Volume 26,Issue 10,2015 Table of Contents
Multi-Objective Optimization Based On-Line Adjustment Strategy of Test Case PrioritizationZHANG Na, YAO Lan, BAO Xiao-An, DONG Meng and GUI Ning2015,26(10):2451-2464 [Abstract(3645)] [View PDF(4404)702.47 K]Software Reliability Model with Irregular Changes of Fault Detection RateWANG Jin-Yong, WU Zhi-Bo, SHU Yan-Jun and ZHANG Zhan2015,26(10):2465-2484 [Abstract(3360)] [View PDF(4538)1.22 M]Bounded Model Checking Technique for Interrupt-Driven SystemsZHOU Xiao-Yu, GU Bin, ZHAO Jian-Hua and YANG Meng-Fei2015,26(10):2485-2503 [Abstract(2543)] [View PDF(3841)691.95 K]Mutation Testing Based on Statistical Dominance AnalysisZHANG Gong-Jie, GONG Dun-Wei and YAO Xiang-Juan2015,26(10):2504-2520 [Abstract(3052)] [View PDF(4141)646.66 K]Model Checking CSP Based on ASP and Critical-Trace Model of CSPZHAO Ling-Zhong, ZHAI Zhong-Yi, QIAN Jun-Yan and GUO Yun-Chuan2015,26(10):2521-2544 [Abstract(3553)] [View PDF(4443)982.90 K]Formal Analysis to Non-Functional Requirements of Trustworthy SoftwareZHANG Xuan, LI Tong, WANG Xu, YU Qian, YU Yong and ZHU Rui2015,26(10):2545-2566 [Abstract(3262)] [View PDF(5167)1.25 M]Ensemble Model and Algorithm with Recalling and Forgetting Mechanisms for Data Stream MiningZHAO Qiang-Li, JIANG Yan-Huang and LU Yu-Tong2015,26(10):2567-2580 [Abstract(3484)] [View PDF(4759)1.00 M]User-Aware De-Duplication AlgorithmZHANG Hu-Yin, ZHOU Jing-Cai, CHEN Yi-Bo and ZHA Wen-Liang2015,26(10):2581-2595 [Abstract(3296)] [View PDF(4663)1.02 M]
Schema Matching Method Based on Information UnitDU Xiao-Kun, LI Guo-Hui, WANG Jiang-Qing, TIE Jun and LI Yan-Hong2015,26(10):2596-2613 [Abstract(4445)] [View PDF(4628)877.95 K]
Multi-Granularity and Time-Varying Fractal Dimension on Data StreamNI Zhi-Wei, WANG Chao, HU Tang-Lei and NI Li-Ping2015,26(10):2614-2630 [Abstract(2936)] [View PDF(4249)991.99 K]Throughput Oriented Range Query Algorithm for Moving Objects in Dual Stream ModeXUE Zhong-Bin, ZHOU Xuan and WANG Shan2015,26(10):2631-2643 [Abstract(2440)] [View PDF(3606)787.92 K]Heuristic Concurrent Dispatching Algorithm for MSM Clos-Network SwitchesLIU Xiao-Feng, ZHAO You-Jian and CHEN Guo2015,26(10):2644-2655 [Abstract(2540)] [View PDF(3940)650.73 K]New Upper Bound on the Maximum Differential Probability for SPS Structure with P-Box Using n-MDSLIU Guo-Qiang and JIN Chen-Hui2015,26(10):2656-2666 [Abstract(2464)] [View PDF(3960)621.61 K]Temperature-Adaptive Time Synchronization for Wireless Sensor NetworksJIN Meng, CHEN Xiao-Jiang, FANG Ding-Yi, TANG Zhan-Yong, LIU Chen, XU Dan and WANG Wei2015,26(10):2667-2683 [Abstract(3580)] [View PDF(4371)885.59 K]Meet-in-the-Middle Attack on TWINE Block CipherWANG Yan-Feng and WU Wen-Ling2015,26(10):2684-2695 [Abstract(2684)] [View PDF(4435)819.05 K]Fully Homomorphic Encryption from Approximate Ideal LatticesGU Chun-Sheng2015,26(10):2696-2719 [Abstract(3001)] [View PDF(6250)868.44 K]Getting Upright Orientation of 3D Objects via Viewpoint ScoringHAN Hong-Lei, WANG Wen-Cheng and HUA Miao2015,26(10):2720-2732 [Abstract(3153)] [View PDF(4127)1.45 M]Object Tracking Based on Component-Level Appearance ModelWANG Mei-Hua, LIANG Yun, LIU Fu-Ming and LUO Xiao-Nan2015,26(10):2733-2747 [Abstract(3608)] [View PDF(3938)2.50 M]