Volume 26,Issue 12,2015 Table of Contents

Other Issues:  
  
Contents

  • Complexity Metrics for Regression Testing of Component-Based Software
  • TAO Chuan-Qi, LI Bi-Xin and Jerry Gao
  • 2015,26(12):3043-3061 [Abstract(2242)]  [View PDF(1865)2.34 M]
  • Method Name Recommendation Based on Source Code Depository and Feature Matching
  • GAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong
  • 2015,26(12):3062-3074 [Abstract(2262)]  [View PDF(2364)1.42 M]
  • Computing Software Reliability Based on Program Invariants
  • ZHOU Yuan and DING Zuo-Hua
  • 2015,26(12):3075-3087 [Abstract(2302)]  [View PDF(2383)1.28 M]
  • Exception Handling Approach of Floating Mathematical Functions
  • XU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei
  • 2015,26(12):3088-3103 [Abstract(2028)]  [View PDF(2620)1.69 M]
  • Programming Method of Dimensional Array Types and High Performance FFT Implementation
  • CUI Xiang, LI Xiao-Wen and CHEN Yi-Feng
  • 2015,26(12):3104-3116 [Abstract(2105)]  [View PDF(1911)1.36 M]
  • Reconstructive Algorithm Based on Extension Rule for Solving #SAT Incrementally
  • JIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang
  • 2015,26(12):3117-3129 [Abstract(1958)]  [View PDF(1768)1.35 M]
  • Subtopic Taxonomy-Aware Framework for Diversity Evaluation
  • CHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping
  • 2015,26(12):3130-3139 [Abstract(1958)]  [View PDF(2380)1.08 M]
  • Probabilistic Max Restricted Path Consistency
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2015,26(12):3140-3150 [Abstract(2176)]  [View PDF(2451)1.30 M]
  • Cross-Lingual Tense Tagging Based on Tree Conditional Random Fields
  • CHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang
  • 2015,26(12):3151-3161 [Abstract(1988)]  [View PDF(2080)1.10 M]
  • Construction of Multi-Attributes Decrement for Concept Lattice
  • MA Yuan and MA Weng-Sheng
  • 2015,26(12):3162-3173 [Abstract(1949)]  [View PDF(1809)1.23 M]
  • Identity-Based Hybrid Signcryption Scheme Using ECC
  • YU Hui-Fang and YANG Bo
  • 2015,26(12):3174-3182 [Abstract(2006)]  [View PDF(2087)1.09 M]
  • Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK Model
  • GAO Hai-Ying
  • 2015,26(12):3183-3195 [Abstract(1801)]  [View PDF(1843)1.31 M]
  • Efficient Revocable Certificateless Signature Against Signing Key Exposure
  • SUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min
  • 2015,26(12):3196-3203 [Abstract(2177)]  [View PDF(1783)906.14 K]
  • Efficient and Provide Security Certificateless Aggregate Signature Scheme
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2015,26(12):3204-3214 [Abstract(1777)]  [View PDF(2002)1.14 M]
  • Fast Privacy Preserving RFID Authentication Protocol
  • ZHAI Li
  • 2015,26(12):3215-3222 [Abstract(2093)]  [View PDF(2129)858.26 K]
  • Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming Search
  • CHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run
  • 2015,26(12):3223-3241 [Abstract(2487)]  [View PDF(1996)1.95 M]