Volume 26,Issue 12,2015 Table of Contents

Other Issues:  
  
Contents

  • Complexity Metrics for Regression Testing of Component-Based Software
  • TAO Chuan-Qi, LI Bi-Xin and Jerry Gao
  • 2015,26(12):3043-3061 [Abstract(3096)]  [View PDF(4376)2.34 M]
  • Method Name Recommendation Based on Source Code Depository and Feature Matching
  • GAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong
  • 2015,26(12):3062-3074 [Abstract(3383)]  [View PDF(5453)1.42 M]
  • Computing Software Reliability Based on Program Invariants
  • ZHOU Yuan and DING Zuo-Hua
  • 2015,26(12):3075-3087 [Abstract(3234)]  [View PDF(5355)1.28 M]
  • Exception Handling Approach of Floating Mathematical Functions
  • XU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei
  • 2015,26(12):3088-3103 [Abstract(3052)]  [View PDF(6402)1.69 M]
  • Programming Method of Dimensional Array Types and High Performance FFT Implementation
  • CUI Xiang, LI Xiao-Wen and CHEN Yi-Feng
  • 2015,26(12):3104-3116 [Abstract(3060)]  [View PDF(5143)1.36 M]
  • Reconstructive Algorithm Based on Extension Rule for Solving #SAT Incrementally
  • JIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang
  • 2015,26(12):3117-3129 [Abstract(2980)]  [View PDF(4548)1.35 M]
  • Subtopic Taxonomy-Aware Framework for Diversity Evaluation
  • CHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping
  • 2015,26(12):3130-3139 [Abstract(2834)]  [View PDF(4977)1.08 M]
  • Probabilistic Max Restricted Path Consistency
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2015,26(12):3140-3150 [Abstract(3094)]  [View PDF(5546)1.30 M]
  • Cross-Lingual Tense Tagging Based on Tree Conditional Random Fields
  • CHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang
  • 2015,26(12):3151-3161 [Abstract(2823)]  [View PDF(4724)1.10 M]
  • Construction of Multi-Attributes Decrement for Concept Lattice
  • MA Yuan and MA Weng-Sheng
  • 2015,26(12):3162-3173 [Abstract(2723)]  [View PDF(4169)1.23 M]
  • Identity-Based Hybrid Signcryption Scheme Using ECC
  • YU Hui-Fang and YANG Bo
  • 2015,26(12):3174-3182 [Abstract(3224)]  [View PDF(5116)1.09 M]
  • Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK Model
  • GAO Hai-Ying
  • 2015,26(12):3183-3195 [Abstract(2693)]  [View PDF(4637)1.31 M]
  • Efficient Revocable Certificateless Signature Against Signing Key Exposure
  • SUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min
  • 2015,26(12):3196-3203 [Abstract(3223)]  [View PDF(4640)906.14 K]
  • Efficient and Provide Security Certificateless Aggregate Signature Scheme
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2015,26(12):3204-3214 [Abstract(2754)]  [View PDF(5666)1.14 M]
  • Fast Privacy Preserving RFID Authentication Protocol
  • ZHAI Li
  • 2015,26(12):3215-3222 [Abstract(3003)]  [View PDF(4785)858.26 K]
  • Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming Search
  • CHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run
  • 2015,26(12):3223-3241 [Abstract(3642)]  [View PDF(4770)1.95 M]