地图     English
学术论文 2015

出自计算机科学国家重点实验室

学术论文 2015
跳转到: 导航, 搜索


2016年 2015年 2014年 2013年 2012年 2011年 2010年 2009年 2008年 往年期刊论文


  1. Yan Cai,Changjiang Jia,Shangru Wu,Ke Zhai,W.K. Chan,ASN: A Dynamic Barrier-based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs,IEEE Transactions on Parallel and Distributed Systems,"26, 1, 13 - 23",ccf a
  2. "Yibiao Yang",Yuming Zhou,Hongmin Lu,Lin Chen,Zhenyu Chen,Baowen Xu ,"Hareton Leung",Zhenyu Zhang,"Are slice-based cohesion metrics actually useful in effort-aware post-release fault-proneness prediction? An empirical study",IEEE Transactions on Software Engineering,"41,4,331 - 357",ccf a
  3. David Nowak,Yu Zhang,Formal Security Proofs with Minimal Fuss: Implicit Computational Complexity at Work,Information and Computation,241,96-113,ccf a
  4. Ying Song,Jiaping Wang, Li-yi Wei,Wencheng Wang,Vector regression functions for texture compression,Acm Transactions on Graphics,"35,1,Article 5 (1-10)",ccf a
  5. Shaowei Cai,Chuan Luo,Kaile Su,Improving WalkSAT By Effective Tie-breaking and Efficient Implementation,The Computer Journal,"58, 11, 2864-2875",core a*
  6. Qi Li ,Xinwen Zhang ,Xin Zhang ,Purui Su ,Invalidating Idealized BGP Security Proposals and Countermeasures,IEEE Transactions on Dependable and Secure Computing,"12, 3, 298-311",ccf a
  7. Wei Xue,Chao Yang,Haohuan Fu,Xinliang Wang,Yangtong Xu,Junfeng Liao,Lin Gan,Yutong Lu,Rajiv Ranjan,Lizhe Wang,Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2,IEEE Transactions on Computers,"64, 8,2382–2393",ccf a
  8. Wencheng Wang,Panpan Xu, Ying Song, Miao Hua,Minying Zhang,Xiaohui Bie,Distinguishing local and global edits for their simultaneous propagation in a uniform framework,IEEE Transactions on Image Processing,"24, 8, 2478-2487",ccf a
  9. Li Shen,Gang Sun,Qingming Huang,Shuhui Wang,Zhouchen Lin,Enhua Wu,Multi-Level Discriminative Dictionary Learning With Application to Large Scale Image Classification,IEEE Transactions on Image Processing,"24, 10, 3109-3123",ccf a
  10. Lei Shi,Hanghang Tong,Jie Tang,Chuang Lin,VEGAS: Visual influEnce GrAph Summarization on Citation Networks,IEEE Transactions on Knowledge and Data Engineering,"27, 12, 3417-3431",ccf a
  11. Lijun Wu, Kaile Su,Shaowei Cai,Xiaosong Zhang,Chenyi Zhang,Shupeng Wang,An I/O Efficient Approach for Detecting All Accepting Cycles,IEEE Transactions on Software Engineering,"41, 8, 730-744 ",ccf a
  12. Lei Shi,Chen Wang,Zhen Wen,Huamin Qu,Chuang Lin,Qi Liao,1.5D Egocentric Dynamic Network Visualization,IEEE Transactions on Visualization and Computer Graphics,"21, 5, 624-637",ccf a
  13. Xiaosheng Li ,Xiaowei He ,Xuehui Liu ,Jian J. Zhang ,Baoquan Liu ,Enhua Wu,Multiphase Interface Tracking with Fast Semi-Lagrangian Contouring,IEEE Transactions on Visualization and Computer Graphics,online,ccf a
  14. Haiming Chen,Ping Lu,Checking determinism of regular expressions with counting,Information and Computation,"241,302–320",ccf a
  15. Ping Lu,Feifei Peng,Haiming Chen ,Lixiao Zheng,Deciding determinism of unary languages,Information and Computation,"245, 181–196",ccf a
  16. George Barmpalias,Rod G. Downey,Michael McInerney,Integer valued betting strategies and Turing degrees,Journal of Computer and System Sciences,81,7,1387–1412,core a*
  17. Andrea Turrini,Holger Hermanns,Polynomial Time Decision Algorithms for Probabilistic Automata,Information and Computation,"244,134-171",ccf a
  18. Chuan Luo,Shaowei Cai,Kaile Su,Wei Wu,Clause States Based Configuration Checking in Local Search for Satisfiability,IEEE Transactions on Cybernetics,"45, 5, 1028 - 1041",ccf b
  19. Ernst Moritz Hahn,Holger Hermanns,Ralf Wimmer,Bernd Becker,Transient Reward Approximation for Continuous-Time Markov Chains,?IEEE Transactions on Reliability,"64, 4, 1254 - 1275",core a
  20. Lijun Wu,Huijia Huang,Kaile Su,Shaowei Cai,Xiaosong Zhang,An I/O Efficient Model Checking Algorithm for Large-Scale Systems,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,"23,5, 905 - 915 ",ccf b
  21. Kai Huang, Min Yu, Rongjie Yan,Xiaomeng Zhang,Xiaolang Yan,Lisane Brisolara,Ahmed Amine Jerraya,Jiong Feng,Communication Optimizations for Multithreaded Code Generation from Simulink Models,ACM Transactions on Embedded Computing Systems,"14,3,59 (1-26)",ccf b
  22. Le Liu,Xiaosheng Li,?Yanyun Chen,Xuehui Liu,Jian J. Zhang,Enhua Wu,An Efficient Feathering System with Collision Control,Computer Graphics Forum,"34,7,279-288",ccf b
  23. Yuan Feng,Lijun Zhang,A nearly optimal upper bound for the self-stabilization time in herman's algorithm,Distributed Computing,"28(4):233-244, 2015",core a
  24. Yinglong Ma,Moyi Shi,Jun Wei,Cost and accuracy aware scientific workflow retrieval based on distance measure,Information Sciences ,"314, 1, 1-13",ccf b
  25. Shaowei Cai,Zhong Jie,Kaile Su,An effective variable selection heuristic in SLS for weighted Max-2-SAT,Journal of Heuristics?,"21, 3, 433-456 ",core a
  26. Changjiang Jia,Yan Cai,Yuen Tak Yu,T.H.Tse,5W+1H pattern: A perspective of systematic mapping studies and a case study on cloud software testing,Journal of Systems and Software,"116, 206–219",ccf b
  27. Chuanyan Hao, Yadang Chen, Wen Wu,Enhua Wu,Image Completion with Perspective Constraint based on a Single Image,Science China Information Sciences,"58, 9, 092109(1-12)",ccf b
  28. Ehsan Ahmad,Yunwei Dong,Brian Larsen,Jidong Lv,Tao Tang,Naijun Zhan,Behavior modeling and verification of movement authority scenario of Chinese Train Control System using AADL,Science China Information Sciences,"58, 11, 112104(1-20)",ccf b
  29. Angsheng Li, Xuechen Li,Yicheng Pan,Wei Zhang,Strategies for network security,Science China Information Sciences,"58, 1, 012107(1–14) ",ccf b
  30. Wenling Wu ,Lei Zhang,Xiaoli Yu ,The DBlock family of block ciphers,Sciences China Information Sciences,"58, 3, 032105(1-14)",ccf b
  31. Jizu Huang,Chao Yang,Xiao-Chuan Cai,A Fully Implicit Method for Lattice Boltzmann Equations,SIAM Journal on Scientific Computing,"37, 5, S291–S313",core a
  32. Jie Chen,Xiwei?Xu,Leon J.?Osterweil,Liming Zhu,Yuriy?Brun,Len Bass,Junchao Xiao,Mingshu Li,Qing?Wang,Using Simulation to Evaluate Error Detection Strategies: A Case Study of Cloud-Based Deployment Processes,Journal of Systems and Software,"110, 205-221",ccf b
  33. Peng Zhang,Angsheng Li,Algorithmic aspects of homophyly of networks,Theoretical Computer Science,"593, 16, 117–131",ccf b
  34. Wenhui Zhang,Bounded Semantics,Theoretical Computer Science,"564, 26, 1-29 ",ccf b
  35. Zhaowei Xu, Yuefei Sui, Wenhui Zhang,Completeness of Hoare Logic with inputs over the Standard Model,Theoretical Computer Science,"612, 25, 23-28",ccf b
  36. Yuxin Deng, Yu Zhang,Program equivalence in linear contexts,Theoretical Computer Science,"585, 20, 71–90",ccf b
  37. Tillmann Miltzow,Jens M Schmidt,Mingji Xia,Counting?K4-subdivisions,Discrete Mathematics,"338,12,2387-2392",core b
  38. Yadang Chen,Chuanyan Hao,Wen Wu,Enhua Wu,Accurate Video Object Segmentation based on Motion Estimation,The Visual Computer,ccf c
  39. Siyuan Qiao, Xiaoxin FangBin Sheng, Wen Wu, Enhua Wu,Structure-aware QR Code abstraction,Visual Computer,"31,1123–1133",ccf c
  40. Miao Hua, Wencheng Wang,Effective structure restoration for image completion using internet resources.,Visual Computer,"31,6,1113-1122",ccf c
  41. Guangyan Huang,Jing He,Yanchun Zhang,Wanlei Zhou,Hai Liu,Zhiming Ding,Yue You,Jian Cao,Mining streams of short text for analysis of world-wide event evolutions,World Wide Web Journal,"18,5, 1201-1217",ccf b
  42. Jizu Huang,Liqun Cao,Chao Yang,A multiscale algorithm for radiative heat transfer equation with rapidly oscillating coefficients ,Applied Mathematics and Computation,"266, 149-168",
  43. Haijian Yang, Chao Yang,Xiao-Chuan Cai,Mixed order discretization based two-level Schwarz preconditioners for a tracer transport problem on the cubed-sphere ,Computers and Fluids,"110, 88-95",
  44. Yan Zeng ,Xuesong Wu ,Jianwen Cao ,An improved KM algorithm for computing the structural index of DAE system,Journal of Algorithms and Computational Technology,"9,3,233-250",core c
  45. Jingzheng Wu, Yanjun Wu, Zhifei Wu,Mutian Yang,Tianyue Luo,Yongji Wang,AndroidFuzzer: Detecting Android Vulnerabilities in Fuzzing Cloud,Journal of Computational Information Systems,"11,11, 3859-3866.",
  46. Jingzheng Wu, Yanjun Wu, Mutian Yang,Zhifei Wu,Tianyue Luo,Yongji Wang,QRCloud: Android Vulnerability Query and Push Services based on QR Code in Cloud Computing,Journal of Computational Information Systems,"11,11, 3875-3881",
  47. George Barmpalias,Mingzhong Cai,Steffen Lempp,Theodore Slaman,On the existence of a strong minimal pair,Journal of Mathematical Logic,"15,1,1-28",
  48. George Barmpalias,Richard Elwes,Andy Lewis-Pye,Tipping Points in 1-Dimensional Schelling Models with Switching Agents,Journal of Statistical Physics,"158,4,806-852",
  49. Danli Wang,Yunfeng Qi,Tingting Wang,Heng Qiao,Yining Shi,Lan Zhang,Evaluation of stereoscopic visual fatigue in experts,Journal of The Society For Information Display,"22,8, 437-447",
  50. Angsheng Li,Jiankou Li, Yicheng Pan,Discovering natural communities in networks,Physica A,"436, 878-896",
  51. Angsheng Li,Jiankou Li,Yicheng Pan,"Homophyly/kinship hypothesis: Natural communities, and predicting in networks",Physica A,"420, 148-163",
  52. Chang Leng,Ying Qiao,Xiaobo Shaoron Hu,Hongan Wang,Utilization-Based Admission Control for Aperiodic Tasks under EDF Scheduling,Real-Time Systems,"51,1,36-76",ccf c
  53. Angsheng Li, Jiankou Li, Yicheng Pan, Xianchen Yin, Xi Yong,Homophyly/Kinship Model: Naturally Evolving Networks,Scientific Reports,"515,140",
  54. Yifan Hu , Lei Shi,Visualizing large graphs,Wiley Interdisciplinary Reviews: Computational Statistics,"7,2, 115-136",
  55. 殷本俊,陈燕,李华婷,吴雯,盛斌,基于Morlet小波变换的视网膜血管分割,计算机辅助设计与图形学学报,7,1263-1270,
  56. 魏敬敬,刘学慧,陈彦云,吴恩华,基于隐式积分的树叶形变快速仿真,计算机辅助设计与图形学学报,"27,3,451-459",
  57. 谯从彬,盛斌,吴雯,马利庄,基于运动分割的视频去模糊,计算机辅助设计与图形学学报,27,11,2108-2115,
  58. 杨欢,李义娜, 张康,可视化设计中的色彩应用,计算机辅助设计与图形学学报,"27,9,1587-1596",
  59. 朱峰军,武继刚,史雯隽,姜桂圆,多选择软硬件划分问题的计算模型与动态规划算法,计算机工程与科学,"37,4,641-648",
  60. 兰韵,刘万伟,董威,刘斌斌,付辰,刘大学,无人驾驶汽车决策系统的规则描述与代码生成方法,计算机工程与科学,"37,8,1510-1516",
  61. 杨猛,杨刚,园林植物数字化仿真算法,计算机工程与应用,"3,35-39,54",
  62. 柴叶生,朱雪阳,晏荣杰,张广泉,基于MARTE模型的系统可靠性预测,计算机科学,"42,12,82-86",
  63. 顾玉磊,朱雪阳,晏荣杰,张广泉,基于异构多核平台的同步数据流图帕累托优化与调度,计算机科学,"42,11,43-47",
  64. 岳翰,吴鹏,并发软件适应性随机测试方法,计算机系统应用,"24,11, 1-6",
  65. 曹燊,李勇坚,基于不变量查找的German协议验证,计算机系统应用,"24,11,173-178",
  66. 王硕,杨秋松,吴涛,基于代码路径的安全操作系统性能优化方法,计算机系统应用,"24,8,18-24",
  67. 张扶桑,金蓓弘,汪兆洋,胡佳锋,张利锋,基于轨迹挖掘的公交车自组织网络路由机制,计算机学报,"38,3,648-662",
  68. 张英骏,冯登国,秦宇,杨波,基于Trustzone的强安全需求环境下可信代码执行方案,计算机研究与发展,52,10,2224-2238,
  69. 彭泽环,孙乐,韩先培,陈波,社区热点微博推荐研究,计算机研究与发展,"52,5,1014-1021",
  70. 王彦士,王伟,刘朝辉,魏峻,黄涛,支持透明集成的数据缓存机制,计算机研究与发展,"52,4,907-917",
  71. 谢沛东,武延军,基于Linux内核的Key-Value存储系统——KStore,计算机应用,"35,1,99-102,114",
  72. 王秀青,侯增广,潘世英,谭民,王永吉,曾慧,基于多超声传感器信息和NeuCube的移动机器人走廊场景识别,计算机应用,35,10,2833-2837,
  73. 吴含宇,肖俊超,王青,基于FARM降低系统性偏差的缺陷修复时间预测方法,计算机应用与软件,"32,7,5-9,15",
  74. 左正康,薛锦云,Apla中泛型约束机制研究,软件学报,"26,6,1340-1355",
  75. 韩红雷, 王文成, 华 淼,基于视点评分的三维模型摆正,软件学报,"26,10,2720?2732",
  76. 陈力,王永吉,吴敬征,吕荫润,基于树状线性规划搜索的单调速率优化设计,软件学报,"26,12, 3223-3241",
  77. 陈伟, 黄翔, 乔晓强, 魏峻, 钟华,软件配置错误诊断与修复技术研究,软件学报,"26,6,1285?1305",
  78. 白琳, 叶丹, 魏峻, 黄涛,一种高效的基于服务功能规约的服务选择方法,软件学报,"26,8,1886?1906",
  79. 王卅, 张文博, 吴恒, 宋云奎, 魏峻, 钟华, 黄涛,一种基于硬件计数器的虚拟机性能干扰估算方法,软件学报,"26,8,2074?2090",
  80. 白琳, 魏峻, 黄翔, 叶丹, 黄涛,一种面向移动应用的探索式服务组合方法,软件学报,"26,9,2191?2211",
  81. 吴涛,杨秋松,贺也平,基于邻接点的VMM动态完整性度量方法,通信学报,"36,9,169-180",
  82. 王榕,张敏,冯登国,李昊,数据库形式化安全策略模型建模及分析方法,通信学报,"36,9,193-203",
  83. 贾娟娟,施智平,关永,李勇坚,魏洪兴,ROS中XML-RPC协议实现的形式化验证,小型微型计算机系统,"12, 2629-2633",
  84. 王建敏,曾凡平,王健康,用优化的正则表达式引擎进行快速网络流分类,小型微型计算机系统,"12, 2690-2695",
  85. 杨猛,郭王翚,贺晓宇,林琳,杨刚,基于形态特征真实感月季大规模建模算法,系统仿真学报,27,10,2328-2336,
  86. 杨溢,盛斌,吴雯,马利庄,基于矩形波谱分析的图像显著性检测,浙江大学学报(理学版),1,1-8,
  87. 董韫美,多类型递归函数,中国科学 : 数学,"45,9,1549-1562",
  88. 李明树,赵琛,武延军,谢沛东,数据操作系统的思想、设计和原型验证,中国科学:信息科学,"45,6,703-720",
  89. 吴敬征,武延军,武志飞,杨牧天,罗天悦,王永吉,基于有向信息流的Android隐私泄露类恶意应用检测方法,中国科学院大学学报,32,6,807-815,
  90. 吴敬征, 武延军, 罗天悦, 武志飞, 杨牧天, 王永吉,一种基于权限控制机制的 Android 系统隐蔽信道限制方法,中国科学院大学学报,"32,5,696-705",
  91. Xiang Zheng,Chao Yang,Xiao-Chuan Cai,David Keyes?,A parallel domain decomposition-based implicit method for the Cahn-Hilliard-Cook phase-field equation in 3D,Journal of Computational Physics,"285,55-70",
  92. Jianxin Chen,Zhengfeng Ji,Chi-Kwong Li,Yiu-Tung Poon,Yi Shen,Nengkun Yu,Bei Zeng,Duanlu Zhou,Discontinuity of maximum entropy inference and quantum phase transitions,New Journal of Physics,"17,8",


2016年 2015年 2014年 2013年 2012年 2011年 2010年 2009年 2008年 往年会议论文
  1. Hanmo Wang,Liang Du,Peng Zhou,Lei Shi,Yi-Dong Shen,Convex Batch Mode Active Sampling via alpha-relative Pearson Divergence,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  2. Miao Xie,Qiusong Yang,Qing Wang,Gao Cong,Gerard de Melo,DynaDiffuse: A Dynamic Diffusion Model for Continuous Time Constrained Influence Maximization,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  3. Meilun Li,Zhikun She,Andrea Turrini,Lijun Zhang,Preference planning for Markov decision processes,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  4. Jianfeng Du,Kewen Wang,Yi-Dong Shen,Towards Tractable and Practical ABox Abduction over Inconsistent Description Logic Ontologies,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  5. Wei Wang,Hao Wang,Chen Zhang,Fanjiang Xu,Transfer Feature Representation via Multiple Kernel Learning,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  6. Shaowei Cai,Jinkun Lin,Kaile Su,Two Weighting Local Search for Minimum Vertex Cover,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,"Austin, Texas, USA",ccf a
  7. Lei Song,Yuan Feng,Lijun Zhang,Decentralized bisimulation for multiagent systems,14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015),May 4-8,"Istanbul, Turkey",core a*
  8. Bin Zhang,Chao Xu,Willi Meier,"Fast Correlation Attacks over extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0",35th Annual Cryptology Conference (CRYPTO 2015),August 16-20,"Santa Barbara, CA, USA",ccf a
  9. Jinkun Lin,Chuan Luo,Shaowei Cai,Kaile Su,Dan Hao,Lu Zhang,TCA: An Efficient Two-Mode Meta-Heuristic Algorithm for Combinatorial Test Generation,30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015),November 9-13,"Lincoln, Nebraska, USA",ccf a
  10. Liang Zou,Martin Fraenzle,Naijun Zhan,Peter Nazier Mosaad,Automatic Verification of Stability and Safety for Delay Differential Equations,27th International Conference on Computer Aided Verification (CAV 2015),July 18-24,"San Francisco, California, USA",ccf a
  11. Yu-Fang Chen,Chih-Duo Hong,Bow-Yaw Wang,Lijun Zhang,Counterexample-guided polynomial loop invariant generation by lagrange interpolation,27th International Conference on Computer Aided Verification (CAV 2015),July 18-24,"San Francisco, California, USA",ccf a
  12. Hui Chen,Jiangdong Li,Fengjun Zhang,Yang Li,Hongan Wang,3D Model-Based Continuous Emotion Recognition,28th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015),June 7-12,"Boston, MA, USA",ccf a
  13. Yan Cai,Lingwei Cao,Effective and precise dynamic detection of hidden races for Java programs,10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) ,August 30 - September 4,"Bergamo, Italy",ccf a
  14. Jiang Zhang,Zhenfeng Zhang,Jintai Ding,Michael Snook,?zgür Dagdelen,Authenticated Key Exchange from Ideal Lattices,34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015),April 26-30 ,"Sofia, Bulgaria",ccf a
  15. Radu Curticapean,Mingji Xia,"Parameterizing the Permanent: Genus, Apices, Minors, Evaluation mod 2^k.",IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS 2015),October 18–20," Berkley, CA, USA",ccf a
  16. Lei Shi,Hanghang Tong,Xinzhu Mu,BrainQuest: Perception-Guided Brain Network Comparison,International Conference on Data Mining (ICDM 2015),November 14-17,"Atlantic City, NJ, USA",core a*
  17. Hanmo Wang,Liang Du,Lei Shi,Peng Zhou,Yuhua Qian,Yi-Dong Shen ,Experimental Design With Multiple Kernels,International Conference on Data Mining (ICDM 2015),November 14-17,"Atlantic City, NJ, USA",core a*
  18. Ziyang Ma,Renjie Liao,Xin Tao,Li Xu,Jiaya Jia,Enhua Wu,Handling Motion Blur in Multi-Frame Super-Resolution, 28th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015),June 7-12,"Boston, MA, USA",ccf a
  19. Wanwei Liu,Lei Song,Ji?Wang,Lijun Zhang,A simple probabilistic extension of modal mu-calculus,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  20. Li Shen,Gang Sun,Zhouchen Lin,Qingming Huang,Enhua Wu,Adaptive Sharing for Image Classification,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  21. Shaowei Cai,Balance between Complexity and Quality: Local Search for Minimum Vertex Cover in Massive Graphs,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  22. Peng Zhou,Liang Du,Hanmo Wang,Lei Shi,Yi-Dong Shen,Learning a Robust Consensus Matrix for Clustering Ensemble via Kullback-Leibler Divergence Minimization,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  23. Lei Song,Yuan Feng,Lijun Zhang,Planning for stochastic games with co-safe objectives,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  24. Peng Zhou,Liang Du,Lei Shi,Hanmo Wang,Yi-Dong Shen,Recovery of Corrupted Multiple Kernels for Clustering,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  25. Liang Du,Peng Zhou,Lei Shi,Hanmo Wang,Mingyu Fan,Wenjian Wang,Yi-Dong Shen ,Robust Multiple Kernel K-means using L2-1-norm,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,"Buenos Aires, Argentina",ccf a
  26. Liang Du,Yi-Dong Shen ,Unsupervised Feature Selection with Adaptive Structure Learning, 21th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-15),August 10-13,"Sydney, NSW, Australia.",ccf a
  27. Fei He,Xiaowei Gao,Bow-Yaw Wang,Lijun Zhang,Leveraging weighted automata in compositional reasoning about concurrent probabilistic systems,42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2015),January 15-17,"Mumbai, India",ccf a
  28. Artur Czumaj,Pan Peng,Christian Sohler ,Testing Cluster Structure of Graphs,47th Annual Symposium on the Theory of Computing (STOC 2015),June 14-17,"Portland, Oregon, USA.",ccf a
  29. Qingsong Liu,Yifan Hu,Lei Shi,Xinzhu Mu,Yutao Zhang,Jie Tang,EgoNetCloud: Event-based Dynamic Egocentric Network Visualization,"IEEE Visualization (VIS'15): Visual Analytics Science and Technology (VAST), Information Visualization (InfoVis) & Scientific Visualization (SciVis)",October 25-30,"Chicago, Il, USA",ccf a
  30. Minghua Wang,Heng Yin,Abhishek Vasisht Bhaskar,Purui Su,Dengguo Feng,Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries,2015 Annual Computer Security Applications Conference (ACSAC 2015),December 7-11,"Los Angeles, CA, USA",ccf b
  31. Bin Zhang,Xinxin Gong,Another Tradeoff Attack on Sprout-like Stream Ciphers,21st International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’ 2015),November 29-December 3,"Auckland, New Zealand",ccf b
  32. Ting Gan,Mingshuai Chen,Liyun Dai,Bican Xia,Naijun Zhan ,Decidability of the reachability for a family of linear vector fields, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,"Shanghai, China",core a
  33. Liang Zou,Naijun Zhan,Shuling Wang,Martin Fr?nzle,Formal Verification of Simulink/Stateflow Diagrams, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,"Shanghai, China",core a
  34. Constantin Enea ,Mihaela Sighireanu ,Zhilin Wu,On Automated Lemma Generation for Separation Logic with Inductive Definitions , 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,"Shanghai, China",core a
  35. Chao Wang,Yi Lv,Peng Wu,TSO-to-TSO Linearizability is Undecidable, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,"Shanghai, China",core a
  36. Hongzhi Yin,Xiaofang Zhou,Yingxia Shao,Hao Wang,Shazia Sadiq,Joint Modeling of User Check-in Behaviors for Point-of-Interest Recommendation,24th ACM International Conference on Information and Knowledge Management (CIKM 2015),October 19-23,"Melbourne, VIC, Australia",ccf b
  37. Peng Zhang,Tao Jiang,Angsheng Li,Improved Approximation Algorithms for the Maximum Happy Vertices and Edges Problems,21st International Computing and Combinatorics Conference (COCOON 2015),August 4-6,"Beijing, China",core a
  38. Sa Wang,Wenbo Zhang,Tao Wang,Chunyang Ye,Tao Huang,Vmon: Monitoring and Quantifying Virtual Machine Inteference via Hardware Performance Counter,"IEEE 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015)",July 1-5,"Taichung, Taiwan",ccf c
  39. Ernst Moritz Hahn,Guangyuan Li,Sven Schewe, Andrea Turrini,Lijun Zhang,Lazy Probabilistic Model Checking without Determinisation,26th International Conference on Concurrency Theory (CONCUR 2015),September 1-4 ,"Madrid, Spain",ccf b
  40. Taolue Chen,Song Fu,Zhilin Wu,On the Satisfiability of Indexed Linear Temporal Logics,26th International Conference on Concurrency Theory (CONCUR 2015),September 1-4 ,"Madrid, Spain",ccf b
  41. Rongjie Yan,Chih-Hong Cheng,Yesheng Chai,Formal consistency checking over specifications in natural languages,"Design, Automation and Test in Europe Conference and Exhibition (DATE 2015)",March 9-13 ,"Grenoble, France",ccf b
  42. Xinye Tang,Song Wang,Ke Mao,Will This Bug-fixing Change Break Regression Testing?,ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2015),October 22-23?,"Beijing, China",ccf b
  43. Jiang Liu,Naijun Zhan,Hengjun Zhao,Liang Zou,Abstraction of elementary hybrid systems by variable transformation,20th International Symposium on Formal Methods (FM 2015),June 24-26,"Oslo, Norway",ccf b
  44. Christian Eisentraut,Jens?Chr. Godskesen,Holger Hermanns,Lei Song,Lijun Zhang,Probabilistic bisimulation for realistic schedulers,20th International Symposium on Formal Methods (FM 2015),June 24-26,"Oslo, Norway",ccf b
  45. Xue-Yang Zhu,Rongjie Yan,Yu-Lei Gu,Jian Zhang,Wenhui Zhang,Guangquan Zhang,Static Optimal Scheduling for Synchronous Data Flow Graphs with Model Checking,20th International Symposium on Formal Methods (FM 2015),June 24-26,"Oslo, Norway",ccf b
  46. Weifeng Wang,Li Jiao,Difference Bound Constraint Abstraction for Timed Automata Reachability Checking,"35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2015)",June 2-4,"Grenoble, France",core a
  47. Fusang Zhang,Hai Liu,Yiu-Wing Leung,Xiaowen Chu,Beihong Jin,Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks,IEEE 35th International Conference on Distributed Computing Systems (ICDCS 2015),June 29 - July 2,"Columbus, OH, USA",ccf b
  48. Peng Zhang,Yulong Ao,Chao Yang,Yiqun Liu,Fangfang Liu,Changmao Wu,Haitao Zhao,Pattern-Driven Hybrid Multi- and Many-Core Acceleration in the MPAS Shallow-Water Model,44th International Conference on Parallel Processing (ICPP'15),September 1-4,"Beijing, China",ccf b
  49. Zhiqiang Zhang,Tianyong Wu,Jian Zhang,Boundary value analysis in automatic white-box test generation,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,"Gaithersbury, MD, USA",ccf b
  50. Lijie Xu,Wensheng Dou,Feng Zhu,Chushu Gao,Jie Liu ,Hua Zhong,Jun Wei,Experience Report: A Characteristic Study on Out of Memory Errors in Distributed Data-Parallel Applications,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,"Gaithersbury, MD, USA",ccf b
  51. Jie Wang,Wensheng Dou,Chushu Gao,Jun Wei,Fast Reproducing Web Application Errors,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,"Gaithersbury, MD, USA",ccf b
  52. Danli Wang,Lan Zhang,Yunfeng Qi,Fang Sun,A TUI-based Programming Tool for Children,ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE '15),July 4-8,"Vilnius, Lithuania",core a
  53. Gilles Dowek,Ying Jiang,"Decidability, introduction rules, and automata","20th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR-20)",November 24-28,"Suva, Fiji",core a
  54. Zhuang Cai,Yi-Na Li,Xianjun Sam Zheng,Kang Zhang,Applying feature integration theory to glyph-based information visualization,IEEE Pacific Visualization Symposium (PacificVis 2015),April 14-17,"Hangzhou, China",ccf c
  55. Phong Q. Nguyen,Jiang Zhang,Zhenfeng Zhang,Simpler Efficient Group Signatures from Lattices,IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2015),March 30-April 1 ,"Maryland, USA",ccf b
  56. Meining Nie,Purui Su,Qi Li,Zhi Wang,Lingyun Ying,Jinlong Hu,Dengguo Feng,Xede: Practical Exploit Early Detection,"18th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2015)",November 2-4,"Kyoto, Japan",ccf b
  57. Hendrik Fichtenberger,Pan Peng,Christian Sohler,On constant size graphs that preserve the local structure of high girth graphs,19th International Workshop on Randomization and Computation (RANDOM'15),August 24-26,"Princeton University, New Jersey, USA",core a
  58. Xiaowei He,Huamin Wang,Fengjun Zhang,Hongan Wang,Guoping Wang,Kun Zhou,Enhua Wu,Simulation of fluid mixing with interface control,14th ACM SIGGRAPH / Eurographics Symposium on Computer Animation (SCA 2015),August 7-9,"Los Angeles, California, USA",ccf b
  59. Peng Zhou,Liang Du,Mingyu Fan,Yi-Dong Shen,An LLE based Heterogeneous Metric Learning for Crossmedia Retrieval,FIFTEENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING (SDM 2015),April 30-May 2,"Vancouver, British Columbia, Canada",ccf b
  60. Xiaosheng Li,Hanqiu Sun,Xuehui Liu,Enhua Wu,Adaptive level set for fluid surface tracking,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,"Beijing, China",core a
  61. Jian Shi,Yue Dong,Xin Tong,Yanyun Chen,Efficient Intrinsic Image Decomposition for RGBD Images,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,"Beijing, China",core a
  62. Yinling Qian,Yue Shu,Hanqiu Sun,Yanyun Chen,Vector Solid Texture Synthesis Using Two-scale Shaping Model,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,"Beijing, China",core a
  63. Chao Wang,Yi Lv,Gaoang Liu,Peng Wu,Quasi-Linearizability is Undecidable,13th Asian Symposium on Programming Languages and Systems (APLAS15),11.30-12.2,"Pohang, South Korea",ccf c
  64. Han Yue,Peng Wu,Tsong-Yueh Chen,Yi Lv,Input-driven Active Testing of Multi-threaded Programs,Asia-Pacific Software Engineering Conference (APSEC15),12.1-12.4,"New Delhi, India",ccf c
  65. Feng Zhu,Jie Liu,Lijie Xu,Dan Ye,Jun Wei,Tao Huang,A Lightweight Evaluation Framework for Table Layouts in MapReduce Based Query Systems,17th Asia-Pacific Web Conference (APWeb 15),9.18-9.20,"Guangzhou, China",ccf c
  66. Feifei Peng,Haiming Chen,Discovering Restricted Regular Expressions with Interleaving,17th Asia-Pacific Web Conference (APWeb 15),9.18-9.20,"Guangzhou, China",ccf c
  67. Zhijia Li,Li Jiao,Xiang Hu,Performance Analysis for Job Scheduling in Hierarchical HPC Systems: A Coloured Petri Nets Method,15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP15),11.18-11.20,"Zhangjiajie, China",ccf c
  68. Yulong Ao,Yiqun Liu,Chao Yang,Fangfang Liu,Peng Zhang,Yutong Lu,Yunfei Du,Performance Evaluation of HPGMG on Tianhe-2: Early Experience,15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP15),11.18-11.20,"Zhangjiajie, China",ccf c
  69. Shuling Wang,Naijun Zhan,Liang Zou,An Improved HHL Prover: An Interactive Theorem Prover for Hybrid Systems,17th International Conference on Formal Engineering Methods (ICFEM15),11.3-11.5,"Paris, France",ccf c
  70. Rong?Wang,Min?Zhang,Dengguo?Feng,Yanyan?Fu,Zhenyu?Chen,A De-anonymization Attack on Geo-located Data Considering Spatio-temporal Influences,7th International Conference on Information and Communications Security (ICICS15),12.9-12.11,"Beijing, China",ccf c
  71. Feifei Peng,Haiming Chen,Xiaoying Mou,Deterministic Regular Expressions with Interleaving,12th International Colloquium on Theoretical Aspects of Computing (ICTAC15),10.29-10.31,"Cali, Colombia",core b
  72. Gang Sun,Yanyun Chen,Xuehui Liu,Enhua Wu,Adaptive Multi-task Learning for Fine-Grained Categorization,2015 IEEE International Conference on Image Processing (ICIP15),9.27-9.30,"Quebec City, QC, Canada",ccf c
  73. Huiling?Zhang,Wenling?Wu,Structural evaluation for generalized feistel structures and applications to LBlock and TWINE,16th International Conference on Cryptology in India (INDOCRYPT15),12.6-12.9,"Bangalore, India",core b
  74. Guangjun Fan,Yongbin Zhou,Francois-Xavier Standaert,Dengguo Feng,On the impacts of mathematical realization over practical security of leakage resilient cryptographic schemes,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,"Beijing, China",core b
  75. Shaoyu Du,Zhenqi Li,Bin Zhang,Dongdai Lin,Combined cache timing attacks and template attacks on stream cipher MUGI,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,"Beijing, China",core b
  76. Shaoyu Du,Bin Zhang,Zhenqi Li,Dongdai Lin,Fault attacks on stream cipher scream,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,"Beijing, China",core b
  77. Liangjun Zang,Weimin Wang,Bo Chen,Cungen Cao,The double-level default description logic d3L,"8th International Conference on Knowledge Science, Engineering and Management (KSEM15)",10.28-10.30,"Chongqing, China",ccf c
  78. Liangjun Zang,Weimin Wang,Ya Wang,Fang Fang,Cong Cao,Xiaolong Wu,Qi Zhou,Ye Lu,Tingyu Li,Cungen Cao,A Chinese framework of semantic taxonomy and description: Preliminary experimental evaluation using web information extraction,"8th International Conference on Knowledge Science, Engineering and Management (KSEM15)",10.28-10.30,"Chongqing, China",ccf c
  79. Angsheng Li,Pan Peng,Testing Small Set Expansion in General Graphs,32nd International Symposium on Theoretical Aspects of Computer Science (STACS15),3.4-3.7,"Dagstuhl, Germany",ccf c
  80. Tingting Hu,Shuling Wang,Zongyan Qiu,Verifying Interaction between Methods in Classes,International Symposium on Theoretical Aspects of Software Engineering (TASE15),9.12-9.14,"Nanjing, China",ccf c
  81. Jingzheng Wu,Yanjun Wu,Mutian Yang,Zhifei Wu,Tianyue Luo,Yongji Wang,biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application,22nd ACM SIGSAC Conference on Computer and Communications Security (CCS15),10.12-10.16,"Denver, Colorado, USA",poster
  82. Tianyue Luo,Chen Ni,Qing Han,Mutian Yang,Jingzheng Wu,Yanjun Wu,PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities,22nd ACM SIGSAC Conference on Computer and Communications Security (CCS15),10.12-10.16,"Denver, Colorado, USA",poster
  83. Yongjian Li,Jun Pang,Yi Lv,Dongrui Fan,Shen Cao,Kaiqiang Duan,paraVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols,13th International Symposium on Automated Technology for Verification and Analysis (ATVA15),10.12-10.15,"Shanghai, China",Core A
  84. Liu Xuemin,Yang Meng,Wang Cheng,Yang Gang,Approach for 3D Reconstructing Bonsai Plant,2015 IEEE International Conference on Multimedia Big Data (BigMM15),4.20-4.22,"Beijing, China",
  85. Yunfeng Qi,Danli Wang,Lan Zhang,Yining Shi,TanProStory: A Tangible Programming System for Children's Storytelling,33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA15),4.18-4.23,"Seoul, Republic of Korea",
  86. Le Wang,Jiangtao Gong,Lei Shi ,OLAP Visual Analytics on Large Software Call Graphs with Hierarchical ChordMap,2015 IEEE International Conference on Data Mining Workshop (ICDMW15),11.14-11.17,"Atlantic City, NJ, USA",
  87. Yuan Feng,Ernst Moritz Hahn,Andrea Turrini,Lijun Zhang,QPMC: A Model Checker for Quantum Programs and Protocols,20th International Symposium on Formal Methods (FM15),6.24-6.26,"Oslo, Norway",
  88. G.Burel,G. Dowek,Y. Jiang ,A Completion Method to Decide Reachability in Rewrite Systems,FroCoS #9.20-9.24,Poland,
  89. Lavindra de Silva,Rongjie Yan,Félix Ingrand,Rachid Alami,Saddek Bensalem,A Verifiable and Correct-by-Construction Controller for Robots in Human Environments,10th Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts (HRI 2015 Extended Abstracts),3.2-3.5,"Portland, Oregon, USA",
  90. Yue Su,Sibai Sun,Yuan Xuan,Lei Shi ,Influence Visualization of Scientific Paper Through Flow-based Citation Network Summarization,2015 IEEE International Conference on Data Mining Workshop (ICDMW15 ),11.14-11.17,"Atlantic City, NJ, USA",
  91. Qian?Zhang,Ying?Jiang,Liping?Ding,Modelling?and?Analysis?of?Network Security --?a?Probabilistic?Value-passing?CCS?Approach,17th International Conference on Information and Communications Security (ICICS15),12.9-12.11,"Beijing, China",
  92. Qingyun Wang,Xuehui Liu,Xin Lu,Jianwen Cao,Wen Tang,Cute Balloons with Thickness,International Conference on Image and Graphics (ICIG15),8.13-8.16,"Tianjin, China",core c
  93. Danli Wan,Yunfeng Qi,Lan Zhang,A tangible programming system conveying event handling concept,14th International Conference on Interaction Design and Children (IDC15),6.21-6.24,USA,
  94. Tom van Dijk,Ernst Moritz Hahn,David N. Jansen,Yong Li,Thomas Neele,Marielle Stoelinga1,Andrea Turrini,Lijun Zhang,A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking,"1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)",11.4-11.6,"Nanjing, China",
  95. Yu Peng,Shuling Wang,Naijun Zhan,Lijun Zhang,Extending Hybrid CSP with Probability and Stochasticity,"1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)",11.4-11.6,"Nanjing, China",
  96. Yu-Lei Gu,Xue-Yang Zhu,Guangquan Zhang,Pareto Optimal Scheduling of Synchronous Data Flow Graphs via Parallel Methods,"1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)",11.4-11.6,"Nanjing, China",
  97. Bo Yang,Kang Yang,Yu Qin,Zhenfeng Zhang,Dengguo Feng,DAA-TZ: An efficient DAA scheme for mobile devices using ARM trustzone,8th International Conference on Trust and Trustworthy Computing (TRUST15),8.24-8.26,"?Heraklion, Greece",
  98. Yan Huang,Cuixia Ma,Hongan Wang,Exploring the Benefits of Text and Sketch in Video Retrieval of Complex Queries,8th International Symposium on Visual Information Communication and Interaction (VINCI'15),8.24-8.26,"Tokyo, AA, Japan",core c
  99. Shaowei Cai,Chuan Luo,Kaile Su,CCAnr: A Configuration Checking Based Local Search Solver for Non-random Satisfiability,18th International Conference on Theory and Applications of Satisfiability Testing (SAT15),9.24-9.27,"Austin, Texas,USA",tool
  100. Zhiyuan Guo,Wenling Wu,Si Gao,Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure, International Conference on Selected Areas in Cryptography(SAC 2015),8.12-8.14,"Sackville, Canada",ccf c
  101. Huiling Zhang,Wenling Wu,Yanfeng Wang, Integral Attack against Bit-Oriented Block Ciphers,Information Security and Cryptology(ICISC 2015),11.25-11.27,"Seoul, South Korea",core b
  102. Li Lin,Wenling Wu,Yafei Zheng,Improved Meet-in-the-Middle distinguisher on Feistel Schemes, International Conference on Selected Areas in Cryptography(SAC 2015),8.12-8.14,"Sackville, Canada",ccf c
  103. Lin Jiao,Bin Zhang,Mingsheng Wang,Two Generic Methods of Analyzing Stream Ciphers,International Information Security Conference(ISC 2015),9.9-9.11,"Trondheim, Norway",ccf c

2016年 2015年 2014年 2013年 2012年 2011年 2010年 2009年 2008年 往年技术报告
  1. ISCAS-SKLCS-15-01 多类型递归函数(MTRF) 董韫美
  2. ISCAS-SKLCS-15-02 Shift between Formal and Informal Design of Embedded Systems Mingshuai Chen, Naijun Zhan, Liang Zou, Mengfei Yang
  3. ISCAS-SKLCS-15-03 TSO-to-TSO Linearizability is Undecidable Chao Wang, Yi Lv, Peng Wu
  4. ISCAS-SKLCS-15-04 Synthesis of Timed Admission Controllers P.S. Thiagarajan, Shaofa Yang,Wang Yi
  5. ISCAS-SKLCS-15-05 Termination Analysis of Polynomial Programs with Equality Conditions Yangjia Li, Naijun Zhan, Mingshuai Chen, Hui Lu, Guohua Wu
  6. ISCAS-SKLCS-15-06 Decidability of the Reachability for a Family of Linear Vector Fields Ting Gan, Mingshuai Chen, Liyun Dai, Bican Xia, Naijun Zhan
  7. ISCAS-SKLCS-15-07 Automatic Verification of Stability and Safety for Delay Differential Equations Liang Zou, Martin Franzle, Naijun Zhan, Peter Nazier Mosaad
  8. ISCAS-SKLCS-15-08 A Two-way Path between Formal and Informal Design of Embedded Systems Mingshuai Chen, Anders Ravn, Mengfei Yang, Naijun Zhan, Liang Zou
  9. ISCAS-SKLCS-15-09 An Improved HHL Prover: An Interactive Theorem Prover for Hybrid Systems Shuling Wang, Naijun Zhan, Liang Zou
  10. ISCAS-SKLCS-15-11 Bounded TSO-to-SC Linearizability is Decidable Chao Wang, Yi Lv, Peng Wu
  11. ISCAS-SKLCS-15-12 A Verifiable Quantitative Relaxation Framework for Concurrent Data Structures Chao Wang, Yi Lv, Peng Wu, Gaoang Liu
  12. ISCAS-SKLCS-15-13 Proving Linearizability via Branching Bisimulation Xiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Hao Wu
  13. ISCAS-SKLCS-15-14 Modelling and Analysis of Network Security- a Probabilistic Value-passing CCS Approach Qian Zhang, Ying Jiang, Liping Ding
  14. ISCAS-SKLCS-15-15 Multi-Constraint Static Scheduling of Synchronous Dataflow Graphs via Retiming and Unfolding Xue-Yang Zhu, Marc Geilen, Twan Basten, Sander Stuijk
  15. ISCAS-SKLCS-15-16 Parallel Algorithm Based Pareto Optimal Scheduling of Synchronous Data Flow Graphs Yu-Lei Gu, Xue-Yang Zhu, Guangquan Zhang
  16. ISCAS-SKLCS-15-17 Co-induction Characterization of Branching Bisimulation with Explicit Divergence Wenqi Liao, Xinxin Liu, Wenhui Zhang
  17. ISCAS-SKLCS-15-18 Characterization and verification of stuttering equivalence Wenqi Liao, Xinxin Liu, Wenhui Zhang
  18. ISCAS-SKLCS-15-19 Trace Abstraction Refinement for Solving Horn Clauses Weifeng Wang, Li Jiao
  19. ISCAS-SKLCS-15-20 Modeling and Analysis of IEEE 802.11 DCF MAC Protocol Using Coloured Petri Nets Xiang Hu, Li Jiao, Zhijia Li



版权所有 © 中国科学院软件研究所计算机科学国家重点实验室 Powered by MediaWiki
京ICP备05046678号