Volume 26,Issue 2,2015 Table of Contents
Time Property Analysis Method for State/Event Fault TreeXU Bing-Feng, HUANG Zhi-Qiu, HU Jun, WEI Ou and LI Wei-Wei2015,26(2):427-446 [Abstract(4429)] [View PDF(6494)1.06 M]
安全攸关软件系统建模与验证专题前言李宣东,刘超,毛晓光2015,26(2):179-180 [Abstract(5737)] [View PDF(6837)316.89 K]Avionics System Testing Based on Formal MethodsLI Rui, LIAN Hang, MA Shi-Long and LI Tao2015,26(2):181-201 [Abstract(5733)] [View PDF(7239)2.27 M]Verification of AADL Models with Timed Abstract State MachinesYANG Zhi-Bin, HU Kai, ZHAO Yong-Wang, MA Dian-Fu and Jean-Paul BODEVEIX2015,26(2):202-222 [Abstract(5992)] [View PDF(7601)1016.99 K]Software Formal Modeling and Verification Method Based on Time STMHOU Gang, ZHOU Kuan-Jiu, CHANG Jun-Wang, WANG Jie and LI Ming-Chu2015,26(2):223-238 [Abstract(6514)] [View PDF(7939)1.36 M]Research on Reliability and Correctness Assurance Methods and Techniques for Device DriversZHANG Yi-Fan, HUANG Chao, OU Jian-Sheng, TANG En-Yi and CHEN Xin2015,26(2):239-253 [Abstract(5668)] [View PDF(7321)730.53 K]Software Fault Localization Based on Data ChainYANG Bo, WU Ji and LIU Chao2015,26(2):254-268 [Abstract(5627)] [View PDF(8217)658.18 K]Method of Automatic Test Case Generation for Safety-Critical Scenarios in Train Control SystemsCHEN Xin, JIANG Peng, ZHANG Yi-Fan, HUANG Chao and ZHOU Yan2015,26(2):269-278 [Abstract(5778)] [View PDF(7068)631.75 K]Schedulability Analysis Model for Multiprocessor Real-Time Systems Using UPPAALDAI Sheng-Xin, HONG Mei, GUO Bing, YANG Qiu-Hui, HUANG Wei and XU Bao-Ping2015,26(2):279-296 [Abstract(6136)] [View PDF(8169)1.61 M]Termination Analysis of Multipath Loop Programs with One VariableLI Yi, LI Chuan-Can and WU Wen-Yuan2015,26(2):297-304 [Abstract(5347)] [View PDF(6214)521.83 K]Statistical Model Checking for Rare-Event in Safety-Critical SystemDU De-Hui, CHENG Bei and LIU Jing2015,26(2):305-320 [Abstract(6127)] [View PDF(8517)892.15 K]Formal Modeling Approach for Aerospace Embedded SoftwareGU Bin, DONG Yun-Wei and WANG Zheng2015,26(2):321-331 [Abstract(6409)] [View PDF(7465)1.73 M]Trustworthy Translation for Eliminating High-Order Operation of a Synchronous Dataflow LanguageLIU Yang, GAN Yuan-Ke, WANG Sheng-Yuan, DONG Yuan, YANG Fei, SHI Gang and YAN Xin2015,26(2):332-347 [Abstract(5791)] [View PDF(6857)829.76 K]Software Vulnerability Code Clone Detection Method Based on Characteristic MetricsGAN Shui-Tao, QIN Xiao-Jun, CHEN Zuo-Ning and WANG Lin-Zhang2015,26(2):348-363 [Abstract(6092)] [View PDF(7661)747.87 K]Machine-Checked Model for Micro-Dalvik Virtual MachineHE Yan-Xiang, JIANG Nan, LI Qing-An, ZHANG Jun and SHEN Fan-Fan2015,26(2):364-379 [Abstract(5616)] [View PDF(6732)706.66 K]Statistical Model Checking of Cyber-Physical Systems Control SoftwareSHAN Li-Jun, ZHOU Xing-She, WANG Yu-Ying, ZHAO Lei, WAN Li-Jing, QIAO Lei and CEHN Jian-Xin2015,26(2):380-389 [Abstract(5960)] [View PDF(9288)847.67 K]
Review of Dynamic Fault Localization Approaches Based on Program SpectrumCHEN Xiang, JU Xiao-Lin, WEN Wan-Zhi and GU Qing2015,26(2):390-412 [Abstract(9321)] [View PDF(11217)843.69 K]Research on Integer-Based Vulnerabilities: Security Model, Detecting Methods and Real-World CasesSUN Hao and ZENG Qing-Kai2015,26(2):413-426 [Abstract(7643)] [View PDF(8685)614.68 K]