Volume 24,Issue 4,2013 Table of Contents

Other Issues:  
  
Contents

  • “Use Case+Control Case” Driven Approach for Software Analysis and Design
  • LIU Chun,ZHANG Wei,ZHAO Hai-Yan and JIN Zhi
  • 2013,24(4):675-695 [Abstract(2462)]  [View PDF(2911)1021.92 K]
  • Performance Modeling and Analysis for Composite Service Considering Failure Recovery
  • GU Jun,LUO Jun-Zhou,CAO Jiu-Xin and LI Wei
  • 2013,24(4):696-714 [Abstract(2067)]  [View PDF(2512)1013.10 K]
  • Research on Relative Correctness of Radl Formal Specification
  • WANG Chang-Jing and XUE Jin-Yun
  • 2013,24(4):715-729 [Abstract(2005)]  [View PDF(2225)824.03 K]
  • Quantitative Evaluation on the Robustness for Software Obfuscating Transformation
  • FU Jian-Jing and WANG Ke
  • 2013,24(4):730-748 [Abstract(2068)]  [View PDF(2304)910.79 K]
  • Software Reliability Model Considering both Testing Effort and Testing Coverage
  • LI Hai-Feng,WANG Shuan-Qi,LIU Chang,ZHENG Jun and LI Zhen
  • 2013,24(4):749-760 [Abstract(2720)]  [View PDF(2837)636.68 K]
  • Framework for Domain-Oriented Academic Literatures Retrieval
  • QIU Jiang-Tao,TANG Chang-Jie and LI Qing
  • 2013,24(4):798-809 [Abstract(2423)]  [View PDF(2619)636.12 K]
  • Visual Quality Analysis Method for Relational Data
  • TENG Dong-Xing,ZENG Zhi-Rong,YANG Hai-Yan,WANG Hong-An and DAI Guo-Zhong
  • 2013,24(4):810-824 [Abstract(2236)]  [View PDF(3105)1.62 M]
  • Location Estimation in Wireless Sensor Networks Based on Probabilistic Model with Variant Variance and Evolutionary Algorithm
  • YE Miao and WANG Yu-Ping
  • 2013,24(4):859-872 [Abstract(2330)]  [View PDF(2833)873.45 K]
  • Group Key Management Based on Random Perturbation in Wireless Sensor Networks
  • ZENG Wei-Ni,LIN Ya-Ping,YU Jian-Ping and WANG Lei
  • 2013,24(4):873-886 [Abstract(2132)]  [View PDF(2588)818.92 K]
  • Selfish Node Detection and Incentive Mechanism in Mobile P2P Networks
  • QU Da-Peng,WANG Xing-Wei and HUANG Min
  • 2013,24(4):887-899 [Abstract(2078)]  [View PDF(2584)766.31 K]
  • Optimal Cross-Layer Power Control and Congestion Control Providing Energy Saving for Ad Hoc Networks
  • ZHANG Yong-Min,XU Wei-Qiang,HUANG Jiong,WANG Ya-Ming,SHU Ting and LIU Liang-Gui
  • 2013,24(4):900-914 [Abstract(2189)]  [View PDF(2390)802.28 K]
  • Review Articles

  • Research Progress on Test Case Evolution
  • ZHANG Zhi-Yi,CHEN Zhen-Yu,XU Bao-Wen and YANG Rui
  • 2013,24(4):663-674 [Abstract(6316)]  [View PDF(4839)735.36 K]
  • Database Physical Structure Optimization Technology
  • CUI Yue-Sheng,ZHANG Yong,ZENG Chun,FENG Jian-Hua and XING Chun-Xiao
  • 2013,24(4):761-780 [Abstract(5195)]  [View PDF(4296)999.54 K]
  • Web Data Source Selection Technologies
  • WAN Chang-Xuan,DENG Song,LIU Xi-Ping,LIAO Guo-Qiong,LIU De-Xi and JIANG Teng-Jiao
  • 2013,24(4):781-797 [Abstract(5092)]  [View PDF(4416)896.14 K]
  • Honeypot Technology Research and Application
  • ZHUGE Jian-Wei,TANG Yong,HAN Xin-Hui and DUAN Hai-Xin
  • 2013,24(4):825-842 [Abstract(5464)]  [View PDF(9008)1.09 M]
  • Drive-by-Download Mechanisms and Defenses
  • ZHANG Hui-Lin,ZOU Wei and HAN Xin-Hui
  • 2013,24(4):843-858 [Abstract(5238)]  [View PDF(6551)832.28 K]