Volume 25,Issue 11,2014 Table of Contents

Other Issues:  
  
Contents

  • Higher-Order π-Calculus with the Mismatch Operator
  • XU Xian
  • 2014,25(11):2433-2451 [Abstract(2829)]  [View PDF(5295)1.06 M]
  • Bounded Model Checking of C Programs Using Event Automaton Specifications
  • KAN Shuang-Long,HUANG Zhi-Qiu,CHEN Zhe and XU Bing-Feng
  • 2014,25(11):2452-2472 [Abstract(3478)]  [View PDF(5318)1.14 M]
  • Web Service Quality Metric Algorithm Employing Objective and Subjective Weight
  • MA You,WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2014,25(11):2473-2485 [Abstract(3721)]  [View PDF(6436)831.32 K]
  • Prioritizing Pointer Analysis Algorithm Based on Points-to Updating
  • LIU Peng,ZHAO Rong-Cai,PANG Jian-Min and YAO Yuan
  • 2014,25(11):2486-2498 [Abstract(2850)]  [View PDF(5298)856.52 K]
  • Bug Prediction Method for Fine-Grained Source Code Changes
  • YUAN Zi,YU Li-Li and LIU Chao
  • 2014,25(11):2499-2517 [Abstract(3841)]  [View PDF(5923)1.93 M]
  • Aggregation and Decomposition of Bipolar Information
  • WANG Guo-Jun and DUAN Jing-Yao
  • 2014,25(11):2518-2527 [Abstract(2627)]  [View PDF(4945)650.48 K]
  • Parallel Inference: A Method of Implicit Discourse Relation Detection
  • HONG Yu,YAN Wei-Rong,CHE Ting-Ting,LIANG Ying-Hong,YAO Jian-Min,ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2014,25(11):2528-2555 [Abstract(3064)]  [View PDF(5608)1.53 M]
  • Approach to Network Services Recommendation Based on Mobile Users' Location
  • LIU Shu-Dong and MENG Xiang-Wu
  • 2014,25(11):2556-2574 [Abstract(4094)]  [View PDF(7428)1.12 M]
  • Flash-Aware Multi-Level Cache Management Strategy
  • WANG Jiang-Tao,LAI Wen-Yu and MENG Xiao-Feng
  • 2014,25(11):2575-2586 [Abstract(2972)]  [View PDF(5922)820.94 K]
  • Study and Application of Temporal Quasi-Order Data Structure
  • YE Xiao-Ping,TANG Yong,LIN Yan-Chong,CHEN Zhao-Ying and ZHANG Zhi-Bo
  • 2014,25(11):2587-2601 [Abstract(3436)]  [View PDF(5398)991.15 K]
  • Effective Link-Based Measure of Node Similarity on Information Networks
  • ZHANG Ying-Long,LI Cui-Ping and CHEN Hong
  • 2014,25(11):2602-2615 [Abstract(3215)]  [View PDF(5958)855.51 K]
  • Hybrid Cutting Algorithm for Packet Classification
  • HAN Wei-Tao,YI Peng and ZHANG Xia
  • 2014,25(11):2616-2626 [Abstract(3092)]  [View PDF(4893)764.76 K]
  • Analysis of Real Solutions Number by Four-Anchor Node Localization for Sensor Networks
  • JI Jing,LIU Gui-Xiong and YU Wen-Sheng
  • 2014,25(11):2627-2635 [Abstract(2691)]  [View PDF(7205)658.68 K]
  • Indoor Location Method Based on Support Vector Regression in 802.11 Wireless Environments
  • SHI Ke,CHEN Hong-Sheng and ZHANG Ren-Tong
  • 2014,25(11):2636-2651 [Abstract(3221)]  [View PDF(5231)1.53 M]
  • Detecting Unknown Recommendation Attacks Based on Bionic Pattern Recognition
  • ZHOU Quan-Qiang,ZHANG Fu-Zhi and LIU Wen-Yuan
  • 2014,25(11):2652-2665 [Abstract(2975)]  [View PDF(5488)904.70 K]
  • Design and Analysis of Kinematic Delay MAC for Non-Uniform Ad Hoc Network
  • WEI Xiao-Long,LI Jian-Hai,XU Hao-Jun and YANG Hai-Dong
  • 2014,25(11):2666-2674 [Abstract(3288)]  [View PDF(5566)814.24 K]
  • Image Segmentation Based on Rough Set and Differential Immune Fuzzy Clustering Algorithm
  • MA Wen-Ping,HUANG Yuan-Yuan,LI Hao,LI Xiao-Ting and JIAO Li-Cheng
  • 2014,25(11):2675-2689 [Abstract(3371)]  [View PDF(5770)1.68 M]
  • Multi-Mode Decision Under Computational Resource Constraints for Video Coding
  • LU Ji-Yuan,HOU Fang,HUANG Cheng-Hui,LIU Yu-Xi and CHAO Hong-Yang
  • 2014,25(11):2690-2701 [Abstract(3626)]  [View PDF(5548)1.10 M]
  • Approach of Virtual Machine Failure Recovery Based on Hidden Markov Model
  • ZHANG Jian-Hua,ZHANG Wen-Bo,XU Ji-Wei,WEI Jun,ZHONG Hua and HUANG Tao
  • 2014,25(11):2702-2714 [Abstract(3067)]  [View PDF(5570)919.98 K]
  • Operator-Based Extendable Complex Event Processing Model
  • MENG You,LUAN Zhong-Zhi,XIE Ming and QIAN De-Pei
  • 2014,25(11):2715-2730 [Abstract(2907)]  [View PDF(5300)1.30 M]