Volume 26,Issue 12,2015 Table of Contents
Complexity Metrics for Regression Testing of Component-Based SoftwareTAO Chuan-Qi, LI Bi-Xin and Jerry Gao2015,26(12):3043-3061 [Abstract(3121)] [View PDF(4551)2.34 M]Method Name Recommendation Based on Source Code Depository and Feature MatchingGAO Yuan, LIU Hui, FAN Xiao-Zhong and NIU Zhen-Dong2015,26(12):3062-3074 [Abstract(3400)] [View PDF(5652)1.42 M]Computing Software Reliability Based on Program InvariantsZHOU Yuan and DING Zuo-Hua2015,26(12):3075-3087 [Abstract(3269)] [View PDF(5503)1.28 M]Exception Handling Approach of Floating Mathematical FunctionsXU Jin-Chen, GUO Shao-Zhong, HUANG Yong-Zhong, WANG Lei and ZHOU Bei2015,26(12):3088-3103 [Abstract(3086)] [View PDF(6864)1.69 M]Programming Method of Dimensional Array Types and High Performance FFT ImplementationCUI Xiang, LI Xiao-Wen and CHEN Yi-Feng2015,26(12):3104-3116 [Abstract(3083)] [View PDF(5344)1.36 M]Reconstructive Algorithm Based on Extension Rule for Solving #SAT IncrementallyJIA Feng-Yu, OUYANG Dan-Tong, ZHANG Li-Ming and LIU Si-Guang2015,26(12):3117-3129 [Abstract(3020)] [View PDF(4712)1.35 M]Subtopic Taxonomy-Aware Framework for Diversity EvaluationCHEN Fei, LIU Yi-Qun, ZHANG Min and MA Shao-Ping2015,26(12):3130-3139 [Abstract(2858)] [View PDF(5130)1.08 M]Probabilistic Max Restricted Path ConsistencyLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2015,26(12):3140-3150 [Abstract(3112)] [View PDF(5731)1.30 M]Cross-Lingual Tense Tagging Based on Tree Conditional Random FieldsCHEN Yi-Jiang, XU Hai-Bo, SHI Xiao-Dong and SU Chang2015,26(12):3151-3161 [Abstract(2844)] [View PDF(4876)1.10 M]Construction of Multi-Attributes Decrement for Concept LatticeMA Yuan and MA Weng-Sheng2015,26(12):3162-3173 [Abstract(2743)] [View PDF(4309)1.23 M]Identity-Based Hybrid Signcryption Scheme Using ECCYU Hui-Fang and YANG Bo2015,26(12):3174-3182 [Abstract(3283)] [View PDF(5272)1.09 M]Attribute-Based Authenticated Key Agreement Protocol Secure in ABeCK ModelGAO Hai-Ying2015,26(12):3183-3195 [Abstract(2718)] [View PDF(4787)1.31 M]Efficient Revocable Certificateless Signature Against Signing Key ExposureSUN Yin-Xia, ZHANG Fu-Tai and SHEN Li-Min2015,26(12):3196-3203 [Abstract(3263)] [View PDF(4803)906.14 K]Efficient and Provide Security Certificateless Aggregate Signature SchemeZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng2015,26(12):3204-3214 [Abstract(2780)] [View PDF(6004)1.14 M]Fast Privacy Preserving RFID Authentication ProtocolZHAI Li2015,26(12):3215-3222 [Abstract(3024)] [View PDF(4897)858.26 K]Rate-Monotonic Optimal Design Based on Tree-Like Linear Programming SearchCHEN Li, WANG Yong-Ji, WU Jing-Zheng and LÜ Yin-Run2015,26(12):3223-3241 [Abstract(3694)] [View PDF(4918)1.95 M]