Volume 21,Issue 2,2010 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 可信软件的构造与演化分析专刊前言
  • **王怀民
  • 2010,21(2):177-178 [Abstract(7393)]  [View PDF(5700)233.26 K]
  • High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
  • LU Xi-Cheng,LI Gen,LU Kai and ZHANG Ying
  • 2010,21(2):179-193 [Abstract(7206)]  [View PDF(5781)1.76 M]
  • Resource-Aware Performance Diagnostic Method for Web Applications
  • WANG Wei,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2010,21(2):194-208 [Abstract(7130)]  [View PDF(6689)1.44 M]
  • Path Sensitive Static Defect Detecting Method
  • XIAO Qing,GONG Yun-Zhan,YANG Zhao-Hong,JIN Da-Hai and WANG Ya-Wen
  • 2010,21(2):209-217 [Abstract(6810)]  [View PDF(5691)745.49 K]
  • Scalable Time-Based Multi-Cycle Checkpointing
  • CI Yi-Wei,ZHANG Zhan,ZUO De-Cheng,WU Zhi-Bo and YANG Xiao-Zong
  • 2010,21(2):218-230 [Abstract(7346)]  [View PDF(4344)1016.67 K]
  • Fault Diagnosis and Handling for Service Composition Based on Petri Nets
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2010,21(2):231-247 [Abstract(9514)]  [View PDF(12065)1.21 M]
  • Failure Diagnosis of Internetware Systems Using Dynamic Description Logic
  • WANG Zhu-Xiao,YANG Kun and SHI Zhong-Zhi
  • 2010,21(2):248-260 [Abstract(6554)]  [View PDF(5371)1.03 M]
  • Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition
  • ZENG Jin,SUN Hai-Long,LIU Xu-Dong,DENG Ting and HUAI Jin-Peng
  • 2010,21(2):261-276 [Abstract(7237)]  [View PDF(8552)1.44 M]
  • Service-Oriented Reliable Multimedia Delivery Algorithm
  • ZHANG Sheng,QIAN Zhu-Zhong and LU Sang-Lu
  • 2010,21(2):277-286 [Abstract(6597)]  [View PDF(4813)1.03 M]
  • Approach to Transforming UML Model to Reliability Analysis Model
  • LIU Yi,MA Zhi-Yi,HE Xiao and HAO Wei-Zhong
  • 2010,21(2):287-304 [Abstract(6218)]  [View PDF(6306)2.60 M]
  • Construction and Certification of a Bytecode Virtual Machine
  • DONG Yuan,REN Kai,WANG Sheng-Yuan and ZHANG Su-Qin
  • 2010,21(2):305-317 [Abstract(5893)]  [View PDF(5412)945.12 K]
  • Construction Techniques of Anticipatory Monitors for Parameterized LTL
  • ZHAO Chang-Zhi,DONG Wei,SUI Ping and QI Zhi-Chang
  • 2010,21(2):318-333 [Abstract(5894)]  [View PDF(4220)1.06 M]
  • Pointer Logic Dealing with Uncertain Equality of Pointers
  • LIANG Hong-Jin,ZHANG Yu,CHEN Yi-Yun,LI Zhao-Peng and HUA Bao-Jian
  • 2010,21(2):334-343 [Abstract(7580)]  [View PDF(4245)701.30 K]
  • Model and Quantification of Autonomic Dependability of Mission-Critical Systems
  • WANG Hui-Qiang,Lü Hong-Wu,ZHAO Qian,DONG Xi-Kun and FENG Guang-Sheng
  • 2010,21(2):344-358 [Abstract(5874)]  [View PDF(5049)1.01 M]
  • Framework Supporting Software Assets Evaluation on Trustworthiness
  • CAI Si-Bo,ZOU Yan-Zhen,SHAO Ling-Shuang,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):359-372 [Abstract(6194)]  [View PDF(5677)1.00 M]
  • Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM
  • GU Liang,GUO Yao,WANG Hua,ZOU Yan-Zhen,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):373-387 [Abstract(6000)]  [View PDF(7663)1.10 M]
  • Reputation-Based Recommender Discovery Approach for Service Selection
  • PAN Jing,XU Feng and Lü Jian
  • 2010,21(2):388-400 [Abstract(6798)]  [View PDF(6285)1.18 M]