Volume 26,Issue 2,2015 Table of Contents

Other Issues:  
  
Contents

  • Time Property Analysis Method for State/Event Fault Tree
  • XU Bing-Feng, HUANG Zhi-Qiu, HU Jun, WEI Ou and LI Wei-Wei
  • 2015,26(2):427-446 [Abstract(4429)]  [View PDF(6494)1.06 M]
  • Special Issue's Articles

  • 安全攸关软件系统建模与验证专题前言
  • 李宣东,刘超,毛晓光
  • 2015,26(2):179-180 [Abstract(5737)]  [View PDF(6837)316.89 K]
  • Avionics System Testing Based on Formal Methods
  • LI Rui, LIAN Hang, MA Shi-Long and LI Tao
  • 2015,26(2):181-201 [Abstract(5733)]  [View PDF(7239)2.27 M]
  • Verification of AADL Models with Timed Abstract State Machines
  • YANG Zhi-Bin, HU Kai, ZHAO Yong-Wang, MA Dian-Fu and Jean-Paul BODEVEIX
  • 2015,26(2):202-222 [Abstract(5992)]  [View PDF(7601)1016.99 K]
  • Software Formal Modeling and Verification Method Based on Time STM
  • HOU Gang, ZHOU Kuan-Jiu, CHANG Jun-Wang, WANG Jie and LI Ming-Chu
  • 2015,26(2):223-238 [Abstract(6514)]  [View PDF(7939)1.36 M]
  • Research on Reliability and Correctness Assurance Methods and Techniques for Device Drivers
  • ZHANG Yi-Fan, HUANG Chao, OU Jian-Sheng, TANG En-Yi and CHEN Xin
  • 2015,26(2):239-253 [Abstract(5668)]  [View PDF(7321)730.53 K]
  • Software Fault Localization Based on Data Chain
  • YANG Bo, WU Ji and LIU Chao
  • 2015,26(2):254-268 [Abstract(5627)]  [View PDF(8217)658.18 K]
  • Method of Automatic Test Case Generation for Safety-Critical Scenarios in Train Control Systems
  • CHEN Xin, JIANG Peng, ZHANG Yi-Fan, HUANG Chao and ZHOU Yan
  • 2015,26(2):269-278 [Abstract(5778)]  [View PDF(7068)631.75 K]
  • Schedulability Analysis Model for Multiprocessor Real-Time Systems Using UPPAAL
  • DAI Sheng-Xin, HONG Mei, GUO Bing, YANG Qiu-Hui, HUANG Wei and XU Bao-Ping
  • 2015,26(2):279-296 [Abstract(6136)]  [View PDF(8169)1.61 M]
  • Termination Analysis of Multipath Loop Programs with One Variable
  • LI Yi, LI Chuan-Can and WU Wen-Yuan
  • 2015,26(2):297-304 [Abstract(5347)]  [View PDF(6214)521.83 K]
  • Statistical Model Checking for Rare-Event in Safety-Critical System
  • DU De-Hui, CHENG Bei and LIU Jing
  • 2015,26(2):305-320 [Abstract(6127)]  [View PDF(8517)892.15 K]
  • Formal Modeling Approach for Aerospace Embedded Software
  • GU Bin, DONG Yun-Wei and WANG Zheng
  • 2015,26(2):321-331 [Abstract(6409)]  [View PDF(7465)1.73 M]
  • Trustworthy Translation for Eliminating High-Order Operation of a Synchronous Dataflow Language
  • LIU Yang, GAN Yuan-Ke, WANG Sheng-Yuan, DONG Yuan, YANG Fei, SHI Gang and YAN Xin
  • 2015,26(2):332-347 [Abstract(5791)]  [View PDF(6857)829.76 K]
  • Software Vulnerability Code Clone Detection Method Based on Characteristic Metrics
  • GAN Shui-Tao, QIN Xiao-Jun, CHEN Zuo-Ning and WANG Lin-Zhang
  • 2015,26(2):348-363 [Abstract(6092)]  [View PDF(7661)747.87 K]
  • Machine-Checked Model for Micro-Dalvik Virtual Machine
  • HE Yan-Xiang, JIANG Nan, LI Qing-An, ZHANG Jun and SHEN Fan-Fan
  • 2015,26(2):364-379 [Abstract(5616)]  [View PDF(6732)706.66 K]
  • Statistical Model Checking of Cyber-Physical Systems Control Software
  • SHAN Li-Jun, ZHOU Xing-She, WANG Yu-Ying, ZHAO Lei, WAN Li-Jing, QIAO Lei and CEHN Jian-Xin
  • 2015,26(2):380-389 [Abstract(5960)]  [View PDF(9288)847.67 K]
  • Review Articles

  • Review of Dynamic Fault Localization Approaches Based on Program Spectrum
  • CHEN Xiang, JU Xiao-Lin, WEN Wan-Zhi and GU Qing
  • 2015,26(2):390-412 [Abstract(9321)]  [View PDF(11217)843.69 K]
  • Research on Integer-Based Vulnerabilities: Security Model, Detecting Methods and Real-World Cases
  • SUN Hao and ZENG Qing-Kai
  • 2015,26(2):413-426 [Abstract(7643)]  [View PDF(8685)614.68 K]