Volume 27,Issue 8,2016 Table of Contents
Model and Solution to Testing Resource Dynamic Allocation for Series-Parallel Software SystemsLU Yang, YUE Feng, ZHANG Guo-Fu, SU Zhao-Pin and WANG Yong-Qi2016,27(8):1964-1977 [Abstract(2890)] [View PDF(4055)864.50 K]Software Fault Location Based on Double-Times-Locating StrategyZONG Fang-Fang, HUANG Hong-Yun and DING Zuo-Hua2016,27(8):1993-2007 [Abstract(3126)] [View PDF(4839)703.90 K]Weak Mutation Testing and Its Transformation for Message Passing Parallel ProgramsGONG Dun-Wei, CHEN Yong-Wei and TIAN Tian2016,27(8):2008-2024 [Abstract(3051)] [View PDF(5453)843.29 K]Topology Discovery with Incomplete Address Forwarding TableZHANG Bin, DIAO Xing-Chun, SUN Yan-Tao, DING Kun and YAN Hao2016,27(8):2086-2098 [Abstract(3276)] [View PDF(4468)659.99 K]Fusion-Based Cognitive Awareness-Control Model for Network Security SituationLIU Xiao-Wu, WANG Hui-Qiang, Lü Hong-Wu, YU Ji-Guo and ZHANG Shu-Wen2016,27(8):2099-2114 [Abstract(3725)] [View PDF(6056)1.48 M]Method of Pushing Context-Aware Service of Augmented Reality by Scene ClassificationLIN Yi, LIU Yue, WANG Yong-Tian and HE Chang-Yu2016,27(8):2115-2134 [Abstract(2892)] [View PDF(6134)4.91 M]Forward-Motion Blurring Kernel Based on Generalized Motion Blurring ModelJIANG Xin-Lan, WANG Liang, LUO Xiao-Yue, WANG Sheng-Chun and LUO Si-Wei2016,27(8):2135-2146 [Abstract(2885)] [View PDF(4276)2.12 M]
数据开放与隐私管理专题前言孟小峰,林东岱2016,27(8):1889-1890 [Abstract(5018)] [View PDF(5868)281.76 K]Information Entropy Models and Privacy Metrics Methods for Privacy ProtectionPENG Chang-Gen, DING Hong-Fa, ZHU Yi-Jie, TIAN You-Liang and FU Zu-Feng2016,27(8):1891-1903 [Abstract(6030)] [View PDF(11350)647.20 K]Efficient Algorithm on Anonymizing Social Networks with Reachability PreservationLIU Xiang-Yu, LI Jia-Jia, AN Yun-Zhe, ZHOU Da-Hai and XIA Xiu-Feng2016,27(8):1904-1921 [Abstract(5019)] [View PDF(6545)902.93 K]Preservation of Implicit Privacy in Spatio-Temporal Data PublicationWANG Lu, MENG Xiao-Feng and GUO Sheng-Na2016,27(8):1922-1933 [Abstract(6115)] [View PDF(8426)1.29 M]
Survey on Log Research of Large Scale Software SystemLIAO Xiang-Ke, LI Shan-Shan, Dong Wei, JIA Zhou-Yang, LIU Xiao-Dong and ZHOU Shu-Lin2016,27(8):1934-1947 [Abstract(9396)] [View PDF(12305)995.37 K]
Specification and Verification of User Privacy Requirements for Service CompositionPENG Huan-Feng, HUANG Zhi-Qiu, FAN Da-Juan and ZHANG Yong-Long2016,27(8):1948-1963 [Abstract(3957)] [View PDF(5175)894.22 K]Web Service QoS Monitoring Approach Sensing to Environmental FactorsZHUANG Yuan, ZHANG Peng-Cheng, LI Wen-Rui, FENG Jun and ZHU Yue-Long2016,27(8):1978-1992 [Abstract(4021)] [View PDF(5145)992.66 K]
Survey on Incentive Mechanisms for Crowd SensingWU Yao, ZENG Ju-Ru, PENG Hui, CHEN Hong and LI Cui-Ping2016,27(8):2025-2047 [Abstract(7681)] [View PDF(16497)1.41 M]New Processor for Data-Intensive ComputingWANG He-Peng, WANG Hong-Zhi, LI Jia-Ning, KONG Xin-Xin, LI Jian-Zhong and GAO Hong2016,27(8):2048-2067 [Abstract(5256)] [View PDF(8453)866.49 K]
Inconsistency Detection in Distributed Big DataLI Wei-Bang, LI Zhan-Huai, CHEN Qun, YANG Jing-Ying and JIANG Tao2016,27(8):2068-2085 [Abstract(3938)] [View PDF(5506)813.18 K]
Survey on In-Memory Computing TechnologyLUO Le, LIU Yi and QIAN De-Pei2016,27(8):2147-2167 [Abstract(7120)] [View PDF(15288)495.48 K]
Cross-Platform Data Layout Optimization Based on Relaxed Reuse Distance on Heterogeneous ArchitecturesLIU Ying, HUANG Lei, Lü Fang, CUI Hui-Min, WANG Lei and FENG Xiao-Bing2016,27(8):2168-2184 [Abstract(2788)] [View PDF(4456)1.69 M]