call us. call us.

首页征集论文论文录用公告 Call for Demo执行委员会程序委员会组织委员会联系方式会议地点 会议议程 特邀报告人 青年学者报告 会议注册 报销材料

   当前位置 - 论文录用公告
无标题文档

NASAC2012录用的投稿信息如下:

(1) 会议录用长文:将在大会期间安排学术报告(Session),并分别推荐到《计算机研究与发展》和《计算机科学与探索》期刊发表:
      推荐到《计算机研究与发展》的论文如下:(以论文投稿编号为序)
23.
巩 朋, 韩兆刚, 张 莉.
过程模型中控制流反模式的定义和检测方法
30.
Chang-Ai Sun , Guan Wang
MujavaX:一个支持非均匀分布的变异生成系统
43.
Jin Wang, Zhiqiu Huang , Jiajun Tang
BPEL谓词约束建模及可行路径分析
45.
Yi Zhu, Hang Zhou , Fangxiong Xiao.
一种嵌入式实时系统软件能耗建模与分析的方法
54.
吕骁博, 郭 耀, 陈向群
基于分割的数字图像云存储机制
61.
Kan Zhang, Huimin Gong , Guangquan Zhang.
一种基于能耗的CPS软件可信管理框架
67.
Wanzhi Wen, Bixin Li, Xiaobing Sun , Shanshan Qi.
基于条件执行切片谱的多错误定位
85.
Lin Sun, Xin Chen , Xuan-Dong Li.
A Method to Verify Time Constraints of Interrupt-driven system
       推荐到《计算机科学与探索》的论文如下:(以论文投稿编号为序)
20.
Su Ping , Ma Xiao-Xing.
An Approach to Component-based Dynamic Dependences
26.
陈 霄, 吴毅坚, 彭 鑫,赵文耘.
一种基于构件组装的Web应用协同开发方法
29.
Jiahong Jiang, Li-Qian Chen , Ji Wang.
基于浮点区间幂集抽象域的浮点程序分析
44.
Cuicui Liu, Bixin Li, Shanshan Qi, Xiaona Wu , Rui Song.
一种基于数据依赖和XBFG的BPEL组合服务 可信性评估方法
48.
Zhe Jia, Zhiqiu Huang, Guohua Shen , Changbo Ke.
Detecting P3P Privacy Conflicts Based on Ontology
56.
Binxian Tao , Ju Qian.
一种自动化的Java程序锁分解重构方法
57.
Xiao-Kang Chen, Chang Xu , Lei Jiang.
Towards Context Consistency for Pervasive Computing by Automated Context Repairing
65.
Liao Husheng , Li Xiaoqing.
XML树模式查询的描述语言及形式语义
66.
Xing Zhao, Xuanzhe Liu, Xudong Wang , Gang Huang.
一种同质Mashup构件池动态构造机制
69.
Zhebang Hua, Meng Li, Junfeng Zhao , Bing Xie.
A WebService QoS Prediction Method Based on Time Series Analysis
76.
Mingtai Zhang , Guangquan Zhang.
一种描述CPS 物理实体的时空Petri 网模型
77.
Dai Yuehua, Qi Yong, Jianbao Ren, Xiaoguang Wang, Yi Shi , Yu Xuan.
A Light-weight and High Performance Virtual Machine Monitor for Many Core
81.
Jiaobao Ren,Yong Qi,Yuehua Dai,Xiaoguang Wang,Yu Xuan,Chen Geng,Yi Shi.
PriVisor: A Method for User Privacy Protection Based on Virtual Machine Monitor
(2)会议短文:将在大会上安排Poster(墙报)的形式进行交流,并推荐到《计算机工程与应用》等相关期刊: (以论文投稿编号为序)
2.
Hao Zhang, Xin Peng , Wenyun Zhao.
模型驱动的Web服务流程动态重配置
3.
Mingliang Wang, Xin Peng , Wenyun Zhao.
社会技术系统的需求监控与自修复
4.
Wei Chen , Feng Xu.
A Backup-service-based Developing Model of Workflow with High Reliability and its Implementation of Supporting Tools
5.
Yebing Xu , Chao Liu.
基于LDA的软件中文文档与代码间关联关系的提取方法研究
6.
Zhiyong Chen, Feng Xu , Ping Yu.
A COP based approach to control software safety enhancement
8.
Xu Xin, Yu Huiqun , Huang Junhu.
Petri Net Based Quantify Security Analysis Model for Cyber-Physical System
10.
Weinan Li , Huiqun Yu.
An improved string matching algorithm based on BM
15.
Zhongwen Xie, Tong Li , Fei Dai.
一种将需求模型转换为软件体系结构模型的方法
18.
Xie Guo-Zhen , Ma Xiao-Xing.
Logical Validity in Dynamic Updating of C Programs
19.
Jiang Wang, Ping Yu, Chun Cao , Xiao-Xing Ma.
A view of software design in open network environment: From RPC to REST
21.
Shi Wenbo , Cao Chun.
ATMS:An Autonomous Trust-management System
22.
Juanjuan Chen, Ou Wei, Zhiqiu Huang , Zhe Chen.
基于双格的多值模型的精化关系与对称化简
24.
段 俊, 张 莉, 路 红 , 凌 济民.
A tool-supported approach for software process enactment
25.
Liu Sai, Li Xurong, Wan Linrui , Chen Tao.
云计算下资源调度模型研究
27.
Xiu Chen.
一种面向情境的情境感知应用编程框架
28.
Ning Wenyu, Wu Qingbo , Tan Yusong.
面向MapReduce的自适应延迟调度算法
32.
陈德健 , 孙艳春 , 黄罡 , 张颖 .
基于操作记录与回放技术的Eclipse操作远程同步教学工具
34.
于 安雷 , 皮 德常.
基于PSO-BP的软件缺陷预测模型
36.
Jiwei Xu, Wenbo Zhang, Heng Wu , Jianhua Zhang.
一种面向X86虚拟化环境的Web服务器I/O优化方法
38.
Xiaotian Xu, Gang Wang, Wei Chen , Lei Shi.
一种基于模型精化的业务流程开发方法
39.
Xinyi Li, Yong Qi and Pengfei Chen.
Software Aging Detection Method Based On Queuing Model
40.
Jun-Yan Qian.
基于抽象解释的不变式验证
42.
Rui Song, Bixin Li, Xiaona Wu, Cuicui Liu , Shanshan Qi.
一种基于偏好的可信服务推荐模型
46.
Ju Qian , Binxian Tao.
Slithice: 一个基于系统依赖图的Java 程序切片工具[Demo]
47.
Shanshan Qi, Bixin Li, Cuicui Liu, Xiaona Wu , Rui Song.
面向组合服务演化的可信性影响分析模型
49.
Guna Hua, Ying Shi, Jia Xiangyang , Jiang Caoqing.
一种Web服务异常处理逻辑开发方法
50.
Renjun Feng, Wei Song , Xiaoxing Ma.
Dependency Analysis of WS-BPEL Defined Web Service
51.
Huaida Song, Meng Li, Junfeng Zhao, Bing Xie , Jing Jin.
OKQA: An Ontology based software development Knowledge Question Answering tool
52.
Pei Xin, Yu Hui-Qun , Fan Gui-Sheng.
Research and Analyze the Mining Personnel Location Algorithm based on ZigBee Technology
60.
Jing Jin, Meng Li, Zhebang Hua, Huaida Song, Junfeng Zhao , Bing Xie.
A Code Function Recognition Approach Based on LDA and Static Analysis
62.
Li Ning, Liu Chao , Yuan Zi.
Research on Visualization for Object-oriented Program Structure Based on Force-Directed Layout
63.
Zhang De-Ping.
A Hybrid Prediction Model for Software Reliability Based on Empirical Mode Decomposition Method
64.
Chunli Xie, Bixin Li , Ximeng Yu.
面向服务发现的Web服务可靠性分析
68.
Wei Tie, Zhiqiu Huang , Jin Wang.
RESTful Web Service Asynchronous Interaction and Composition with BPEL
71.
Wei Lv, Zhi-Qiu Huang, Zhe Chen , Shuang-Long Kan.
ESpin: A SPIN-based Eclipse Model Checking Environment
73.
Maoguang Wang.
The Multi-Agent System Negotiation Driven By A Multi-Win Policy
75.
张蓓蓓, 陈宁江 ,胡丹丹 .
基于BP神经网络的负载预测驱动的虚拟机部署改进策略研究
78.
Kunming Nie.
一种面向舰船PHM系统的软件产品线自动构建框架
82.
白海洋 , 李静 , 赵 娜
基于时间自动机的嵌入式软件模型可调度性验证
86.
Jiang Hui, Lei Bu , Xuandong Li.
基于迁移系统分析的线性混成系统安全性验证工具
87.
Junhua Zhang.
Assume-Guarantee Verification of Probabilistic Systems by Abstraction Refinement
88.
刘 林源 , 周 航.
基于信任度的Web服务组合隐私访问控制模型
89.
Hang Zhou, Quan Shao, Yi Zhu , Linyuan Liu.
基于TCPN网模型的Web组合服务动态行为的性能分析

 


Copyright @ 南京航空航天大学, 2011-2012 . All Rights Reserved