Advanced Search

    column
    False Positive Elimination in Static Defect Detection
    Zhao Yunshan, Gong Yunzhan, Zhou Ao, Wang Qian, and Zhou Hongbo
    2012, 49(9): 1822-1831.
    Abstract PDF
    Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction
    Dong Longming, Wang Ji, Chen Liqian, Dong Wei
    2012, 49(9): 1832-1842.
    Abstract PDF
    Automatically Generating Error-Traceable Test Cases Based on Compiler
    He Yanxiang, Chen Yong, Wu Wei, Xu Chao, and Wu Libing
    2012, 49(9): 1843-1851.
    Abstract PDF
    Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis
    Zhou Hongbo, Jin Dahai, and Gong Yunzhan
    2012, 49(9): 1852-1862.
    Abstract PDF
    Verifying the Correctness of Loop Optimization Based on Extended Logic Transformation System μTS
    Wang Changjing
    2012, 49(9): 1863-1873.
    Abstract PDF
    Dynamical Integrity of Codes: Model and Method
    Wu Hao and Wu Guoqing
    2012, 49(9): 1874-1882.
    Abstract PDF
    A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization
    Wu Jianhui, Zhang Jing, Li Renfa, Liu Zhaohua
    2012, 49(9): 1883-1898.
    Abstract PDF
    A Fast Heuristic Parallel Ant Colony Algorithm for Circles Packing Problem with the Equilibrium Constraints
    Li Ziqiang, Tian Zhuojun, Wang Yishou, Yue Benxian
    2012, 49(9): 1899-1909.
    Abstract PDF
    Multiple Objects Event Detection over RFID Data Streams
    Peng Shanglian, Li Zhanhuai, Li Qiang, Chen Qun, Liu Hailong
    2012, 49(9): 1910-1925.
    Abstract PDF
    Mining Frequent Subtree on Paging XML Data Stream
    Lei Xiangxin, Yang Zhiying, Huang Shaoyin, Hu Yunfa
    2012, 49(9): 1926-1936.
    Abstract PDF
    An LDA Based Approach to Detect the Low-Quality Reply Posts in Web Forums
    Han Xiaohui, Ma Jun, Shao Haimin, and Xue Ran
    2012, 49(9): 1937-1946.
    Abstract PDF
    A Secure Top-k Query Protocol in Two-Tiered Sensor Networks
    Li Rui, Lin Yaping, Yi Yeqing, Xiong Shuai, and Ye Songtao
    2012, 49(9): 1947-1958.
    Abstract PDF
    Passive RFID Tag Anti-Collision Binary Tree Slotted Protocol without Tags Quantity Estimation
    Wu Haifeng, Zeng Yu, and Feng Jihua
    2012, 49(9): 1959-1971.
    Abstract PDF
    Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network
    Zheng Liming, Zou Peng, Han Weihong, Li Aiping, Jia Yan
    2012, 49(9): 1972-1981.
    Abstract PDF
    Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
    Li Chao, Tian Xinguang, Xiao Xi, Duan Miyi
    2012, 49(9): 1982-1990.
    Abstract PDF
    A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation
    Liu Meng, Wang Xuan, Huang Hejiao, Zhao Hainan, Zhang Jiajia
    2012, 49(9): 1991-1998.
    Abstract PDF
    Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata
    Zhou Yousheng, Wang Feng, Qing Sihan, Yang Yixian, Niu Xinxin
    2012, 49(9): 1999-2004.
    Abstract PDF
    eTissue: An Adaptive Reconfigurable Bio-Inspired Hardware Architecture
    Xu Jiaqing, Dou Yong, Lü Qi, Feng Xue
    2012, 49(9): 2005-2017.
    Abstract PDF
    An Optimized Code-Generating Algorithm for Reconfigurable Instruction Set Processors
    Zhang Huizhen, Wang Chao, Li Xi, Zhou Xuehai
    2012, 49(9): 2018-2026.
    Abstract PDF
    A Novel Flow for Asynchronous Circuit Design Using Synchronous EDA Tools
    Wang Yourui, Shi Wei, Wang Zhiying, Lu Hongyi, and Su Bo
    2012, 49(9): 2027-2035.
    Abstract PDF
    Applying Batch Processing to Improve Performance of iSCSI Storage System
    Han Yong, Yao Nianmin, and Diao Ying
    2012, 49(9): 2036-2043.
    Abstract PDF