Volume 27,Issue 12,2016 Table of Contents

Other Issues:  
  
Contents

  • Satisfiability Threshold of the Regular Random (k,r)-SAT Problem
  • ZHOU Jin-Cheng, XU Dao-Yun and LU You-Jun
  • 2016,27(12):2985-2993 [Abstract(3065)]  [View PDF(5287)1.14 M]
  • Exogenous Quantum Markov Chains and Reachability Analysis
  • LIN Yun-Guo and LI Yong-Ming
  • 2016,27(12):2994-3002 [Abstract(2693)]  [View PDF(5289)1.10 M]
  • Sufficient Conditions for Convergence of the Warning Propagation Algorithm
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(12):3003-3013 [Abstract(2920)]  [View PDF(5013)1.36 M]
  • Improving the Performance of Defect Prediction Based on Evolution Data
  • WANG Dan-Dan and WANG Qing
  • 2016,27(12):3014-3029 [Abstract(2271)]  [View PDF(4889)1.79 M]
  • Research on Multi-Scale Data Mining Method
  • LIU Meng-Meng, ZHAO Shu-Liang, HAN Yu-Hui, SU Dong-Hai, LI Xiao-Chao and CHEN Min
  • 2016,27(12):3030-3050 [Abstract(3787)]  [View PDF(6471)3.17 M]
  • Optimizing Top-k Similarity Join Algorithm
  • WANG Hong-Ya, YANG Li-Hong and LIU Xiao-Qiang
  • 2016,27(12):3051-3066 [Abstract(2698)]  [View PDF(5057)1.77 M]
  • Technique Based on Shared Execution Strategy for Optimizing Interval Query
  • ZHOU Xin, ZHANG Xiao, XUE Zhong-Bin and WANG Shan
  • 2016,27(12):3067-3084 [Abstract(1733)]  [View PDF(3925)2.27 M]
  • Real-Time and Passive Wormhole Detection for Wireless Sensor Networks
  • LU Li, Muhammad Jawad HUSSAIN and ZHU Jin-Qi
  • 2016,27(12):3085-3103 [Abstract(2937)]  [View PDF(5063)2.24 M]
  • Software Defined Security Networking Mechanism Against DDoS Attacks
  • WANG Xiu-Lei, CHEN Ming, XING Chang-You, SUN Zhi and WU Quan-Feng
  • 2016,27(12):3104-3119 [Abstract(3553)]  [View PDF(5887)2.50 M]
  • Coverage Prediction Model and Number Estimation for Directional Sensor Networks
  • LIU Zhi-Min, JIA Wei-Jia and WANG Guo-Jun
  • 2016,27(12):3120-3130 [Abstract(2099)]  [View PDF(4300)1.32 M]
  • Shape Recognition Using Unordered Point-Set Description and Matching of Object Contour
  • WANG Bin
  • 2016,27(12):3131-3142 [Abstract(2530)]  [View PDF(4591)2.08 M]
  • Method of Formal Design and Verification of OS on Assembly Layer
  • QIAN Zhen-Jiang, HUANG Hao and SONG Fang-Min
  • 2016,27(12):3143-3157 [Abstract(2763)]  [View PDF(5693)1.77 M]
  • Fault Tolerant Global Scheduling with Non-Preemptive Backups
  • PENG Hao, LU Yang, SUN Feng and HAN Jiang-Hong
  • 2016,27(12):3158-3171 [Abstract(1952)]  [View PDF(3790)1.59 M]
  • Data Characteristics-Based Kernel Malware Detection
  • CHEN Zhi-Feng, LI Qing-Bao, ZHANG Ping and DING Wen-Bo
  • 2016,27(12):3172-3191 [Abstract(3286)]  [View PDF(5645)2.23 M]
  • Load Balancing Framework for Metadata Service of Distributed File Systems
  • SUN Yao, LIU Jie, YE Dan and ZHONG Hua
  • 2016,27(12):3192-3207 [Abstract(3066)]  [View PDF(6045)1.91 M]
  • Approach of Measuring and Predicting Software System State Based on Hidden Markov Model
  • WU Jia, ZENG Wei-Ru, CHEN Han-Lin and TANG Xue-Fei
  • 2016,27(12):3208-3222 [Abstract(1993)]  [View PDF(6252)1.96 M]