Volume 24,Issue 4,2013 Table of Contents

Other Issues:  
  
Contents

  • “Use Case+Control Case” Driven Approach for Software Analysis and Design
  • LIU Chun,ZHANG Wei,ZHAO Hai-Yan and JIN Zhi
  • 2013,24(4):675-695 [Abstract(4667)]  [View PDF(6492)1021.92 K]
  • Performance Modeling and Analysis for Composite Service Considering Failure Recovery
  • GU Jun,LUO Jun-Zhou,CAO Jiu-Xin and LI Wei
  • 2013,24(4):696-714 [Abstract(3463)]  [View PDF(5612)1013.10 K]
  • Research on Relative Correctness of Radl Formal Specification
  • WANG Chang-Jing and XUE Jin-Yun
  • 2013,24(4):715-729 [Abstract(3470)]  [View PDF(5195)824.03 K]
  • Quantitative Evaluation on the Robustness for Software Obfuscating Transformation
  • FU Jian-Jing and WANG Ke
  • 2013,24(4):730-748 [Abstract(3558)]  [View PDF(5559)910.79 K]
  • Software Reliability Model Considering both Testing Effort and Testing Coverage
  • LI Hai-Feng,WANG Shuan-Qi,LIU Chang,ZHENG Jun and LI Zhen
  • 2013,24(4):749-760 [Abstract(4653)]  [View PDF(6910)636.68 K]
  • Framework for Domain-Oriented Academic Literatures Retrieval
  • QIU Jiang-Tao,TANG Chang-Jie and LI Qing
  • 2013,24(4):798-809 [Abstract(3957)]  [View PDF(6212)636.12 K]
  • Visual Quality Analysis Method for Relational Data
  • TENG Dong-Xing,ZENG Zhi-Rong,YANG Hai-Yan,WANG Hong-An and DAI Guo-Zhong
  • 2013,24(4):810-824 [Abstract(3649)]  [View PDF(7282)1.62 M]
  • Location Estimation in Wireless Sensor Networks Based on Probabilistic Model with Variant Variance and Evolutionary Algorithm
  • YE Miao and WANG Yu-Ping
  • 2013,24(4):859-872 [Abstract(3786)]  [View PDF(7154)873.45 K]
  • Group Key Management Based on Random Perturbation in Wireless Sensor Networks
  • ZENG Wei-Ni,LIN Ya-Ping,YU Jian-Ping and WANG Lei
  • 2013,24(4):873-886 [Abstract(3584)]  [View PDF(5919)818.92 K]
  • Selfish Node Detection and Incentive Mechanism in Mobile P2P Networks
  • QU Da-Peng,WANG Xing-Wei and HUANG Min
  • 2013,24(4):887-899 [Abstract(3601)]  [View PDF(6129)766.31 K]
  • Optimal Cross-Layer Power Control and Congestion Control Providing Energy Saving for Ad Hoc Networks
  • ZHANG Yong-Min,XU Wei-Qiang,HUANG Jiong,WANG Ya-Ming,SHU Ting and LIU Liang-Gui
  • 2013,24(4):900-914 [Abstract(3931)]  [View PDF(5657)802.28 K]
  • Review Articles

  • Research Progress on Test Case Evolution
  • ZHANG Zhi-Yi,CHEN Zhen-Yu,XU Bao-Wen and YANG Rui
  • 2013,24(4):663-674 [Abstract(9459)]  [View PDF(10632)735.36 K]
  • Database Physical Structure Optimization Technology
  • CUI Yue-Sheng,ZHANG Yong,ZENG Chun,FENG Jian-Hua and XING Chun-Xiao
  • 2013,24(4):761-780 [Abstract(8255)]  [View PDF(12025)999.54 K]
  • Web Data Source Selection Technologies
  • WAN Chang-Xuan,DENG Song,LIU Xi-Ping,LIAO Guo-Qiong,LIU De-Xi and JIANG Teng-Jiao
  • 2013,24(4):781-797 [Abstract(8061)]  [View PDF(10986)896.14 K]
  • Honeypot Technology Research and Application
  • ZHUGE Jian-Wei,TANG Yong,HAN Xin-Hui and DUAN Hai-Xin
  • 2013,24(4):825-842 [Abstract(9013)]  [View PDF(25355)1.09 M]
  • Drive-by-Download Mechanisms and Defenses
  • ZHANG Hui-Lin,ZOU Wei and HAN Xin-Hui
  • 2013,24(4):843-858 [Abstract(8401)]  [View PDF(14931)832.28 K]