Page 4 - 《软件学报》2021年第10期
P. 4
Journal of Software Vol.32, No.10 Oct. 2021
Contents
SYSTEM SOFTWARE AND SOFTWARE ENGINEERING
2977 Formal Verification Method for Integer Overflow in Aerospace Embedded Software
GAO Meng, TENG Jun-Yuan, WANG Zheng
2993 HDFS Data Consistency Modelling and Analysis Based on Colored Petri Net
QIAO Jia-Lin, HUANG Xiang-Dong, YANG Yi-Fan, WANG Jian-Min, WU Kai
3014 DevSecOps: Exploring Practices of Realizing Continuous Security in DevOps
DAI Qi-Ming, MAO Run-Feng, HUANG Huang, RONG Guo-Ping, SHEN Hai-Feng, SHAO Dong
PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE
3036 Improving AMR-to-text Generation with Multi-task Pre-training
XU Dong-Qin, LI Jun-Hui, ZHU Mu-Hua, ZHOU Guo-Dong
3051 Survey of Dynamic Hand Gesture Understanding and Interaction
ZHANG Wei, LIN Ze-Yi, CHENG Jian, KE Ming-Yu, DENG Xiao-Ming, WANG Hong-An
3068 Learning Causal Relationship from Time Series Based on Bayesian Network
WANG Shuang-Cheng, ZHENG Fei, ZHANG Li
3085 Optimal Clustering Number Determining Algorithm by the New Clustering Method
ZHU Er-Zhou, SUN Yue, ZHANG Yuan-Xiang, GAO Xin, MA Ru-Hui, LI Xue-Jun
3104 Multi-source-inspired Immune Detector Generation and Detection in Neighborhood Shape- space
XI Liang, YAO Zhi-Yu, ZHANG Feng-Bin
3122 Walking Recognition and Parameters Estimation Based on Wi-Fi Channel State Information
LI Sheng-Jie, LI Xiang, ZHANG Yue, WANG Ya-Sha, ZHANG Da-Qing
3139 Few Shot and Confusing Charges Prediction with the Auxiliary Sentences of Case
GUO Jun-Jun, LIU Zhen-Cheng, YU Zheng-Tao, HUANG Yu-Xin, XIANG Yan
3151 Improved Flower Pollination Algorithm Based on Multi-strategy
XIAO Hui-Hui, WAN Chang-Xuan
DATABASE TECHNOLOGY
3176 Review of Research on Multi-query Sharing Technology
WEI Jian-Hao, XIA Ye-Feng, GONG Xue-Qing
3203 Building New Key-value Store with High Performance and High Availability
ZHU Yue-An, JIAN Huai-Bing, LONG Yong-Chao, LI Bin, WANG Shu, WU Xi-Liang, ZHONG Zhi-Chu,
ZHANG Yan-Song
3219 Predicting Smartphone Battery Life by Fine-grained Usage Data
LI Huo-Ran, LIU Xuan-Zhe, MEI Qiao-Zhu, MEI Hong
COMPUTER NETWORKS AND INFORMATION SECURITY
3236 Secure Re-use of Partial Randomness and its Application in Multi-receiver Signcryption Scheme
LIU Zhen, HAN Yi-Liang, YANG Xiao-Yuan, LIU Shu-Guang
3254 Research on Intrusion Detection Based on Random Forest and Gradient Boosting Tree
ZHOU Jie-Ying, HE Peng-Fei, QIU Rong-Fa, CHEN Guo, WU Wei-Gang
3266 Range-based Multi-keyword Searchable Scheme with Privacy Protection in e-Healthcare Cloud Systems
ZHANG Ming-Wu, HUANG Jia-Jun, HARN Lein
COMPUTER GRAPHICS AND COMPUTER AIDED DESIGN
3283 Single Image De-raining Using a Recurrent Dual-attention-residual Ensemble Network
ZHANG Xue-Feng, LI Jin-Jing
COMPUTER ARCHITECTURE
3293 VMOffset: Semantic Reconstruction Improvement Method in Virtual Machine Introspection
CHEN Xing-Shu, CAI Meng-Juan, WANG Wei, WANG Qi-Xu, JIN Xin
MULTIMEDIA TECHNIQUES
3310 Encrypted Video Recognition in Large-scale Fingerprint Database
WU Hua, YU Zhen-Hua, CHENG Guang, HU Xiao-Yan
©Copyright 2021, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior
written permission of the Institute of Software, the Chinese Academy of Sciences.