An Efficient Bounded Model Checking Approach for Web Service Composition
暂无分享,去创建一个
Hongwei Jiang | Jingjing Hu | Chen Liu | Wencong Han | Dongyan Ma | Yuanzhang Li | Hongwei Jiang | Jingjing Hu | Wencong Han | Chen Liu | Yuan-zhang Li | Dongyan Ma
[1] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[2] Eunhee Kim,et al. Bounded Model Checking of Hybrid Systems for Control , 2015, IEEE Transactions on Automatic Control.
[3] Li Yang,et al. A trust-based collaborative filtering algorithm for E-commerce recommendation system , 2018, Journal of Ambient Intelligence and Humanized Computing.
[4] Lucas C. Cordeiro,et al. ESBMC-GPU A context-bounded model checking tool to verify CUDA programs , 2018, Sci. Comput. Program..
[5] Dongqing Xie,et al. DF Relaying Networks With Randomly Distributed Interferers , 2017, IEEE Access.
[6] Brij B. Gupta,et al. Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT , 2018, IEEE Access.
[7] Yu Xue,et al. Efficient business process consolidation: combining topic features with structure matching , 2016, Soft Comput..
[8] Alvaro Soria,et al. AI-based Web Service Composition: A Review , 2016 .
[9] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[10] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[11] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[12] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[13] Bożena Woźna-Szcześniak,et al. SAT-based Bounded Model Checking for Weighted Deontic Interpreted Systems , 2016 .
[14] Liehuang Zhu,et al. Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things , 2019, IEEE Access.
[15] Maryam Omid,et al. Context-Aware Web Service Composition based on AI Planning , 2017, Appl. Artif. Intell..
[16] Xiaojiang Du,et al. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.
[17] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[18] Ji Wang,et al. Counterexample-Preserving Reduction for Symbolic Model Checking , 2013, ICTAC.
[19] Lijun Wu,et al. Symbolic model checking for discrete real-time systems , 2017, Science China Information Sciences.
[20] Manuel Mucientes,et al. An Integrated Semantic Web Service Discovery and Composition Framework , 2015, IEEE Transactions on Services Computing.
[21] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[22] Ruimao Zhang,et al. Cost-Effective Active Learning for Deep Image Classification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[23] Jinqiao Shi,et al. Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.
[24] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[25] Jie Wu,et al. Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..
[26] Bixin Li,et al. Incremental Verification of Evolving BPEL-Based Web Composite Service , 2016 .
[27] Qing Wang,et al. Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..
[28] Albert Y. Zomaya,et al. A Survey of Mobile Device Virtualization , 2016, ACM Comput. Surv..
[29] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[30] Mianxiong Dong,et al. FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[31] Chen Liang,et al. Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.
[32] Changzhen Hu,et al. Hybrid Recommendation Algorithm Based on Latent Factor Model and PersonalRank , 2018 .
[33] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[34] Yu Zhang,et al. Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..
[35] Yue Zhang,et al. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..
[36] Yuanzhang Li,et al. DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[37] Jan van Eijck,et al. Symbolic model checking for Dynamic Epistemic Logic - S5 and beyond , 2018, J. Log. Comput..
[38] Ching-Hsien Hsu,et al. Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler , 2017, J. Syst. Archit..
[39] Zhang Changyou,et al. Proactive service selection based on acquaintance model and LS-SVM , 2016 .
[40] Michael Leuschel,et al. Proof assisted bounded and unbounded symbolic model checking of software and system models , 2017, Sci. Comput. Program..
[41] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[42] Kais Klai,et al. On the Verification of Opacity in Web Services and Their Composition , 2017, IEEE Transactions on Services Computing.
[43] Yu Xue,et al. Approximate normalized cuts without Eigen-decomposition , 2016, Inf. Sci..
[44] Jing Zhang,et al. Automatic Combination Technology of Fuzzy CPN for OWL-S Web Services in Supercomputing Cloud Platform , 2017, Int. J. Pattern Recognit. Artif. Intell..
[45] Jing Guo,et al. Efficient encoding for bounded model checking of timed automata , 2017 .