Volume 24,Issue 4,2013 Table of Contents

Other Issues:  
  
Contents

  • “Use Case+Control Case” Driven Approach for Software Analysis and Design
  • LIU Chun,ZHANG Wei,ZHAO Hai-Yan and JIN Zhi
  • 2013,24(4):675-695 [Abstract(2589)]  [View PDF(3015)1021.92 K]
  • Performance Modeling and Analysis for Composite Service Considering Failure Recovery
  • GU Jun,LUO Jun-Zhou,CAO Jiu-Xin and LI Wei
  • 2013,24(4):696-714 [Abstract(2177)]  [View PDF(2570)1013.10 K]
  • Research on Relative Correctness of Radl Formal Specification
  • WANG Chang-Jing and XUE Jin-Yun
  • 2013,24(4):715-729 [Abstract(2137)]  [View PDF(2311)824.03 K]
  • Quantitative Evaluation on the Robustness for Software Obfuscating Transformation
  • FU Jian-Jing and WANG Ke
  • 2013,24(4):730-748 [Abstract(2209)]  [View PDF(2370)910.79 K]
  • Software Reliability Model Considering both Testing Effort and Testing Coverage
  • LI Hai-Feng,WANG Shuan-Qi,LIU Chang,ZHENG Jun and LI Zhen
  • 2013,24(4):749-760 [Abstract(2873)]  [View PDF(2945)636.68 K]
  • Framework for Domain-Oriented Academic Literatures Retrieval
  • QIU Jiang-Tao,TANG Chang-Jie and LI Qing
  • 2013,24(4):798-809 [Abstract(2532)]  [View PDF(2679)636.12 K]
  • Visual Quality Analysis Method for Relational Data
  • TENG Dong-Xing,ZENG Zhi-Rong,YANG Hai-Yan,WANG Hong-An and DAI Guo-Zhong
  • 2013,24(4):810-824 [Abstract(2340)]  [View PDF(3332)1.62 M]
  • Location Estimation in Wireless Sensor Networks Based on Probabilistic Model with Variant Variance and Evolutionary Algorithm
  • YE Miao and WANG Yu-Ping
  • 2013,24(4):859-872 [Abstract(2457)]  [View PDF(2935)873.45 K]
  • Group Key Management Based on Random Perturbation in Wireless Sensor Networks
  • ZENG Wei-Ni,LIN Ya-Ping,YU Jian-Ping and WANG Lei
  • 2013,24(4):873-886 [Abstract(2239)]  [View PDF(2657)818.92 K]
  • Selfish Node Detection and Incentive Mechanism in Mobile P2P Networks
  • QU Da-Peng,WANG Xing-Wei and HUANG Min
  • 2013,24(4):887-899 [Abstract(2194)]  [View PDF(2707)766.31 K]
  • Optimal Cross-Layer Power Control and Congestion Control Providing Energy Saving for Ad Hoc Networks
  • ZHANG Yong-Min,XU Wei-Qiang,HUANG Jiong,WANG Ya-Ming,SHU Ting and LIU Liang-Gui
  • 2013,24(4):900-914 [Abstract(2333)]  [View PDF(2448)802.28 K]
  • Review Articles

  • Research Progress on Test Case Evolution
  • ZHANG Zhi-Yi,CHEN Zhen-Yu,XU Bao-Wen and YANG Rui
  • 2013,24(4):663-674 [Abstract(6591)]  [View PDF(4952)735.36 K]
  • Database Physical Structure Optimization Technology
  • CUI Yue-Sheng,ZHANG Yong,ZENG Chun,FENG Jian-Hua and XING Chun-Xiao
  • 2013,24(4):761-780 [Abstract(5516)]  [View PDF(4403)999.54 K]
  • Web Data Source Selection Technologies
  • WAN Chang-Xuan,DENG Song,LIU Xi-Ping,LIAO Guo-Qiong,LIU De-Xi and JIANG Teng-Jiao
  • 2013,24(4):781-797 [Abstract(5505)]  [View PDF(4571)896.14 K]
  • Honeypot Technology Research and Application
  • ZHUGE Jian-Wei,TANG Yong,HAN Xin-Hui and DUAN Hai-Xin
  • 2013,24(4):825-842 [Abstract(5736)]  [View PDF(9474)1.09 M]
  • Drive-by-Download Mechanisms and Defenses
  • ZHANG Hui-Lin,ZOU Wei and HAN Xin-Hui
  • 2013,24(4):843-858 [Abstract(5566)]  [View PDF(6688)832.28 K]