Page 4 - 《软件学报》2021年第9期
P. 4
Journal of Software Vol.32, No.9 Sep. 2021
Contents
THEORETICAL COMPUTER SCIENCE
2629 Satisfiability Threshold of the Strictly d-regular Random (3,2s)-SAT Problem for Fixed s
WANG Yong-Ping, XU Dao-Yun
SYSTEM SOFTWARE AND SOFTWARE ENGINEERING
2642 Benefits and Challenges of Domian Driven Design Patterns: Systematic Review
JIA Zi-Jia, ZHONG Chen-Xing, ZHOU Shi-Qi, RONG Guo-Ping, ZHANG Cheng
2665 Survey of Automatic Program Repair Techniques
JIANG Jia-Jun, CHEN Jun-Jie, XIONG Ying-Fei
2691 Reuse of Test Cases Between Similar Programs Based on Keyword Flow Graph
QIAN Zhong-Sheng, SONG Tao
2713 Automatic Logging Decision Through Program Layered Structure Tree and Transfer Learning
JIA Tong, LI Ying, ZHANG Qi-Xun, WU Zhong-Hai
2729 Microservice Test Suite Minimization Technology Based on Logs Mining
CHEN Li-Zhe, WU Ji, YANG Hai-Yan, ZHANG Kui
PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE
2744 Local Search-based Parallel Extension Rule Reasoning Method
LI Zhuang, LIU Lei, ZHANG Tong-Bo, ZHOU Wen-Bo, LÜ Shuai
2755 Improved Generative Adversarial Network for Image Scene Transformation
XIAO Jin-Sheng, ZHOU Jing-Long, LEI Jun-Feng, LI Liang, DING Ling, DU Zhi-Yi
2769 Research on Parallel Propagation Mode of Table Constraint Based on Multi-core CPU
CHEN Jia-Nan, LI Zhe, LI Zhan-Shan
2783 Sentiment Classification Method Based on Multi-channel Features and Self-attention
LI Wei-Jiang, QI Fang, YU Zheng-Tao
2801 Collaborative Filtering Based Zero-Shot Learning
YANG Bo, ZHANG Yu-Xue-Qing, PENG Yi-Da, ZHANG Chun-Xu, HUANG Jing
DATABASE TECHNOLOGY
2816 Fusion Technique for Fragmented Genealogy Data
WU Xin-Dong, LI Jiao, ZHOU Peng, BU Chen-Yang
COMPUTER NETWORKS AND INFORMATION SECURITY
2837 Probability Integral Cryptanalysis and Its Application on PUFFIN
SHANG Fang-Zhou, SUN Bing, LIU Guo-Qiang, LI Chao
2849 Formal Analysis and Optimization of TLS1.3 Protocol in Strong Security Model
LU Si-Qi, ZHOU Si-Yuan, MAO Ying
2867 Effective Low-energy Scheme for Mobile Data Collection and Wireless Chargin
ZHONG Ping, XU Ai-Kun, ZHANG Yi-Wen, LI Ya-Ting, ZHANG Yi-Ming, HUANG Jia-Wei, WANG Jian-Xin
2887 Cryptographic Algorithms Against Backdoored Pseudorandom Number Generator
KANG Bu-Rong, ZHANG Lei, ZHANG Rui, MENG Xin-Yu, CHEN Tong
2901 Spatial Steganalysis of Low Embedding Rate Based on Convolutional Neural Network
SHEN Jun, LIAO Xin, QIN Zheng, LIU Xu-Chong
2916 Malicious URL Detection Based on Multiple Feature Fusion
WU Sen-Yan, LUO Xi, WANG Wei-Ping, QIN Yan
2935 Post-quantum Blind Signature Scheme Based on Multivariate Cryptosystem
YU Hui-Fang, FU Shuai-Feng
COMPUTER ARCHITECTURE
2945 Performance Optimization of Molecular Dynamics Simulation on Sunway TaihuLight System
TIAN Zhuo, Chen Yi-Feng
2963 Cache Coordination Scheme Based on Two-level Cache
LIU Jia-Qi, ZHANG Ya-Wen, ZHANG Han-Wen, MENG Xu-Ying, ZHOU Ji-Hua, ZHANG Yu-Jun
©Copyright 2021, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior
written permission of the Institute of Software, the Chinese Academy of Sciences.