Volume 25,Issue 3,2014 Table of Contents

Other Issues:  
  
Contents

  • Visual Debugging Concurrent Programs with Event Structure
  • WU Xiao-Quan and WEI Jun
  • 2014,25(3):457-471 [Abstract(3136)]  [View PDF(5393)937.79 K]
  • Efficient Scene-Sensitive Fault Detection Approach
  • ZHONG Lu-Jie,HUO Wei,LI Long,LI Feng,FENG Xiao-Bing and ZHANG Zhao-Qing
  • 2014,25(3):472-488 [Abstract(3086)]  [View PDF(4828)874.75 K]
  • Formal Semantics Model for Automatic Test of Safety Critical Systems
  • LÜ Jiang-Hua,MA Shi-Long,LI Xian-Jun and GAO Shi-Wei
  • 2014,25(3):489-505 [Abstract(3976)]  [View PDF(6070)874.67 K]
  • Dynamic Result Optimization for Keyword Search over Relational Databases
  • LIN Zi-Yu,ZOU Quan,LAI Yong-Xuan and LIN Chen
  • 2014,25(3):528-546 [Abstract(4604)]  [View PDF(6541)1.03 M]
  • Dynamic Community Detection Based on Information Flow Analysis
  • SUO Bo,LI Zhan-Huai,CHEN Qun and WANG Zhong
  • 2014,25(3):547-559 [Abstract(3253)]  [View PDF(5351)1.37 M]
  • Index Structure for Multivariate Time Series under DTW Distance Metric
  • LI Zheng-Xin,ZHANG Feng-Ming,LI Ke-Wu and ZHANG Xiao-Feng
  • 2014,25(3):560-575 [Abstract(3786)]  [View PDF(6982)853.28 K]
  • Scheduling Scheme Algorithm in Low-Duty-Cycle WSN
  • CHEN Liang-Yin,WANG Jin-Lei,ZHANG Jing-Yu,WANG Qiang,LIU Yan,YIN Feng and LUO Qian
  • 2014,25(3):631-641 [Abstract(3308)]  [View PDF(6038)609.35 K]
  • Contents

  • Securing Prefixes Against BGP Hijacking in a Cooperative Way
  • WANG Xiao-Qiang,ZHU Pei-Dong and LU Xi-Cheng
  • 2014,25(3):642-661 [Abstract(3157)]  [View PDF(5768)2.33 M]
  • Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution Environment
  • LIU Chuan-Yi,LIN Jie and TANG Bo
  • 2014,25(3):662-674 [Abstract(4659)]  [View PDF(8392)1.26 M]
  • Contents

  • Saliency Texture Structure Descriptor and its Application in Pedestrian Detection
  • XIAO De-Gui,XIN Chen,ZHANG Ting,ZHU Huan and LI Xiao-Le
  • 2014,25(3):675-689 [Abstract(3548)]  [View PDF(6082)1.10 M]
  • Review Articles

  • Mobile User Requirements Acquisition Techniques and Their Applications
  • MENG Xiang-Wu,WANG Fan,SHI Yan-Cui and ZHANG Yu-Jie
  • 2014,25(3):439-456 [Abstract(7707)]  [View PDF(10573)867.41 K]
  • Survey on Quality Evaluation and Control of Online Reviews
  • LIN Yu-Ming,WANG Xiao-Ling,ZHU Tao and ZHOU Ao-Ying
  • 2014,25(3):506-527 [Abstract(8049)]  [View PDF(9897)1021.48 K]
  • Survey on Privacy Preserving Techniques for Publishing Social Network Data
  • LIU Xiang-Yu,WANG Bin and YANG Xiao-Chun
  • 2014,25(3):576-590 [Abstract(8855)]  [View PDF(10980)830.93 K]
  • Survey on Research and Progress of Low-Rate Denial of Service Attacks
  • WEN Kun,YANG Jia-Hai and ZHANG Bin
  • 2014,25(3):591-605 [Abstract(7264)]  [View PDF(7981)768.21 K]
  • Rendezvous in Cognitive Radio Networks:A Survey
  • LIU Quan,ZHAO Guang-Sheng,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2014,25(3):606-630 [Abstract(7198)]  [View PDF(9066)1.37 M]