• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Requirements Engineering Under the Background of Artificial Intelligence Preface#br#
Liu Lin, Li Zhi
2021, 58(4): 681-682. DOI: 10.7544/issn1000-1239.2021.qy0401
Abstract PDF
Intelligent Requirements Elicitation and Modeling: A Literature Review
Wang Ye, Chen Junwu, Xia Xin, Jiang Bo
2021, 58(4): 683-705. DOI: 10.7544/issn1000-1239.2021.20200740
Abstract PDF
An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese
Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng
2021, 58(4): 706-730. DOI: 10.7544/issn1000-1239.2021.20200757
Abstract PDF
An Approach for Improving the Requirements Quality of User Stories
Wang Chunhui, Jin Zhi, Zhao Haiyan, Cui Muyuan
2021, 58(4): 731-748. DOI: 10.7544/issn1000-1239.2021.20200732
Abstract PDF
A User Requirements Preference Analysis Method of Mobile Applications Based on Meta-Path Embedding
Song Rui, LiTong, Dong Xin, Ding Zhiming
2021, 58(4): 749-762. DOI: 10.7544/issn1000-1239.2021.20200737
Abstract PDF
Automatic Trend Analysis of Mobile App Updates Based on App Changelogs
Zhong Renyi, WangChong, Liang Peng, Luo Zhong
2021, 58(4): 763-776. DOI: 10.7544/issn1000-1239.2021.20200756
Abstract PDF
Enhancing Requirements Traceability Recovery via a Graph Mining-Based Expansion Learning
Chen Lei, Wang Dandan, Wang Qing, Shi Lin
2021, 58(4): 777-793. DOI: 10.7544/issn1000-1239.2021.20200733
Abstract PDF
A Survey of Cache-Based Side Channel Countermeasure
Wang Chong, Wei Shuai, Zhang Fan, Song Ke
2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
Abstract PDF
Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
Niu Shufen, Xie Yaya, Yang Pingping, Du Xiaoni
2021, 58(4): 811-821. DOI: 10.7544/issn1000-1239.2021.20200041
Abstract PDF
A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment
Pan Yuting, Lin Li
2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183
Abstract PDF
A Runtime Information Based Defense Technique for Ethereum Smart Contract
Xiang Jie, Yang Zhemin, Zhou Shunfan, Yang Min
2021, 58(4): 834-848. DOI: 10.7544/issn1000-1239.2021.20200135
Abstract PDF
Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling
Qu Lingfeng, He Hongjie, Chen Fan, Zhang Shanjun
2021, 58(4): 849-861. DOI: 10.7544/issn1000-1239.2021.20200011
Abstract PDF
A Survey on Graph Processing Accelerators
Yan Mingyu, Li Han, Deng Lei, Hu Xing, Ye Xiaochun, Zhang Zhimin, Fan Dongrui, Xie Yuan
2021, 58(4): 862-887. DOI: 10.7544/issn1000-1239.2021.20200110
Abstract PDF
A Consistent Hash Data Placement Algorithm Based on Stripe
Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing
2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
Abstract PDF