Volume 26,Issue 12,2015 Table of Contents
Complexity Metrics for Regression Testing of Component-Based SoftwareTAO Chuan-Qi, LI Bi-Xin and Jerry Gao2015,26(12):3043-3061 [Abstract(2989)] [View PDF(3542)2.34 M]Method Name Recommendation Based on Source Code Depository and Feature MatchingGAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong2015,26(12):3062-3074 [Abstract(3295)] [View PDF(4584)1.42 M]Computing Software Reliability Based on Program InvariantsZHOU Yuan and DING Zuo-Hua2015,26(12):3075-3087 [Abstract(3171)] [View PDF(4407)1.28 M]Exception Handling Approach of Floating Mathematical FunctionsXU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei2015,26(12):3088-3103 [Abstract(2884)] [View PDF(5290)1.69 M]Programming Method of Dimensional Array Types and High Performance FFT ImplementationCUI Xiang, LI Xiao-Wen and CHEN Yi-Feng2015,26(12):3104-3116 [Abstract(3001)] [View PDF(4013)1.36 M]Reconstructive Algorithm Based on Extension Rule for Solving #SAT IncrementallyJIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang2015,26(12):3117-3129 [Abstract(2926)] [View PDF(3592)1.35 M]Subtopic Taxonomy-Aware Framework for Diversity EvaluationCHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping2015,26(12):3130-3139 [Abstract(2745)] [View PDF(4181)1.08 M]Probabilistic Max Restricted Path ConsistencyLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2015,26(12):3140-3150 [Abstract(3012)] [View PDF(4745)1.30 M]Cross-Lingual Tense Tagging Based on Tree Conditional Random FieldsCHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang2015,26(12):3151-3161 [Abstract(2766)] [View PDF(3891)1.10 M]Construction of Multi-Attributes Decrement for Concept LatticeMA Yuan and MA Weng-Sheng2015,26(12):3162-3173 [Abstract(2683)] [View PDF(3503)1.23 M]Identity-Based Hybrid Signcryption Scheme Using ECCYU Hui-Fang and YANG Bo2015,26(12):3174-3182 [Abstract(3136)] [View PDF(4172)1.09 M]Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK ModelGAO Hai-Ying2015,26(12):3183-3195 [Abstract(2644)] [View PDF(3770)1.31 M]Efficient Revocable Certificateless Signature Against Signing Key ExposureSUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min2015,26(12):3196-3203 [Abstract(3102)] [View PDF(3750)906.14 K]Efficient and Provide Security Certificateless Aggregate Signature SchemeZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng2015,26(12):3204-3214 [Abstract(2669)] [View PDF(4122)1.14 M]Fast Privacy Preserving RFID Authentication ProtocolZHAI Li2015,26(12):3215-3222 [Abstract(2949)] [View PDF(3943)858.26 K]Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming SearchCHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run2015,26(12):3223-3241 [Abstract(3578)] [View PDF(3952)1.95 M]