Volume 24,Issue 7,2013 Table of Contents

Other Issues:  
  
Contents

  • Rich Client Middleware for Runtime Self-Adaption
  • ZHAO Qi,LIU Xuan-Zhe,WANG Xu-Dong,HUANG Gang and MEI Hong
  • 2013,24(7):1419-1435 [Abstract(1882)]  [View PDF(2658)1006.83 K]
  • Semantics-Configurable Model Transformation
  • HE Xiao,MA Zhi-Yi,WANG Rui-Chao and SHAO Wei-Zhong
  • 2013,24(7):1436-1454 [Abstract(2134)]  [View PDF(2436)895.75 K]
  • Automatic Breakpoint Generating Approach Based on Minimum Debugging Frontier Set
  • LI Feng,HUO Wei,CHEN Cong-Ming,LI Long,ZHONG Lu-Jie and FENG Xiao-Bing
  • 2013,24(7):1455-1468 [Abstract(2137)]  [View PDF(2326)966.42 K]
  • Optimization of Configurable Greedy Algorithm for Covering Arrays Generation
  • NIE Chang-Hai and JIANG Jing
  • 2013,24(7):1469-1483 [Abstract(2051)]  [View PDF(2229)1.08 M]
  • Fault Localization Method Using Information Quantity
  • DING Hui,CHEN Lin,QIAN Ju,XU Lei and XU Bao-Wen
  • 2013,24(7):1484-1494 [Abstract(2457)]  [View PDF(2721)603.26 K]
  • Calculus Using Fitness Testing for Method Redirection
  • ZHAO Yin-Liang,ZHU Chang-Peng,HAN Bo and ZENG Qing-Hua
  • 2013,24(7):1495-1511 [Abstract(2091)]  [View PDF(2183)836.87 K]
  • Contents

  • Performance Prediction Method for UML Software Architecture and Its Automation
  • LI Chuan-Huang,WANG Wei-Ming and SHI Yin-Yan
  • 2013,24(7):1512-1528 [Abstract(3790)]  [View PDF(3519)924.32 K]
  • Contents

  • Memetic Immune Algorithm for Multiobjective Optimization
  • QI Yu-Tao,LIU Fang,CHANG Wei-Yuan,MA Xiao-Liang and JIAO Li-Cheng
  • 2013,24(7):1529-1544 [Abstract(2186)]  [View PDF(3388)1.49 M]
  • Optimizations of Multi-Aspect Rating Inference Model
  • WANG Hui-Zhen and ZHU Jing-Bo
  • 2013,24(7):1545-1556 [Abstract(2118)]  [View PDF(3513)626.46 K]
  • Conformant Planning Based on Reducing Belief States
  • WEI Wei,OUYANG Dan-Tong and LÜ Shuai
  • 2013,24(7):1557-1570 [Abstract(1887)]  [View PDF(1886)696.95 K]
  • Memory Enhanced Dynamic Multi-Objective Evolutionary Algorithm Based on Decomposition
  • LIU Min and ZENG Wen-Hua
  • 2013,24(7):1571-1588 [Abstract(2250)]  [View PDF(3068)1.74 M]
  • Hybrid Heuristic Online Planning for POMDPs
  • ZHANG Zong-Zhang and CHEN Xiao-Ping
  • 2013,24(7):1589-1600 [Abstract(2066)]  [View PDF(2247)662.44 K]
  • Contents

  • Analysis for Incremental and Decremental Standard Support Vector Machine
  • GU Bin,ZHENG Guan-Sheng and WANG Jian-Dong
  • 2013,24(7):1601-1613 [Abstract(2583)]  [View PDF(2898)1014.95 K]
  • Contents

  • Extending Action Languages for Intelligent Service Robot Task Planning
  • JIN Guo-Qiang and CHEN Xiao-Ping
  • 2013,24(7):1614-1625 [Abstract(1773)]  [View PDF(2397)651.76 K]
  • Faithful and Full Translations Between Logics
  • SHEN Yu-Ming,MA Yue,CAO Cun-Gen,SUI Yue-Fei and WANG Ju
  • 2013,24(7):1626-1637 [Abstract(2046)]  [View PDF(2049)621.82 K]
  • Spectrum Allocation Algorithm Based on User Allocation and Load
  • CHEN Jian,WU Jian-Ping and LI He-Wu
  • 2013,24(7):1638-1649 [Abstract(2006)]  [View PDF(2175)875.00 K]
  • Memory Efficient Algorithm and Architecture for Multi-Pattern Matching
  • SONG Tian,LI Dong-Ni,WANG Dong-Sheng and XUE Yi-Bo
  • 2013,24(7):1650-1665 [Abstract(2162)]  [View PDF(2978)918.92 K]
  • Contents

  • MapReduce-Based Large-Scale Online Social Network Worm Simulation
  • HE Liang,FENG Deng-Guo,WANG Rui,SU Pu-Rui and YING Ling-Yun
  • 2013,24(7):1666-1682 [Abstract(4256)]  [View PDF(3970)960.22 K]
  • Contents

  • Research on Trace Drive Instruction Cache Timing Attack on RSA
  • CHEN Cai-Sen,WANG Tao,GUO Shi-Ze and ZHOU Ping
  • 2013,24(7):1683-1694 [Abstract(1966)]  [View PDF(2146)844.70 K]