Volume 21,Issue 2,2010 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 可信软件的构造与演化分析专刊前言
  • **王怀民
  • 2010,21(2):177-178 [Abstract(8083)]  [View PDF(6120)233.26 K]
  • High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
  • LU Xi-Cheng,LI Gen,LU Kai and ZHANG Ying
  • 2010,21(2):179-193 [Abstract(8393)]  [View PDF(6429)1.76 M]
  • Resource-Aware Performance Diagnostic Method for Web Applications
  • WANG Wei,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2010,21(2):194-208 [Abstract(8096)]  [View PDF(7205)1.44 M]
  • Path Sensitive Static Defect Detecting Method
  • XIAO Qing,GONG Yun-Zhan,YANG Zhao-Hong,JIN Da-Hai and WANG Ya-Wen
  • 2010,21(2):209-217 [Abstract(7991)]  [View PDF(6196)745.49 K]
  • Scalable Time-Based Multi-Cycle Checkpointing
  • CI Yi-Wei,ZHANG Zhan,ZUO De-Cheng,WU Zhi-Bo and YANG Xiao-Zong
  • 2010,21(2):218-230 [Abstract(8368)]  [View PDF(4789)1016.67 K]
  • Fault Diagnosis and Handling for Service Composition Based on Petri Nets
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2010,21(2):231-247 [Abstract(10947)]  [View PDF(12629)1.21 M]
  • Failure Diagnosis of Internetware Systems Using Dynamic Description Logic
  • WANG Zhu-Xiao,YANG Kun and SHI Zhong-Zhi
  • 2010,21(2):248-260 [Abstract(7501)]  [View PDF(6016)1.03 M]
  • Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition
  • ZENG Jin,SUN Hai-Long,LIU Xu-Dong,DENG Ting and HUAI Jin-Peng
  • 2010,21(2):261-276 [Abstract(8407)]  [View PDF(9267)1.44 M]
  • Service-Oriented Reliable Multimedia Delivery Algorithm
  • ZHANG Sheng,QIAN Zhu-Zhong and LU Sang-Lu
  • 2010,21(2):277-286 [Abstract(7630)]  [View PDF(5288)1.03 M]
  • Approach to Transforming UML Model to Reliability Analysis Model
  • LIU Yi,MA Zhi-Yi,HE Xiao and HAO Wei-Zhong
  • 2010,21(2):287-304 [Abstract(7115)]  [View PDF(6707)2.60 M]
  • Construction and Certification of a Bytecode Virtual Machine
  • DONG Yuan,REN Kai,WANG Sheng-Yuan and ZHANG Su-Qin
  • 2010,21(2):305-317 [Abstract(6761)]  [View PDF(5786)945.12 K]
  • Construction Techniques of Anticipatory Monitors for Parameterized LTL
  • ZHAO Chang-Zhi,DONG Wei,SUI Ping and QI Zhi-Chang
  • 2010,21(2):318-333 [Abstract(6826)]  [View PDF(4716)1.06 M]
  • Pointer Logic Dealing with Uncertain Equality of Pointers
  • LIANG Hong-Jin,ZHANG Yu,CHEN Yi-Yun,LI Zhao-Peng and HUA Bao-Jian
  • 2010,21(2):334-343 [Abstract(8790)]  [View PDF(4632)701.30 K]
  • Model and Quantification of Autonomic Dependability of Mission-Critical Systems
  • WANG Hui-Qiang,Lü Hong-Wu,ZHAO Qian,DONG Xi-Kun and FENG Guang-Sheng
  • 2010,21(2):344-358 [Abstract(6894)]  [View PDF(5569)1.01 M]
  • Framework Supporting Software Assets Evaluation on Trustworthiness
  • CAI Si-Bo,ZOU Yan-Zhen,SHAO Ling-Shuang,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):359-372 [Abstract(7377)]  [View PDF(6343)1.00 M]
  • Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM
  • GU Liang,GUO Yao,WANG Hua,ZOU Yan-Zhen,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):373-387 [Abstract(7135)]  [View PDF(8598)1.10 M]
  • Reputation-Based Recommender Discovery Approach for Service Selection
  • PAN Jing,XU Feng and Lü Jian
  • 2010,21(2):388-400 [Abstract(7774)]  [View PDF(6739)1.18 M]