Volume 26,Issue 2,2015 Table of Contents
Time Property Analysis Method for State/Event Fault TreeXU Bing-Feng, HUANG Zhi-Qiu, HU Jun, WEI Ou and LI Wei-Wei2015,26(2):427-446 [Abstract(4464)] [View PDF(6752)1.06 M]
安全攸关软件系统建模与验证专题前言李宣东,刘超,毛晓光2015,26(2):179-180 [Abstract(5770)] [View PDF(7437)316.89 K]Avionics System Testing Based on Formal MethodsLI Rui, LIAN Hang, MA Shi-Long and LI Tao2015,26(2):181-201 [Abstract(5772)] [View PDF(7859)2.27 M]Verification of AADL Models with Timed Abstract State MachinesYANG Zhi-Bin, HU Kai, ZHAO Yong-Wang, MA Dian-Fu and Jean-Paul BODEVEIX2015,26(2):202-222 [Abstract(6038)] [View PDF(8120)1016.99 K]Software Formal Modeling and Verification Method Based on Time STMHOU Gang, ZHOU Kuan-Jiu, CHANG Jun-Wang, WANG Jie and LI Ming-Chu2015,26(2):223-238 [Abstract(6561)] [View PDF(8560)1.36 M]Research on Reliability and Correctness Assurance Methods and Techniques for Device DriversZHANG Yi-Fan, HUANG Chao, OU Jian-Sheng, TANG En-Yi and CHEN Xin2015,26(2):239-253 [Abstract(5699)] [View PDF(7850)730.53 K]Software Fault Localization Based on Data ChainYANG Bo, WU Ji and LIU Chao2015,26(2):254-268 [Abstract(5664)] [View PDF(8704)658.18 K]Method of Automatic Test Case Generation for Safety-Critical Scenarios in Train Control SystemsCHEN Xin, JIANG Peng, ZHANG Yi-Fan, HUANG Chao and ZHOU Yan2015,26(2):269-278 [Abstract(5824)] [View PDF(7618)631.75 K]Schedulability Analysis Model for Multiprocessor Real-Time Systems Using UPPAALDAI Sheng-Xin, HONG Mei, GUO Bing, YANG Qiu-Hui, HUANG Wei and XU Bao-Ping2015,26(2):279-296 [Abstract(6208)] [View PDF(8852)1.61 M]Termination Analysis of Multipath Loop Programs with One VariableLI Yi, LI Chuan-Can and WU Wen-Yuan2015,26(2):297-304 [Abstract(5376)] [View PDF(6758)521.83 K]Statistical Model Checking for Rare-Event in Safety-Critical SystemDU De-Hui, CHENG Bei and LIU Jing2015,26(2):305-320 [Abstract(6167)] [View PDF(9201)892.15 K]Formal Modeling Approach for Aerospace Embedded SoftwareGU Bin, DONG Yun-Wei and WANG Zheng2015,26(2):321-331 [Abstract(6460)] [View PDF(8047)1.73 M]Trustworthy Translation for Eliminating High-Order Operation of a Synchronous Dataflow LanguageLIU Yang, GAN Yuan-Ke, WANG Sheng-Yuan, DONG Yuan, YANG Fei, SHI Gang and YAN Xin2015,26(2):332-347 [Abstract(5828)] [View PDF(7385)829.76 K]Software Vulnerability Code Clone Detection Method Based on Characteristic MetricsGAN Shui-Tao, QIN Xiao-Jun, CHEN Zuo-Ning and WANG Lin-Zhang2015,26(2):348-363 [Abstract(6132)] [View PDF(8197)747.87 K]Machine-Checked Model for Micro-Dalvik Virtual MachineHE Yan-Xiang, JIANG Nan, LI Qing-An, ZHANG Jun and SHEN Fan-Fan2015,26(2):364-379 [Abstract(5652)] [View PDF(7281)706.66 K]Statistical Model Checking of Cyber-Physical Systems Control SoftwareSHAN Li-Jun, ZHOU Xing-She, WANG Yu-Ying, ZHAO Lei, WAN Li-Jing, QIAO Lei and CEHN Jian-Xin2015,26(2):380-389 [Abstract(6005)] [View PDF(9810)847.67 K]
Review of Dynamic Fault Localization Approaches Based on Program SpectrumCHEN Xiang, JU Xiao-Lin, WEN Wan-Zhi and GU Qing2015,26(2):390-412 [Abstract(9358)] [View PDF(11848)843.69 K]Research on Integer-Based Vulnerabilities: Security Model, Detecting Methods and Real-World CasesSUN Hao and ZENG Qing-Kai2015,26(2):413-426 [Abstract(7677)] [View PDF(9206)614.68 K]