Volume 25,Issue 11,2014 Table of Contents
Higher-Order π-Calculus with the Mismatch OperatorXU Xian2014,25(11):2433-2451 [Abstract(2829)] [View PDF(5295)1.06 M]Bounded Model Checking of C Programs Using Event Automaton SpecificationsKAN Shuang-Long,HUANG Zhi-Qiu,CHEN Zhe and XU Bing-Feng2014,25(11):2452-2472 [Abstract(3478)] [View PDF(5318)1.14 M]Web Service Quality Metric Algorithm Employing Objective and Subjective WeightMA You,WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun2014,25(11):2473-2485 [Abstract(3721)] [View PDF(6436)831.32 K]Prioritizing Pointer Analysis Algorithm Based on Points-to UpdatingLIU Peng,ZHAO Rong-Cai,PANG Jian-Min and YAO Yuan2014,25(11):2486-2498 [Abstract(2850)] [View PDF(5298)856.52 K]Bug Prediction Method for Fine-Grained Source Code ChangesYUAN Zi,YU Li-Li and LIU Chao2014,25(11):2499-2517 [Abstract(3841)] [View PDF(5923)1.93 M]Aggregation and Decomposition of Bipolar InformationWANG Guo-Jun and DUAN Jing-Yao2014,25(11):2518-2527 [Abstract(2627)] [View PDF(4945)650.48 K]Parallel Inference: A Method of Implicit Discourse Relation DetectionHONG Yu,YAN Wei-Rong,CHE Ting-Ting,LIANG Ying-Hong,YAO Jian-Min,ZHU Qiao-Ming and ZHOU Guo-Dong2014,25(11):2528-2555 [Abstract(3064)] [View PDF(5608)1.53 M]Approach to Network Services Recommendation Based on Mobile Users' LocationLIU Shu-Dong and MENG Xiang-Wu2014,25(11):2556-2574 [Abstract(4094)] [View PDF(7428)1.12 M]Flash-Aware Multi-Level Cache Management StrategyWANG Jiang-Tao,LAI Wen-Yu and MENG Xiao-Feng2014,25(11):2575-2586 [Abstract(2972)] [View PDF(5922)820.94 K]Study and Application of Temporal Quasi-Order Data StructureYE Xiao-Ping,TANG Yong,LIN Yan-Chong,CHEN Zhao-Ying and ZHANG Zhi-Bo2014,25(11):2587-2601 [Abstract(3436)] [View PDF(5398)991.15 K]Effective Link-Based Measure of Node Similarity on Information NetworksZHANG Ying-Long,LI Cui-Ping and CHEN Hong2014,25(11):2602-2615 [Abstract(3215)] [View PDF(5958)855.51 K]Hybrid Cutting Algorithm for Packet ClassificationHAN Wei-Tao,YI Peng and ZHANG Xia2014,25(11):2616-2626 [Abstract(3092)] [View PDF(4893)764.76 K]Analysis of Real Solutions Number by Four-Anchor Node Localization for Sensor NetworksJI Jing,LIU Gui-Xiong and YU Wen-Sheng2014,25(11):2627-2635 [Abstract(2691)] [View PDF(7205)658.68 K]Indoor Location Method Based on Support Vector Regression in 802.11 Wireless EnvironmentsSHI Ke,CHEN Hong-Sheng and ZHANG Ren-Tong2014,25(11):2636-2651 [Abstract(3221)] [View PDF(5231)1.53 M]Detecting Unknown Recommendation Attacks Based on Bionic Pattern RecognitionZHOU Quan-Qiang,ZHANG Fu-Zhi and LIU Wen-Yuan2014,25(11):2652-2665 [Abstract(2975)] [View PDF(5488)904.70 K]Design and Analysis of Kinematic Delay MAC for Non-Uniform Ad Hoc NetworkWEI Xiao-Long,LI Jian-Hai,XU Hao-Jun and YANG Hai-Dong2014,25(11):2666-2674 [Abstract(3288)] [View PDF(5566)814.24 K]Image Segmentation Based on Rough Set and Differential Immune Fuzzy Clustering AlgorithmMA Wen-Ping,HUANG Yuan-Yuan,LI Hao,LI Xiao-Ting and JIAO Li-Cheng2014,25(11):2675-2689 [Abstract(3371)] [View PDF(5770)1.68 M]Multi-Mode Decision Under Computational Resource Constraints for Video CodingLU Ji-Yuan,HOU Fang,HUANG Cheng-Hui,LIU Yu-Xi and CHAO Hong-Yang2014,25(11):2690-2701 [Abstract(3626)] [View PDF(5548)1.10 M]Approach of Virtual Machine Failure Recovery Based on Hidden Markov ModelZHANG Jian-Hua,ZHANG Wen-Bo,XU Ji-Wei,WEI Jun,ZHONG Hua and HUANG Tao2014,25(11):2702-2714 [Abstract(3067)] [View PDF(5570)919.98 K]Operator-Based Extendable Complex Event Processing ModelMENG You,LUAN Zhong-Zhi,XIE Ming and QIAN De-Pei2014,25(11):2715-2730 [Abstract(2907)] [View PDF(5300)1.30 M]