Volume 21,Issue 2,2010 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 可信软件的构造与演化分析专刊前言
  • **王怀民
  • 2010,21(2):177-178 [Abstract(7641)]  [View PDF(5824)233.26 K]
  • High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
  • LU Xi-Cheng,LI Gen,LU Kai and ZHANG Ying
  • 2010,21(2):179-193 [Abstract(7620)]  [View PDF(6005)1.76 M]
  • Resource-Aware Performance Diagnostic Method for Web Applications
  • WANG Wei,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2010,21(2):194-208 [Abstract(7449)]  [View PDF(6802)1.44 M]
  • Path Sensitive Static Defect Detecting Method
  • XIAO Qing,GONG Yun-Zhan,YANG Zhao-Hong,JIN Da-Hai and WANG Ya-Wen
  • 2010,21(2):209-217 [Abstract(7223)]  [View PDF(5826)745.49 K]
  • Scalable Time-Based Multi-Cycle Checkpointing
  • CI Yi-Wei,ZHANG Zhan,ZUO De-Cheng,WU Zhi-Bo and YANG Xiao-Zong
  • 2010,21(2):218-230 [Abstract(7736)]  [View PDF(4507)1016.67 K]
  • Fault Diagnosis and Handling for Service Composition Based on Petri Nets
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2010,21(2):231-247 [Abstract(10107)]  [View PDF(12222)1.21 M]
  • Failure Diagnosis of Internetware Systems Using Dynamic Description Logic
  • WANG Zhu-Xiao,YANG Kun and SHI Zhong-Zhi
  • 2010,21(2):248-260 [Abstract(6871)]  [View PDF(5520)1.03 M]
  • Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition
  • ZENG Jin,SUN Hai-Long,LIU Xu-Dong,DENG Ting and HUAI Jin-Peng
  • 2010,21(2):261-276 [Abstract(7610)]  [View PDF(8692)1.44 M]
  • Service-Oriented Reliable Multimedia Delivery Algorithm
  • ZHANG Sheng,QIAN Zhu-Zhong and LU Sang-Lu
  • 2010,21(2):277-286 [Abstract(6970)]  [View PDF(4933)1.03 M]
  • Approach to Transforming UML Model to Reliability Analysis Model
  • LIU Yi,MA Zhi-Yi,HE Xiao and HAO Wei-Zhong
  • 2010,21(2):287-304 [Abstract(6540)]  [View PDF(6428)2.60 M]
  • Construction and Certification of a Bytecode Virtual Machine
  • DONG Yuan,REN Kai,WANG Sheng-Yuan and ZHANG Su-Qin
  • 2010,21(2):305-317 [Abstract(6214)]  [View PDF(5517)945.12 K]
  • Construction Techniques of Anticipatory Monitors for Parameterized LTL
  • ZHAO Chang-Zhi,DONG Wei,SUI Ping and QI Zhi-Chang
  • 2010,21(2):318-333 [Abstract(6227)]  [View PDF(4373)1.06 M]
  • Pointer Logic Dealing with Uncertain Equality of Pointers
  • LIANG Hong-Jin,ZHANG Yu,CHEN Yi-Yun,LI Zhao-Peng and HUA Bao-Jian
  • 2010,21(2):334-343 [Abstract(7985)]  [View PDF(4346)701.30 K]
  • Model and Quantification of Autonomic Dependability of Mission-Critical Systems
  • WANG Hui-Qiang,Lü Hong-Wu,ZHAO Qian,DONG Xi-Kun and FENG Guang-Sheng
  • 2010,21(2):344-358 [Abstract(6277)]  [View PDF(5187)1.01 M]
  • Framework Supporting Software Assets Evaluation on Trustworthiness
  • CAI Si-Bo,ZOU Yan-Zhen,SHAO Ling-Shuang,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):359-372 [Abstract(6634)]  [View PDF(5832)1.00 M]
  • Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM
  • GU Liang,GUO Yao,WANG Hua,ZOU Yan-Zhen,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):373-387 [Abstract(6461)]  [View PDF(7978)1.10 M]
  • Reputation-Based Recommender Discovery Approach for Service Selection
  • PAN Jing,XU Feng and Lü Jian
  • 2010,21(2):388-400 [Abstract(7155)]  [View PDF(6431)1.18 M]