Journal 2015
时间:2019-07-22 分类:Journal Paper
-
- Yan Cai,Changjiang Jia,Shangru Wu,Ke Zhai,W.K. Chan,ASN: A Dynamic Barrier-based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs,IEEE Transactions on Parallel and Distributed Systems,”26, 1, 13 – 23″
- “Yibiao Yang”,Yuming Zhou,Hongmin Lu,Lin Chen,Zhenyu Chen,Baowen Xu ,”Hareton Leung”,Zhenyu Zhang,”Are slice-based cohesion metrics actually useful in effort-aware post-release fault-proneness prediction? An empirical study”,IEEE Transactions on Software Engineering,”41,4,331 – 357″
- David Nowak,Yu Zhang,Formal Security Proofs with Minimal Fuss: Implicit Computational Complexity at Work,Information and Computation,241,96-113
- Ying Song,Jiaping Wang, Li-yi Wei,Wencheng Wang,Vector regression functions for texture compression,Acm Transactions on Graphics,”35,1,Article 5 (1-10)”
- Shaowei Cai,Chuan Luo,Kaile Su,Improving WalkSAT By Effective Tie-breaking and Efficient Implementation,The Computer Journal,”58, 11, 2864-2875″
- Qi Li ,Xinwen Zhang ,Xin Zhang ,Purui Su ,Invalidating Idealized BGP Security Proposals and Countermeasures,IEEE Transactions on Dependable and Secure Computing,”12, 3, 298-311″
- Wei Xue,Chao Yang,Haohuan Fu,Xinliang Wang,Yangtong Xu,Junfeng Liao,Lin Gan,Yutong Lu,Rajiv Ranjan,Lizhe Wang,Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2,IEEE Transactions on Computers,”64, 8,2382–2393″
- Wencheng Wang,Panpan Xu, Ying Song, Miao Hua,Minying Zhang,Xiaohui Bie,Distinguishing local and global edits for their simultaneous propagation in a uniform framework,IEEE Transactions on Image Processing,”24, 8, 2478-2487″
- Li Shen,Gang Sun,Qingming Huang,Shuhui Wang,Zhouchen Lin,Enhua Wu,Multi-Level Discriminative Dictionary Learning With Application to Large Scale Image Classification,IEEE Transactions on Image Processing,”24, 10, 3109-3123″
- Lei Shi,Hanghang Tong,Jie Tang,Chuang Lin,VEGAS: Visual influEnce GrAph Summarization on Citation Networks,IEEE Transactions on Knowledge and Data Engineering,”27, 12, 3417-3431″
- Lijun Wu, Kaile Su,Shaowei Cai,Xiaosong Zhang,Chenyi Zhang,Shupeng Wang,An I/O Efficient Approach for Detecting All Accepting Cycles,IEEE Transactions on Software Engineering,”41, 8, 730-744 “
- Lei Shi,Chen Wang,Zhen Wen,Huamin Qu,Chuang Lin,Qi Liao,1.5D Egocentric Dynamic Network Visualization,IEEE Transactions on Visualization and Computer Graphics,”21, 5, 624-637″
- Xiaosheng Li ,Xiaowei He ,Xuehui Liu ,Jian J. Zhang ,Baoquan Liu ,Enhua Wu,Multiphase Interface Tracking with Fast Semi-Lagrangian Contouring,IEEE Transactions on Visualization and Computer Graphics,online
- Haiming Chen,Ping Lu,Checking determinism of regular expressions with counting,Information and Computation,”241,302–320″
- Ping Lu,Feifei Peng,Haiming Chen ,Lixiao Zheng,Deciding determinism of unary languages,Information and Computation,”245, 181–196″
- George Barmpalias,Rod G. Downey,Michael McInerney,Integer valued betting strategies and Turing degrees,Journal of Computer and System Sciences,81,7,1387–1412
- Andrea Turrini,Holger Hermanns,Polynomial Time Decision Algorithms for Probabilistic Automata,Information and Computation,”244,134-171″
- Chuan Luo,Shaowei Cai,Kaile Su,Wei Wu,Clause States Based Configuration Checking in Local Search for Satisfiability,IEEE Transactions on Cybernetics,”45, 5, 1028 – 1041″
- Ernst Moritz Hahn,Holger Hermanns,Ralf Wimmer,Bernd Becker,Transient Reward Approximation for Continuous-Time Markov Chains,?IEEE Transactions on Reliability,”64, 4, 1254 – 1275″
- Lijun Wu,Huijia Huang,Kaile Su,Shaowei Cai,Xiaosong Zhang,An I/O Efficient Model Checking Algorithm for Large-Scale Systems,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,”23,5, 905 – 915 “
- Kai Huang, Min Yu, Rongjie Yan,Xiaomeng Zhang,Xiaolang Yan,Lisane Brisolara,Ahmed Amine Jerraya,Jiong Feng,Communication Optimizations for Multithreaded Code Generation from Simulink Models,ACM Transactions on Embedded Computing Systems,”14,3,59 (1-26)”
- Le Liu,Xiaosheng Li,?Yanyun Chen,Xuehui Liu,Jian J. Zhang,Enhua Wu,An Efficient Feathering System with Collision Control,Computer Graphics Forum,”34,7,279-288″
- Yuan Feng,Lijun Zhang,A nearly optimal upper bound for the self-stabilization time in herman’s algorithm,Distributed Computing,”28(4):233-244, 2015″
- Yinglong Ma,Moyi Shi,Jun Wei,Cost and accuracy aware scientific workflow retrieval based on distance measure,Information Sciences ,”314, 1, 1-13″
- Shaowei Cai,Zhong Jie,Kaile Su,An effective variable selection heuristic in SLS for weighted Max-2-SAT,Journal of Heuristics?,”21, 3, 433-456 “
- Changjiang Jia,Yan Cai,Yuen Tak Yu,T.H.Tse,5W+1H pattern: A perspective of systematic mapping studies and a case study on cloud software testing,Journal of Systems and Software,”116, 206–219″
- Chuanyan Hao, Yadang Chen, Wen Wu,Enhua Wu,Image Completion with Perspective Constraint based on a Single Image,Science China Information Sciences,”58, 9, 092109(1-12)”
- Ehsan Ahmad,Yunwei Dong,Brian Larsen,Jidong Lv,Tao Tang,Naijun Zhan,Behavior modeling and verification of movement authority scenario of Chinese Train Control System using AADL,Science China Information Sciences,”58, 11, 112104(1-20)”
- Angsheng Li, Xuechen Li,Yicheng Pan,Wei Zhang,Strategies for network security,Science China Information Sciences,”58, 1, 012107(1–14) “
- Wenling Wu ,Lei Zhang,Xiaoli Yu ,The DBlock family of block ciphers,Sciences China Information Sciences,”58, 3, 032105(1-14)”
- Jizu Huang,Chao Yang,Xiao-Chuan Cai,A Fully Implicit Method for Lattice Boltzmann Equations,SIAM Journal on Scientific Computing,”37, 5, S291–S313″
- Jie Chen,Xiwei?Xu,Leon J.?Osterweil,Liming Zhu,Yuriy?Brun,Len Bass,Junchao Xiao,Mingshu Li,Qing?Wang,Using Simulation to Evaluate Error Detection Strategies: A Case Study of Cloud-Based Deployment Processes,Journal of Systems and Software,”110, 205-221″
- Peng Zhang,Angsheng Li,Algorithmic aspects of homophyly of networks,Theoretical Computer Science,”593, 16, 117–131″
- Wenhui Zhang,Bounded Semantics,Theoretical Computer Science,”564, 26, 1-29 “
- Zhaowei Xu, Yuefei Sui, Wenhui Zhang,Completeness of Hoare Logic with inputs over the Standard Model,Theoretical Computer Science,”612, 25, 23-28″
- Yuxin Deng, Yu Zhang,Program equivalence in linear contexts,Theoretical Computer Science,”585, 20, 71–90″
- Tillmann Miltzow,Jens M Schmidt,Mingji Xia,Counting?K4-subdivisions,Discrete Mathematics,”338,12,2387-2392″,b
- Yadang Chen,Chuanyan Hao,Wen Wu,Enhua Wu,Accurate Video Object Segmentation based on Motion Estimation,The Visual Computer
- Siyuan Qiao, Xiaoxin FangBin Sheng, Wen Wu, Enhua Wu,Structure-aware QR Code abstraction,Visual Computer,”31,1123–1133″
- Miao Hua, Wencheng Wang,Effective structure restoration for image completion using internet resources.,Visual Computer,”31,6,1113-1122″
- Guangyan Huang,Jing He,Yanchun Zhang,Wanlei Zhou,Hai Liu,Zhiming Ding,Yue You,Jian Cao,Mining streams of short text for analysis of world-wide event evolutions,World Wide Web Journal,”18,5, 1201-1217″
- Jizu Huang,Liqun Cao,Chao Yang,A multiscale algorithm for radiative heat transfer equation with rapidly oscillating coefficients ,Applied Mathematics and Computation,”266, 149-168″
- Haijian Yang, Chao Yang,Xiao-Chuan Cai,Mixed order discretization based two-level Schwarz preconditioners for a tracer transport problem on the cubed-sphere ,Computers and Fluids,”110, 88-95″
- Yan Zeng ,Xuesong Wu ,Jianwen Cao ,An improved KM algorithm for computing the structural index of DAE system,Journal of Algorithms and Computational Technology,”9,3,233-250″,c
- Jingzheng Wu, Yanjun Wu, Zhifei Wu,Mutian Yang,Tianyue Luo,Yongji Wang,AndroidFuzzer: Detecting Android Vulnerabilities in Fuzzing Cloud,Journal of Computational Information Systems,”11,11, 3859-3866.”
- Jingzheng Wu, Yanjun Wu, Mutian Yang,Zhifei Wu,Tianyue Luo,Yongji Wang,QRCloud: Android Vulnerability Query and Push Services based on QR Code in Cloud Computing,Journal of Computational Information Systems,”11,11, 3875-3881″
- George Barmpalias,Mingzhong Cai,Steffen Lempp,Theodore Slaman,On the existence of a strong minimal pair,Journal of Mathematical Logic,”15,1,1-28″
- George Barmpalias,Richard Elwes,Andy Lewis-Pye,Tipping Points in 1-Dimensional Schelling Models with Switching Agents,Journal of Statistical Physics,”158,4,806-852″
- Danli Wang,Yunfeng Qi,Tingting Wang,Heng Qiao,Yining Shi,Lan Zhang,Evaluation of stereoscopic visual fatigue in experts,Journal of The Society For Information Display,”22,8, 437-447″
- Angsheng Li,Jiankou Li, Yicheng Pan,Discovering natural communities in networks,Physica A,”436, 878-896″
- Angsheng Li,Jiankou Li,Yicheng Pan,”Homophyly/kinship hypothesis: Natural communities, and predicting in networks”,Physica A,”420, 148-163″
- Chang Leng,Ying Qiao,Xiaobo Shaoron Hu,Hongan Wang,Utilization-Based Admission Control for Aperiodic Tasks under EDF Scheduling,Real-Time Systems,”51,1,36-76″
- Angsheng Li, Jiankou Li, Yicheng Pan, Xianchen Yin, Xi Yong,Homophyly/Kinship Model: Naturally Evolving Networks,Scientific Reports,”515,140″
- Yifan Hu , Lei Shi,Visualizing large graphs,Wiley Interdisciplinary Reviews: Computational Statistics,”7,2, 115-136″
- 殷本俊,陈燕,李华婷,吴雯,盛斌,基于Morlet小波变换的视网膜血管分割,计算机辅助设计与图形学学报,7,1263-1270
- 魏敬敬,刘学慧,陈彦云,吴恩华,基于隐式积分的树叶形变快速仿真,计算机辅助设计与图形学学报,”27,3,451-459″
- 谯从彬,盛斌,吴雯,马利庄,基于运动分割的视频去模糊,计算机辅助设计与图形学学报,27,11,2108-2115
- 杨欢,李义娜, 张康,可视化设计中的色彩应用,计算机辅助设计与图形学学报,”27,9,1587-1596″
- 朱峰军,武继刚,史雯隽,姜桂圆,多选择软硬件划分问题的计算模型与动态规划算法,计算机工程与科学,”37,4,641-648″
- 兰韵,刘万伟,董威,刘斌斌,付辰,刘大学,无人驾驶汽车决策系统的规则描述与代码生成方法,计算机工程与科学,”37,8,1510-1516″
- 杨猛,杨刚,园林植物数字化仿真算法,计算机工程与应用,”3,35-39,54″
- 柴叶生,朱雪阳,晏荣杰,张广泉,基于MARTE模型的系统可靠性预测,计算机科学,”42,12,82-86″
- 顾玉磊,朱雪阳,晏荣杰,张广泉,基于异构多核平台的同步数据流图帕累托优化与调度,计算机科学,”42,11,43-47″
- 岳翰,吴鹏,并发软件适应性随机测试方法,计算机系统应用,”24,11, 1-6″
- 曹燊,李勇坚,基于不变量查找的German协议验证,计算机系统应用,”24,11,173-178″
- 王硕,杨秋松,吴涛,基于代码路径的安全操作系统性能优化方法,计算机系统应用,”24,8,18-24″
- 张扶桑,金蓓弘,汪兆洋,胡佳锋,张利锋,基于轨迹挖掘的公交车自组织网络路由机制,计算机学报,”38,3,648-662″
- 张英骏,冯登国,秦宇,杨波,基于Trustzone的强安全需求环境下可信代码执行方案,计算机研究与发展,52,10,2224-2238
- 彭泽环,孙乐,韩先培,陈波,社区热点微博推荐研究,计算机研究与发展,”52,5,1014-1021″
- 王彦士,王伟,刘朝辉,魏峻,黄涛,支持透明集成的数据缓存机制,计算机研究与发展,”52,4,907-917″
- 谢沛东,武延军,基于Linux内核的Key-Value存储系统——KStore,计算机应用,”35,1,99-102,114″
- 王秀青,侯增广,潘世英,谭民,王永吉,曾慧,基于多超声传感器信息和NeuCube的移动机器人走廊场景识别,计算机应用,35,10,2833-2837
- 吴含宇,肖俊超,王青,基于FARM降低系统性偏差的缺陷修复时间预测方法,计算机应用与软件,”32,7,5-9,15″
- 左正康,薛锦云,Apla中泛型约束机制研究,软件学报,”26,6,1340-1355″
- 韩红雷, 王文成, 华 淼,基于视点评分的三维模型摆正,软件学报,”26,10,2720?2732″
- 陈力,王永吉,吴敬征,吕荫润,基于树状线性规划搜索的单调速率优化设计,软件学报,”26,12, 3223-3241″
- 陈伟, 黄翔, 乔晓强, 魏峻, 钟华,软件配置错误诊断与修复技术研究,软件学报,”26,6,1285?1305″
- 白琳, 叶丹, 魏峻, 黄涛,一种高效的基于服务功能规约的服务选择方法,软件学报,”26,8,1886?1906″
- 王卅, 张文博, 吴恒, 宋云奎, 魏峻, 钟华, 黄涛,一种基于硬件计数器的虚拟机性能干扰估算方法,软件学报,”26,8,2074?2090″
- 白琳, 魏峻, 黄翔, 叶丹, 黄涛,一种面向移动应用的探索式服务组合方法,软件学报,”26,9,2191?2211″
- 吴涛,杨秋松,贺也平,基于邻接点的VMM动态完整性度量方法,通信学报,”36,9,169-180″
- 王榕,张敏,冯登国,李昊,数据库形式化安全策略模型建模及分析方法,通信学报,”36,9,193-203″
- 贾娟娟,施智平,关永,李勇坚,魏洪兴,ROS中XML-RPC协议实现的形式化验证,小型微型计算机系统,”12, 2629-2633″
- 王建敏,曾凡平,王健康,用优化的正则表达式引擎进行快速网络流分类,小型微型计算机系统,”12, 2690-2695″
- 杨猛,郭王翚,贺晓宇,林琳,杨刚,基于形态特征真实感月季大规模建模算法,系统仿真学报,27,10,2328-2336
- 杨溢,盛斌,吴雯,马利庄,基于矩形波谱分析的图像显著性检测,浙江大学学报(理学版),1,1-8
- 董韫美,多类型递归函数,中国科学 : 数学,”45,9,1549-1562″
- 李明树,赵琛,武延军,谢沛东,数据操作系统的思想、设计和原型验证,中国科学:信息科学,”45,6,703-720″
- 吴敬征,武延军,武志飞,杨牧天,罗天悦,王永吉,基于有向信息流的Android隐私泄露类恶意应用检测方法,中国科学院大学学报,32,6,807-815
- 吴敬征, 武延军, 罗天悦, 武志飞, 杨牧天, 王永吉,一种基于权限控制机制的 Android 系统隐蔽信道限制方法,中国科学院大学学报,”32,5,696-705″
- Xiang Zheng,Chao Yang,Xiao-Chuan Cai,David Keyes?,A parallel domain decomposition-based implicit method for the Cahn-Hilliard-Cook phase-field equation in 3D,Journal of Computational Physics,”285,55-70″
- Jianxin Chen,Zhengfeng Ji,Chi-Kwong Li,Yiu-Tung Poon,Yi Shen,Nengkun Yu,Bei Zeng,Duanlu Zhou,Discontinuity of maximum entropy inference and quantum phase transitions,New Journal of Physics,”17,8″