Volume 26,Issue 10,2015 Table of Contents

Other Issues:  
  
Contents

  • Multi-Objective Optimization Based On-Line Adjustment Strategy of Test Case Prioritization
  • ZHANG Na, YAO Lan, BAO Xiao-An, DONG Meng and GUI Ning
  • 2015,26(10):2451-2464 [Abstract(2628)]  [View PDF(2230)702.47 K]
  • Software Reliability Model with Irregular Changes of Fault Detection Rate
  • WANG Jin-Yong, WU Zhi-Bo, SHU Yan-Jun and ZHANG Zhan
  • 2015,26(10):2465-2484 [Abstract(2355)]  [View PDF(2204)1.22 M]
  • Bounded Model Checking Technique for Interrupt-Driven Systems
  • ZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua and YANG Meng-Fei
  • 2015,26(10):2485-2503 [Abstract(1716)]  [View PDF(2096)691.95 K]
  • Mutation Testing Based on Statistical Dominance Analysis
  • ZHANG Gong-Jie, GONG Dun-Wei and YAO Xiang-Juan
  • 2015,26(10):2504-2520 [Abstract(2055)]  [View PDF(2119)646.66 K]
  • Model Checking CSP Based on ASP and Critical-Trace Model of CSP
  • ZHAO Ling-Zhong, ZHAI Zhong-Yi, QIAN Jun-Yan and GUO Yun-Chuan
  • 2015,26(10):2521-2544 [Abstract(2455)]  [View PDF(2097)982.90 K]
  • Formal Analysis to Non-Functional Requirements of Trustworthy Software
  • ZHANG Xuan, LI Tong, WANG Xu, YU Qian, YU Yong and ZHU Rui
  • 2015,26(10):2545-2566 [Abstract(2203)]  [View PDF(2443)1.25 M]
  • Ensemble Model and Algorithm with Recalling and Forgetting Mechanisms for Data Stream Mining
  • ZHAO Qiang-Li, JIANG Yan-Huang and LU Yu-Tong
  • 2015,26(10):2567-2580 [Abstract(2497)]  [View PDF(2550)1.00 M]
  • User-Aware De-Duplication Algorithm
  • ZHANG Hu-Yin, ZHOU Jing-Cai, CHEN Yi-Bo and ZHA Wen-Liang
  • 2015,26(10):2581-2595 [Abstract(2313)]  [View PDF(2350)1.02 M]
  • Contents

  • Schema Matching Method Based on Information Unit
  • DU Xiao-Kun, LI Guo-Hui, WANG Jiang-Qing, TIE Jun and LI Yan-Hong
  • 2015,26(10):2596-2613 [Abstract(3407)]  [View PDF(2621)877.95 K]
  • Contents

  • Multi-Granularity and Time-Varying Fractal Dimension on Data Stream
  • NI Zhi-Wei, WANG Chao, HU Tang-Lei and NI Li-Ping
  • 2015,26(10):2614-2630 [Abstract(1915)]  [View PDF(1980)991.99 K]
  • Throughput Oriented Range Query Algorithm for Moving Objects in Dual Stream Mode
  • XUE Zhong-Bin, ZHOU Xuan and WANG Shan
  • 2015,26(10):2631-2643 [Abstract(1565)]  [View PDF(1897)787.92 K]
  • Heuristic Concurrent Dispatching Algorithm for MSM Clos-Network Switches
  • LIU Xiao-Feng, ZHAO You-Jian and CHEN Guo
  • 2015,26(10):2644-2655 [Abstract(1684)]  [View PDF(1937)650.73 K]
  • New Upper Bound on the Maximum Differential Probability for SPS Structure with P-Box Using n-MDS
  • LIU Guo-Qiang and JIN Chen-Hui
  • 2015,26(10):2656-2666 [Abstract(1588)]  [View PDF(2130)621.61 K]
  • Temperature-Adaptive Time Synchronization for Wireless Sensor Networks
  • JIN Meng, CHEN Xiao-Jiang, FANG Ding-Yi, TANG Zhan-Yong, LIU Chen, XU Dan and WANG Wei
  • 2015,26(10):2667-2683 [Abstract(2377)]  [View PDF(2164)885.59 K]
  • Meet-in-the-Middle Attack on TWINE Block Cipher
  • WANG Yan-Feng and WU Wen-Ling
  • 2015,26(10):2684-2695 [Abstract(1874)]  [View PDF(2341)819.05 K]
  • Fully Homomorphic Encryption from Approximate Ideal Lattices
  • GU Chun-Sheng
  • 2015,26(10):2696-2719 [Abstract(1926)]  [View PDF(3016)868.44 K]
  • Getting Upright Orientation of 3D Objects via Viewpoint Scoring
  • HAN Hong-Lei, WANG Wen-Cheng and HUA Miao
  • 2015,26(10):2720-2732 [Abstract(2153)]  [View PDF(1938)1.45 M]
  • Object Tracking Based on Component-Level Appearance Model
  • WANG Mei-Hua, LIANG Yun, LIU Fu-Ming and LUO Xiao-Nan
  • 2015,26(10):2733-2747 [Abstract(2522)]  [View PDF(1770)2.50 M]