Volume 26,Issue 1,2015 Table of Contents
Technique of Cooperative Reverse Reasoning in Related Path Static AnalysisGUO Xi and WANG Pan2015,26(1):1-13 [Abstract(8266)] [View PDF(8241)731.52 K]
Optimized Software Testing Strategy Based on the Defect Correlation Markov ModelBAO Xiao-An,XIE Xiao-Ming,ZHANG Na,CAO Jian-Wen and GUI Ning2015,26(1):14-25 [Abstract(5511)] [View PDF(5924)651.88 K]Research on the Robust Illumination of the Likelihood Similarity Function in Tracking TargetDI Nan,ZHU Ming and HAN Guang-Liang2015,26(1):52-61 [Abstract(3850)] [View PDF(5388)1.90 M]Joint Adaptation Algorithm of Rate, Mode and Channel for IEEE 802.11nCHEN Jian,LI He-Wu,ZHANG Xiao-Yan and ZHOU Jun2015,26(1):98-108 [Abstract(4059)] [View PDF(6086)728.49 K]Proxy Re-Signature Scheme for Stream ExchangeSUN Yi,CHEN Xing-Yuan,DU Xue-Hui,CHEN Liang and XU Jian2015,26(1):129-144 [Abstract(3585)] [View PDF(5446)1.83 M]
Survey on Transfer Learning ResearchZHUANG Fu-Zhen,LUO Ping,HE Qing and SHI Zhong-Zhi2015,26(1):26-39 [Abstract(14163)] [View PDF(19041)763.52 K]Computational Metaphor ProcessingTIAN Jia,SU Chang and CHEN Yi-Jiang2015,26(1):40-51 [Abstract(7923)] [View PDF(7657)617.70 K]State-of-the-Art Survey on Software-Defined Networking (SDN)ZHANG Chao-Kun,CUI Yong,TANG He-Yi and WU Jian-Ping2015,26(1):62-81 [Abstract(16528)] [View PDF(31915)1.04 M]Survey on Network-Coding-Aware Routing in Wireless NetworkCHEN Chen,DONG Chao,MAO Ya-Fei,CHEN Gui-Hai and WANG Hai2015,26(1):82-97 [Abstract(7340)] [View PDF(7956)915.67 K]Survey on the Searchable EncryptionLI Jing-Wei,JIA Chun-Fu,LIU Zhe-Li,LI Jin and LI Min2015,26(1):109-128 [Abstract(9737)] [View PDF(17464)850.63 K]Research on Indexing for Cloud Data ManagementMA You-Zhong and MENG Xiao-Feng2015,26(1):145-166 [Abstract(9352)] [View PDF(10141)1.65 M]Progress and Challenges of Graph Aggregation and Summarization TechniquesPAN Qiu-Ping,YOU Jin-Guo,ZHANG Zhi-Peng,DONG Peng-Zhi and HU Bao-Li2015,26(1):167-177 [Abstract(8264)] [View PDF(7233)621.82 K]