Volume 24,Issue 4,2013 Table of Contents
“Use Case+Control Case” Driven Approach for Software Analysis and DesignLIU Chun,ZHANG Wei,ZHAO Hai-Yan and JIN Zhi2013,24(4):675-695 [Abstract(4667)] [View PDF(6492)1021.92 K]Performance Modeling and Analysis for Composite Service Considering Failure RecoveryGU Jun,LUO Jun-Zhou,CAO Jiu-Xin and LI Wei2013,24(4):696-714 [Abstract(3463)] [View PDF(5612)1013.10 K]Research on Relative Correctness of Radl Formal SpecificationWANG Chang-Jing and XUE Jin-Yun2013,24(4):715-729 [Abstract(3470)] [View PDF(5195)824.03 K]Quantitative Evaluation on the Robustness for Software Obfuscating TransformationFU Jian-Jing and WANG Ke2013,24(4):730-748 [Abstract(3558)] [View PDF(5559)910.79 K]Software Reliability Model Considering both Testing Effort and Testing CoverageLI Hai-Feng,WANG Shuan-Qi,LIU Chang,ZHENG Jun and LI Zhen2013,24(4):749-760 [Abstract(4653)] [View PDF(6910)636.68 K]Framework for Domain-Oriented Academic Literatures RetrievalQIU Jiang-Tao,TANG Chang-Jie and LI Qing2013,24(4):798-809 [Abstract(3957)] [View PDF(6212)636.12 K]Visual Quality Analysis Method for Relational DataTENG Dong-Xing,ZENG Zhi-Rong,YANG Hai-Yan,WANG Hong-An and DAI Guo-Zhong2013,24(4):810-824 [Abstract(3649)] [View PDF(7282)1.62 M]Location Estimation in Wireless Sensor Networks Based on Probabilistic Model with Variant Variance and Evolutionary AlgorithmYE Miao and WANG Yu-Ping2013,24(4):859-872 [Abstract(3786)] [View PDF(7154)873.45 K]Group Key Management Based on Random Perturbation in Wireless Sensor NetworksZENG Wei-Ni,LIN Ya-Ping,YU Jian-Ping and WANG Lei2013,24(4):873-886 [Abstract(3584)] [View PDF(5919)818.92 K]Selfish Node Detection and Incentive Mechanism in Mobile P2P NetworksQU Da-Peng,WANG Xing-Wei and HUANG Min2013,24(4):887-899 [Abstract(3601)] [View PDF(6129)766.31 K]Optimal Cross-Layer Power Control and Congestion Control Providing Energy Saving for Ad Hoc NetworksZHANG Yong-Min,XU Wei-Qiang,HUANG Jiong,WANG Ya-Ming,SHU Ting and LIU Liang-Gui2013,24(4):900-914 [Abstract(3931)] [View PDF(5657)802.28 K]
Research Progress on Test Case EvolutionZHANG Zhi-Yi,CHEN Zhen-Yu,XU Bao-Wen and YANG Rui2013,24(4):663-674 [Abstract(9459)] [View PDF(10632)735.36 K]Database Physical Structure Optimization TechnologyCUI Yue-Sheng,ZHANG Yong,ZENG Chun,FENG Jian-Hua and XING Chun-Xiao2013,24(4):761-780 [Abstract(8255)] [View PDF(12025)999.54 K]Web Data Source Selection TechnologiesWAN Chang-Xuan,DENG Song,LIU Xi-Ping,LIAO Guo-Qiong,LIU De-Xi and JIANG Teng-Jiao2013,24(4):781-797 [Abstract(8061)] [View PDF(10986)896.14 K]Honeypot Technology Research and ApplicationZHUGE Jian-Wei,TANG Yong,HAN Xin-Hui and DUAN Hai-Xin2013,24(4):825-842 [Abstract(9013)] [View PDF(25355)1.09 M]Drive-by-Download Mechanisms and DefensesZHANG Hui-Lin,ZOU Wei and HAN Xin-Hui2013,24(4):843-858 [Abstract(8401)] [View PDF(14931)832.28 K]