Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2015 Issue 10
Multi-Objective Optimization Based On-Line Adjustment Strategy of Test Case Prioritization
ZHANG Na;,YAO Lan;,BAO Xiao-An;,DONG Meng;,GUI Ning;
..............page:2451-2464
Software Reliability Model with Irregular Changes of Fault Detection Rate
WANG Jin-Yong;,WU Zhi-Bo;,SHU Yan-Jun;,ZHANG Zhan;
..............page:2465-2484
Bounded Model Checking Technique for Interrupt-Driven Systems
ZHOU Xiao-Yu;,GU Bin;,ZHAO Jian-Hua;,YANG Meng-Fei;
..............page:2485-2503
Mutation Testing Based on Statistical Dominance Analysis
ZHANG Gong-Jie;,GONG Dun-Wei;,YAO Xiang-Juan;
..............page:2504-2520
Model Checking CSP Based on ASP and Critical-Trace Model of CSP
ZHAO Ling-Zhong;,ZHAI Zhong-Yi;,QIAN Jun-Yan;,GUO Yun-Chuan;
..............page:2521-2544
Formal Analysis to Non-Functional Requirements of Trustworthy Software
ZHANG Xuan;,LI Tong;,WANG Xu;,YU Qian;,YU Yong;,ZHU Rui;
..............page:2545-2566
Ensemble Model and Algorithm with Recalling and Forgetting Mechanisms for Data Stream Mining
ZHAO Qiang-Li;,JIANG Yan-Huang;,LU Yu-Tong;
..............page:2567-2580
User-Aware De-Duplication Algorithm
ZHANG Hu-Yin;,ZHOU Jing-Cai;,CHEN Yi-Bo;,ZHA Wen-Liang;
..............page:2581-2595
Schema Matching Method Based on Information Unit
DU Xiao-Kun;,LI Guo-Hui;,WANG Jiang-Qing;,TIE Jun;,LI Yan-Hong;
..............page:2596-2613
Multi-Granularity and Time-Varying Fractal Dimension on Data Stream
NI Zhi-Wei;,WANG Chao;,HU Tang-Lei;,NI Li-Ping;
..............page:2614-2630
Throughput Oriented Range Query Algorithm for Moving Objects in Dual Stream Mode
XUE Zhong-Bin;,ZHOU Xuan;,WANG Shan;
..............page:2631-2643
Heuristic Concurrent Dispatching Algorithm for MSM Clos-Network Switches
LIU Xiao-Feng;,ZHAO You-Jian;,CHEN Guo;
..............page:2644-2655
Temperature-Adaptive Time Synchronization for Wireless Sensor Networks
JIN Meng;,CHEN Xiao-Jiang;,FANG Ding-Yi;,TANG Zhan-Yong;,LIU Chen;,XU Dan;,WANG Wei;
..............page:2667-2683
Meet-in-the-Middle Attack on TWINE Block Cipher
WANG Yan-Feng;,WU Wen-Ling;
..............page:2684-2695
Fully Homomorphic Encryption from Approximate Ideal Lattices
GU Chun-Sheng;
..............page:2696-2719
Getting Upright Orientation of 3D Objects via Viewpoint Scoring
HAN Hong-Lei;,WANG Wen-Cheng;,HUA Miao;
..............page:2720-2732
Object Tracking Based on Component-Level Appearance Model
WANG Mei-Hua;,LIANG Yun;,LIU Fu-Ming;,LUO Xiao-Nan;
..............page:2733-2747