Fang J Q,Wang X F,Zheng Z G.Research of dynamical complexity of nonlinear networks[J].Complex Systems and Complexity Science,2010,7(2-3):5-9.
[2]
何成万,张立军,张慧.基于元数据和反射的面向方面软件演化方法[J].电子学报,2011,39(8):1771-1777. He Cheng-wan,Zhang Li-jun,Zhang Hui.An approach to aspect-oriented software evolution based on metadata and reflection[J].Acta Electronica Sinica,2011,39(8):1771-1777.(in Chinese)
[3]
Sureka A.Learning to classify bug reports into components[J].Objects,Models,Components,Patterns,2012,73(4):288-303.
[4]
林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. Lin Chuang,Wang Yuan zhuo,Yang Yang,Qu Yang.Research on network dependability analysis methods based on stochastic Petri Net[J].Acta Electronica Sinica,2006,34(2):322-332.(in Chinese)
[5]
Vinay Singh,Vandana Bhattacherjee,Sandeep Bhattacharjee.An analysis of dependency of coupling on software defects[J].ACM SIGSOFT Software Engineering Notes,2012,37(1):1-6.
[6]
Hiller,M,Jhumka,A,Suri,N.Epic.Profiling the propagation and effect of data errors in software[J].IEEE Transactions Computers,2004,53(5):512-530.
[7]
Grunske L,Neumann R.Quality improvement by integrating non-functional properties in software architecture specification[J].EASY,2002,2(1):23-32.
[8]
P.Popic,D.Desovski,W.Abdelmoez.Error propagation in the reliability analysis of component-based systems [A].Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering [C].Chicago:Academic Press,2005.10-15.
[9]
Chidamber S R,Kemerer C F.A metrics suite for object oriented design[J].IEEE Transactions on Software Engineering,1994,20(6):476-493.
[10]
马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese)
[11]
Hongyu Zhang.On the distribution of software faults[J].IEEE Transactions on Software Engineering,2008,34(2):301-302.
[12]
陈平,韩浩,沈晓斌.基于动静态程序分析的整形漏洞检测工具[J].电子学报,2010,38(8):1741-1747. Chen Ping,Han Hao,Shen Xiao-bin.Detecting integer bugs based on static and dynamic program analysis[J].Acta Electronica Sinica,2010,38(8):1741-1747.(in Chinese)
[13]
Monson J S,Wirthlin M,Hutchings B.A fault injection analysis of Linux operating on an FPGA-embedded platform[J].International Journal of Reconfigurable Computing,2012,2012(1):7-18.
Yukihiko Nakata,Philipp Getto,Anna Marciniak-Czochra,Tomás Alarcón.Stability analysis of multi-compartment models for cell production systems[J].Journal of Biological Dynamics,2012,6(1):2-18.
[16]
Alsaade F,Fouda Y,Khan A R.Efficient cellular automata algorithm for template matching[J].Journal of Artificial Intelligence,2012,5(3):122-129.
[17]
苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. Su Pu-rui,Feng Deng-guo.An anomaly intrusion detection model based on nonhierarchical clustering[J].Acta Electronica Sinica,2006,34(10):1809-1811.(in Chinese)
[18]
徐建军,谭庆平,熊磊,叶俊.一种针对软错误的程序可靠性定量分析方法[J].电子学报,2011,39(3):675-679. Xu Jian-jun,Tan Qing-ping,Xiong Lei,Ye Jun.A quantitative approach for program reliability analysis of soft errors[J].Acta Electronica Sinica,2011,39(3):675-679.(in Chinese)
[19]
Wei-Feng Pan,Bing Li,Yu-Tao Ma.Measuring structural quality of object-oriented software via bug propagation analysis on weighted software networks[J].Journal of Computer Science and Technology,2010,25(6):1202-1213.
[20]
Avizienis A,Laprie J,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].Nato Security through Science Series E Human and Societal Dynamics,2007,23(10):11-33.
[21]
Elmqvist J,Nadjm-Tehrani S.Safety-oriented design of component assemblies using safety interfaces[J].Electronic Notes in Theoretical Computer Science,2007,182:57-72.
[22]
Rugina A E,Kanoun K,Kaaniche M.An architecture-based dependability modeling framework using AADL[J].arXiv preprint arXiv:2007,3(10):0704-0865.