Volume 26,Issue 12,2015 Table of Contents

Other Issues:  
  
Contents

  • Complexity Metrics for Regression Testing of Component-Based Software
  • TAO Chuan-Qi, LI Bi-Xin and Jerry Gao
  • 2015,26(12):3043-3061 [Abstract(3121)]  [View PDF(4551)2.34 M]
  • Method Name Recommendation Based on Source Code Depository and Feature Matching
  • GAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong
  • 2015,26(12):3062-3074 [Abstract(3400)]  [View PDF(5652)1.42 M]
  • Computing Software Reliability Based on Program Invariants
  • ZHOU Yuan and DING Zuo-Hua
  • 2015,26(12):3075-3087 [Abstract(3269)]  [View PDF(5503)1.28 M]
  • Exception Handling Approach of Floating Mathematical Functions
  • XU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei
  • 2015,26(12):3088-3103 [Abstract(3086)]  [View PDF(6864)1.69 M]
  • Programming Method of Dimensional Array Types and High Performance FFT Implementation
  • CUI Xiang, LI Xiao-Wen and CHEN Yi-Feng
  • 2015,26(12):3104-3116 [Abstract(3083)]  [View PDF(5344)1.36 M]
  • Reconstructive Algorithm Based on Extension Rule for Solving #SAT Incrementally
  • JIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang
  • 2015,26(12):3117-3129 [Abstract(3020)]  [View PDF(4712)1.35 M]
  • Subtopic Taxonomy-Aware Framework for Diversity Evaluation
  • CHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping
  • 2015,26(12):3130-3139 [Abstract(2858)]  [View PDF(5130)1.08 M]
  • Probabilistic Max Restricted Path Consistency
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2015,26(12):3140-3150 [Abstract(3112)]  [View PDF(5731)1.30 M]
  • Cross-Lingual Tense Tagging Based on Tree Conditional Random Fields
  • CHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang
  • 2015,26(12):3151-3161 [Abstract(2844)]  [View PDF(4876)1.10 M]
  • Construction of Multi-Attributes Decrement for Concept Lattice
  • MA Yuan and MA Weng-Sheng
  • 2015,26(12):3162-3173 [Abstract(2743)]  [View PDF(4309)1.23 M]
  • Identity-Based Hybrid Signcryption Scheme Using ECC
  • YU Hui-Fang and YANG Bo
  • 2015,26(12):3174-3182 [Abstract(3283)]  [View PDF(5272)1.09 M]
  • Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK Model
  • GAO Hai-Ying
  • 2015,26(12):3183-3195 [Abstract(2718)]  [View PDF(4787)1.31 M]
  • Efficient Revocable Certificateless Signature Against Signing Key Exposure
  • SUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min
  • 2015,26(12):3196-3203 [Abstract(3263)]  [View PDF(4803)906.14 K]
  • Efficient and Provide Security Certificateless Aggregate Signature Scheme
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2015,26(12):3204-3214 [Abstract(2780)]  [View PDF(6004)1.14 M]
  • Fast Privacy Preserving RFID Authentication Protocol
  • ZHAI Li
  • 2015,26(12):3215-3222 [Abstract(3024)]  [View PDF(4897)858.26 K]
  • Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming Search
  • CHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run
  • 2015,26(12):3223-3241 [Abstract(3694)]  [View PDF(4918)1.95 M]