首页 >> 学术研究 >> 论文 >> 2012 >> 正文

2012


一、国际顶级期刊会议

1.Hong Mei, Gang Huang, Tao Xie. Internetware: A Software Paradigm for Internet Computing. Cover Feature, IEEE Computer, July 2012, 26-31.

2.Yongzhi Cao, Reliability of mobile processes with noisy channels, IEEE Transactions on Computers, 61 (2012), pp. 1217-1230.

3.Hui Liu, Zhiyi Ma, Weizhong Shao, Zhendong Niu, Schedule of Bad Smell Detection and Resolution: A New Way to Save Effort. IEEE Transactions on Software Engineering, 2012, 38(1): 220-235.

4.Hong Mei, Dan Hao, Lingming Zhang, Lu Zhang, Ji Zhou, and Gregg Rothermel, “A Static Approach to Prioritizing JUnit Test Cases,” IEEE Transactions on Software Engineering, 2012, 38(6), pp. 1258-1275.

5.Bin Cui, Zhe Zhao, Wee Hyong Tok: A Framework for Similarity Search of Time Series Cliques with Natural Relations. IEEE Trans. Knowl. Data Eng. 24(3): 385-398 (2012)

6.Jun Gao, Jeffrey Xu Yu, HuidaQiu, Xiao Jiang, Tengjiao Wang, Dongqing Yang: Holistic Top-k Simple Shortest Path Join in Graphs. IEEE Trans. Knowl. Data Eng. 24(4): 665-677 (2012).

7.Xin Cao, Gao Cong, Bin Cui, Christian S. Jensen, Quan Yuan: Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. ACM Trans. Inf. Syst. 30(2): 7 (2012)

8.Ying Zhang, Gang Huang, Xuanzhe Liu, Wei Zhang, Hong Mei, and ShunXiang Yang, “Refactoring Android Java Code for On-Demand Computation Offloading,” 27th ACM SIGPLAN International Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA'12), 2012.

8.Sichen Meng, Xiaoyin Wang, Lu Zhang, and Hong Mei, “A History-Based Matching Approach to Identification of Framework Evolution,”Proceedings of 34th International Conference on Software Engineering (ICSE 2012), June 2012, pp. 353-363.

9.Minghui Zhou and Audris Mockus. “What Make Long Term Contributors: Willingness and Opportunity in OSS Community.” 34rd International Conference on Software Engineering (ICSE 2012), June 2012, pp.518-528.

10.Dan Hao, Lu Zhang, Xingxia Wu, Hong Mei, Gregg Rothermel, “On-Demand Test Suite Reduction,” 34th International Conference on Software Engineering (ICSE 2012), June 2-9, 2012, pp. 738-748.

11.Xiaoyin Wang, Lu Zhang, Tao Xie, YingfeiXiong, Hong Mei. “Automating Presentation Changes in Dynamic Web Applications via Collaborative Hybrid Analysis,” 20th International Symposium on the Foundations of Software Engineering (FSE 2012), November 2012, 16.

12.Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, and Hong Mei, “Can I Clone This Piece of Code Here?” 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), September 2012, pp. 170-179.

13.Shaowei Cai, Kaile Su, “Configuration Checking with Aspiration in Local Search for SAT,” 26th AAAI Conference on Artificial Intelligence (AAAI 2012), July 2012.

14.Xiaowei Huang, Kaile Su, Chenyi Zhang, “Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall,” 26th AAAI Conference on Artificial Intelligence (AAAI 2012), July 2012.

15.Shaowei Cai, Kaile Su, Abdul Sattar, “Two New Local Search Strategies for Minimum Vertex Cover,” 26th AAAI Conference on Artificial Intelligence (AAAI 2012), July 2012.

16.Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu, “Provenance-based Indexing Support in Micro-blog Platforms,”28th International Conference on Data Engineering (ICDE 2012), April 2012, 558-569.

17.Junjie Yao, Bin Cui, Liansheng Hua, Yuxin Huang, “Keyword Query Reformulation on Structured Data,” 28th International Conference on Data Engineering (ICDE 2012), April 2012, 953-964.

18.Jun Gao, Ruoming Jin, Jiashuai Zhou, Jeffrey Xu Yu, Xiao Jiang, Tengjiao Wang, “Relational Approach for Shortest Path Discovery over Large Graphs,” 38th International Conference on Very Large Databases (VLDB 2012), August 2012, PVLDB 5(4):358-369.

19.Hongzhi Yin, Bin Cui, Jing Li, Junjie Yao, Chen Chen, “Challenging the Long Tail Recommendation,” 38th International Conference on Very Large Databases (VLDB 2012), August 2012, PVLDB 5(9): 896-907.


二、国际期刊

1.Bin Cui, Zhe Zhao, Wee Hyong Tok: A Framework for Similarity Search of Time Series Cliques with Natural Relations. IEEE Trans. Knowl. Data Eng. 24(3): 385-398 (2012)

2.Xin Cao, Gao Cong, Bin Cui, Christian S. Jensen, Quan Yuan: Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. ACM Trans. Inf. Syst. 30(2): 7 (2012)

3.Junjie Yao, Bin Cui, Gao Cong, Yuxin Huang: Evolutionary taxonomy construction from dynamic tag space. World Wide Web 15(5-6): 581-602 (2012)

4.Jin Shao, Qianxiang Wang, Hong Mei, Model Based Monitoring and Controlling for Platform-as-a-Service (PaaS), International, Journal of Cloud Applications and Computing, VOL. 2, NO. 1, February 2012. 发表论文

5.Shuqin Huang, Yongzhi Cao, Hanpin Wang, Wanlling Qu, Value-passing CCS with noisy Channels, Theoretical Computer Science, 433(2012), pp43-59

6.Jun Gao, Jeffrey Xu Yu, HuidaQiu, Xiao Jiang, Tengjiao Wang, Dongqing Yang: Holistic Top-k Simple Shortest Path Join in Graphs. IEEE Trans. Knowl. Data Eng. 24(4): 665-677 (2012).

7.Tengjiao Wang, Ziyu Lin, Bishan Yang, Jun Gao, Allen Huang, Dongqing Yang, Qi Zhang, Shiwei Tang, JinzhongNiu: MBA: A market-based approach to data allocation and dynamic migration for cloud database. SCIENCE CHINA Information Sciences (CHINAF) 55(9):1935-1948 (2012)

8.Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei, "Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems",Journal of Networking and Computer Applications, 35(3), pp.974-981, 2012.

9.Suke Li, Zhi Guan, Liyong Tang, Zhong Chen: Exploiting ConsumerReviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3):635-649 (2012)

10.Oluwasefunmi Arogundade, Adio Akinwale, Zhi Jin and Xiaoguang Yang, Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse, Information Security Journal: A Global Perspective, 21(3): 137-149, 2012

11.Kedian Mu, Weiru Liu and Zhi Jin, An Approach to Generating Proposals for Handling Inconsistent Software Requirements, International Journal of Knowledge and Systems Science,3(1): 1-17, 2012

12.Kedian Mu, Weiru Liu and Zhi Jin, Measuring the blame of each formula for inconsistent prioritized knowledge bases, Journal of Logic and Computation, 22(3): 481-516, 2012

13.Hui Liu, Zhiyi Ma, Weizhong Shao, Zhendong Niu, Schedule of Bad Smell Detection and Resolution: A New Way to Save Effort. IEEE Transactions on Software Engineering, 2012, 38(1): 220-235

14.Hong Mei, Gang Huang, Tao Xie. Internetware: A Software Paradigm for Internet Computing. Cover Feature, IEEE Computer, July 2012, 26-31.

15.Qi Zhao, Xuanzhe Liu, Xingrun Chen, Jiyu Huang, Gang Huang, Hong Mei. A data access framework for service-oriented rich clients. Springer Journal of Service Oriented Computing and Applications: Volume 6, Issue 2 (2012), pp 99-116.

16.Gang Huang, Xi1ng Chen, Ying Zhang and Xiaodong Zhang. Towards architecture-based management of platforms in the cloud. Frontiers of Computer Science, Volume 6, Number 4 (2012), 388-397.

17.Ying Zhang, Gang Huang, Xuanzhe Liu, and Hong Mei, “Tuning Adaptive Computations for the Performance Improvement of Applications in JEE Server,” Journal of Internet Services and Applications, Volume 3, Issue 2 (2012), pp. 143-158, Springer, 2012

18.Zhang Changyou, Huang Kun, Cui Xiang, Chen Yifeng. Energy-Aware GPU Programming at Source-Code Levels. Tsinghua Science and Technology. 2012, 17(3),pp278-286

19.Yongzhi Cao, Reliability of mobile processes with noisy channels, IEEE Transactions on Computers, 61 (2012), pp. 1217-1230.

20.Yongzhi Cao and Yoshinori Ezawa, Nondeterministic fuzzy automata, Information Sciences, 191 (2012), pp. 86-97.

21.Weien Chen, Yongzhi Cao, and Hanpin Wang, Behavioural equivalences of a probabilistic pi-calculus, Science China Information Sciences, 55 (2012), pp. 2031–2043.

22.Zhang Cheng, Yang Jing, Xu Jin. DNA/AuNP Fluorescent Detecting Nano-Device. Advanced Materials Research, Vols: 535-537, 2012,pp: 455-458.

23.Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen: Information-theoreticmodeling of false data filtering schemes in wireless sensor networks.TOSN 8(2): 14 (2012)

24.Hong Mei, Dan Hao, Lingming Zhang, Lu Zhang, Ji Zhou, and Gregg Rothermel, “A Static Approach to Prioritizing JUnit Test Cases,” IEEE Transactions on Software Engineering, Vol. 38, No. 6, 2012, pp. 1258-1275.

三、国际会议

1.Jun Gao, Ruoming Jin, Jiashuai Zhou, Jeffrey Xu Yu, Xiao Jiang, Tengjiao Wang, “Relational Approach for Shortest Path Discovery over Large Graphs,” 38th International Conference on Very Large Databases (VLDB 2012), August 2012, PVLDB 5(4):358-369.

2.Hongzhi Yin, Bin Cui, Jing Li, Junjie Yao, Chen Chen: Challenging the Long Tail Recommendation. PVLDB 5(9): 896-907 (2012)

3.Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu: Provenance-based Indexing Support in Micro-blog Platforms. ICDE 2012: 558-569

4.Junjie Yao, Bin Cui, Liansheng Hua, Yuxin Huang: Keyword Query Reformulation on Structured Data. ICDE 2012: 953-964

5.Dan Hao, Xingxia Wu, Lu Zhang, An Empirical Study of Execution-Data Classification Based on Machine Learning, the 24th International Conference on Software Engineering and Knowledge Engineering (SEKE 2012), July 1-3, 2012, pages 283-288, Hotel Sofitel, Redwood City, San Francisco Bay, USA.

6.Dan Hao, Lu Zhang, Xingxia Wu, Hong Mei, Gregg Rothermel, On-Demand Test SuiteReduction, the 34th International Conference on Software Engineering (ICSE 2012), June 2-9, 2012, pages 738-748, Zurich, Switzerland

7.Meng Ma, Yu Huang, Chao-Hsien Chu, Ping Wang. User-Driven Cloud Transportation System for Smart Driving, IEEE CloudCom 2012.

8.Yu Song, Tian Liu, Ke Xu: Independent Domination on Tree Convex Bipartite Graphs. FAW-AAIM 2012: 129-138

9.Chaoyi Wang, Tian Liu, Wei Jiang, Ke Xu: Feedback Vertex Sets on Tree Convex Bipartite Graphs. COCOA 2012: 95-102

10.Hui Song, Gang Huang, YingfeiXiong, Yanchun Sun. Inferring the Data Access from the Clients of Generic APIs. In ICSM'12: 28th IEEE International Conference on Software Maintenance, September 2012.

11.SichenMeng, Xiaoyin Wang, Lu Zhang, and Hong Mei, “A History-Based Matching Approach to Identification of Framework Evolution,”Proceedings of 34th International Conference on Software Engineering (ICSE 2012), June 2012, pp. 353-363.

12.Lingming Zhang, DarkoMarinov, Lu Zhang and SarfrazKhurshid, “Regression Mutation Testing,”Proceedings of International Symposium on Software Testing and Analysis (ISSTA 2012), 15-20 July, 2012, pp. 331-341.

13.Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, and Hong Mei, “Can I Clone This Piece of Code Here?” Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), September, 2012, pp. 170-179.

14.Xiaoyin Wang, Lu Zhang, Tao Xie, Yingfei Xiong, and Hong Mei, “Automating Presentation Changes in Dynamic WebApplications via Collaborative Hybrid Analysis,” Proceedings of the 18th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE-20), November, 2012, 16.

15.ShaoweiCai, Kaile Su: Configuration Checking with Aspiration in Local Search for SAT. AAAI 2012

16.Xiaowei Huang, Kaile Su, Chenyi Zhang: Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall. AAAI-12,2012

17.ShaoweiCai, Kaile Su, Abdul Sattar: Two New Local Search Strategies for Minimum Vertex Cover. AAAI-12, 2012

18.ChuanLuo, Kaile Su, ShaoweiCai: Improving Local Search for Random 3-SAT Using Quantitative Configuration Checking. ECAI 2012: 570-575. 2012

19.YanyanXu, Wei Chen, Kaile Su, Wenhui Zhang: Solving Difficult SAT Problems by Using OBDDs and Greedy Clique Decomposition. FAW-AAIM 2012: 259-268. 2012

20.GuanfengLv, Yao Chen, YachaoFeng,Qingliang Chen, Kaile Su: A Succinct and Efficient Implementation of a 2^32 BDD Package. TASE 2012: 241-244. 2012

21.Guangtai Liang, Qian Wu, Qianxiang Wang, Hong Mei, An Effective Defect Detection and Warning Prioritization Approach for Resource Leaks, COMPSAC 2012,Izmir, Turkey.

22.Ling Wu, Guangtai Liang, Qianxiang Wang, Program Behavior Analysis and Control for Online IDE, IWSC 2012: The 9th IEEE International Workshop on Software Cybernetics,Izmir, Turkey.

23.Kang, L and Cao, D, An Extension to Computing Elements in Erlang for Actor Based Concurrent Programming, In: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on, pp. 99-105, Shenzhen.

24.Linqing Wang,Jun Gao,Tengjiao Wang,Hongyan Li: A cost aware adaptive multiple table join evaluation in MapReduce.FSKD 2012:2437-2441

25.Tengfei Ji,Jun Gao,Dongqing Yang: A Scalable Algorithm for Detecting Community Outliers in Social Networks.WAIM 2012:434-445

26.Chunyang Wei, Hongyan Li, Kai Lei, Tengjiao Wang. Efficient Cube Computing on An ExtendedMultidimensional Model over Uncertain Data. In Proc of FSKD 2012.1384-1388

27.Xu Cheng, BipingMeng, Yuxin Chen, Peng Zhao, Hongyan Li, Tengjiao Wang, Dongqing Yang: Dynamic Table: A Layered and Configurable Storage Structure in the Cloud. WAIM Workshops 2012:204-215

28.Ziyou Wang, Minghui Zhou, Hong Mei. Towards an Adaptive Service Degradation Approach for Handling Server Overload. The 19th Asia-Pacific Software Engineering Conference. HongKong. December 4–7, 2012.

29.Minghui Zhou. Looking for Micro-process in Large-scale Data. EAST'12, Lund, Sweden, 22 Sep 2012, pp39-42.

30.Chao You, Minghui Zhou, Hongwu Lin, Zan Xiao, Hong Mei. Towards Online Localization and Recovery for Faulty Components in Component- Based Applications. COMPSAC 2012.The 36th Annual International Computer Software and Applications Conference. Best paper award. Izmir, Turkey, July 16-20, pp.138-147.

31.Minghui Zhou and Audris Mockus. What Make Long Term Contributors: Willingness and Opportunity in OSS Community. ICSE '12 Proceedings of the 34rd International Conference on Software Engineering, Zurich, Switzerland, 2-9 June 2012, pp.518-528.

32.Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou,Bing Xie,Internet-Based Evaluation and Prediction of Web Services Trustworthiness,IEEE signature conference on Computer Software and Applications ( COMPSAC 2012), July 2012

33.Lu Fang, Lijie Wang, Meng Li, Junfeng Zhao, Bing Xie, Lingshuang Shao, ITowards Automatic Tagging for Web Services, EEE International Conference on Web Services (ICWS2012), July 2012

34.Meng Li, Jing Jin, Junfeng Zhao, and Bing Xie, Propositional Logic-Based and Evidence-Rich Trustworthiness Evaluation for Web Services, IEEE International Conference on Web Services (ICWS2012), July 2012

35.Meng Li, Zhebang Hua, Junfeng Zhao, Yanzhen Zou, and Bing Xie, ARIMA Model-Based Web Services Trustworthiness Evaluation and Prediction,The 10th International Conference on Service Oriented Computing (ICSOC 2012), Nov. 2012.

36.Li Yi, Wei Zhang, Haiyan Zhao, Zhi Jin, and Hong Mei,Mining Binary Constraints in the Construction of Feature Models,Proceedings of 20th International Conference on Requirements Engineering, Pp.141-150.

37.Zhao Wang, Chao Zhang, Zhong Chen. Moving Target Localization Based on Multi-sensor Distance Estimation .H. Tan (Ed.): Knowledge discovery and data Mining 2012, AISC 135, pp151-157.Springer –Verlag Berlin Heidelberg, 2012.

38.Zhao Wang, the Research on Teaching Ideas of "Data Structure and Algorithm" in Non-computer Major. A. Xie & X. Huang (Eds.): Advances in Computer Science and Education, AISC 140, pp. 249–254. Springer –Verlag Berlin Heidelberg,2012

39.Zhao Wang, Xuesong Zhang, Zhong Chen. Rapdos: A RFID Authentication Protocol for Defending against DoS. ICCIS2012:The 4th International Conference on Computational and Information Sciences . Chongqing, China. August 17-19,2012[C].pp1042-1045. IEEE press.2012

40.Zhao. Wang, Zhigang. Xu, Wei. Xin, Zhong. Chen. Implementation and Analysis of a Practical NFC Relay Attack Example.:IMCCC2012:The Second International Conference on Instrumentation & Measurement, Computer, Communication and Control. Harbin, China.

41.Zhao Wang, Wei Xin, Zhigang. Xu, Zhong. Chen. A Secure RFID Communication Protocol Based on Simplified DES. 2012 International Conference on Information Technology and Software Engineering. Beijing, China.

42.Yang Yuan, Yao Guo,"Boreas: an Accurate and Scalable Token-based approach to code clone detection",The 27th IEEE/ACM Conference on Automated Software Engineering, Essen, Germany, Sep 2012.

43.Junjun Kong, Jiannong Cao, Yang Liu, Yao Guo, Weizhong Shao,"Smarter Wheelchairs Who Can Talk to Each Other: An Integrated and Collaborative Approach", HealthCom'2012, Beijing China, Oct 2012.

44.Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen: Resistingrelay attacks on vehicular Passive Keyless Entry and start systems.FSKD 2012: 2232-2236

45.Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun and ZhongChen. Permission-Based Abnormal Application Detection for Android,ICICS 2012.

46.Liangwen Yu, Jiawei Zhu, Zhenggang Wu, Tao Yang, Jianbin Hu and ZhongChen. Privacy Protection in Social Networks using l-Diversity, ICICS2012.

47.Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen: APrivacy-Preserving Path-Checking Solution for RFID-Based SupplyChains. ICICS 2012: 400-407

48.Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen:iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC2012: 517-524

49.Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen, PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate ofthe Intelligent Street Lamp System. UIC/ATC 2012: 525-532

50.Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen: RGH: AnEfficient RSU-Aided Group-Based Hierarchical Privacy EnhancementProtocol for VANETs. WAIM 2012: 352-362

51.Yongming Jin, Wei Xin, Huiping Sun, Zhong Chen: PUF-Based RFIDAuthentication Protocol against Secret Key Leakage. APWeb 2012:318-329

52.Wei Xin, Shigeru Fujimura: Parallel quantum evolutionary algorithmswith Client-Server model for multi-objective optimization on discreteproblems. IEEE Congress on Evolutionary Computation 2012: 1-8

53.Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen: Towardsprivacy-preserving RFID-based location-based services. FSKD 2012:

54.Lixing Li, Zhi Jin,Ge Li,Liwei Zheng,Qiang Wei: Modeling and Analyzing the Reliability and Cost of Service Composition in the IoT: A Probabilistic Approach.ICWS 2012: 584-591

55.Bin Yin, Zhi Jin: Extending the Problem Frames Approach for Capturing Non-functional Requirements.ACIS-ICIS 2012: 432-437

56.Yi Liu, Zhiyi Ma, Hui Liu, Weizhong Shao. Risk-driven Non-functional Requirement Analysis and Specification. The 24th International Conference on Software Engineering and Knowledge Engineering.(SEKE 2012). pp. 55-60

57.Yi Liu, Zhiyi Ma, Rui Qiu, Weizhong Shao. An Approach to Integrating Non-Functional Requirement into UML Design Models Based on NFR-Specific Patterns. The 12th International Conference on Quality Software (QSIC 2012). pp132-135.

58.Huihong He, Zhiyi Ma, Xiang Li, Hongjie Chen, Weizhong Shao, “An Approach to Estimating Cost of Running Cloud Applications based on AWS”, The 19th Asia Pacific Software Engineering Conference(APSEC2012).

59.LiliMou, Ge Li, Zhi Jin, Yangyang Lu and YiyangHao, Discovering Domain Concepts and Hyponymy Relations by Text Relevance Classifying based Iterative Web Searching, Proceedings of 19th Asia-Pacific Software Engineering Conference, 18 December, Hong kong, China.

60.Qiang Wei, Zhi Jin, Lixing Li, Ge Li, Lightweight semantic service modeling for IoT : An environment-based approach, Proceedings of iThings 2012, Paris, France.

61.Ying Zhang, Gang Huang, Xuanzhe Liu, Wei Zhang, Hong Mei, and ShunXiang Yang, “Refactoring Android Java Code for On-Demand Computation Offloading,” accepted by the 27th ACM SIGPLAN International Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA'12), 2012, Tucson, Arizona, USA.

62.Yihan Wu, Gang Huang, Hui Song, Ying Zhang, Model Driven Configuration of Fault Tolerance Solutions for Component-Based Software System. ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (MODELS 2012)

63.Xing Chen, Ying Zhang, Xiaodong Zhang, Yihan Wu, Gang Huang. A Model-based Framework for Platform Management in Cloud.11th Workshop on Adaptive and Reflective Middleware (ARM 2012).

64.Xudong Wang, Xuanzhe Liu, Ying Zhang, Gang Huang Migration and Execution of JavaScript Applications between Mobile Devices and Cloud, SPLASH '12: Conference on Systems, Programming, and Applications: Software for Humanity Proceedings, 2012

65.Lei Zhang, Yanchun Sun, WeihuWang, Hui Song, Gang Huang. Detecting Anti-Patterns in Java EE Runtime System Model, Internetware 2012.

66.Yanchun Sun, Xuanzhe Liu. Educating Students by “Real-world” Software Engineering Practices—Designing Software Engineering Practice Course. In the 7th International Conference on Computer Science and Education (ICCSE 2012), Melbourne, Australia, 2012.

67.Y. Chen, X. Cui and H. Mei. PARRAY: A Unifying Array Representation for Heterogeneous Parallelism. PPoPP'12, ACM SIGPLAN 2012.

68.Changyou Zhang, Kun Huang, Xiang Cui, Yifeng Chen. Power-Aware Programming with GPU Accelerators,IPDPS2012:26th IEEE International Parallel & Distributed Processing Symposium Shanghai, China,21 May - 25 May 2012

69.Li Yi, Haiyan Zhao, Wei Zhang, Zhi Jin. CoFM: An Environment for Collaborative Feature Modeling, The IEEE 20th International Requirements Engineering Conference, 2012.

70.Long Li, Haiyan Zhao, Wei Zhang. MbFM:AMatrix-Based Tool for Modeling and Configuring Feature Models. The IEEE 20th International Requirements Engineering Conference, 2012.

71.Sen Ma, Wen Zhao, Hang Zhang, Shikun Zhang. Material Hub:A Semantic Search Engine with Rule Reasoning. 2012 IEEE International Computer Software and Applications Conference (COMPSAC 2012), Izmir Turkey. July 16-20, 2012. Pp303-310.

72.XiaoyuanBao, Wen Zhao and Shikun Zhang.QXC - An Efficient Querable XML Data Compression Method in EMR System. The 11th International Conference on Information and Knowledge Engineering (IKE'12, WORLDCOMP’12). Las Vegas Nevada, USA. July 16-19, 2012. Pp231-239.


四、中文期刊

1.梁广泰,王千祥,CODAS: 一个易扩展的静态代码缺陷分析服务,计算机科学,第39卷,第一期, 2012年1月。

2.接钧靖,史庭训,焦文品,孟繁晶。构件自适应策略的在线定制及动态评估,软件学报,2012,23(4):802?815。

3.高原,刘辉,樊孝忠,牛振东,邵维忠. 代码坏味的处理顺序. 软件学报, 2012, 23(8): 1965-1977

4.王立杰,李萌,蔡斯博,李戈,谢冰,杨芙清,一种基于网络信息搜索的Web Service文本描述信息扩充方法,软件学报,2012,23(6):1335−1349.

5.何啸,麻志毅,邵维忠.一种支持多种模型转换技术的组合方法.软件学报,Vol.23, No.4, April 2012,PP.816-830.


五、国内会议

1.宋怀达,李萌,金靖,赵俊峰+,谢冰,OKQA:一个基于本体的软件开发知识QA工具,NASAC2012录用

2.金靖, 赵俊峰+, 李萌, 华哲邦, 谢冰,一种基于LDA和静态分析的代码功能挖掘方法,NASAC2012录用

3.易立,赵海燕,张伟,金芝,梅宏,特征模型融合研究浅析, 全国软件与应用技术会议(NASAC 2012),计算机学报 录用。

4.李龙,赵海燕,张伟, 特征模型定制的一种自动传播策略与选择性回退机制, 全国软件与应用技术会议(NASAC 2012),计算机学报 录用。

5.吕骁博, 郭耀, 陈向群, “一种基于分割的数字图像云存储机制”. NASAC 2012.

6.陈德健, 孙艳春, 黄罡, 张颖,基于操作记录与回放技术的远程同步教学工具,计算机工程与应用(已录用),全国软件与应用技术会议(NASAC 2012)。

7.赵星,刘譞哲,王旭东,黄罡,一种同质Mashup构件池动态构造机制,计算机科学与探索(已录用),全国软件与应用学术会议(NASAC 2012)

8.张常有, 陈一峯. 面向数据划分的交互式图可视化方法. 2012年全国高性能计算年会HPC China 2012

9.闫秋玲,吴良,陈薇,王腾蛟,雷凯,杨冬青.EVOC: 一种基于链接和内容信息的动态社区挖掘方法,NDBC 2012全国数据库年会

10.郭少松,王腾蛟,杨冬青. XML模式匹配:整体连接算法TurboStack,NDBC 2012全国数据库年会

11.欧高炎, 陈薇, 王腾蛟, 雷凯, 杨冬青. 一种新的情感影响最大化模型,NDBC 2012全国数据库年会