Special Issue: Software Systems
|  Schwoon S. Model-checking pushdown systems[Ph.D. Thesis]. Department of Computer Science, Technische Universität München, 2002.
 Suwimonteerabuth D, Berger F, Schwoon S, Esparza J. jMoped:A test environment for Java programs. In Proc. the 33rd International Conference on Computer-Aided Verification, July 2017, pp.164-167.
 Ball T, Rajamani S K. The SLAM project:Debugging system software via static analysis. In Proc. the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2002, pp.1-3.
 Reps T W, Schwoon S, Jha S, Melski D. Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program., 2005, 58(1/2):206-263.
 Song F, Touili T. PuMoC:A CTL model-checker for sequential programs. In Proc. the 27th IEEE/ACM International Conference on Automated Software Engineering, September 2012, pp.346-349.
 Hague M, Ong C H L. Analysing mu-calculus properties of pushdown systems. In Proc. the 17th International SPIN Workshop on Model Checking Software, September 2010, pp.187-192.
 Bouajjani A, Müller-Olm M, Touili T. Regular symbolic analysis of dynamic networks of pushdown systems. In Proc. the 16th International Conference on Concurrency Theory, August 2005, pp.473-487.
 Cai X J, Ogawa M. Well-structured pushdown systems. In Proc. the 24th International Conference on Concurrency Theory, August 2013, pp.121-136.
 Abdulla P A, Atig M F, Stenman J. Dense-timed pushdown automata. In Proc. the 27th Annual IEEE Symposium on Logic in Computer Science, June 2012, pp.35-44.
 Abdulla P A, Atig M F, Stenman J. Computing optimal reachability costs in priced dense-timed pushdown automata. In Proc. the 8th International Conference Language and Automata Theory and Applications, March 2014, pp.62-75.
 Esparza J, Kucera A, Schwoon S. Model-checking LTL with regular valuations for pushdown systems. In Proc. the 4th International Symposium on Theoretical Aspects of Computer Software, October 2001, pp.316-339.
 Li X, Ogawa M. Conditional weighted pushdown systems and applications. In Proc. the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, January 2010, pp.141-150.
 Minamide Y, Mori S. Reachability analysis of the HTML5 parser specification and its application to compatibility testing. In Proc. the 18th International Symposium on Formal Methods, August 2012, pp.293-307.
 Johnson J I, Sergey I, Earl C, Might M, van Horn D. Pushdown flow analysis with abstract garbage collection. Journal of Functional Programming, 2014, 24(2/3):218-283.
 Nitta N, Takata Y, Seki H. An efficient security verification method for programs with stack inspection. In Proc. the 8th ACM Conference on Computer and Communications Security, November 2001, pp.68-77.
 Shivers O G. Control-flow analysis of higher order languages or taming lambda[Ph.D. Thesis]. Carnegie Mellon University, 1991.
 Bravenboer M, Smaragdakis Y. Strictly declarative specification of sophisticated points-to analyses. In Proc. the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, October 2009, pp.243-262.
 Lhoták O, Hendren L. Context-sensitive points-to analysis:Is it worth it? In Proc. the 15th International Conference on Compiler Construction, March 2006, pp.47-64.
 Thanh H V L, Li X. An on-the-fly algorithm for conditional weighted pushdown systems. Journal of Information Processing, 2014, 22(4):1-7.
 Uezato Y, Minamide Y. Pushdown systems with stack manipulation. In Proc. the 11th International Symposium on Automated Technology for Verification and Analysis, October 2013, pp.412-426.
 Song F, Miao W K, Pu G G, Zhang M. On reachability analysis of pushdown systems with transductions:Application to Boolean programs with call-by-reference. In Proc. the 26th International Conference on Concurrency Theory, September 2015, pp.383-397.
 Esparza J, Ganty P. Complexity of pattern-based verification for multithreaded programs. In Proc. the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2011, pp.499-510.
|||Que-Ping Kong, Zi-Yan Wang, Yuan Huang, Xiang-Ping Chen, Xiao-Cong Zhou, Zi-Bin Zheng, and Gang Huang. Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts [J]. Journal of Computer Science and Technology, 2022, 37(1): 67-82.|
|||Feng Wang, Guo-Jie Luo, Guang-Yu Sun, Yu-Hao Wang, Di-Min Niu, Hong-Zhong Zheng. Area Efficient Pattern Representation of Binary Neural Networks on RRAM [J]. Journal of Computer Science and Technology, 2021, 36(5): 1155-1166.|
|||Zeynep Banu Ozger, Nurgul Yuzbasioglu Uslu. An Effective Discrete Artificial Bee Colony Based SPARQL Query Path Optimization by Reordering Triples [J]. Journal of Computer Science and Technology, 2021, 36(2): 445-462.|
|||Bin-Bin Liu, Wei Dong, Jia-Xin Liu, Ya-Ting Zhang, Dai-Yan Wang. ProSy: API-Based Synthesis with Probabilistic Model [J]. Journal of Computer Science and Technology, 2020, 35(6): 1234-1257.|
|||Dong Liu, Zhi-Lei Ren, Zhong-Tian Long, Guo-Jun Gao, He Jiang. Mining Design Pattern Use Scenarios and Related Design Pattern Pairs: A Case Study on Online Posts [J]. Journal of Computer Science and Technology, 2020, 35(5): 963-978.|
|||Monidipa Das, Soumya K. Ghosh. Data-Driven Approaches for Spatio-Temporal Analysis: A Survey of the State-of-the-Arts [J]. Journal of Computer Science and Technology, 2020, 35(3): 665-696.|
|||Wen-Yan Chen, Ke-Jiang Ye, Cheng-Zhi Lu, Dong-Dai Zhou, Cheng-Zhong Xu. Interference Analysis of Co-Located Container Workloads: A Perspective from Hardware Performance Counters [J]. Journal of Computer Science and Technology, 2020, 35(2): 412-417.|
|||Jiu-Ru Gao, Wei Chen, Jia-Jie Xu, An Liu, Zhi-Xu Li, Hongzhi Yin, Lei Zhao. An Efficient Framework for Multiple Subgraph Pattern Matching Models [J]. Journal of Computer Science and Technology, 2019, 34(6): 1185-1202.|
|||Zhe Liu, Cheng-Jian Qiu, Yu-Qing Song, Xiao-Hong Liu, Juan Wang, Victor S. Sheng. Texture Feature Extraction from Thyroid MR Imaging Using High-Order Derived Mean CLBP [J]. Journal of Computer Science and Technology, 2019, 34(1): 35-46.|
|||Aakash Ahmad, Claus Pahl, Ahmed B. Altamimi, Abdulrahman Alreshidi. Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures [J]. Journal of Computer Science and Technology, 2018, 33(6): 1278-1306.|
|||Xin Xu, Jiaheng Lu, Wei Wang. Hierarchical Clustering of Complex Symbolic Data and Application for Emitter Identification [J]. , 2018, 33(4): 807-822.|
|||Lei Guo, Yu-Fei Wen, Xin-Hua Wang. Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks [J]. , 2018, 33(4): 682-696.|
|||Guo-Wei Wang, Jin-Dou Zhang, Jing Li. Complete Your Mobility: Linking Trajectories Across Heterogeneous Mobility Data Sources [J]. , 2018, 33(4): 792-806.|
|||Guochen Cai, Kyungmi Lee, Ickjai Lee. Mining Semantic Trajectory Patterns from Geo-Tagged Data [J]. , 2018, 33(4): 849-862.|
|||Shi-Ming Guo, Hong Gao. HUITWU: An Efficient Algorithm for High-Utility Itemset Mining in Transaction Databases [J]. , 2016, 31(4): 776-786.|