Volume 27,Issue 12,2016 Table of Contents
Satisfiability Threshold of the Regular Random (k,r)-SAT ProblemZHOU Jin-Cheng, XU Dao-Yun and LU You-Jun2016,27(12):2985-2993 [Abstract(3065)] [View PDF(5287)1.14 M]Exogenous Quantum Markov Chains and Reachability AnalysisLIN Yun-Guo and LI Yong-Ming2016,27(12):2994-3002 [Abstract(2693)] [View PDF(5289)1.10 M]Sufficient Conditions for Convergence of the Warning Propagation AlgorithmWANG Xiao-Feng and XU Dao-Yun2016,27(12):3003-3013 [Abstract(2920)] [View PDF(5013)1.36 M]Improving the Performance of Defect Prediction Based on Evolution DataWANG Dan-Dan and WANG Qing2016,27(12):3014-3029 [Abstract(2271)] [View PDF(4889)1.79 M]Research on Multi-Scale Data Mining MethodLIU Meng-Meng, ZHAO Shu-Liang, HAN Yu-Hui, SU Dong-Hai, LI Xiao-Chao and CHEN Min2016,27(12):3030-3050 [Abstract(3787)] [View PDF(6471)3.17 M]Optimizing Top-k Similarity Join AlgorithmWANG Hong-Ya, YANG Li-Hong and LIU Xiao-Qiang2016,27(12):3051-3066 [Abstract(2698)] [View PDF(5057)1.77 M]Technique Based on Shared Execution Strategy for Optimizing Interval QueryZHOU Xin, ZHANG Xiao, XUE Zhong-Bin and WANG Shan2016,27(12):3067-3084 [Abstract(1733)] [View PDF(3925)2.27 M]Real-Time and Passive Wormhole Detection for Wireless Sensor NetworksLU Li, Muhammad Jawad HUSSAIN and ZHU Jin-Qi2016,27(12):3085-3103 [Abstract(2937)] [View PDF(5063)2.24 M]Software Defined Security Networking Mechanism Against DDoS AttacksWANG Xiu-Lei, CHEN Ming, XING Chang-You, SUN Zhi and WU Quan-Feng2016,27(12):3104-3119 [Abstract(3553)] [View PDF(5887)2.50 M]Coverage Prediction Model and Number Estimation for Directional Sensor NetworksLIU Zhi-Min, JIA Wei-Jia and WANG Guo-Jun2016,27(12):3120-3130 [Abstract(2099)] [View PDF(4300)1.32 M]Shape Recognition Using Unordered Point-Set Description and Matching of Object ContourWANG Bin2016,27(12):3131-3142 [Abstract(2530)] [View PDF(4591)2.08 M]Method of Formal Design and Verification of OS on Assembly LayerQIAN Zhen-Jiang, HUANG Hao and SONG Fang-Min2016,27(12):3143-3157 [Abstract(2763)] [View PDF(5693)1.77 M]Fault Tolerant Global Scheduling with Non-Preemptive BackupsPENG Hao, LU Yang, SUN Feng and HAN Jiang-Hong2016,27(12):3158-3171 [Abstract(1952)] [View PDF(3790)1.59 M]Data Characteristics-Based Kernel Malware DetectionCHEN Zhi-Feng, LI Qing-Bao, ZHANG Ping and DING Wen-Bo2016,27(12):3172-3191 [Abstract(3286)] [View PDF(5645)2.23 M]Load Balancing Framework for Metadata Service of Distributed File SystemsSUN Yao, LIU Jie, YE Dan and ZHONG Hua2016,27(12):3192-3207 [Abstract(3066)] [View PDF(6045)1.91 M]Approach of Measuring and Predicting Software System State Based on Hidden Markov ModelWU Jia, ZENG Wei-Ru, CHEN Han-Lin and TANG Xue-Fei2016,27(12):3208-3222 [Abstract(1993)] [View PDF(6252)1.96 M]