Volume 25,Issue 11,2014 Table of Contents

Other Issues:  
  
Contents

  • Higher-Order π-Calculus with the Mismatch Operator
  • XU Xian
  • 2014,25(11):2433-2451 [Abstract(2815)]  [View PDF(5191)1.06 M]
  • Bounded Model Checking of C Programs Using Event Automaton Specifications
  • KAN Shuang-Long,HUANG Zhi-Qiu,CHEN Zhe and XU Bing-Feng
  • 2014,25(11):2452-2472 [Abstract(3463)]  [View PDF(5230)1.14 M]
  • Web Service Quality Metric Algorithm Employing Objective and Subjective Weight
  • MA You,WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2014,25(11):2473-2485 [Abstract(3695)]  [View PDF(6331)831.32 K]
  • Prioritizing Pointer Analysis Algorithm Based on Points-to Updating
  • LIU Peng,ZHAO Rong-Cai,PANG Jian-Min and YAO Yuan
  • 2014,25(11):2486-2498 [Abstract(2834)]  [View PDF(5212)856.52 K]
  • Bug Prediction Method for Fine-Grained Source Code Changes
  • YUAN Zi,YU Li-Li and LIU Chao
  • 2014,25(11):2499-2517 [Abstract(3826)]  [View PDF(5790)1.93 M]
  • Aggregation and Decomposition of Bipolar Information
  • WANG Guo-Jun and DUAN Jing-Yao
  • 2014,25(11):2518-2527 [Abstract(2612)]  [View PDF(4864)650.48 K]
  • Parallel Inference: A Method of Implicit Discourse Relation Detection
  • HONG Yu,YAN Wei-Rong,CHE Ting-Ting,LIANG Ying-Hong,YAO Jian-Min,ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2014,25(11):2528-2555 [Abstract(3054)]  [View PDF(5487)1.53 M]
  • Approach to Network Services Recommendation Based on Mobile Users' Location
  • LIU Shu-Dong and MENG Xiang-Wu
  • 2014,25(11):2556-2574 [Abstract(4084)]  [View PDF(7321)1.12 M]
  • Flash-Aware Multi-Level Cache Management Strategy
  • WANG Jiang-Tao,LAI Wen-Yu and MENG Xiao-Feng
  • 2014,25(11):2575-2586 [Abstract(2954)]  [View PDF(5824)820.94 K]
  • Study and Application of Temporal Quasi-Order Data Structure
  • YE Xiao-Ping,TANG Yong,LIN Yan-Chong,CHEN Zhao-Ying and ZHANG Zhi-Bo
  • 2014,25(11):2587-2601 [Abstract(3419)]  [View PDF(5285)991.15 K]
  • Effective Link-Based Measure of Node Similarity on Information Networks
  • ZHANG Ying-Long,LI Cui-Ping and CHEN Hong
  • 2014,25(11):2602-2615 [Abstract(3203)]  [View PDF(5871)855.51 K]
  • Hybrid Cutting Algorithm for Packet Classification
  • HAN Wei-Tao,YI Peng and ZHANG Xia
  • 2014,25(11):2616-2626 [Abstract(3066)]  [View PDF(4794)764.76 K]
  • Analysis of Real Solutions Number by Four-Anchor Node Localization for Sensor Networks
  • JI Jing,LIU Gui-Xiong and YU Wen-Sheng
  • 2014,25(11):2627-2635 [Abstract(2669)]  [View PDF(7066)658.68 K]
  • Indoor Location Method Based on Support Vector Regression in 802.11 Wireless Environments
  • SHI Ke,CHEN Hong-Sheng and ZHANG Ren-Tong
  • 2014,25(11):2636-2651 [Abstract(3197)]  [View PDF(5149)1.53 M]
  • Detecting Unknown Recommendation Attacks Based on Bionic Pattern Recognition
  • ZHOU Quan-Qiang,ZHANG Fu-Zhi and LIU Wen-Yuan
  • 2014,25(11):2652-2665 [Abstract(2968)]  [View PDF(5401)904.70 K]
  • Design and Analysis of Kinematic Delay MAC for Non-Uniform Ad Hoc Network
  • WEI Xiao-Long,LI Jian-Hai,XU Hao-Jun and YANG Hai-Dong
  • 2014,25(11):2666-2674 [Abstract(3276)]  [View PDF(5480)814.24 K]
  • Image Segmentation Based on Rough Set and Differential Immune Fuzzy Clustering Algorithm
  • MA Wen-Ping,HUANG Yuan-Yuan,LI Hao,LI Xiao-Ting and JIAO Li-Cheng
  • 2014,25(11):2675-2689 [Abstract(3352)]  [View PDF(5667)1.68 M]
  • Multi-Mode Decision Under Computational Resource Constraints for Video Coding
  • LU Ji-Yuan,HOU Fang,HUANG Cheng-Hui,LIU Yu-Xi and CHAO Hong-Yang
  • 2014,25(11):2690-2701 [Abstract(3605)]  [View PDF(5463)1.10 M]
  • Approach of Virtual Machine Failure Recovery Based on Hidden Markov Model
  • ZHANG Jian-Hua,ZHANG Wen-Bo,XU Ji-Wei,WEI Jun,ZHONG Hua and HUANG Tao
  • 2014,25(11):2702-2714 [Abstract(3051)]  [View PDF(5460)919.98 K]
  • Operator-Based Extendable Complex Event Processing Model
  • MENG You,LUAN Zhong-Zhi,XIE Ming and QIAN De-Pei
  • 2014,25(11):2715-2730 [Abstract(2891)]  [View PDF(5219)1.30 M]