluation Method Based on Importance Contribution in Scale-free NetworksYIN Rong-Rong, YIN Xue-Liang, CUI Meng-Di and XU Ying-Han2019,30(6):1875-1885 [Abstract(2053)] [View PDF(4084)1.08 M]Combined Filtering and DBM Reconstructing for Fingerprint EnhancementBIAN Wei-Xin, DING Shi-Fei, ZHANG Nan, ZHANG Jian and ZHAO Xing-Yu2019,30(6):1886-1900 [Abstract(2310)] [View PDF(3862)1.84 M]
区块链与数字货币技术专题前言斯雪明,陈文光2019,30(6):1575-1576 [Abstract(2896)] [View PDF(5489)279.26 K]Research on High-performance Consortium Blockchain TechnologyZHU Li, YU Huan, ZHAN Shi-Xiao, QIU Wei-Wei and LI Qi-Lei2019,30(6):1577-1593 [Abstract(5310)] [View PDF(9638)1.72 M]Distributed Framework of SWIFT System Based on Permissioned BlockchainZHU Jian-Ming, DING Qing-Yang and GAO Sheng2019,30(6):1594-1613 [Abstract(4617)] [View PDF(8398)2.01 M]Traceability Mechanism of Dynamic Data in Internet of Things Based on Consortium BlockchainQIAO Rui, CAO Yan and WANG Qing-Xian2019,30(6):1614-1631 [Abstract(4091)] [View PDF(8847)1.91 M]
Survey of Blockchain Access Control in Internet of ThingsSHI Jin-Shan and LI Ru2019,30(6):1632-1648 [Abstract(6338)] [View PDF(12961)1.65 M]Research on the Progress in Cross-chain Technology of BlockchainsLI Fang, LI Zhuo-Ran and ZHAO He2019,30(6):1649-1660 [Abstract(7539)] [View PDF(15579)1.15 M]
Model for Data Access Control and Sharing Based on BlockchainWANG Xiu-Li, JIANG Xiao-Zhou and LI Yang2019,30(6):1661-1669 [Abstract(5267)] [View PDF(10996)1.25 M]RepChain—A Permissioned Blockchain Toolkit Implemented by Reactive ProgrammingLI Chun-Xiao, CHEN Sheng, ZHENG Long-Shuai, ZUO Chun, JIANG Bu-Yun and LIANG Geng2019,30(6):1670-1680 [Abstract(4598)] [View PDF(6824)1.23 M]Mimic Blockchain—Solution to the Security of BlockchainXU Mi-Xue, YUAN Chao, WANG Yong-Juan, FU Jin-Hua and LI Bin2019,30(6):1681-1691 [Abstract(4577)] [View PDF(8627)1.12 M]Privacy Preserving Scheme in Block Chain with Provably Secure Based on SM9 AlgorithmYANG Ya-Tao, CAI Ju-Liang, ZHANG Xiao-Wei and YUAN Zheng2019,30(6):1692-1704 [Abstract(5472)] [View PDF(9152)1.37 M]Supervised Anonymous Authentication SchemeWANG Zhen, FAN Jia, CHENG Lin, AN Hong-Zhang, ZHENG Hai-Bin and NIU Jun-Xiang2019,30(6):1705-1720 [Abstract(4892)] [View PDF(8544)1.78 M]
Buffer Overflow Detection Techniques and Tools Based on Application PerspectiveSITU Ling-Yun, WANG Lin-Zhang, LI Xuan-Dong and LIU Yang2019,30(6):1721-1741 [Abstract(4041)] [View PDF(7904)2.30 M]Survey of Entity Relationship Extraction Based on Deep LearningE Hai-Hong, ZHANG Wen-Jing, XIAO Si-Qi, CHENG Rui, HU Ying-Xi, ZHOU Xiao-Song and NIU Pei-Qing2019,30(6):1793-1818 [Abstract(7331)] [View PDF(7420)2.75 M]Survey on Measurement Methods in Software-defined NetworkingDAI Mian, CHENG Guang and ZHOU Yu-Yang2019,30(6):1853-1874 [Abstract(3527)] [View PDF(9179)1.95 M]