Volume 26,Issue 2,2015 Table of Contents

Other Issues:  
  
Contents

  • Time Property Analysis Method for State/Event Fault Tree
  • XU Bing-Feng, HUANG Zhi-Qiu, HU Jun, WEI Ou and LI Wei-Wei
  • 2015,26(2):427-446 [Abstract(2539)]  [View PDF(2306)1.06 M]
  • Special Issue's Articles

  • 安全攸关软件系统建模与验证专题前言
  • 李宣东,刘超,毛晓光
  • 2015,26(2):179-180 [Abstract(3453)]  [View PDF(2826)316.89 K]
  • Avionics System Testing Based on Formal Methods
  • LI Rui, LIAN Hang, MA Shi-Long and LI Tao
  • 2015,26(2):181-201 [Abstract(3354)]  [View PDF(2225)2.27 M]
  • Verification of AADL Models with Timed Abstract State Machines
  • YANG Zhi-Bin, HU Kai, ZHAO Yong-Wang, MA Dian-Fu and Jean-Paul BODEVEIX
  • 2015,26(2):202-222 [Abstract(3463)]  [View PDF(2959)1016.99 K]
  • Software Formal Modeling and Verification Method Based on Time STM
  • HOU Gang, ZHOU Kuan-Jiu, CHANG Jun-Wang, WANG Jie and LI Ming-Chu
  • 2015,26(2):223-238 [Abstract(3651)]  [View PDF(2873)1.36 M]
  • Research on Reliability and Correctness Assurance Methods and Techniques for Device Drivers
  • ZHANG Yi-Fan, HUANG Chao, OU Jian-Sheng, TANG En-Yi and CHEN Xin
  • 2015,26(2):239-253 [Abstract(2936)]  [View PDF(2784)730.53 K]
  • Software Fault Localization Based on Data Chain
  • YANG Bo, WU Ji and LIU Chao
  • 2015,26(2):254-268 [Abstract(3187)]  [View PDF(3160)658.18 K]
  • Method of Automatic Test Case Generation for Safety-Critical Scenarios in Train Control Systems
  • CHEN Xin, JIANG Peng, ZHANG Yi-Fan, HUANG Chao and ZHOU Yan
  • 2015,26(2):269-278 [Abstract(3353)]  [View PDF(2777)631.75 K]
  • Schedulability Analysis Model for Multiprocessor Real-Time Systems Using UPPAAL
  • DAI Sheng-Xin, HONG Mei, GUO Bing, YANG Qiu-Hui, HUANG Wei and XU Bao-Ping
  • 2015,26(2):279-296 [Abstract(3443)]  [View PDF(3158)1.61 M]
  • Termination Analysis of Multipath Loop Programs with One Variable
  • LI Yi, LI Chuan-Can and WU Wen-Yuan
  • 2015,26(2):297-304 [Abstract(3243)]  [View PDF(2476)521.83 K]
  • Statistical Model Checking for Rare-Event in Safety-Critical System
  • DU De-Hui, CHENG Bei and LIU Jing
  • 2015,26(2):305-320 [Abstract(3639)]  [View PDF(3111)892.15 K]
  • Formal Modeling Approach for Aerospace Embedded Software
  • GU Bin, DONG Yun-Wei and WANG Zheng
  • 2015,26(2):321-331 [Abstract(3510)]  [View PDF(2694)1.73 M]
  • Trustworthy Translation for Eliminating High-Order Operation of a Synchronous Dataflow Language
  • LIU Yang, GAN Yuan-Ke, WANG Sheng-Yuan, DONG Yuan, YANG Fei, SHI Gang and YAN Xin
  • 2015,26(2):332-347 [Abstract(3205)]  [View PDF(2474)829.76 K]
  • Software Vulnerability Code Clone Detection Method Based on Characteristic Metrics
  • GAN Shui-Tao, QIN Xiao-Jun, CHEN Zuo-Ning and WANG Lin-Zhang
  • 2015,26(2):348-363 [Abstract(3429)]  [View PDF(2921)747.87 K]
  • Machine-Checked Model for Micro-Dalvik Virtual Machine
  • HE Yan-Xiang, JIANG Nan, LI Qing-An, ZHANG Jun and SHEN Fan-Fan
  • 2015,26(2):364-379 [Abstract(3232)]  [View PDF(2612)706.66 K]
  • Statistical Model Checking of Cyber-Physical Systems Control Software
  • SHAN Li-Jun, ZHOU Xing-She, WANG Yu-Ying, ZHAO Lei, WAN Li-Jing, QIAO Lei and CEHN Jian-Xin
  • 2015,26(2):380-389 [Abstract(3190)]  [View PDF(4216)847.67 K]
  • Review Articles

  • Review of Dynamic Fault Localization Approaches Based on Program Spectrum
  • CHEN Xiang, JU Xiao-Lin, WEN Wan-Zhi and GU Qing
  • 2015,26(2):390-412 [Abstract(5881)]  [View PDF(3588)843.69 K]
  • Research on Integer-Based Vulnerabilities: Security Model, Detecting Methods and Real-World Cases
  • SUN Hao and ZENG Qing-Kai
  • 2015,26(2):413-426 [Abstract(5148)]  [View PDF(3522)614.68 K]