Volume 25,Issue 11,2014 Table of Contents
Higher-Order π-Calculus with the Mismatch OperatorXU Xian2014,25(11):2433-2451 [Abstract(2815)] [View PDF(5191)1.06 M]Bounded Model Checking of C Programs Using Event Automaton SpecificationsKAN Shuang-Long,HUANG Zhi-Qiu,CHEN Zhe and XU Bing-Feng2014,25(11):2452-2472 [Abstract(3463)] [View PDF(5230)1.14 M]Web Service Quality Metric Algorithm Employing Objective and Subjective WeightMA You,WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun2014,25(11):2473-2485 [Abstract(3695)] [View PDF(6331)831.32 K]Prioritizing Pointer Analysis Algorithm Based on Points-to UpdatingLIU Peng,ZHAO Rong-Cai,PANG Jian-Min and YAO Yuan2014,25(11):2486-2498 [Abstract(2834)] [View PDF(5212)856.52 K]Bug Prediction Method for Fine-Grained Source Code ChangesYUAN Zi,YU Li-Li and LIU Chao2014,25(11):2499-2517 [Abstract(3826)] [View PDF(5790)1.93 M]Aggregation and Decomposition of Bipolar InformationWANG Guo-Jun and DUAN Jing-Yao2014,25(11):2518-2527 [Abstract(2612)] [View PDF(4864)650.48 K]Parallel Inference: A Method of Implicit Discourse Relation DetectionHONG Yu,YAN Wei-Rong,CHE Ting-Ting,LIANG Ying-Hong,YAO Jian-Min,ZHU Qiao-Ming and ZHOU Guo-Dong2014,25(11):2528-2555 [Abstract(3054)] [View PDF(5487)1.53 M]Approach to Network Services Recommendation Based on Mobile Users' LocationLIU Shu-Dong and MENG Xiang-Wu2014,25(11):2556-2574 [Abstract(4084)] [View PDF(7321)1.12 M]Flash-Aware Multi-Level Cache Management StrategyWANG Jiang-Tao,LAI Wen-Yu and MENG Xiao-Feng2014,25(11):2575-2586 [Abstract(2954)] [View PDF(5824)820.94 K]Study and Application of Temporal Quasi-Order Data StructureYE Xiao-Ping,TANG Yong,LIN Yan-Chong,CHEN Zhao-Ying and ZHANG Zhi-Bo2014,25(11):2587-2601 [Abstract(3419)] [View PDF(5285)991.15 K]Effective Link-Based Measure of Node Similarity on Information NetworksZHANG Ying-Long,LI Cui-Ping and CHEN Hong2014,25(11):2602-2615 [Abstract(3203)] [View PDF(5871)855.51 K]Hybrid Cutting Algorithm for Packet ClassificationHAN Wei-Tao,YI Peng and ZHANG Xia2014,25(11):2616-2626 [Abstract(3066)] [View PDF(4794)764.76 K]Analysis of Real Solutions Number by Four-Anchor Node Localization for Sensor NetworksJI Jing,LIU Gui-Xiong and YU Wen-Sheng2014,25(11):2627-2635 [Abstract(2669)] [View PDF(7066)658.68 K]Indoor Location Method Based on Support Vector Regression in 802.11 Wireless EnvironmentsSHI Ke,CHEN Hong-Sheng and ZHANG Ren-Tong2014,25(11):2636-2651 [Abstract(3197)] [View PDF(5149)1.53 M]Detecting Unknown Recommendation Attacks Based on Bionic Pattern RecognitionZHOU Quan-Qiang,ZHANG Fu-Zhi and LIU Wen-Yuan2014,25(11):2652-2665 [Abstract(2968)] [View PDF(5401)904.70 K]Design and Analysis of Kinematic Delay MAC for Non-Uniform Ad Hoc NetworkWEI Xiao-Long,LI Jian-Hai,XU Hao-Jun and YANG Hai-Dong2014,25(11):2666-2674 [Abstract(3276)] [View PDF(5480)814.24 K]Image Segmentation Based on Rough Set and Differential Immune Fuzzy Clustering AlgorithmMA Wen-Ping,HUANG Yuan-Yuan,LI Hao,LI Xiao-Ting and JIAO Li-Cheng2014,25(11):2675-2689 [Abstract(3352)] [View PDF(5667)1.68 M]Multi-Mode Decision Under Computational Resource Constraints for Video CodingLU Ji-Yuan,HOU Fang,HUANG Cheng-Hui,LIU Yu-Xi and CHAO Hong-Yang2014,25(11):2690-2701 [Abstract(3605)] [View PDF(5463)1.10 M]Approach of Virtual Machine Failure Recovery Based on Hidden Markov ModelZHANG Jian-Hua,ZHANG Wen-Bo,XU Ji-Wei,WEI Jun,ZHONG Hua and HUANG Tao2014,25(11):2702-2714 [Abstract(3051)] [View PDF(5460)919.98 K]Operator-Based Extendable Complex Event Processing ModelMENG You,LUAN Zhong-Zhi,XIE Ming and QIAN De-Pei2014,25(11):2715-2730 [Abstract(2891)] [View PDF(5219)1.30 M]