Journal of Guangxi Normal University(Natural Science Edition) ›› 2014, Vol. 32 ›› Issue (2): 48-54.
Previous Articles Next Articles
TAN Hong-jian, YANG Ya-hui, DONG Ming-gang
CLC Number:
[1] GOEL A L, OKUMOTO K. Time-dependent error-detection rate model for software reliability and other performance measures [J]. IEEE Transaction on Reliability, 1979, 28(3): 206-211. [2] OKUMOTO K, GOEL A L. Optimum release for software systems based on reliability and cost criteria [J]. Journal of Systems and Software, 1980, 1(4): 315-318. [3] NISHIO Y, DOHI T. Determination of the optimal software release time based on proportional hazards software reliability growth models. [J]. Journal of Quality in Maintenance Engineering, 2003, 9(1): 48-65. [4] CHATTERJEE S, SINGH J B. A NHPP based software reliability model and optimal release policy with logistic-exponential test coverage under imperfect debugging[J]. International Journal of System Assurance Engineering and Management, 2013:1-8. [5] HUANG C Y, LIN Chu-ti. Analysis of software reliability modeling considering testing compression factor and failure-to-fault relationship[J]. IEEE Transactions on Computers, 2010, 59(2): 283-288. [6] QUADRI S M K, AHMAD N. Software reliability growth modeling with new modified weibull testing-effort and optimal release policy[J]. International journal of computer applications, 2010, 6(12): 1-10. [7] KAPUR P K, PHAM H, Chanda U, et al. Optimal allocation of testing effort during testing and debugging phases: a control theoretic approach[J]. International Journal of Systems Science, 2013, 44(9): 1639-1650. [8] PHAM Hoang, Zhang Xue-mei, A software cost model with warranty and risk costs [J]. IEEE Transactions on Computers, 1999, 48(1): 71-75。 [9] HUANG Chin-yu. Cost-reliability optimal release policy for software reliability models incorporating improvements in testing efficiency [J]. Journal of Systems and Software, 2005, 77(2): 139-155. [10] XIE Min, LI Xiang, NG S H. Risk-based software release policy under parameter uncertainty[J]. Journal of Risk and Reliability, 2011, 225(1): 42-49. [11] LI Xiang, XIE Min, NG S H. Multi-Objective Optimization Approaches to Software Release Time Determination[J]. Asia-Pacific Journal of Operational Research, 2012, 29(3): 1240019. [12] 张烨,吴开贵. 考虑发布后故障发现概率的软件费用模型[J]. 计算机系统应用,2012, 21(1): 90-93. [13] 胡海宏,沈元隆. 基于用户要求并考虑软件失效的费用模型[J]. 计算机技术与发展,2011, 21(7): 91-95. |
[1] | GE Lina, LIU Jinhui. Privacy Preserving Method Based on k-isomorphism and Local Randomization [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 1-8. |
[2] | HOU You-li, YANG Xiong. Technology Research about Two-stage Encryption Key of DatabaseSecurity Based on DES Encryption Algorithm [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 125-130. |
[3] | HUANG Tian-qiang, LI Kai, ZHENG Zhi. Algorithm of Supervised Learning on Outlier Manifold [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 131-135. |
[4] | WANG Han, WANG Xu’an, ZHOU Neng, LIU Yudong. Blockchain-based Public Verifiable Scheme for Sharing Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 1-7. |
[5] | ZHANG Yongsheng, ZHU Wenjun, SHI Ruoqi, DU Zhenhua, ZHANG Rui, WANG Zhi. A Confidence-guided Hybrid Android Malware DetectionSystem with Multiple Heterogeneous Algorithms [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 19-28. |
[6] | WANG Tao, MA Chuan. Data Race Detection for Multi-threaded Programsin Android Based on Pi Calculus [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 29-42. |
[7] | ZHOU Yan-yan, FENG Jia-li. Algorithm of Digital Audio Watermarking Based on Qualitative Mapping [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(2): 200-204. |
|