论文

一、国际顶级期刊会议

1.Yitao Ni,Shan-Shan Hou,Lu Zhang,Jun Zhu,Zhongjie Li,QianLan Mei,and Jia-Su Sun,"Effective Message-Sequence Generation for Testing BPEL Programs,"IEEE Transactions on Services Computing,Vo1.6,No.1,2013,pp.7-19.

2.Xiaoyin Wang,Lu Zhang,Tao Xie,Hong Mei,and Jiasu Sun,"Locating Need-to-Externalize Constant Strings for Software Internationalization With Generalized String-Taint Analysis",IEEE Transactions on Software Engineering,Vol.39,No.4,2013,

pp.516-536.

3.Shaowei Cai,Kaile Su,ChuanLuo,Abdul Sattar:NuMVC:An Efficient Local Search Algorithm for Minimum Vertex Cover.J.Artif.Intell.Res.(JAIR)46:687-716(2013).

4.Yongzhi Cao,Sherry X.Sun,Huaiqing Wang,and Guoqing Chen, A behavioral distance for fuzzy-transition systems,IEEE Transactions on Fuzzy Systems,21(2013),pp.735-747.

5.Jun Gao,Jeffrey Xu Yu,Ruoming Jin,Jiashuai Zhou,Tengjiao Wang,Outsourcing Shortest Distance Computing With Protection.VLDB Journal.August 2013,Volume 22,Issue 4,pp543-559.

6.Dan Hao,Tian Lan,Hongyu Zhang,Chao Guo,Lu Zhang,Is This a Bug or an Obsolete Test?the 27th European Conference on Object-Oriented Programming(ECOOP 2013),3-5 July 2013,Pages 602-628,Montpeller,France.

7.Qian Wu,Ling Wu,Guangtai Liang,Qianxiang Wang,Tao Xie,Hong Mei,Inferring Dependency Constraints on Parameters for Web Services,WWW2013.

8.Guangtai Liang,Qianxiang Wang,Tao Xie,Hong Mei,Inferring Project-Specific Bug Patterns for Detecting Sibling Bugs,FSE 2013.

9.Lingming Zhang,Dan Hao,Lu Zhang,Gregg Rothermel,Hong Mei,Bridging the Gap between the Total and Additional Test-Case Prioritization Strategies,the 35th International Conference on Software Engineering(ICSE 2013),18-26 May 2013,Pages 192-201,San Francisco,USA.

10.Lingming Zhang,Lu Zhang and Sarfrazkhurshid,"Injecting Mechanical Faults to Localize Developer Faults for Evolving Software"Proceedings of 28th Annual ACM SIGPLAN Conference on Object-Oriented Programming,Systems,Languages,

and Applications(OOpsla 2013),(part of SPLASH2013),October 26-31,2013,pp.765-784.

11.Hongzhi Yin,Yizhou Sun,Bin Cui,Zhiting Hu and Ling Chen:"LCARS:A Location-Content-Aware Recommender System",KDD2013,pp.221-229.

12.Hongzhi Yin,Bin Cui,Hua Lu,Yuxin Huang and Junjie Yao:"A Unified Model For Stable and Temporal Topic Detection from Social Media Data",ICDE 2013,pp.661-672.

13.Shaowei Cai,Kaile Su,Chuanluo:Improving WalkSAT for Random K-Satisfiability Problem with k>3.AAAI 2013.

14.Guanfeng Lv,Kaile Su,Yanyan Xu:CacBDD:ABDD Package with Dynamic Cache Management.CAV 2013:229-234.

15.ShaoweiCai,Kaile Su:Comprehensive Score:Towards Efficient Local Search for SAT with Long Clauses.IJCAI2013.

16.Cheng Zhang Liuqing Liuqing Wu,Jing Yang,Shi Liu and Jin Xu,A Molecular Logical Switch beacon controlled by thiolated DNA signals,2013,Chemical Communications,2013,49,11308-11310.

17.Jing Yang,Lingjing Shen,Jingjing MA,H.Inaki Schlaberg,Shi Liu,Jin Xu,and Cheng Zhang,Fluorescent nanoparticle beacon for logic gate operation regulated by strand displacement.ACSAppl.Mater.Interfaces,2013,5(12),pp5392-5396.

18.Cheng Zhang,Jingjing Ma,Jing Yang,H.Inaki Schlaberg,Shi Liu,and Jin Xu,Nanoparticle Aggregation Logic Computing Controlled by DNA Branch Migration,Applied Physics Letter,2013,103,093106.


二、国际期刊

1.Jun Gao,Jeffrey Xu Yu,Ruoming Jin,Jiashuai Zhou,Tengjiao Wang,Outsourcing shortest distance computing with privacy protection.VLDB Journal.August 2013,Volume22,Issue4,pp543-559.

2.Tao Yang,Hu Jianbin and Zhong Chen,a practical and extendible VANETS Privacy-Preserving System,Journal of Automation and Control Engineering,vol.l,No.2,pp.166-170,March 2013,ETP Press.

3.Bo Wang,Zhenjiang Hu,Qiang Sun,Haiyan Zhao,Yingfei Xiong,Wei Zhang,Hong Mei.Supporting Feature Model Refinement With Updatable View.frontiers of Computer Science in China,Vol 7,Issue 2,pp257-271,April2013.

4.Yitao Ni,Shan-Shan Hou,Lu Zhang,Jun Zhu,Zhongjie Li,Qianlan,Hong Mei,and Jia-Su Sun,"Effective Message-Sequence Generation for Testing BPEL Programs",IEEE Transactions on Services Computing,Vol.6,No.1,2013,pp.7-19.

5.Xiaoyin Wang,Lu Zhang,Tao Xie,Hong Mei,and Jiasu Sun,"Locating Need-to-Exteralize Constant Strings for Software Internationalization with Generalized String-Taint Analysis",IEEE Transaxtions on Software Engineering,Vol.39,no.4,2013,

pp.516-536.

6.Liang Li,Tian Liu,Ke Xu.Variable-Centered Consistency in Model B.Minds & Machines.23(1):95-103,Springer,2013.(SCI收录)

7.Wei Jiang,Tian Liu,Chaoyi Wang,Ke Xu.Feedback Vertex Sets on Restricted Bipartite Graphs.Theoretical Computer Science,507(7):41-51,Elsevier,2013.(SCI收录)

8.Wenpin Jiao,Yanchun Sun.Supporting Adaptation of Decentralized Software based on Application Acenarios,Journal of Aystems and Software,Volume86,Issue 7,July 2013,Pages1891-1906.

9.ShaoweiCai,Kaile Su,ChuanLuo,Abdul Sattar:NuMVC:An Efficient Local Search,Algorithm for Minimum Vertex Cover.J.Artif.Intell.Res.(JAIR)46:687-716(2013)

10.Wei Zhang,Li Yi,Haiyan Zhao,Zhi jin:Feature-oriented stigmergy-based collaborative requirements modeling:an exploratory approach for requirements elicitation and cvolution based on web-enabled collective intelligence.SCIENCE CHINA

Information Sciences 56(8):1-18(2013).

11.Bo Wang,Zhenjiang Hu,Qiang Sun,Haiyan Zhao,yingfei Xiong,Wei Zhang,Hong mei.Supporting feature model refinement with updatable view,Frontier of Computer Science,Frontiers of Computer Science 7(2):257-271(2013)

12.Wei Zhang,Li Yi,Haiyan Zhi Jin:Feature-oriented stigmergy-based collaborative requirements modeling:an exploratory approach for requirements modeling:an exploratory approach for requirements elicitation and evolution based on web-

enabled collective intelligence.SCIENCE CHINA Information Sciences 56(8):1-18(2013).

13.Kedian Mu,Jun Hong,Zhi Jin,Weiru Liu:From inconsistency handling to non-canonical requirements management:A Iogical perspective.Int.J.Approx.Reasoning 54(1):109-131,2013.

14.Kedian Mu,Zhi Jin,Weiru Liu,Didar Zowghi,Bo Wei:Measuring the significance of inconsistency in the Viewpoints framework.Sci.Comput.Program.78(9):1572-1599,2013.

15.Wei-Tek Tsai,Budan Wu,Zhi Jin,Yu Huang,WuLi:Ontology patterns for service-oriented software development.Softw,Pract.Exper.43(7):867-883,2013.

16.Yun Ma,Xuan Lu,Xuanzhe Liu,Xudong Wang,M.Brian Blake:Data-driven synthesis of multiple recommendation patterns to create situational Web mashups.SCIENCE CHINA Information Sciences 56(8):1-16(2013).

17.Hui Liu,Zhengong Niu,Zhiyi Ma,and Weizhong Shao.Identification of Generalization Refactoring Opportunities.Automated software engineering March 2013,volume 20,Issue 1,pp81-110.

18.Yifeng Chen:Semanticnheritance in unifying theories of programming.Formal Asp.Comput.25(1):89-106(2013).

19.Yiferig Chen:Algebraic Program Semantics For Supercomputing.Theories of Programming and Formal Methods 2013:118-135.

20.Yongzhi Cao,Sherry X.Sun,Huaiqing Wang,and Guoqing Chen,A behavioral distance for fuzzy-transition systems,IEEE Transactions on Fuzzy Systems,21(2013),pp.735-747.

21.Yongzhi Cao,Lirong Xia,and Mingsheng Ying,Probabilistic automata for computing with words,Journal of Computer and System Sciences,79(2013),pp.152-172.

22.Cheng Zhang,Liuqing Wu,Jing Yang,shi Liub and Jin Xu,A Molecular Logical Switch beacon controlled by thiolated DNA signals,2013,Chemical Communications,2013,49,11308-11310.

23.Cheng Zhang,Jingjing Ma,Jing Yang,Shi Liu,and Jin Xu,Binding Assistance Triggering Attachments of Hairpin DNA onto Gold Nanoparticles.Analytical Chemistry,2013,85(24),11973-11978.

24.Jing Yang,Lingjing Shen,Jingjing Ma,H.Inaki Schlaberg,Shi Liu,Jin Xu,and Cheng Zhang,Fluorescent nanoparticle beacon for logic gate operation regulated by strand displacement.ACS Appl.Mater.Interfaces,2013,5(12),5392-5396.

25.Cheng Zhang,Jingjing Ma,Jing Yang,H.Inaki Schlaberg,Shi Liu,and Jin Xu,Nanoparticle Aggregation Logic Computing Controlled by DNA Branch Migration,Applied Physics Letter,2013,103,093106.

26.Cheng Zhang,Jingjing Ma,Jing Yang,Yafei Dong,Jin Xu,Selective Control of Gold Nanoparticles based on Circular DNA Strand Displacement,Journal of Colloid and Interface Science,2013,DOI 10.1016/j.jcis.2013.11.079.

27.Hu Xiong,Guobin Zhu,Zhong Chen,Fagen Li:Efficient communication scheme with confidentiality and Privacy for vehicular networks.Computers & Electrical Engineering 39(6):1717-1725(2013).

28Hu Xiong,Jian-bin Hu,Zhonghen:Security Flaw of an ECC-based Signcryption Scheme with Anonymity.I.J.Network Security 15(4):317-320(2013).

29.Hu Xiong,Zhi Guan,Zhong Chen,Fagen Li:An efficient certificateless aggregate signature with constant pairing computations.Inf.Sci.219:225-235(2013).

30.Hu Xiong,Yanan Chen,Zhi Guan,Zhong Chen:Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.Inf.Sci.235:329-340(2013).

31.Hu Xiong,Zhong Chen,Fagen Li:New identity-based three-party authenticated Key agreement protocol with provable security.j.network and Computer Applications 36(2):927-932(2013).

32.Huayou Si,Zhong Chen,Yong Deng,Lian Yu:Semantic web services publication and OCT-based discovery in structured P2P network.Service Oriented Computing and Applications 7(3):169-180(2013).

33.Shaowei Cai,Kaile Su:Local search for Boolean Satisfiability with configuration checking and subscore.Artif.Intell.204:75-98(2013).


三、国际会议

1.Hongzhi Yin,Yizhou Sun,Bin Cui,Zhiting Hu and Ling Chen:"LCARS:A Location-Content-Aware Recommender System",KDD 2013".

2.Xiaogang Shi,Yanfei Lv,Yingxia Shao and Bin Cui:"BCATE:A Balanced Contention-Aware Transaction Execution Model for Highly Concurrent OLTP Systems",WAIM2013.

3.Xiang Wang,Lele Yu,Junjie Yao,Bin Cui:A Multiple Feature Integration Model to Infer Occupation from Social Media Records,WISE 2013.

4.Yingxia Shao,junjie Yao,Bin Cui,Lin ma:PAGE:A Partition Aware Graph Computation Engine,CIKM2013.

5.Yanfei Lv,Bin Cui,Xuexuan Chen,Jing Li:Hotness Aware Buffer Management for Flash based Hybrid Storage Systems,CIKM 2013.

6.TengfeiJi,Dongqing Yang,and Jun Gao.Incremental Local Evolutionary Outlier Detection for Dynamic Social Networks.In Proc of PKDD 2013.

7.Hongzhi Yin,Bin Cui,Hua Lu,Yuxin Huang and Junjie Yao:"A Unified Model for Stable and Temporal Topic Detection from Social Media Data",ICDE 2013.

8.Yanfei Lv,Xuexuan Chen,Guangyu Sun,Bin Cui:A Probabilistic Data Replacement Strategy for Flash-Based Hybrid Storage System.APWeb 2013:360-371.

9.Chen Chen,Hongzhi Yin,Junjie Yao,Bin Cui:TeRec:A Temporal Recommender System Over Tweet Stream,VLDB 2013(demo).

10.Dan Hao,Xu Zhao,Lu Zhang,Adaptive Test-Case Prioritization Guided by Output Inspectation,the 37th Annual International Computer Software and Applications Conference(COMPSAC 2013),22-26July2013,pages169-179,Tokyo,Japan.

11.Dan Hao,TianLan,Hongyu Zhang,Chao Guo,Lu Zhang,Is This a Bug or an Obsolete Test?the 27th European Conference on Object-Oriented Programming(ECOOP 2013),3-5 July 2013,pages 602-628,Montpellier,France.

12.Lingming Zhang,Dan Hao,Lu Zhang,Gregg Rothermel,Hong Mei,Bridging the Gap between the Total and Additional Test-Case Prioritization Strategies,the 35th International Conference on Software Engineering(ICSE 2013),18-26 May 2013,pages192-201,San Francisco,USA.

13.Bo Wang,Leonardo Passos,Yingfei Xiong,Krzysztof Czarnecki,Haiyan Zhao,Wei Zhang.Smart Fixer:Fixing Software Configurations based on Self-adaptive Priorities.In SPLC 13:Proceedings of 17th International Software Product Line

Conference,August2013.

14.Jun Li,Yingfei Xiong,Xuanzhe Liu,Lu Zhang.How Does Web Service API Evolution Affect Clients?.In ICWS 13:Proceedings of IEEE 20th International conference on Web Service(Application & Experience Track),June2013.

15.Runtime Model Based Management of Diverse Cloud Resources,Xiaodong Zhang,Xing Chen,Ying Zhang,Yihan Wu,Wei Yao,Gang Huang,ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems2013.

16.Qian Wu,Ling Wu,Guangtai Liang,Qianxiang Wang,Tao Xie,Hong Mei,Inferring Dependency Constraints on Parameters for Web Services,WWW2013.

17.Guangtai Liang,Qianxiang Wang,Tao Xie,Hong Mei,Inferring Project-Specific Bug Patterns for Detecting Sibling Bugs,FSE 2013.

18.Yiyang Hao,Ge Li,LiliMou,Lu Zhang and Zhi Jin,"MCT:A Tool for Commenting Program by Multimedia Comments",Proceedings of 35th International Conference on Software Engineering(ICSE 2013),(Formal Tool Demonstration),18-26 May

2013,pp.1339-1342.

19.Lingming Zhang,Lu Zhang and SarfrazKhurshid,"Injecting Mechanical Faults to Localize Developer Faults for Evolving Software"Proceedings of 28th Annual ACM SIGPLAN Conference on Object-Oriented Programming,Systems,Languges,

and Applications(OOPSLA 2013),(part of SPLASH 2013),October26-31,2013,pp.765-784.

20.Zhao Lu,Tian Liu,Ke Xu.Tractable Connected Domination for Restricted Bipartite Graphs(Extended Abstract).Proc.of COCOON,721-728,Springer,2013.(EI收录).

21.Min Lu,Tian Liu,Ke Xu.Independent Domination:Reductions from Circular-and Triad-Convex Bipartite Graphs to Convex Bipartite Graphs.Proc.of FAW-AAIM,142-152,Spinger,2013.(EI收录).

22.Zhao Lu,Min Lu,Tian Liu,Ke Xu.Circular Convex Bipartite Graphs:Feedback Vertex Set,Proc.of COCOA,272-283,2013.

23.Chaoyi Wang,Tian Liu,Ke Xu.Large Hypertree Width for Sparse Random Hypergraphs.Proc.of FAW-AAIM,294-302,Spinger,2013.(EI收录).

24.Zhao Lu,Min Lu,Tian Liu,Ke Xu.Circular Convex Bipartite Graphs:Feedback Vertex Set,Proc.of COCOA,to appear,2013.(EI收录).

25.Yanchun Sun,Hui Song,Wenpin Jiao.Using Architecture to Support the Collaborations in Software Maintenance.In the 25th International Conference on Software Engineering and Knowledge Engineering,Boston,USA,June27-29,2013.

26.Wenpin Jiao.Measurements for Adaptation Level and Efficiency of Adaptive Software Systems,2013 International Conference on Engineering of Complex Computer Systems,17-19 July 2013,Singapore.ICECCS 2013.pp.37-45.

27.Tingxun SHI,Ruizhi WANG,Daolan ZHANG,Wenpin JIAO,Bing XIE.Quality Driven Design of program Frameworks for Intelligent Sensor Applications.The 20th Asia-Pacific Software Engineering Conference(APSEC 2013),2-5 December2013,

Bangkok,Thailand.

28.Tingxun SHi,Ruizhi Wang,Daolan ZHang,Wenpin Jiao,Bing Xie.Analyzing Behavior Patterns of IoT-Oriented Intereetware s Components(Intelligent Sensors).The Fifth Asia-Pacific Aymposium on Internetware(Internetware2013),October23-24,

2013,Changsha,China.

29.Shaowei Cai,Kaile Su,Chuan luo:Improving WalkSAT for Random k-Satisfiability Problem with k>3.AAAI2013.

30.Guanfeng Lv,Kaile Su,Yanyan Xu:CacBDD:A BDD Package with Dynamic Cache Management.CAV2013:229-234.

31.Shaowei Cai,Kaile Su:Comprehensive Score:Towards Efficient Local Search for SAT with Long Clauses.IJCAI2013.

32.Chuan Luo,ShaoweiCai,Wei Wu and Kaile Su,Focused Random Walk with Configuration Checking and Break Minimum for Satisfiability,CP2013.

33.Wu,Z,Yu,L,Zhu,J,Sun,H,Guan,Zhi,Chen,Zheng,:A hybrid approach for privacy Preservation in Location based queries.In Gao,Y,Shim,K,Ding,Z,Jin,P,Ren,Z,Xiao,Y,Liu,A,Qiao,S,eds:WAIM Workshops.Volume7901of lecture Notes in Computer Science,Springer(2013)315-326.

34.Wu,Z,Yu,L,Sun,H,Guan,Z,Chen,Z:Authenticating Users of Recommender Systems Using Naive Bayes.eds:WISE 2013.Volume8180 of Lecture Notes in Computer Science,Springer(2013).

35.Qiuxiang Dong,Zhi Guan,Liang Wu,Zhong Chen:Fuzzy Keyword Search over Encrypted Data in the Public Key Setting.In WAIM2013.Volume7923,2013,pp729-740.

36.Liangwen Yu,Tao Yang,Zhengang Wu,Jiawei Zhu,Jianbin Hu,Zhong Chen:Sensitive Edges Protection in Social Networks.In WAIM 2013.Volume 7923,2013,pp564-569.

37.Y.Yang,Z.Guan,J.Zhu,Q.Dong,Z.Chen, Accelerating AES in JavaScript With WebGL,ICICS2013,LNCS8233,pp.275-287.Springer.

38.Bing Xie,Meng Li,Jing Jin,Junfeng Zhao,Yanzhen Zou Mining Cohesive Domain Topics from Source Code,ICSR2013,LNCS7925,pp.239-254,2013.

39.Yasha Wang,Jiangtao Wang,Yuxing Teng,Junfeng Zhao,STERS:A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network,SEKE2013.

40.Chengke Wang,Fengrun Yan,Yao Guo,Xiangqun Chen.Power Estimation for Mobile Applications with Profile Driven Battery Traces.ACM/IEEE International Symposium on Low Power Electronics and Design(ISLPED 13).

41.Pengfei Yuan,Yao Guo,Xiangqun Chen,Towards an Operating System for Campus,in submission,Internetware 13.

42.Haoyu Wang,Junjun Kong,Yao Guo and Xiangqun chen.Mobile Web Browser Optimizations in the Cloud Era:A Survey,IEEE Mobile Cloud 2013,San Francisco,CA,USA.

43.Lin Zhang,Yao Guo and Xiangqun,Chen,Patronus:Augmented Privacy Protection for Resource Publication in On-line Social Networks,IEEE Mobile Cloud 2013,San Francisco,CA,USA.

44.Yasha Wang,Jiangtao Wang,Xiaoyu Zhang,QTime:A Queuing-Time Notification System Based on Participatory Sensing Data,the 37thIEEE Conference on Computers,Software,and Applications(COMPSAC2013),2013.

45.Hanglong Zhan,Lianghuan Kang,Lantao Liu,Donggang Cao,"Scalable Resource Aggregation Service of an Erlang OTP Paas Platform",sose,pp.353-358,2013IEEE Seventh International Symposium on Service-Oriented System Engineering,2013.

46.Chun Liu,Wei Zhang,Haiyan Zhao,Zhi Jin:A Problem Oriented Approach to Modeling Feedback Loops for Self-Adaptive Software Systems.APSEC 2013:440-445.

47.Long Li,Haiyan Zhao,Wei Zhang,Weichao Wang,An Action-Stack Based Selective-Undo Methodin Feature Model Customization,ICSR2013:295-301.

48.Chun Liu,Wei Zhang,Haiyan Zhao and Zhi Jin,Analyzing Early Requirements of Cyber-Physical Systems Through STructure and Goal Modeling,APSEC2013.

49.Lili Mou,Ge Li,Zhi Jin,Domain Hyponymy Hierarchy Discovery by Iterative Web Searching and Inferable Semantics based Concept Selecting,Proceedings of IEEE 37th Annual Computer Software and Applicaions Conference(COMPSAC 2013):387-392,2013.

50.Bin Tin,Zhi Jin,Wei Zhang,Haiyan Zhao,Bo Wei,Finding Optimal Solution for Satisfying Non-Functional Requirements via 0-1 Proceedings of IEEE 37th Annual Computer Software and Applications Conference(COMPSAC 2013):415-424,2013.

51.Yangyang Lu,Ge Li,Zhi Jin,Xueyuan Xing,Yiyang Hao:A KnoWWare Based Infrastructure for Rule Based Control Systems in Smart Spaces.Proceedings of 13th International Conference on Software Reuse(ICSR 2013):289-294.

52.Xiaodong Zhang,Xing Chen,Ying Zhang,Yihan Wu,Wei Yao,Gang Huang Qiang Lin.Runtime Model Based Management of Diverse Cloud Resources.MODELS 2013:572-588.

53.Yun Ma,Xuanzhe Lin,Yihan Wu,Paul Grace:Model-Based Management of Service Composition.SOSE 2013:103-112.

54.Xudong Wang,Xuanzhe Liu,Gang Huang,Yunxin Liu.AppMobiCloud:Improving Mobile Web Applications by Mobile-Cloud Convergence.Internetware2013.

55.Zixiao Zhu,Yanzhen Zou,Yong Jin,Bing Xie.Automatically Generating API-usage Example for Project Developers.Internet Ware2013.

56.Yanzhen Zou,Changsheng Liu,Yong Jin,Bing Xie.Assessing Software Quality through Web Comment Search and Analysis.The 13th International Conference on Software Resue(ICSR 13),18-21 June,2013.pisa,Italy.LNCS7925,pp.208-223.

57.Jialiang Xie,Minghai Zhou,Audris Mockus.Impact of Triage:a Study of Mozilla and Gnome.ESEM 2013(Empirical Software Engineering and Measurement).Oct7-11.Baltimore,Maryland,USA.

58.Wei Chen,Tengjiao Wang,Dongqing Yang,Kai Lei and Yueqin Lin,Massively Parallel Learning of Bayesian Networks with Mapreduce for Factor Relationship Analysis,IJCNN2013.

59.Gaoyan Ou,Wei Chen,Tengjiao Wang,Dongqing Yang,Aspect-Specific Polarity-Aware Summarization ofOnline Reviews,WAIM2013.

60.Wei Xin,Zhi Guan,Tao Yang,Huiping Sun,Zhong Chen:An Efficient Preserving RFID Ownership Transfer Protocol.ApWeb 2013:538-549.

61.Wei Xin,Liangwen Yu,Yong Yang,Jian-bin Hu,Zhong Chen:MisDis:An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET.APWeb 2013:583-594.


四、中文期刊

1.周家帅,王琦,高军:"一中基于动态划分的MapReduce负载平衡方法”。计算机研究与发展。第50卷增刊2013年8月369-378。

2.王永刚,严寒冰,许俊峰,胡建斌,陈钟:"垃圾标签的抵御方法研究",计算机研究与发展,2013:50(10).

3.张颖,黄罡,刘旋哲,梅宏,李影,杨顺祥:“一种支持Java应用中计算按需远程执行的方法”,软件学报,2013。

4.陈星,张颖,张晓东,武义涵,黄罡,梅宏:"基于模型的云基础设施按需管理方法与支撑框架",软件学报,2013.

5. 吴凌,梁广泰,王千祥CEclipse:一个基于服务组合的在线集成开发环境,计算机研究与发展,2013。

6.何啸,麻志毅,王瑞超,邵维忠:语义可配置的模型转换.软件学报,2013,24(7):1436-1454.

7.宋晖,黄罡,武义涵,孙艳春,邵维忠,梅宏:运行时软件体系结构的建模与维护.软件学报,2013,24(8):1731-1745.

8.张伟,赵海燕:软件可信性与自适应软件随想.中国计算机学会通讯,2013,9(6):8-13.

9.梅宏,郭耀:"面向网络的操作系统----现状和挑战".中国科学信息科学,2013,43(3):303-321.

10.孔俊俊,郭耀,陈向群,邵维忠:"一种基于智能物体的物联网系统及应用开发方法".计算机研究与发展.2013,50(6):1198-1209.

11.康亮环,曹东刚:Conentity:一种基于进程的自主并发实体编程模型及其实现,中国科学:信息科学,43(1):126-142.

12.易立,赵海燕,张伟,金芝,梅宏:"特征模型融合研究浅析,计算机学报.2013.第2期,1-12.

13.李龙,赵海燕,张伟:"特征模型定制的一种自动传播策略与选择性回退机制,计算机学报.2013.第2期,1-130.

14.王波,赵海燕,张伟,金芝,梅宏:”问题驱动的需求捕获中问题分析与解决技术研究“,计算机研究与发展,50(7):1513-1523,2013.

15.魏强,金芝,李戈,李力行:"物联网服务发现初探:传统SOA的可行性和局限性“,计算机科学与探索,7(2):97-113,2013。

16.易立,赵海燕,张伟,金芝,梅宏:"特征模型融合研究",计算机学报,36(1):1-9,2013.

17.尹斌,金芝,李智:"问题框架方法的可靠性关注点及系统可靠性增强模式,计算机学报,36(1):74-87,2013.

18.赵祺,刘旋哲,王旭东,黄罡,梅宏:"一种面向富客户端应用的运行时自适应中间件.软件学报,2013,24(7):1419-1435.

19.何啸,麻志毅,邵伟忠:"语义可配置的模型转换".软件学报,2013,24(7):1436-1454.

20.王梓又,周明辉,梅宏:"一种动态的客户端负载均衡机制".中国科学:信息科学,2013,43:60-72,doi:10.1360/112012-462.

21.吴良,黄威靖,陈薇,王腾蛟,雷凯:"ACT-LDA:集成话题发现、社区发现和影响力分析的概率模型”,计算机科学与探索,2013,第7卷10期.

22.高军,杨冬青:"基于可扩展计算平台的大图数据管理,科研信息化技术与应用2013,vol.4 Issue 1:49-56.

23.高振龙,李红燕,苗高杉,雷凯,王腾蛟,CUU:“大规模时空数据区域查询更新策略。计算机科学与探索,2013,第7卷10期。

24.牟雁超,苏汉宸,程序,李红燕,王腾蛟,ASIC:"一种适用于云数据管理的自适应辅助索引机制”。计算机科学与探索,2013,第7卷10期。


五、国内会议

1.徐赢,崔斌:查询性能预测方法的性能评测研究,NDBC 2013.

2.杨楠,吴凌,王千祥,POIDE-PHP:支持PHP应用的在线集成开发环境,NASAC 2013.

3.金靖,李萌,赵俊峰,谢冰,基于时间序列分析的LDA和静态分析的代码功能识别方法,技术机工程与应用,2013VO1.49(15):27-31.

4.宋怀达,李萌,赵俊峰,金靖,谢冰,OKQA:"一个基于本体的软件开发知识QA工具,计算机工程与应用,2013 Vo1.49(16):30-34.

5.华哲邦,李萌,赵俊峰,谢冰:"基于时间序列分析的Web Service Qos预测方法“。计算机科学与探索,2013,第3卷218-226。

6.陈德健,孙艳春,黄罡,张颖:"基于操作记录与回放技术的Eclipse操作远程同步教学工具”。计算机工程与应用,2013,Vol.49(6):65-71.

7.陈德健,孙艳春,黄罡:“Smart SEP:基于Web图形操作记录与回放的在线同步教学平台,被NASAC2013会议录用,并被推荐到计算机科学发表。

8.庄希威,孙艳春,黄罡:"一种基于社交网络服务的mashup连接子的设计与实现”。被NASAC2013会议录用,并被推荐到计算机科学发表。

9.国风,孔俊俊,郭耀,陈向群:“一种智能手机上下文信息获取的代价模型及其应用”。NASAC 13。

10.陆璇,马郓,王旭东,刘旋哲:"一种数据驱动的服务构件组装推荐技术"。全国软件与应用大会.

11.方译萌,马郓,朱晓,刘旋哲,黄罡:"MobiTran:一种面向智能手机的PC版Web应用转化技术“。全国软件与应用大会。

12.陈萧宇,刘旋哲,黄罡,张颖:"Scratch:一个基于Chrome浏览器的用户操作捕捉与回放工具。全国软件与应用大会。

13.郭颖,陈峰宏,周明辉:"一种大规模代码克隆的检测方法".中国计算机大会(并推荐到计算机科学与探索杂志)。