Volume 26,Issue 12,2015 Table of Contents

Other Issues:  
  
Contents

  • Complexity Metrics for Regression Testing of Component-Based Software
  • TAO Chuan-Qi, LI Bi-Xin and Jerry Gao
  • 2015,26(12):3043-3061 [Abstract(1824)]  [View PDF(1523)2.34 M]
  • Method Name Recommendation Based on Source Code Depository and Feature Matching
  • GAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong
  • 2015,26(12):3062-3074 [Abstract(1856)]  [View PDF(2096)1.42 M]
  • Computing Software Reliability Based on Program Invariants
  • ZHOU Yuan and DING Zuo-Hua
  • 2015,26(12):3075-3087 [Abstract(1903)]  [View PDF(2070)1.28 M]
  • Exception Handling Approach of Floating Mathematical Functions
  • XU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei
  • 2015,26(12):3088-3103 [Abstract(1634)]  [View PDF(2149)1.69 M]
  • Programming Method of Dimensional Array Types and High Performance FFT Implementation
  • CUI Xiang, LI Xiao-Wen and CHEN Yi-Feng
  • 2015,26(12):3104-3116 [Abstract(1688)]  [View PDF(1704)1.36 M]
  • Reconstructive Algorithm Based on Extension Rule for Solving #SAT Incrementally
  • JIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang
  • 2015,26(12):3117-3129 [Abstract(1563)]  [View PDF(1501)1.35 M]
  • Subtopic Taxonomy-Aware Framework for Diversity Evaluation
  • CHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping
  • 2015,26(12):3130-3139 [Abstract(1538)]  [View PDF(2061)1.08 M]
  • Probabilistic Max Restricted Path Consistency
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2015,26(12):3140-3150 [Abstract(1755)]  [View PDF(2144)1.30 M]
  • Cross-Lingual Tense Tagging Based on Tree Conditional Random Fields
  • CHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang
  • 2015,26(12):3151-3161 [Abstract(1578)]  [View PDF(1863)1.10 M]
  • Construction of Multi-Attributes Decrement for Concept Lattice
  • MA Yuan and MA Weng-Sheng
  • 2015,26(12):3162-3173 [Abstract(1592)]  [View PDF(1590)1.23 M]
  • Identity-Based Hybrid Signcryption Scheme Using ECC
  • YU Hui-Fang and YANG Bo
  • 2015,26(12):3174-3182 [Abstract(1555)]  [View PDF(1767)1.09 M]
  • Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK Model
  • GAO Hai-Ying
  • 2015,26(12):3183-3195 [Abstract(1454)]  [View PDF(1625)1.31 M]
  • Efficient Revocable Certificateless Signature Against Signing Key Exposure
  • SUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min
  • 2015,26(12):3196-3203 [Abstract(1726)]  [View PDF(1480)906.14 K]
  • Efficient and Provide Security Certificateless Aggregate Signature Scheme
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2015,26(12):3204-3214 [Abstract(1375)]  [View PDF(1661)1.14 M]
  • Fast Privacy Preserving RFID Authentication Protocol
  • ZHAI Li
  • 2015,26(12):3215-3222 [Abstract(1672)]  [View PDF(1913)858.26 K]
  • Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming Search
  • CHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run
  • 2015,26(12):3223-3241 [Abstract(1937)]  [View PDF(1551)1.95 M]