Journal Paper

Journal 2015

    1. Yan Cai,Changjiang Jia,Shangru Wu,Ke Zhai,W.K. Chan,ASN: A Dynamic Barrier-based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs,IEEE Transactions on Parallel and Distributed Systems,”26, 1, 13 – 23″
    2. “Yibiao Yang”,Yuming Zhou,Hongmin Lu,Lin Chen,Zhenyu Chen,Baowen Xu ,”Hareton Leung”,Zhenyu Zhang,”Are slice-based cohesion metrics actually useful in effort-aware post-release fault-proneness prediction? An empirical study”,IEEE Transactions on Software Engineering,”41,4,331 – 357″
    3. David Nowak,Yu Zhang,Formal Security Proofs with Minimal Fuss: Implicit Computational Complexity at Work,Information and Computation,241,96-113
    4. Ying Song,Jiaping Wang, Li-yi Wei,Wencheng Wang,Vector regression functions for texture compression,Acm Transactions on Graphics,”35,1,Article 5 (1-10)”
    5. Shaowei Cai,Chuan Luo,Kaile Su,Improving WalkSAT By Effective Tie-breaking and Efficient Implementation,The Computer Journal,”58, 11, 2864-2875″
    6. Qi Li ,Xinwen Zhang ,Xin Zhang ,Purui Su ,Invalidating Idealized BGP Security Proposals and Countermeasures,IEEE Transactions on Dependable and Secure Computing,”12, 3, 298-311″
    7. Wei Xue,Chao Yang,Haohuan Fu,Xinliang Wang,Yangtong Xu,Junfeng Liao,Lin Gan,Yutong Lu,Rajiv Ranjan,Lizhe Wang,Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2,IEEE Transactions on Computers,”64, 8,2382–2393″
    8. Wencheng Wang,Panpan Xu, Ying Song, Miao Hua,Minying Zhang,Xiaohui Bie,Distinguishing local and global edits for their simultaneous propagation in a uniform framework,IEEE Transactions on Image Processing,”24, 8, 2478-2487″
    9. Li Shen,Gang Sun,Qingming Huang,Shuhui Wang,Zhouchen Lin,Enhua Wu,Multi-Level Discriminative Dictionary Learning With Application to Large Scale Image Classification,IEEE Transactions on Image Processing,”24, 10, 3109-3123″
    10. Lei Shi,Hanghang Tong,Jie Tang,Chuang Lin,VEGAS: Visual influEnce GrAph Summarization on Citation Networks,IEEE Transactions on Knowledge and Data Engineering,”27, 12, 3417-3431″
    11. Lijun Wu, Kaile Su,Shaowei Cai,Xiaosong Zhang,Chenyi Zhang,Shupeng Wang,An I/O Efficient Approach for Detecting All Accepting Cycles,IEEE Transactions on Software Engineering,”41, 8, 730-744 “
    12. Lei Shi,Chen Wang,Zhen Wen,Huamin Qu,Chuang Lin,Qi Liao,1.5D Egocentric Dynamic Network Visualization,IEEE Transactions on Visualization and Computer Graphics,”21, 5, 624-637″
    13. Xiaosheng Li ,Xiaowei He ,Xuehui Liu ,Jian J. Zhang ,Baoquan Liu ,Enhua Wu,Multiphase Interface Tracking with Fast Semi-Lagrangian Contouring,IEEE Transactions on Visualization and Computer Graphics,online
    14. Haiming Chen,Ping Lu,Checking determinism of regular expressions with counting,Information and Computation,”241,302–320″
    15. Ping Lu,Feifei Peng,Haiming Chen ,Lixiao Zheng,Deciding determinism of unary languages,Information and Computation,”245, 181–196″
    16. George Barmpalias,Rod G. Downey,Michael McInerney,Integer valued betting strategies and Turing degrees,Journal of Computer and System Sciences,81,7,1387–1412
    17. Andrea Turrini,Holger Hermanns,Polynomial Time Decision Algorithms for Probabilistic Automata,Information and Computation,”244,134-171″
    18. Chuan Luo,Shaowei Cai,Kaile Su,Wei Wu,Clause States Based Configuration Checking in Local Search for Satisfiability,IEEE Transactions on Cybernetics,”45, 5, 1028 – 1041″
    19. Ernst Moritz Hahn,Holger Hermanns,Ralf Wimmer,Bernd Becker,Transient Reward Approximation for Continuous-Time Markov Chains,?IEEE Transactions on Reliability,”64, 4, 1254 – 1275″
    20. Lijun Wu,Huijia Huang,Kaile Su,Shaowei Cai,Xiaosong Zhang,An I/O Efficient Model Checking Algorithm for Large-Scale Systems,IEEE Transactions on Very Large Scale Integration (VLSI) Systems,”23,5, 905 – 915 “
    21. Kai Huang, Min Yu, Rongjie Yan,Xiaomeng Zhang,Xiaolang Yan,Lisane Brisolara,Ahmed Amine Jerraya,Jiong Feng,Communication Optimizations for Multithreaded Code Generation from Simulink Models,ACM Transactions on Embedded Computing Systems,”14,3,59 (1-26)”
    22. Le Liu,Xiaosheng Li,?Yanyun Chen,Xuehui Liu,Jian J. Zhang,Enhua Wu,An Efficient Feathering System with Collision Control,Computer Graphics Forum,”34,7,279-288″
    23. Yuan Feng,Lijun Zhang,A nearly optimal upper bound for the self-stabilization time in herman’s algorithm,Distributed Computing,”28(4):233-244, 2015″
    24. Yinglong Ma,Moyi Shi,Jun Wei,Cost and accuracy aware scientific workflow retrieval based on distance measure,Information Sciences ,”314, 1, 1-13″
    25. Shaowei Cai,Zhong Jie,Kaile Su,An effective variable selection heuristic in SLS for weighted Max-2-SAT,Journal of Heuristics?,”21, 3, 433-456 “
    26. Changjiang Jia,Yan Cai,Yuen Tak Yu,T.H.Tse,5W+1H pattern: A perspective of systematic mapping studies and a case study on cloud software testing,Journal of Systems and Software,”116, 206–219″
    27. Chuanyan Hao, Yadang Chen, Wen Wu,Enhua Wu,Image Completion with Perspective Constraint based on a Single Image,Science China Information Sciences,”58, 9, 092109(1-12)”
    28. Ehsan Ahmad,Yunwei Dong,Brian Larsen,Jidong Lv,Tao Tang,Naijun Zhan,Behavior modeling and verification of movement authority scenario of Chinese Train Control System using AADL,Science China Information Sciences,”58, 11, 112104(1-20)”
    29. Angsheng Li, Xuechen Li,Yicheng Pan,Wei Zhang,Strategies for network security,Science China Information Sciences,”58, 1, 012107(1–14) “
    30. Wenling Wu ,Lei Zhang,Xiaoli Yu ,The DBlock family of block ciphers,Sciences China Information Sciences,”58, 3, 032105(1-14)”
    31. Jizu Huang,Chao Yang,Xiao-Chuan Cai,A Fully Implicit Method for Lattice Boltzmann Equations,SIAM Journal on Scientific Computing,”37, 5, S291–S313″
    32. Jie Chen,Xiwei?Xu,Leon J.?Osterweil,Liming Zhu,Yuriy?Brun,Len Bass,Junchao Xiao,Mingshu Li,Qing?Wang,Using Simulation to Evaluate Error Detection Strategies: A Case Study of Cloud-Based Deployment Processes,Journal of Systems and Software,”110, 205-221″
    33. Peng Zhang,Angsheng Li,Algorithmic aspects of homophyly of networks,Theoretical Computer Science,”593, 16, 117–131″
    34. Wenhui Zhang,Bounded Semantics,Theoretical Computer Science,”564, 26, 1-29 “
    35. Zhaowei Xu, Yuefei Sui, Wenhui Zhang,Completeness of Hoare Logic with inputs over the Standard Model,Theoretical Computer Science,”612, 25, 23-28″
    36. Yuxin Deng, Yu Zhang,Program equivalence in linear contexts,Theoretical Computer Science,”585, 20, 71–90″
    37. Tillmann Miltzow,Jens M Schmidt,Mingji Xia,Counting?K4-subdivisions,Discrete Mathematics,”338,12,2387-2392″,b
    38. Yadang Chen,Chuanyan Hao,Wen Wu,Enhua Wu,Accurate Video Object Segmentation based on Motion Estimation,The Visual Computer
    39. Siyuan Qiao, Xiaoxin FangBin Sheng, Wen Wu, Enhua Wu,Structure-aware QR Code abstraction,Visual Computer,”31,1123–1133″
    40. Miao Hua, Wencheng Wang,Effective structure restoration for image completion using internet resources.,Visual Computer,”31,6,1113-1122″
    41. Guangyan Huang,Jing He,Yanchun Zhang,Wanlei Zhou,Hai Liu,Zhiming Ding,Yue You,Jian Cao,Mining streams of short text for analysis of world-wide event evolutions,World Wide Web Journal,”18,5, 1201-1217″
    42. Jizu Huang,Liqun Cao,Chao Yang,A multiscale algorithm for radiative heat transfer equation with rapidly oscillating coefficients ,Applied Mathematics and Computation,”266, 149-168″
    43. Haijian Yang, Chao Yang,Xiao-Chuan Cai,Mixed order discretization based two-level Schwarz preconditioners for a tracer transport problem on the cubed-sphere ,Computers and Fluids,”110, 88-95″
    44. Yan Zeng ,Xuesong Wu ,Jianwen Cao ,An improved KM algorithm for computing the structural index of DAE system,Journal of Algorithms and Computational Technology,”9,3,233-250″,c
    45. Jingzheng Wu, Yanjun Wu, Zhifei Wu,Mutian Yang,Tianyue Luo,Yongji Wang,AndroidFuzzer: Detecting Android Vulnerabilities in Fuzzing Cloud,Journal of Computational Information Systems,”11,11, 3859-3866.”
    46. Jingzheng Wu, Yanjun Wu, Mutian Yang,Zhifei Wu,Tianyue Luo,Yongji Wang,QRCloud: Android Vulnerability Query and Push Services based on QR Code in Cloud Computing,Journal of Computational Information Systems,”11,11, 3875-3881″
    47. George Barmpalias,Mingzhong Cai,Steffen Lempp,Theodore Slaman,On the existence of a strong minimal pair,Journal of Mathematical Logic,”15,1,1-28″
    48. George Barmpalias,Richard Elwes,Andy Lewis-Pye,Tipping Points in 1-Dimensional Schelling Models with Switching Agents,Journal of Statistical Physics,”158,4,806-852″
    49. Danli Wang,Yunfeng Qi,Tingting Wang,Heng Qiao,Yining Shi,Lan Zhang,Evaluation of stereoscopic visual fatigue in experts,Journal of The Society For Information Display,”22,8, 437-447″
    50. Angsheng Li,Jiankou Li, Yicheng Pan,Discovering natural communities in networks,Physica A,”436, 878-896″
    51. Angsheng Li,Jiankou Li,Yicheng Pan,”Homophyly/kinship hypothesis: Natural communities, and predicting in networks”,Physica A,”420, 148-163″
    52. Chang Leng,Ying Qiao,Xiaobo Shaoron Hu,Hongan Wang,Utilization-Based Admission Control for Aperiodic Tasks under EDF Scheduling,Real-Time Systems,”51,1,36-76″
    53. Angsheng Li, Jiankou Li, Yicheng Pan, Xianchen Yin, Xi Yong,Homophyly/Kinship Model: Naturally Evolving Networks,Scientific Reports,”515,140″
    54. Yifan Hu , Lei Shi,Visualizing large graphs,Wiley Interdisciplinary Reviews: Computational Statistics,”7,2, 115-136″
    55. 殷本俊,陈燕,李华婷,吴雯,盛斌,基于Morlet小波变换的视网膜血管分割,计算机辅助设计与图形学学报,7,1263-1270
    56. 魏敬敬,刘学慧,陈彦云,吴恩华,基于隐式积分的树叶形变快速仿真,计算机辅助设计与图形学学报,”27,3,451-459″
    57. 谯从彬,盛斌,吴雯,马利庄,基于运动分割的视频去模糊,计算机辅助设计与图形学学报,27,11,2108-2115
    58. 杨欢,李义娜, 张康,可视化设计中的色彩应用,计算机辅助设计与图形学学报,”27,9,1587-1596″
    59. 朱峰军,武继刚,史雯隽,姜桂圆,多选择软硬件划分问题的计算模型与动态规划算法,计算机工程与科学,”37,4,641-648″
    60. 兰韵,刘万伟,董威,刘斌斌,付辰,刘大学,无人驾驶汽车决策系统的规则描述与代码生成方法,计算机工程与科学,”37,8,1510-1516″
    61. 杨猛,杨刚,园林植物数字化仿真算法,计算机工程与应用,”3,35-39,54″
    62. 柴叶生,朱雪阳,晏荣杰,张广泉,基于MARTE模型的系统可靠性预测,计算机科学,”42,12,82-86″
    63. 顾玉磊,朱雪阳,晏荣杰,张广泉,基于异构多核平台的同步数据流图帕累托优化与调度,计算机科学,”42,11,43-47″
    64. 岳翰,吴鹏,并发软件适应性随机测试方法,计算机系统应用,”24,11, 1-6″
    65. 曹燊,李勇坚,基于不变量查找的German协议验证,计算机系统应用,”24,11,173-178″
    66. 王硕,杨秋松,吴涛,基于代码路径的安全操作系统性能优化方法,计算机系统应用,”24,8,18-24″
    67. 张扶桑,金蓓弘,汪兆洋,胡佳锋,张利锋,基于轨迹挖掘的公交车自组织网络路由机制,计算机学报,”38,3,648-662″
    68. 张英骏,冯登国,秦宇,杨波,基于Trustzone的强安全需求环境下可信代码执行方案,计算机研究与发展,52,10,2224-2238
    69. 彭泽环,孙乐,韩先培,陈波,社区热点微博推荐研究,计算机研究与发展,”52,5,1014-1021″
    70. 王彦士,王伟,刘朝辉,魏峻,黄涛,支持透明集成的数据缓存机制,计算机研究与发展,”52,4,907-917″
    71. 谢沛东,武延军,基于Linux内核的Key-Value存储系统——KStore,计算机应用,”35,1,99-102,114″
    72. 王秀青,侯增广,潘世英,谭民,王永吉,曾慧,基于多超声传感器信息和NeuCube的移动机器人走廊场景识别,计算机应用,35,10,2833-2837
    73. 吴含宇,肖俊超,王青,基于FARM降低系统性偏差的缺陷修复时间预测方法,计算机应用与软件,”32,7,5-9,15″
    74. 左正康,薛锦云,Apla中泛型约束机制研究,软件学报,”26,6,1340-1355″
    75. 韩红雷, 王文成, 华 淼,基于视点评分的三维模型摆正,软件学报,”26,10,2720?2732″
    76. 陈力,王永吉,吴敬征,吕荫润,基于树状线性规划搜索的单调速率优化设计,软件学报,”26,12, 3223-3241″
    77. 陈伟, 黄翔, 乔晓强, 魏峻, 钟华,软件配置错误诊断与修复技术研究,软件学报,”26,6,1285?1305″
    78. 白琳, 叶丹, 魏峻, 黄涛,一种高效的基于服务功能规约的服务选择方法,软件学报,”26,8,1886?1906″
    79. 王卅, 张文博, 吴恒, 宋云奎, 魏峻, 钟华, 黄涛,一种基于硬件计数器的虚拟机性能干扰估算方法,软件学报,”26,8,2074?2090″
    80. 白琳, 魏峻, 黄翔, 叶丹, 黄涛,一种面向移动应用的探索式服务组合方法,软件学报,”26,9,2191?2211″
    81. 吴涛,杨秋松,贺也平,基于邻接点的VMM动态完整性度量方法,通信学报,”36,9,169-180″
    82. 王榕,张敏,冯登国,李昊,数据库形式化安全策略模型建模及分析方法,通信学报,”36,9,193-203″
    83. 贾娟娟,施智平,关永,李勇坚,魏洪兴,ROS中XML-RPC协议实现的形式化验证,小型微型计算机系统,”12, 2629-2633″
    84. 王建敏,曾凡平,王健康,用优化的正则表达式引擎进行快速网络流分类,小型微型计算机系统,”12, 2690-2695″
    85. 杨猛,郭王翚,贺晓宇,林琳,杨刚,基于形态特征真实感月季大规模建模算法,系统仿真学报,27,10,2328-2336
    86. 杨溢,盛斌,吴雯,马利庄,基于矩形波谱分析的图像显著性检测,浙江大学学报(理学版),1,1-8
    87. 董韫美,多类型递归函数,中国科学 : 数学,”45,9,1549-1562″
    88. 李明树,赵琛,武延军,谢沛东,数据操作系统的思想、设计和原型验证,中国科学:信息科学,”45,6,703-720″
    89. 吴敬征,武延军,武志飞,杨牧天,罗天悦,王永吉,基于有向信息流的Android隐私泄露类恶意应用检测方法,中国科学院大学学报,32,6,807-815
    90. 吴敬征, 武延军, 罗天悦, 武志飞, 杨牧天, 王永吉,一种基于权限控制机制的 Android 系统隐蔽信道限制方法,中国科学院大学学报,”32,5,696-705″
    91. Xiang Zheng,Chao Yang,Xiao-Chuan Cai,David Keyes?,A parallel domain decomposition-based implicit method for the Cahn-Hilliard-Cook phase-field equation in 3D,Journal of Computational Physics,”285,55-70″
    92. Jianxin Chen,Zhengfeng Ji,Chi-Kwong Li,Yiu-Tung Poon,Yi Shen,Nengkun Yu,Bei Zeng,Duanlu Zhou,Discontinuity of maximum entropy inference and quantum phase transitions,New Journal of Physics,”17,8″