Volume 21,Issue 2,2010 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 可信软件的构造与演化分析专刊前言
  • **王怀民
  • 2010,21(2):177-178 [Abstract(7474)]  [View PDF(5745)233.26 K]
  • High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
  • LU Xi-Cheng,LI Gen,LU Kai and ZHANG Ying
  • 2010,21(2):179-193 [Abstract(7349)]  [View PDF(5857)1.76 M]
  • Resource-Aware Performance Diagnostic Method for Web Applications
  • WANG Wei,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2010,21(2):194-208 [Abstract(7234)]  [View PDF(6725)1.44 M]
  • Path Sensitive Static Defect Detecting Method
  • XIAO Qing,GONG Yun-Zhan,YANG Zhao-Hong,JIN Da-Hai and WANG Ya-Wen
  • 2010,21(2):209-217 [Abstract(6948)]  [View PDF(5734)745.49 K]
  • Scalable Time-Based Multi-Cycle Checkpointing
  • CI Yi-Wei,ZHANG Zhan,ZUO De-Cheng,WU Zhi-Bo and YANG Xiao-Zong
  • 2010,21(2):218-230 [Abstract(7485)]  [View PDF(4407)1016.67 K]
  • Fault Diagnosis and Handling for Service Composition Based on Petri Nets
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2010,21(2):231-247 [Abstract(9744)]  [View PDF(12117)1.21 M]
  • Failure Diagnosis of Internetware Systems Using Dynamic Description Logic
  • WANG Zhu-Xiao,YANG Kun and SHI Zhong-Zhi
  • 2010,21(2):248-260 [Abstract(6666)]  [View PDF(5427)1.03 M]
  • Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition
  • ZENG Jin,SUN Hai-Long,LIU Xu-Dong,DENG Ting and HUAI Jin-Peng
  • 2010,21(2):261-276 [Abstract(7365)]  [View PDF(8594)1.44 M]
  • Service-Oriented Reliable Multimedia Delivery Algorithm
  • ZHANG Sheng,QIAN Zhu-Zhong and LU Sang-Lu
  • 2010,21(2):277-286 [Abstract(6730)]  [View PDF(4850)1.03 M]
  • Approach to Transforming UML Model to Reliability Analysis Model
  • LIU Yi,MA Zhi-Yi,HE Xiao and HAO Wei-Zhong
  • 2010,21(2):287-304 [Abstract(6331)]  [View PDF(6359)2.60 M]
  • Construction and Certification of a Bytecode Virtual Machine
  • DONG Yuan,REN Kai,WANG Sheng-Yuan and ZHANG Su-Qin
  • 2010,21(2):305-317 [Abstract(6012)]  [View PDF(5448)945.12 K]
  • Construction Techniques of Anticipatory Monitors for Parameterized LTL
  • ZHAO Chang-Zhi,DONG Wei,SUI Ping and QI Zhi-Chang
  • 2010,21(2):318-333 [Abstract(6007)]  [View PDF(4264)1.06 M]
  • Pointer Logic Dealing with Uncertain Equality of Pointers
  • LIANG Hong-Jin,ZHANG Yu,CHEN Yi-Yun,LI Zhao-Peng and HUA Bao-Jian
  • 2010,21(2):334-343 [Abstract(7718)]  [View PDF(4280)701.30 K]
  • Model and Quantification of Autonomic Dependability of Mission-Critical Systems
  • WANG Hui-Qiang,Lü Hong-Wu,ZHAO Qian,DONG Xi-Kun and FENG Guang-Sheng
  • 2010,21(2):344-358 [Abstract(6016)]  [View PDF(5095)1.01 M]
  • Framework Supporting Software Assets Evaluation on Trustworthiness
  • CAI Si-Bo,ZOU Yan-Zhen,SHAO Ling-Shuang,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):359-372 [Abstract(6344)]  [View PDF(5735)1.00 M]
  • Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM
  • GU Liang,GUO Yao,WANG Hua,ZOU Yan-Zhen,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):373-387 [Abstract(6170)]  [View PDF(7778)1.10 M]
  • Reputation-Based Recommender Discovery Approach for Service Selection
  • PAN Jing,XU Feng and Lü Jian
  • 2010,21(2):388-400 [Abstract(6919)]  [View PDF(6321)1.18 M]