首页 >> 学术研究 >> 论文 >> 2010 >> 正文

2010


一、国际顶级期刊会议

1. Bin Cui, Jiakui Zhao, and Dongqing Yang, Exploring Correlated Subspaces for Efficient Query Processing in Sparse Databases. IEEE Transaction on Data and Knowledge Engineering, vol. 22, no. 2, pp. 219-233, February 2010.

2. Wenpin Jiao. Multiagent Cooperation via Reasoning about the Behavior of Others. Computational Intelligence. vol. 26, no. 1, pp. 57-83, February 2010.

3. Zhang Cheng, Yang Jing, and Xu Jin. The Circular DNA Logic Gates with Branch Migration. Langmuir, vol. 26, no. 3, pp. 1416-1419, 2010.

4. Shaowei Cai and Kaile Su. EWLS: A New Local Search for Minimum Vertex Cover. AAAI Conference on Artificial Intelligence, July 2010.

5. Xin Cao, Gao Cong, Bin Cui, and C. S. Jensen A Generalized Framework of Exploring Category Information for Question Retrieval in Community Question Answer Archives. 19th International Conference on World Wide Web, April 2010, pp. 201-210.

6. Bin Cui, Anthony Tung, Ce Zhang, and Zhe Zhao. Multiple Features Fusion for Social Media Applications. ACM SIGMOD International Conference on Management of Data, June 2010, pp. 435-446.

7. Bin Cui, Ce Zhang, and Gao Cong. Content-enriched Classifier for Web Video Classification. 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, July 2010, pp. 619-626.

8. Guangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, and Hong Mei. Automatic Construction of an Effective Training Set for Prioritizing Static Analysis Warnings. IEEE/ACM International Conference on Automated Software Engineering, September 2010, pp. 93-102.

9. Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, and Jeffrey Xu Yu. Matching Dependence-Related Queries in the System Dependence Graph. IEEE/ACM International Conference on Automated Software Engineering, September 2010, pp. 457-466.

10. Junjie Yao, Bin Cui, Yuxin Huang and Xin Jin. Temporal and Social Context Based Burst Detection From Folksonomies. AAAI Conference on Artificial Intelligence, July 2010.

11. Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, and Hong Mei. Is Operator-Based Mutant Selection Superior to Random Mutant Selection? 32nd International Conference on Software Engineering, May 2010, pp. 435-444.

12. Hao Zhong, Suresh Thummalapanta, Tao Xie, Lu Zhang, and Qing Wang. Mining API Mapping for Language Migration. 32nd International Conference on Software Engineering, May 2010, pp. 195-204.

13. Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, and Jiasu Sun. Locating Need-to-Translate Constant Strings in Web Applications. ACM SIGSOFT Symposium on Foundations of Software Engineering, November 2010.

14. Minghui Zhou and Audris Mockus. Developer Fluency: Achieving True Mastery in Software Projects. ACM SIGSOFT Symposium on Foundations of Software Engineering, November 2010.

二、国际期刊论文

1. Dihui Bao, Yehu Chen, Huiping Sun, Zhong Chen, Supermarket Service Modeling and Evaluation, International Journal of Service Science, Management, Engineering and Technology, Vol.1,Issue 2, 2010,pp.33-50.

2. Yongzhi Cao, A hierarchy of behavioral equivalences in the p-calculus with noisy channels, The Computer Journal, 53 (2010), 3-20.

3. Yongzhi Cao and Guoqing Chen, A fuzzy Petri nets model for computing with words, IEEE Transactions on Fuzzy Systems, 18 (2010), 486-499.

4. F. Cheng, J. S. Yu, H. L. Xiong (2010), Facial Expression Recognition in JAFFE Dataset based on Gaussian Process Classication. IEEE Transactions on Neural Networks, Volume 21, Issue 10, pp. 1685-1690.

5. Bin Cui, Jiakui Zhao and Dongqing Yang, Exploring Correlated Subspaces for Efficient Query Processing in Sparse Databases. IEEE Transaction on Data and Knowledge Engineering, vol. 22, no. 2, pp. 219-233.

6. Jun Gao, Jiaheng Lu, Tengjiao Wang, Dongqing Yang, Efficient evaluation of query rewriting plan over materialized XML view. Journal of Systems and Software. 2010. 83(6):1029-1038 (2010)

7. Nike Gui, Jian-bin Hu and Zhong Chen, A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks, Journal of Networks, 5(5):535-542, May 2010.

8. Dan Hao, Tao Xie, Lu Zhang, Xiaoyin Wang, Jiasu Sun, and Hong Mei. Test Input Reduction for Result Inspection to Facilitate Fault Localization. Automated Software Engineering: An International Journal, Vol. 17, No. 1, March 2010, pp. 5-3.

9. Wenpin Jiao, Yunchun Sun, Hong Mei, Automated Assembly of Internet-Scale Software Systems Involving Autonomous Agents, Journal of Systems and Software, 83(2010) pp.1838-1850.

10. Wenpin Jiao. Multiagent Cooperation via Reasoning about the Behavior of Others. Computational Intelligence. Volume 26 Issue 1, Pages 57 - 83, February 2010.

11. Yan Li, Fenghong Chen, Xi Sun, Minghui Zhou, Wenpin Jiao, Donggang Cao, and Hong Mei. Towards Self-adaptive Resource Management for Large-scale Shared Clusters. Journal of Computer Science and Technology, 25(5):1, Sept.2010.

12. X. Li, T. Liu: On exponential time lower bound of Knapsack under backtracking. Theoretical Computer Science, 411(16-18): 1883-1888 (2010)

13. Xuanzhe Liu, Gang Huang, Hong Mei. A Community-Centric Approach to Automated Service Composition. Science in China, series F, 2010 Vol. 53 No. 1: 50–63.

14. Qiang Xiaoli, Kou Zheng. Prediction of Interspecies Transmission for Avian Influenza A Virus Based on BP Neural Network. Mathematical and Computer Modelling, 2010, 52: 2060-2065.

15. Puwei Wang, Zhi Jin, Lin Liu,and Budan Wu, Specifying and Composing Web Services with an Environment Ontology-based Approach, International Journal of Web Services Research, 7(3): 73-92, 2010.

16. Puwei Wang, Zhi Jin and Hongyan Liu, Capability Description and Discovery of Internetware Entity, Science in China, 53(4): 685-703, 2010.

17. Tao Wang, Zhenxing Qin, Zhi Jin, Shichao Zhang: Handling over-fitting in test cost-sensitive decision tree learning by feature selection, smoothing and pruning. Journal of Systems and Software 83(7): 1137-1147 (2010)

18. Lijun Wu, Jinshu Su, Kaile Su, Xiangyu Luo, Zhihua Yang: A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems. Knowl.-Based Syst. 23(2): 162-168 (2010)

19. Yang Jing, Zhang Cheng, Xu Jin, et al. A novel computing model of the maximum clique problem based on circular DNA. Science China Information Sciences (Science in China Series F),2010, 53(7):1409-1416.

20. Zhang Cheng, Yang Jing, Xu Jin. The Circular DNA Logic Gates with Branch Migration. Langmuir,2010, 26(3): 1416-1419.

21. Zhang Cheng, Yang Jing, Xu Jin et al.. A “nano-dial” molecular computing model based on circular DNA. Current NanoScience,2010, 6(3):285-291.

22. Zhang Cheng, Yang Jing, Xu Jin et al. A DNA length reducing computing model for maximum independent set problem. Chinese Science Bulletin, 2010, 55(9): 890-896.

23. Lu Zhang, Jing Luo, He Li, Jiasu Sun, and Hong Mei. A Biting-Down Approach to Hierarchical Decomposition of Object-Oriented Systems Based on Structure Analysis. Journal of Software Maintenance and Evolution: Research and Practice, Vol. 22, No. 8, December 2010, pp. 567-596.

24. Shichao Zhang, Zhi Jin, Jingli Lu: Summary queries for frequent itemsets mining. Journal of Systems and Software 83(3): 405-411 (2010)

25. Dongming Zhao, Xiangrong Liu, Xiaoli Qiang. Subtraction in the DNA tile assembly model. Journal of Computational and Theoretical Nanoscience. 2010, 7(1): 173-175.

26. Jiaqi Zhu, Hanpin Wang, Zhongyuan Xu, Chunxiang Xu, A New Model for Model Checking, Cycle Weighted Kripke Structure, Journal of Frontiers of Computer Science in China, Vol.4(1), pp78–88,2010



三、国际会议

1. Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen, Context-Aware Usage Control for Android, In 6th International ICST Conference on Security and Privacy in Communication Networks (SecureCOMM ), Singapore, September 7-9, 2010.

2. Shaowei Cai, Kaile Su: EWLS: a new local search for minimum vertex cover, AAAI 2010.

3. Y. L. Cai, J. S. Yu, H. P. Wang (2010), Prediction of Protein-Protein Interactions Using Subcellular and Functional Localizations. Life System Modeling and Intelligent Computing, LNCS, Volume 6330, pp282-290.

4. Xin Cao, Gao Cong, Bin Cui, C. S. Jensen: A Generalized Framework of Exploring Category Information for Question Retrieval in Community Question Answer Archives, The 17th International World Wide Web Conference, pp. 201-210 (WWW2010)

5. Yongzhi Cao and Guoqing Chen, Towards approximate equivalences of workflow processes, International Conference on Electronic-Business Intelligence (ICEBI2010)

6. Franck Chauvel, Hui Song, Xiang Ping Chen, Gang Huang and Hong Mei: Using QoS-Contracts to Drive Architecture-Centric Self-Adaptation. Quality of Software Architecture, 2010.

7. Lijiang Chen, Bin Cui, Linhao Xu and Heng Tao Shen: Distributed Cache Indexing for Efficient Subspace Skyline Computation in P2P Networks The 15th International Conference on Database Systems for Advanced Applications, pp. 3-18 (DASFAA 2010)

8. L. Chen, B. Cui, L. Xu and H. T. Shen: Distributed Cache Indexing for Efficient Subspace Skyline Computation in P2P Networks The 15th International Conference on Database Systems for Advanced Applications (DASFAA 2010)

9. Xing Chen, Management as a Service: An Empirical Case Study in the Internetware Cloud. International Workshop on Cloud Services, 2010.

10. Xing Chen, Xuanzhe Liu, Xiaodong Zhang, Zhao Liu, Gang Huang. Service Encapsulation for Middleware Management Interfaces. International Symposium on Service Oriented System Engineering. 2010, pp. 272-279.

11. Yu Chen, Liqun Chen. Twin Bilinear Diffie-Hellman Inversion Problem and Its Application. The 13th Annual International Conference on Information Security and Cryptology, ICISC 2010, accepted.

12. Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen. When ABE meets RSS. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2010, LNCS 6166, pp.319-326.

13. Bin Cui, Jiakui Zhao and Gao Cong, ISIS: A New Approach for Efficient Similarity Search in Sparse Databases, The 15th International Conference on Database Systems for Advanced Applications, pp. 231-245 (DASFAA 2010)

14. Bin Cui, Anthony Tung, Ce Zhang and Zhe Zhao, Multiple Features Fusion for Social Media Applications. ACM SIGMOD International Conference on Management of Data, pp. 435-446

15. Bin Cui, Junjie Yao, Gao Cong, and Yuxin Huang, Evolutionary Taxonomy Construction from Dynamic Tag Space, The 11th International Conference on Web Information System Engineering (WISE 2010)

16. Bin Cui, Ce Zhang and Gao Cong, Content-enriched Classifier for Web Video Classification. 33rd Annual ACM SIGIR Conference, 2010, pp. 619-626

17. Jun Gao, Huida Qiu, XiaoJiang, Tengjiao Wang, Dongqing Yang, Fast Top-k Simple Shortest Paths Discovery in Graphs. In Proc of CIKM 2010.

18. Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei, Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based System, In the International Symposium on High Confidence Embedded Computing (HiCEC), With the 7th International Conference on Autonomic and Trusted Computing (ATC), Xi'an, Shanxi, China, October 26-29, 2010.

19. Liang Gu,Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei, SCOBA: Source Code Based Attestation on Custom Software, In the 26th Annual Computer Security Applications Conference (ACSAC), Austin, Texas, USA, December 6-10, 2010.

20. Liang Gu, Yao Guo, Yanjiang Yang, Hong Mei, Feng Bao, Modeling TCG-based Secure systems with Colored Petri Nets, INTRUST 2010.

21. Nike Gui, Ennan Zhai, Jian-bin Hu and Zhong Chen, SWORDS: Improving Sensor Networks Immunity under Worm Attacks, Web-Age Information Management, 11th International Conference, 2010, Jiuzhaigou, China, July 15-17, 2010.

22. Jianbin Hu, Huaixi Wang. A Note on the Security Proof of Waters Identity-Based Encryption,2010 The 3rd International Conference on computational Intelligence and Industrial Applicaition (PACIIA2010)

23. Jianbin Hu, Cong Tang, Yong Deng, Wei Xin, Tao Yang, Zhong Chen, Anming Xie, Towards Names and Gender Behavior in Online Social Networks, CPSCom 2010, Hangzhou, China, Dec 2010.

24. Wenhui Hu, Xin Gao, Wei Ye, Xin Gao, Shikun Zhang, Ontology-based Modification for the Code Generated from Model, SEDM 2010, p38-44, 2010.

25. Wenhui Hu, Xin Gao, Wei Ye, Shikun Zhang, A Runtime Approach for Software Fault Analysis based on Interpolation, NISS 2010, p243-249, 2010.

26. Jiyu Huang. A Browser-based Framework for Data Cache in Web-Delivered Service Composition. SOCA 2010.

27. Xiao Jiang, Jun Gao, Tengjiao Wang, Dongqing Yang. Multiple Sensitive Association Protection in the Outsourced Database. In Proc of DASFAA 2010. 123-137

28. Wei Jin, Hanpin Wang, Yongzhi Cao, Zizhen Wang and Xiaojuan Ban, Modeling BPEL and BPEL4People with a timed interruptable π-calculus, 2010 IEEE 34th Annual Computer Software and Applications Conference, (COMSAC 2010), pp: 487-492, 2010.

29. Fei Li, Jingming Liu, Zheng Li. DNA computation model based on self-assembled nanoparticle probes for 0-1 integer programming problem. Mathematics and computers in simulation.

30. Fei Li, Jin Xu, Zheng Li. DNA computation model based on self-assembled nanoparticle probes for SAT-Problem. 2010 second international conference on future computer and communication.

31. Suke Li, Jinmei Hao and Zhong Chen, Tagging Online Service Review, in Proc. of the 6th IEEE International Conference on Natural Language Processing and Knowledge Engineering (IEEE NLP-KE 2010), pp.267-280, Beijing, China, Aug. 21-23, 2010.

32. Suke Li and Zhong Chen, Exploiting Web Reviews for Generating Customer Service Surveys, The 2nd International Workshop on Search and Mining User-generated Contents (SMUC 2010) (workshop of The 19th ACM International Conference on Information and Knowledge Management, CIKM 2010), Toronto, Canada, Oct. 25-29, 2010.

33. Suke Li, Jinmei Hao and Zhong Chen, Graph-based Service Quality Evaluation through Mining Web Reviews, in Proc. of the 6th IEEE International Conference on Natural Language Processing and Knowledge Engineering (IEEE NLP-KE 2010), pp.280-287, Beijing, China, Aug. 21-23, 2010.

34. Suke Li, jinmei Hao and Zhong Chen, Generating Tags for Service Reviews, The 6th International Conference on Advanced Data Mining and Applications (ADMA2010), ChongQing, China, Nov.19-21, 2010.

35. Suke Li and Zhong Chen, Social Services Computing: Concepts, Research Challenges, and Directions, the International Workshop on Universal User Modeling and Applications (UUMA 2010).

36. Yan Li, Minghui Zhou, Chao You, Guo Yang, Hong Mei. Enabling On Demand Deployment of Middleware Services in Componentized Middleware. Component-Based Software Engineering, CBSE2010, pp 113-129.

37. Guangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, Hong Mei, Automatic Construction of an Effective Training Set for Prioritizing Static Analysis Warnings, to appear in International Conference on Automated Software Engineering (ASE) 2010.

38. Chun Liu, Yue Wang, Wei Zhang, Zhi Jin, Elicitation of Dependability Requirements: a HAZOP-based Approach, RE’10 Poster.

39. Xuanzhe Liu, Gang Huang, Qi Zhao, Zhi Jin, Hong Mei. Assisting End-User Programming for the Service-Oriented Web. International Conference on Automated Software Engineering, 2010.

40. Yi liu, Zhiyi Ma, Weizhong Shao. Integrating Non-Functional Requirement Modeling into Model Driven Development Method. 17th Asia Pacific Software Engineering Conference (APSEC2010), 30 Nov.-3 Dec. 2010, Sydney, Australia

41. Zhao Liu, Xuanzhe Liu, Gang Huang, Teng Teng, Yong Zhang, Honggang Yuan. Automated Composition of Middleware Management Services. International Symposium on Service Oriented System Engineering. 2010, pp. 264 - 271.

42. Song Luo, Jianbin Hu and Zhong Chen, Implementing Attribute-Based Encryption in Web Services, in Proc. of The IEEE 8th International Conference on Web Services (ICWS2010), Miami, USA, Jul. 2010.

43. Song Luo, Jianbin Hu and Zhong Chen, A Novel Threshold Distributed Authentication Scheme Using Bilinear Pairings, in Proc. of The 2nd International Workshop on Education Technology and Computer Science (ETCS 2010), Wuhan, China, Mar. 2010.

44. Song Luo, Jianbin Hu and Zhong Chen, New Construction of Identity-based Proxy Re-encryption, The 10th ACM Workshop on Digital Rights Management (ACM-DRM 2010), Chicago, USA, Oct. 2010. (short paper)

45. Song Luo, Jianbin Hu and Zhong Chen, Hierarchical Attributes: Practical Extension for Attribute-based Encryption, The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), Shanghai, China, Oct. 2010. (short paper)

46. Yanfei Lv, Xuexuan Chen, Bin Cui, ACAR: an Adaptive Cost Aware Cache Replacement Approach for Flash Memory, Proceedings of the 11th International Conference On Web-Age Information Management,pp. 558-569 (WAIM 2010)

47. Jia-kuan Ma, Ya-sha Wang, Lei Shi, Hong Mei, An Automatic Approach to Aid Process Integration within a Secure Software Processes Family. ICSP 2010: 188-199

48. Zhiyi Ma, Lianghuan Kang, Hongjie Chen, An Approach to Modeling Service-Oriented Solutions based on CBDI-SAE Metamodel for SOA 2.0. 2010 Fifth IEEE International Symposium on Service Oriented System Engineering, 2010.6.

49. Qiang Xiaoli, Xu Jin, Liu Xiangrong, et al.. An unenumerative DNA computing model for vertex coloring problem. Proceedings of the 16th International Conference on DNA Computing and Molecular Programming. 2010.

50. Jin Shao, Hao Wei, Qianxiang Wang, Hong Mei, A Runtime Model Based Monitoring Approach for Cloud, to appear in the 3rd International Conference on Cloud Computing(CLOUD 2010).

51. Jin Shao, Fang Deng, Haiwen Liu, Qianxiang Wang, Hong Mei, Lazy Runtime Verification for Constraints on Interacting Objects, to appear in APSEC 2010.

52. Si Huayou, Zhao Yun, Qi Hengnian, Chen Zhong. The Design and Implementation of an Approach to Publish and Discover Semantic Web Services. Proceedings of the 5th International Conference on Intelligent Systems and Knowledge Engineering (ISKE2010). Hangzhou, China. 2010.11.15-16.

53. Si Huayou, Ni Yulin, Chen Zhong, Yu Lian, Zhao Yu. An Approach to Semantic Web Services Publication and Discovery Based on OWL Ontology Inference. Proceedings of the 5th IEEE International Symposium on Service-Oriented System Engineering (SOSE’10). Nanjing, China. 2010.06.

54. Si Huayou, Zhao Yun, Qi Hengnian, Chen Zhong. An Approach to Distributed Semantic Web Services Publication and Discovery Based on Chord. Proceedings of the 3rd International Symposium on Computational Intelligence and Design (ISCID2010). Hangzhou, China. 2010.10.29-31.

55. Hui Song, Gang Huang, Yingfei Xiong, Franck Chuavel, Yanchun Sun, Hong Mei. Inferring Meta-Models for Runtime System Data from the Clients of Management APIs. MoDELS 2010.

56. Hui Song, Gang Huang, Franck Chauvel, Yanchun Sun and Hong Mei,SM@RT: Representing Runtime System Data as MOF-Compliant Models. ICSE 2010, Informal Research Demonstrations.

57. Yoonki Song, Xiaoyin Wang, Tao Xie, Lu Zhang, and Hong Mei. JDF: Detecting Duplicate Bug Reports in Jazz. Proceedings of the 32nd International Conference on Software Engineering (ICSE 2010), (Informal Tool Demonstration), Vol. 2, 2-8 May 2010, pp. 315-316.

58. Cong Sun, Liyong Tang, Zhong Chen, Secure Information Flow in Java via Reachability Analysis of Pushdown System, in Proc. of the 10th International Conference on Quality Software (QSIC’10), Zhangjiajie, China, Jul. 2010. 142-150

59. Y. Sun. The Challenge and Practice of Creating Software Engineering Curriculum. International Symposium on Collaborative Software Engineering, Oct., 2010.

60. Jian Tang and Zhi Jin, Assignment Problem in Requirements Driven Agent Collaboration and its Implementation, Proceedings Of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010): 839-846, May 10-14, 2010.

61. Bo Wang, Yingfei Xiong, Zhenjiang Hu, Haiyan Zhao, Wei Zhang, and Hong Mei, A Dynamic-Priority based Approach to Fixing Inconsistent Feature Models, MODELS 2010.

62. Bo Wang, Zhenjiang Hu, Yingfei Xiong, Haiyan Zhao, Wei Zhang, and Hong Mei, Tolerating Inconsistency in Feature Models, LWI’2010.

63. Lijie Wang, Leye Wang, Ge Li, Bing Xie. Assisting Developers to Read Code Help-Documents Efficiently through Discovering Document-section Relationships. SEKE2010

64. Lijie Wang, Fei Liu, Liangjie Zhang, Ge Li, Bing Xie. Enriching Descriptions for Public Web Services using Information Captured from Related Web Pages on the Internet. 2010 Fifth IEEE International Symposium on Service Oriented System Engineering. page(s): 141-150.

65. Maoguang Wang, Hong Mei, Wenpin Jiao, Junjing Jie, Tingxun Shi. Multi-agent System Collaboration Based on the Relation-web Model, AICI 2010, Lecture Notes in Artificial Intelligence 6319, 2010, pp.132-144, 2010.

66. Maoguang Wang, Hong Mei, Wenpin Jiao, Junjing Jie, Jianzhu Ma. A Self-Adaptive Mechanism for Software Configuration Based on Case-based Reasoning and Policy, proceeding of AICI’10, pp.250-255, IEEE Computer Society, 2010.

67. Maoguang Wang, Junjing Jie, Tingxun Shi, Xi Fang. An Agent-based Autonomous Component Model for Internetware, proceeding of WISM’10, pp.348-352, IEEE Computer Society, 2010.

68. Maoguang Wang, Wenpin Jiao, Junjing Jie, Tingxun Shi.A Multi-dimensional Hierarchical Model Methodology for Autonomic Computing System, proceeding of ICIS’10 , pp.356-360, IEEE Press, 2010.

69. X. Wang, L. Qian, J. Wu, T. Liu, An energy and distance based clustering protocol for wireless sensor networks, in Novel Algorithms and Techniques in Telecommunications and Networking (Proc. TeNe 2008), 409-412, Springer, 2010

70. Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, and Jeffrey Xu Yu, Matching Dependence-Related Queries in the System Dependence Graph, Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering (ASE 2010), 20-24 September, 2010, pp. 457-466.

71. Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, and Jiasu Sun, Locating Need-to-Translate Constant Strings in Web Applications, Proceedings of the 18th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE-18), 7-11 November, 2010.

72. Ya-sha Wang, Xiao-yang He, Jin-gang Guo, Jia-rui Jiang, Software Process Reuse by Pattern Weaving, SEKE 2010

73. Yonggang Wang, Ennan Zhai, Jianbin Hu, Zhong Chen, Claper: Recommend Classical Papers to Beginners, International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'10), Aug. 2010.

74. Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jianbin Hu, Zhong Chen, DSpam: Defending against Tag Spam in Tagging Systems, International Conference on Parallel and Distributed Systems (ICPADS 2010), Dec. 2010.

75. Ziyou Wang, Minghui Zhou, Hong Mei. Towards an Empirical Reuse Approach for the Software Evolution: A Case Study. In: International Conference on Quality Software (QSIC), 2010 10th , 14-15 July 2010, pp.282-287

76. Zizhen Wang, Hanpin Wang, Naijun Zhan, Refinement of Models of Software Components, ACM Symposium on Applied Computing 2010, (SAC 2010): 2311-2318,2010 (regulare)

77. Zizhen Wang, Hanpin Wang, Yongzhi Cao, Wanling Qu, Wei Jin and Meixia Zhu, A Game Perspective of Refinement of Component Models, 2010 IEEE 34th Annual Computer Software and Applications Conference, (COMSAC 2010), pp: 437-442, 2010.

78. Bo Wei, Zhi Jin and Lin Liu, A Formalism for Extending the NFR Framework to Support the Composition of the Goal Trees, APSEC 2010

79. Bo Wei, Zhi Jin and Didar Zowghi, Knowledge Integration under Multiple Attributes, Proceedings of the 4th International Conference on Knowledge Science, Engineering and Management (KSEM2010): 555-560, 2010

80. Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena and Keith Ross, Privacy of Peer-Assisted Security Patch Distribution, in IEEE P2P 2010, Delft, Netherlands, August 2010.

81. K. Wu, J. S. Yu, H. P. Wang (2010), Unsupervised Text Pattern Learning Using Minimum Description Length. The 4th International Universal Communication Symposium, pp160-165.

82. Qian Wu, Qianxiang Wang, Natural Language Processing based Detection of Duplicate Defect Patterns, to appear in the 7th International Workshop on Software Cybernetics, in conjunction with COMPSAC 2010.

83. Zan Xiao, Donggang Cao, Weizhong Shao, A Policy-based Framework for Automated SLA Negotiation for Internet-based Virtual Computing Environment, The 2010 IEEE International Workshop on Internet-based Virtual Computing Environment (iVCE’10), Dec 8, 2010, Shanghai

84. Anming Xie, Cong Tang, Zhuhua Cai, Jianbin Hu and Zhong Chen, An Adjacency Matrixes-based Model for Network Security Analysis, in ICC'10, Camp town, South Africa, May. 2010.

85. Chunxiang Xu, Wanling Qu, Hanpin Wang,Zizhen Wang,A Petri-net Based Method for Data Validation of Web Services Composition. 2010 34th Annual IEEE Computer Software and Application Conference (COMPSAC 2010), 468-476.

86. Chunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban, A Petri Net-Based Method for RFID Event Detection. 2010 34th Annual IEEE Computer Software and Application Conference (COMPSAC 2010), 367-372.

87. K. Xu and T. Liu, Constraint satisfaction problems with growing domains (Invited talk), International workshop on statistical physics and computer science, Beijing, July, 2010

88. Xu Jin, Qiang Xiaoli, Zhang Kai, et al.. A Parallel Type of DNA Computing Model for Graph Vertex Coloring Problem. Proceedings 2010 Fifth International Conference on Bio-Inspired Computing:Theories and Applications, 2010.

89. Junjie Yao, Bin Cui, Yuxin Huang and Yanhong Zhou: "Detecting Bursty Events in Collaborative Tagging Systems". 26th IEEE International Conference on Data Engineering, pp.780-783.

90. Junjie Yao, Bin Cui, Yuxin Huang and Xin Jin, Temporal and Social Context Based Burst Detection From Folksonomies, Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-2010)

91. Bin Yin and Zhi Jin, Non-functional attributes for Problem Frames approach, Proceedings of the 4nd International Workshop on Advances and Applications of Problem Orientation (IWAAPO 2010), Workshop of the ICSE’10 May 3, 2010, ACM Press

92. Yuan Chongyi, Zhao Wen, Huang Yu. Operation expression: A way to verified software. 2010 World Congress in computer Science, Computer Engineering and Applied Computing (The 2010 International Conference on Foundations of Computer Science), Las Vegas, Nevada, USA. July 12-15, 2010

93. Ennan Zhai, Huiping Sun, Sihan Qing, Zhong chen, Sorcery: Overcoming Deceptive Votes in P2P Content Sharing Systems, Peer-to-Peer Networking and Application. 2010, Delft, Netherlands, August 25-27, 2010

94. Zhang Cheng, Yang Jing, Xu Jin. Circular DNA Logic Gates with Branch Migration. The 16th International Conference on DNA Computing and Molecular Programming (DNA 16), 2010,

95. Lingming Zhang, Tao Xie, Lu Zhang, Nikolai Tillmann, Jonathan de Halleux and Hong Mei, Test Generation via Dynamic Symbolic Execution for Mutation Testing, Proceedings of the 26th International Conference on Software Maintenance (ICSM 2010), 12-18 September, 2010.

96. Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, and Hong Mei, Is Operator-Based Mutant Selection Superior to Random Mutant Selection? Proceedings of 32nd International Conference on Software Engineering (ICSE 2010), Vol. 1, 2-8 May 2010, pp. 435-444.

97. Nuyun ZHANG, Ning JIANG, Ying ZHANG, Gang HUANG. Towards Automated Generation of User-Specific Eclipse Wizard. CyberC 2010.

98. Nuyun ZHANG, Gang HUANG, Ying ZHANG, Hong MEI. Towards Automated Synthesis of Executable Eclipse Tutorial. SEKE 2010.

99. Nuyun Zhang, Ying Liu, Gang Huang, Yabin Dang. Behavior-based Usability Testing of User Manuals. International Conference on Software Engineering and Data Mining (SEDM), 2010. pp. 257-262.

100. Zhang Nuyun, Huang Gang, Zhang Ying, Mei Hong. Automating Reusable-Procedure Discovery through Developer’s Action Analysis. International Conference on Quality Software (QSIC), 2010, pp. 240-247.

101. Xiaowei Zhang, Donggang Cao, Yunpeng Gao, Xiangqun Chen, Hong Mei, An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism, in Proceedings of 34th Annual IEEE International Computer Software and Applications Conference, Jul 19-23, 2010, Seoul

102. Ying Zhang, Gang Huang, Xuanzhe Liu, Zizhan Zheng, and Hong Mei. Towards Automatic Tuning of Adaptive Computations in Autonomic Middleware. 9th Workshop on Adaptive and Reflective Middleware (ARM2010)

103. Ying Zhang, Gang Huang, Xuanzhe Liu, Hong Mei. Integrating Resource Consumption and Allocation for Infrastructure Resources on-Demand. CLOUD 2010, pp75-82.

104. Bin Zhao, Guangjun Cai, Zhi Jin: Semantic Approach for Service Oriented Requirements Modeling. Intelligent Information Processing 2010: 35-44

105. Junfeng Zhao, Lingshuang Shao, Zhiwen Cheng, Bing Xie, A Flexible Multi-Source Web Service’s QoS Acquisition Framework and Implementation, The 7th International Conference on Autonomic and Trusted Computing

106. Junfeng Zhao, Bing Xie, Yasha Wang, Yongjun XU, TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse, Twenty-Second International Conference on Software Engineering and Knowledge Engineering (SEKE'10), July 2009, Page(s):752-757

107. Qi Zhao. Towards a Data Access Framework for Service-Oriented Rich Clients. SOCA 2010.

108. Qi Zhao, Xuanzhe Liu, Gang Huang, Jiyu Huang, Hong Mei. A Browser-based Middleware for Service-Oriented Rich Client. International Conference on Service Science (ICSS), 2010, pp. 22-27.

109. Qi Zhao, Xuanzhe Liu, Dawei Sun, Tiancheng Liu, Ying Li, Gang Huang. Mashing-up Rich User Interfaces for Human-Interaction in WS-BPEL. ICWS 2010. pp 559-566, July 5-10, Miami, USA.

110. Wen Zhao, Yu Huang, Chongyi Yuan, Lifu wang. Formalizing Business Process Execution Language Based on Petri Nets. The 2nd International Workshop Intelligent System and Applications (ISA2010). Wuhan, China. MAY 22-23, 2010.

111. Zhe Zhao, Bin Cui, Wee Hyong Tok, Jiakui Zhao: Efficient Similarity Matching of Time Series Cliques with Natural Relations. 26th IEEE International Conference on Data Engineering, pp. 908-911.

112. Hao Zhong, Suresh Thummalapanta, Tao Xie, Lu Zhang, and Qing Wang, Mining API Mapping for Language Migration, Proceedings of 32nd International Conference on Software Engineering (ICSE 2010), Vol. 1, 2-8 May 2010, pp. 195-204.

113. M. Zhou and A. Mockus. Developer fluency: Achieving true mastery in software projects. In ACMSIGSOFT / FSE, Santa Fe, New Mexico, 2010.

114. M. Zhou and A. Mockus. Growth of Newcomer Competence: Challenges of Globalization. In Future of Software Engineering (FoSER) on ACMSIGSOFT / FSE, Santa Fe, New Mexico, 2010.

115. Meixia Zhu, Hanpin Wang, Wei Jin, Zizhen Wang, Chunxiang Xu, Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation, 2010 34th Annual IEEE Computer Software and Applications Conference Workshops, (COMSAC 2010), 170-175.

116. Meixia Zhu, Hanpin Wang, Yongzhi Cao, Zizhen Wang, Wei Jin, The Analysis of Sequence Diagram with Time Properties in Qualitative and Quantitative Aspects by Model Transformation, to appear in 7th Asia Pacific Software Engineering Conference, 2010

117. Wenhui Zhu, Tao Yang, Gang Huang, Yanchun Sun, Hong Mei. A Task-Oriented Navigation Approach to Enhancing Architectural Description Comprehension. COMPSAC 2010.

118. YanZhen Zou, SiBo Cai, Meng Li, Lijie Wang, Bing Xie. A Framework for Trust enabled Software Asset Retrieval. The 7th International Conference on Autonomic and Trusted Computing, October 26-29, 2010. Xi'an China.

四、国内期刊论文

1. 蔡斯博, 邹艳珍, 邵凌霜, 谢冰, 邵维忠: 一种支持软件资源可信评估的框架. 软件学报,2010年第2期,359-372.

2. 陈湘萍,黄罡,孙艳春,梅宏:支持自适应过程中分析与规划的软件体系结构模型。计算机研究与发展,47(7),2010, 1156-1164。

3. 崔晓峰,孙艳春,梅宏:以决策为中心的软件体系结构设计方法,软件学报, 2010, Vol 21, No.6, pp1196-1207

4. 范月科, 强小利, 许进:图的最大团与最大独立集粘贴DNA计算模型. 计算机学报. 2010, 33(2): 305-310. (EI)

5. 付强,王腾蛟,李红燕,杨冬青,唐世渭:XSLC: 基于分层编码并面向查询的XML数据压缩算法,计算机科学与探索,4(2),2010年第2期,pp.145−152

6. 高昕, 赵文, 叶蔚, 张世琨,王立福:一种基于时间序列的RFID供应链数据分析方法. 电子学报, 38(2A):26~32. 2010.2. (EI收录)

7. 古亮,郭耀,王华,邹艳珍,谢冰,邵维忠: 基于TPM的运行时软件可信证据收集机制, 软件学报 2010年第2期.

8. 李信鹏,赵文,刘殿兴,袁崇义,张世琨等:基于RFID发现服务的一种供应链建模技术. 电子学报, 38(2A):107~116. 2010.2. (EI收录)

9. 刘春,王越,金芝:基于知识的可信性需求获取,《电子学报》,38(2A): 188-193,2010

10. 刘殿兴,赵文,李信鹏,冯志明,张世琨等:RFID信息服务网络中支持复合订阅的路由算法研究. 电子学报, 38(2A):33~40. 2010.2. (EI收录)

11. 刘飞,王立杰,李戈,赵俊峰,谢冰:一种构件标签自动提取方法及其实现,电子学报,Vol.38,No.2A,2010年2月,P45-49.

12. 刘辉, 麻志毅, 邵维忠:逆向工程中的大类图拆分方法,软件学报, 2010, 21(11): 2701-2710

13. 柳毅,麻志毅,何啸,邵维忠: 一种从UML模型到可靠性分析模型的转换方法. 软件学报,21(2)(2010):287-304

14. 邵津, 邓芳, 王千祥: 一个基于模型的软件监测与分析框架, 计算机研究与发展,2010年7月。

15. 陶富民,高军,王腾蛟:周凯面向话题的新闻评论的情感特征选取. 中文信息学报, 2010年5月。

16. 王昭.流密码算法RC4的教学设计.信息安全与技术,2010(12).

17. 徐春香,屈婉玲,王捍贫,朱梅霞:死路删除语义下的WS-BPEL流程的建模,北京大学学报,2010,第46卷第2期,162-170.

18. 许世峰,高军,杨冬青,王腾蛟:基于穿行次数的大规模图数据路径查询,计算机研究与发展, 47(1),2010年第1期,pp.96−103

19. 闫华,张伟,赵海燕,梅宏:基于二分决策图的特征模型验证方法.软件学报,2010,21(1):84-97

20. 赵加奎,杨冬青,陈立军:基于容斥原理的Skyband基数估计方法,软件学报,第21卷,第7期,2010年7月,pp.1550−1560

21. 赵文, 李信鹏, 刘殿兴, 张世琨等:供应链环境下一种分布式RFID发现服务. 电子学报, 38(2A):99~106. 2010.2. (EI收录)

22. 周明辉,张益菲,梅宏:面向OSGi的应用服务器重构方法和实践. 计算机科学与探索,2010,04(02):108-114


五、国内会议

1. 房路,赵俊峰,邵凌霜,谢冰:一种面向场景基于预测的Web Services自动选择机制,全国软件与应用技术会议(NASAC 2010)

2. 林洪武,尤朝,周明辉,梅宏:以代理为中心的 OSGi 构件资源监控方法.NASAC2010,计算机科学与探索

3. 刘昌盛,李萌,邹艳珍,谢冰: 一种基于Internet的JAR包使用信息收集方法. 全国软件与应用学术会议(NASAC),2010年,苏州,中国. 优秀论文(推荐到电子学报)

4. 盛拓耕,王亚沙,周武,马家宽:一个监测程序员阅读Word文档行为的工具,NASAC 2010

5. 王旭东, 刘譞哲,赵祺,黄罡:面向富互联网应用的计算任务动态迁移机制。2010全国软件与应用大会,计算机科学与探索。

6. 魏豪,邵津,吴凌,刘海文,王千祥:SOSE: 一个面向软件工程的PaaS平台,NASAC 2010(长文)。

7. 武义涵,宋晖,杜小智,齐勇,黄罡:基于运行时模型的VOD系统动态监测。2010全国软件与应用大会,计算机科学。

8. 张琳, 冯青, 郭耀, 陈向群: 面向移动社交网络的数据共享与访问控制,全国软件与应用学术会议(NASAC10), 计算机科学。

9. 方汐,马剑竹,王茂光,焦文品:一种基于双向选择的多agent系统自动集成方案。Agent 2010,《计算机工程与科学》,2010, 32(6):68-73。