Volume 25,Issue 3,2014 Table of Contents
Visual Debugging Concurrent Programs with Event StructureWU Xiao-Quan and WEI Jun2014,25(3):457-471 [Abstract(3136)] [View PDF(5393)937.79 K]Efficient Scene-Sensitive Fault Detection ApproachZHONG Lu-Jie,HUO Wei,LI Long,LI Feng,FENG Xiao-Bing and ZHANG Zhao-Qing2014,25(3):472-488 [Abstract(3086)] [View PDF(4828)874.75 K]Formal Semantics Model for Automatic Test of Safety Critical SystemsLÜ Jiang-Hua,MA Shi-Long,LI Xian-Jun and GAO Shi-Wei2014,25(3):489-505 [Abstract(3976)] [View PDF(6070)874.67 K]Dynamic Result Optimization for Keyword Search over Relational DatabasesLIN Zi-Yu,ZOU Quan,LAI Yong-Xuan and LIN Chen2014,25(3):528-546 [Abstract(4604)] [View PDF(6541)1.03 M]Dynamic Community Detection Based on Information Flow AnalysisSUO Bo,LI Zhan-Huai,CHEN Qun and WANG Zhong2014,25(3):547-559 [Abstract(3253)] [View PDF(5351)1.37 M]Index Structure for Multivariate Time Series under DTW Distance MetricLI Zheng-Xin,ZHANG Feng-Ming,LI Ke-Wu and ZHANG Xiao-Feng2014,25(3):560-575 [Abstract(3786)] [View PDF(6982)853.28 K]Scheduling Scheme Algorithm in Low-Duty-Cycle WSNCHEN Liang-Yin,WANG Jin-Lei,ZHANG Jing-Yu,WANG Qiang,LIU Yan,YIN Feng and LUO Qian2014,25(3):631-641 [Abstract(3308)] [View PDF(6038)609.35 K]
Securing Prefixes Against BGP Hijacking in a Cooperative WayWANG Xiao-Qiang,ZHU Pei-Dong and LU Xi-Cheng2014,25(3):642-661 [Abstract(3157)] [View PDF(5768)2.33 M]Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution EnvironmentLIU Chuan-Yi,LIN Jie and TANG Bo2014,25(3):662-674 [Abstract(4659)] [View PDF(8392)1.26 M]
Saliency Texture Structure Descriptor and its Application in Pedestrian DetectionXIAO De-Gui,XIN Chen,ZHANG Ting,ZHU Huan and LI Xiao-Le2014,25(3):675-689 [Abstract(3548)] [View PDF(6082)1.10 M]
Mobile User Requirements Acquisition Techniques and Their ApplicationsMENG Xiang-Wu,WANG Fan,SHI Yan-Cui and ZHANG Yu-Jie2014,25(3):439-456 [Abstract(7707)] [View PDF(10573)867.41 K]Survey on Quality Evaluation and Control of Online ReviewsLIN Yu-Ming,WANG Xiao-Ling,ZHU Tao and ZHOU Ao-Ying2014,25(3):506-527 [Abstract(8049)] [View PDF(9897)1021.48 K]Survey on Privacy Preserving Techniques for Publishing Social Network DataLIU Xiang-Yu,WANG Bin and YANG Xiao-Chun2014,25(3):576-590 [Abstract(8855)] [View PDF(10980)830.93 K]Survey on Research and Progress of Low-Rate Denial of Service AttacksWEN Kun,YANG Jia-Hai and ZHANG Bin2014,25(3):591-605 [Abstract(7264)] [View PDF(7981)768.21 K]Rendezvous in Cognitive Radio Networks:A SurveyLIU Quan,ZHAO Guang-Sheng,WANG Xiao-Dong and ZHOU Xing-Ming2014,25(3):606-630 [Abstract(7198)] [View PDF(9066)1.37 M]