Advanced Search

    column
    Requirements Engineering Under the Background of Artificial Intelligence Preface#br#
    Liu Lin, Li Zhi
    2021, 58(4): 681-682. DOI: 10.7544/issn1000-1239.2021.qy0401
    Abstract PDF
    Intelligent Requirements Elicitation and Modeling: A Literature Review
    Wang Ye, Chen Junwu, Xia Xin, Jiang Bo
    2021, 58(4): 683-705. DOI: 10.7544/issn1000-1239.2021.20200740
    Abstract PDF
    An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese
    Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng
    2021, 58(4): 706-730. DOI: 10.7544/issn1000-1239.2021.20200757
    Abstract PDF
    An Approach for Improving the Requirements Quality of User Stories
    Wang Chunhui, Jin Zhi, Zhao Haiyan, Cui Muyuan
    2021, 58(4): 731-748. DOI: 10.7544/issn1000-1239.2021.20200732
    Abstract PDF
    A User Requirements Preference Analysis Method of Mobile Applications Based on Meta-Path Embedding
    Song Rui, LiTong, Dong Xin, Ding Zhiming
    2021, 58(4): 749-762. DOI: 10.7544/issn1000-1239.2021.20200737
    Abstract PDF
    Automatic Trend Analysis of Mobile App Updates Based on App Changelogs
    Zhong Renyi, WangChong, Liang Peng, Luo Zhong
    2021, 58(4): 763-776. DOI: 10.7544/issn1000-1239.2021.20200756
    Abstract PDF
    Enhancing Requirements Traceability Recovery via a Graph Mining-Based Expansion Learning
    Chen Lei, Wang Dandan, Wang Qing, Shi Lin
    2021, 58(4): 777-793. DOI: 10.7544/issn1000-1239.2021.20200733
    Abstract PDF
    A Survey of Cache-Based Side Channel Countermeasure
    Wang Chong, Wei Shuai, Zhang Fan, Song Ke
    2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    Abstract PDF
    Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
    Niu Shufen, Xie Yaya, Yang Pingping, Du Xiaoni
    2021, 58(4): 811-821. DOI: 10.7544/issn1000-1239.2021.20200041
    Abstract PDF
    A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment
    Pan Yuting, Lin Li
    2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183
    Abstract PDF
    A Runtime Information Based Defense Technique for Ethereum Smart Contract
    Xiang Jie, Yang Zhemin, Zhou Shunfan, Yang Min
    2021, 58(4): 834-848. DOI: 10.7544/issn1000-1239.2021.20200135
    Abstract PDF
    Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling
    Qu Lingfeng, He Hongjie, Chen Fan, Zhang Shanjun
    2021, 58(4): 849-861. DOI: 10.7544/issn1000-1239.2021.20200011
    Abstract PDF
    A Survey on Graph Processing Accelerators
    Yan Mingyu, Li Han, Deng Lei, Hu Xing, Ye Xiaochun, Zhang Zhimin, Fan Dongrui, Xie Yuan
    2021, 58(4): 862-887. DOI: 10.7544/issn1000-1239.2021.20200110
    Abstract PDF
    A Consistent Hash Data Placement Algorithm Based on Stripe
    Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing
    2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    Abstract PDF