Volume 26,Issue 10,2015 Table of Contents

Other Issues:  
  
Contents

  • Multi-Objective Optimization Based On-Line Adjustment Strategy of Test Case Prioritization
  • ZHANG Na, YAO Lan, BAO Xiao-An, DONG Meng and GUI Ning
  • 2015,26(10):2451-2464 [Abstract(3645)]  [View PDF(4404)702.47 K]
  • Software Reliability Model with Irregular Changes of Fault Detection Rate
  • WANG Jin-Yong, WU Zhi-Bo, SHU Yan-Jun and ZHANG Zhan
  • 2015,26(10):2465-2484 [Abstract(3360)]  [View PDF(4538)1.22 M]
  • Bounded Model Checking Technique for Interrupt-Driven Systems
  • ZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua and YANG Meng-Fei
  • 2015,26(10):2485-2503 [Abstract(2543)]  [View PDF(3841)691.95 K]
  • Mutation Testing Based on Statistical Dominance Analysis
  • ZHANG Gong-Jie, GONG Dun-Wei and YAO Xiang-Juan
  • 2015,26(10):2504-2520 [Abstract(3052)]  [View PDF(4141)646.66 K]
  • Model Checking CSP Based on ASP and Critical-Trace Model of CSP
  • ZHAO Ling-Zhong, ZHAI Zhong-Yi, QIAN Jun-Yan and GUO Yun-Chuan
  • 2015,26(10):2521-2544 [Abstract(3553)]  [View PDF(4443)982.90 K]
  • Formal Analysis to Non-Functional Requirements of Trustworthy Software
  • ZHANG Xuan, LI Tong, WANG Xu, YU Qian, YU Yong and ZHU Rui
  • 2015,26(10):2545-2566 [Abstract(3262)]  [View PDF(5167)1.25 M]
  • Ensemble Model and Algorithm with Recalling and Forgetting Mechanisms for Data Stream Mining
  • ZHAO Qiang-Li, JIANG Yan-Huang and LU Yu-Tong
  • 2015,26(10):2567-2580 [Abstract(3484)]  [View PDF(4759)1.00 M]
  • User-Aware De-Duplication Algorithm
  • ZHANG Hu-Yin, ZHOU Jing-Cai, CHEN Yi-Bo and ZHA Wen-Liang
  • 2015,26(10):2581-2595 [Abstract(3296)]  [View PDF(4663)1.02 M]
  • Contents

  • Schema Matching Method Based on Information Unit
  • DU Xiao-Kun, LI Guo-Hui, WANG Jiang-Qing, TIE Jun and LI Yan-Hong
  • 2015,26(10):2596-2613 [Abstract(4445)]  [View PDF(4628)877.95 K]
  • Contents

  • Multi-Granularity and Time-Varying Fractal Dimension on Data Stream
  • NI Zhi-Wei, WANG Chao, HU Tang-Lei and NI Li-Ping
  • 2015,26(10):2614-2630 [Abstract(2936)]  [View PDF(4249)991.99 K]
  • Throughput Oriented Range Query Algorithm for Moving Objects in Dual Stream Mode
  • XUE Zhong-Bin, ZHOU Xuan and WANG Shan
  • 2015,26(10):2631-2643 [Abstract(2440)]  [View PDF(3606)787.92 K]
  • Heuristic Concurrent Dispatching Algorithm for MSM Clos-Network Switches
  • LIU Xiao-Feng, ZHAO You-Jian and CHEN Guo
  • 2015,26(10):2644-2655 [Abstract(2540)]  [View PDF(3940)650.73 K]
  • New Upper Bound on the Maximum Differential Probability for SPS Structure with P-Box Using n-MDS
  • LIU Guo-Qiang and JIN Chen-Hui
  • 2015,26(10):2656-2666 [Abstract(2464)]  [View PDF(3960)621.61 K]
  • Temperature-Adaptive Time Synchronization for Wireless Sensor Networks
  • JIN Meng, CHEN Xiao-Jiang, FANG Ding-Yi, TANG Zhan-Yong, LIU Chen, XU Dan and WANG Wei
  • 2015,26(10):2667-2683 [Abstract(3580)]  [View PDF(4371)885.59 K]
  • Meet-in-the-Middle Attack on TWINE Block Cipher
  • WANG Yan-Feng and WU Wen-Ling
  • 2015,26(10):2684-2695 [Abstract(2684)]  [View PDF(4435)819.05 K]
  • Fully Homomorphic Encryption from Approximate Ideal Lattices
  • GU Chun-Sheng
  • 2015,26(10):2696-2719 [Abstract(3001)]  [View PDF(6250)868.44 K]
  • Getting Upright Orientation of 3D Objects via Viewpoint Scoring
  • HAN Hong-Lei, WANG Wen-Cheng and HUA Miao
  • 2015,26(10):2720-2732 [Abstract(3153)]  [View PDF(4127)1.45 M]
  • Object Tracking Based on Component-Level Appearance Model
  • WANG Mei-Hua, LIANG Yun, LIU Fu-Ming and LUO Xiao-Nan
  • 2015,26(10):2733-2747 [Abstract(3608)]  [View PDF(3938)2.50 M]