Volume 21,Issue 2,2010 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 可信软件的构造与演化分析专刊前言
  • **王怀民
  • 2010,21(2):177-178 [Abstract(9270)]  [View PDF(9918)233.26 K]
  • High-Trusted-Software-Oriented Automatic Testing for Integer Overflow Bugs
  • LU Xi-Cheng,LI Gen,LU Kai and ZHANG Ying
  • 2010,21(2):179-193 [Abstract(10299)]  [View PDF(11171)1.76 M]
  • Resource-Aware Performance Diagnostic Method for Web Applications
  • WANG Wei,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2010,21(2):194-208 [Abstract(9604)]  [View PDF(11750)1.44 M]
  • Path Sensitive Static Defect Detecting Method
  • XIAO Qing,GONG Yun-Zhan,YANG Zhao-Hong,JIN Da-Hai and WANG Ya-Wen
  • 2010,21(2):209-217 [Abstract(9991)]  [View PDF(10797)745.49 K]
  • Scalable Time-Based Multi-Cycle Checkpointing
  • CI Yi-Wei,ZHANG Zhan,ZUO De-Cheng,WU Zhi-Bo and YANG Xiao-Zong
  • 2010,21(2):218-230 [Abstract(9838)]  [View PDF(9049)1016.67 K]
  • Fault Diagnosis and Handling for Service Composition Based on Petri Nets
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2010,21(2):231-247 [Abstract(12854)]  [View PDF(19392)1.21 M]
  • Failure Diagnosis of Internetware Systems Using Dynamic Description Logic
  • WANG Zhu-Xiao,YANG Kun and SHI Zhong-Zhi
  • 2010,21(2):248-260 [Abstract(9027)]  [View PDF(10423)1.03 M]
  • Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition
  • ZENG Jin,SUN Hai-Long,LIU Xu-Dong,DENG Ting and HUAI Jin-Peng
  • 2010,21(2):261-276 [Abstract(10240)]  [View PDF(13948)1.44 M]
  • Service-Oriented Reliable Multimedia Delivery Algorithm
  • ZHANG Sheng,QIAN Zhu-Zhong and LU Sang-Lu
  • 2010,21(2):277-286 [Abstract(9071)]  [View PDF(9424)1.03 M]
  • Approach to Transforming UML Model to Reliability Analysis Model
  • LIU Yi,MA Zhi-Yi,HE Xiao and HAO Wei-Zhong
  • 2010,21(2):287-304 [Abstract(8598)]  [View PDF(11453)2.60 M]
  • Construction and Certification of a Bytecode Virtual Machine
  • DONG Yuan,REN Kai,WANG Sheng-Yuan and ZHANG Su-Qin
  • 2010,21(2):305-317 [Abstract(8330)]  [View PDF(11341)945.12 K]
  • Construction Techniques of Anticipatory Monitors for Parameterized LTL
  • ZHAO Chang-Zhi,DONG Wei,SUI Ping and QI Zhi-Chang
  • 2010,21(2):318-333 [Abstract(8335)]  [View PDF(9144)1.06 M]
  • Pointer Logic Dealing with Uncertain Equality of Pointers
  • LIANG Hong-Jin,ZHANG Yu,CHEN Yi-Yun,LI Zhao-Peng and HUA Bao-Jian
  • 2010,21(2):334-343 [Abstract(10735)]  [View PDF(8785)701.30 K]
  • Model and Quantification of Autonomic Dependability of Mission-Critical Systems
  • WANG Hui-Qiang,Lü Hong-Wu,ZHAO Qian,DONG Xi-Kun and FENG Guang-Sheng
  • 2010,21(2):344-358 [Abstract(8549)]  [View PDF(29125)1.01 M]
  • Framework Supporting Software Assets Evaluation on Trustworthiness
  • CAI Si-Bo,ZOU Yan-Zhen,SHAO Ling-Shuang,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):359-372 [Abstract(9273)]  [View PDF(10995)1.00 M]
  • Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM
  • GU Liang,GUO Yao,WANG Hua,ZOU Yan-Zhen,XIE Bing and SHAO Wei-Zhong
  • 2010,21(2):373-387 [Abstract(8787)]  [View PDF(13588)1.10 M]
  • Reputation-Based Recommender Discovery Approach for Service Selection
  • PAN Jing,XU Feng and Lü Jian
  • 2010,21(2):388-400 [Abstract(9222)]  [View PDF(11297)1.18 M]