Volume 26,Issue 12,2015 Table of Contents

Other Issues:  
  
Contents

  • Complexity Metrics for Regression Testing of Component-Based Software
  • TAO Chuan-Qi, LI Bi-Xin and Jerry Gao
  • 2015,26(12):3043-3061 [Abstract(1652)]  [View PDF(1435)2.34 M]
  • Method Name Recommendation Based on Source Code Depository and Feature Matching
  • GAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong
  • 2015,26(12):3062-3074 [Abstract(1662)]  [View PDF(1959)1.42 M]
  • Computing Software Reliability Based on Program Invariants
  • ZHOU Yuan and DING Zuo-Hua
  • 2015,26(12):3075-3087 [Abstract(1708)]  [View PDF(1950)1.28 M]
  • Exception Handling Approach of Floating Mathematical Functions
  • XU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei
  • 2015,26(12):3088-3103 [Abstract(1461)]  [View PDF(1935)1.69 M]
  • Programming Method of Dimensional Array Types and High Performance FFT Implementation
  • CUI Xiang, LI Xiao-Wen and CHEN Yi-Feng
  • 2015,26(12):3104-3116 [Abstract(1486)]  [View PDF(1629)1.36 M]
  • Reconstructive Algorithm Based on Extension Rule for Solving #SAT Incrementally
  • JIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang
  • 2015,26(12):3117-3129 [Abstract(1284)]  [View PDF(1417)1.35 M]
  • Subtopic Taxonomy-Aware Framework for Diversity Evaluation
  • CHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping
  • 2015,26(12):3130-3139 [Abstract(1362)]  [View PDF(1858)1.08 M]
  • Probabilistic Max Restricted Path Consistency
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2015,26(12):3140-3150 [Abstract(1583)]  [View PDF(2007)1.30 M]
  • Cross-Lingual Tense Tagging Based on Tree Conditional Random Fields
  • CHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang
  • 2015,26(12):3151-3161 [Abstract(1410)]  [View PDF(1786)1.10 M]
  • Construction of Multi-Attributes Decrement for Concept Lattice
  • MA Yuan and MA Weng-Sheng
  • 2015,26(12):3162-3173 [Abstract(1326)]  [View PDF(1509)1.23 M]
  • Identity-Based Hybrid Signcryption Scheme Using ECC
  • YU Hui-Fang and YANG Bo
  • 2015,26(12):3174-3182 [Abstract(1341)]  [View PDF(1672)1.09 M]
  • Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK Model
  • GAO Hai-Ying
  • 2015,26(12):3183-3195 [Abstract(1302)]  [View PDF(1535)1.31 M]
  • Efficient Revocable Certificateless Signature Against Signing Key Exposure
  • SUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min
  • 2015,26(12):3196-3203 [Abstract(1514)]  [View PDF(1388)906.14 K]
  • Efficient and Provide Security Certificateless Aggregate Signature Scheme
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2015,26(12):3204-3214 [Abstract(1149)]  [View PDF(1563)1.14 M]
  • Fast Privacy Preserving RFID Authentication Protocol
  • ZHAI Li
  • 2015,26(12):3215-3222 [Abstract(1494)]  [View PDF(1844)858.26 K]
  • Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming Search
  • CHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run
  • 2015,26(12):3223-3241 [Abstract(1681)]  [View PDF(1486)1.95 M]