Volume 26,Issue 12,2015 Table of Contents
Complexity Metrics for Regression Testing of Component-Based SoftwareTAO Chuan-Qi, LI Bi-Xin and Jerry Gao2015,26(12):3043-3061 [Abstract(3096)] [View PDF(4376)2.34 M]Method Name Recommendation Based on Source Code Depository and Feature MatchingGAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong2015,26(12):3062-3074 [Abstract(3383)] [View PDF(5453)1.42 M]Computing Software Reliability Based on Program InvariantsZHOU Yuan and DING Zuo-Hua2015,26(12):3075-3087 [Abstract(3234)] [View PDF(5355)1.28 M]Exception Handling Approach of Floating Mathematical FunctionsXU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei2015,26(12):3088-3103 [Abstract(3052)] [View PDF(6402)1.69 M]Programming Method of Dimensional Array Types and High Performance FFT ImplementationCUI Xiang, LI Xiao-Wen and CHEN Yi-Feng2015,26(12):3104-3116 [Abstract(3060)] [View PDF(5143)1.36 M]Reconstructive Algorithm Based on Extension Rule for Solving #SAT IncrementallyJIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang2015,26(12):3117-3129 [Abstract(2980)] [View PDF(4548)1.35 M]Subtopic Taxonomy-Aware Framework for Diversity EvaluationCHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping2015,26(12):3130-3139 [Abstract(2834)] [View PDF(4977)1.08 M]Probabilistic Max Restricted Path ConsistencyLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2015,26(12):3140-3150 [Abstract(3094)] [View PDF(5546)1.30 M]Cross-Lingual Tense Tagging Based on Tree Conditional Random FieldsCHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang2015,26(12):3151-3161 [Abstract(2823)] [View PDF(4724)1.10 M]Construction of Multi-Attributes Decrement for Concept LatticeMA Yuan and MA Weng-Sheng2015,26(12):3162-3173 [Abstract(2723)] [View PDF(4169)1.23 M]Identity-Based Hybrid Signcryption Scheme Using ECCYU Hui-Fang and YANG Bo2015,26(12):3174-3182 [Abstract(3224)] [View PDF(5116)1.09 M]Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK ModelGAO Hai-Ying2015,26(12):3183-3195 [Abstract(2693)] [View PDF(4637)1.31 M]Efficient Revocable Certificateless Signature Against Signing Key ExposureSUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min2015,26(12):3196-3203 [Abstract(3223)] [View PDF(4640)906.14 K]Efficient and Provide Security Certificateless Aggregate Signature SchemeZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng2015,26(12):3204-3214 [Abstract(2754)] [View PDF(5666)1.14 M]Fast Privacy Preserving RFID Authentication ProtocolZHAI Li2015,26(12):3215-3222 [Abstract(3003)] [View PDF(4785)858.26 K]Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming SearchCHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run2015,26(12):3223-3241 [Abstract(3642)] [View PDF(4770)1.95 M]