Volume 24,Issue 5,2013 Table of ContentsDownload Contents
Subnettrees for Strict Pattern Matching with General Gaps and Length ConstraintsWU You-Xi,LIU Ya-Wei,GUO Lei and WU Xin-Dong2013,24(5):915-932 [Abstract(5473)] [View PDF(4331)1.03 M]Commutativity of Quantum Weakest Liberal Precondition and Its PropertiesLEI Hong-Xuan,XI Zheng-Jun and LI Yong-Ming2013,24(5):933-941 [Abstract(3932)] [View PDF(3280)623.22 K]Model-Based Change Impact Analysis for Component-Based SoftwareTAO Chuan-Qi,LI Bi-Xin,Jerry GAO and SUN Xiao-Bing2013,24(5):942-960 [Abstract(4423)] [View PDF(3832)1.74 M]From User Requirements to Software Specifications:An Approach Based on Problem TransformationLI Zhi and JIN Zhi2013,24(5):961-976 [Abstract(5107)] [View PDF(4356)1.07 M]Technique of Software Fault Localization Based on Hierarchical Slicing SpectrumWEN Wan-Zhi,LI Bi-Xin,SUN Xiao-Bing and LIU Cui-Cui2013,24(5):977-992 [Abstract(5006)] [View PDF(5313)986.02 K]Sound and Complete Set of Reduction Rules of Free Choice WF-NetsZHANG Man,DUAN Zhen-Hua and WANG Xiao-Bing2013,24(5):993-1005 [Abstract(3619)] [View PDF(3275)909.46 K]Web-Based Dynamic Multi-Document Summarization System FrameworkLIU Mei-Ling,REN Hong-E,YU Yang,ZHENG De-Quan and ZHAO Tie-Jun2013,24(5):1006-1021 [Abstract(4194)] [View PDF(3417)1001.06 K]Implicit Discourse Relation Recognition Based on Tree KernelXU Fan,ZHU Qiao-Ming and ZHOU Guo-Dong2013,24(5):1022-1035 [Abstract(4032)] [View PDF(3413)935.04 K]Subjectivity Ranking of Verbs and Adjectives with an Unlabeled CorpusXU Ge,MENG Xin-Fan and WANG Hou-Feng2013,24(5):1036-1050 [Abstract(3803)] [View PDF(3886)982.02 K]Open Domain New Word Detection Using Condition Random Field MethodCHEN Fei,LIU Yi-Qun,WEI Chao,ZHANG Yun-Liang,ZHANG Min and MA Shao-Ping2013,24(5):1051-1060 [Abstract(4178)] [View PDF(9905)820.24 K]Building Entity Relationship Models for PDDL and Developing Planners Based on Stored ProceduresRAO Dong-Ning,JIANG Zhi-Hua and JIANG Yun-Fei2013,24(5):1061-1077 [Abstract(3575)] [View PDF(5583)1.42 M]Reliable Dynamic Source Routing Protocol Based on Local Trust SystemSUN Yu-Xing,XIE Li and CHEN Yi-Fei2013,24(5):1098-1110 [Abstract(3607)] [View PDF(3562)1.04 M]Algebraic Truncated Differential Cryptanalysis of 5-Round Salsa20GUAN Jie and ZHANG Zhong-Ya2013,24(5):1111-1126 [Abstract(3692)] [View PDF(3921)925.00 K]Extensible User Interface Description LanguageDU Yi,DENG Chang-Zhi,TIAN Feng,REN Lei and DAI Guo-Zhong2013,24(5):1127-1142 [Abstract(4540)] [View PDF(3907)2.15 M]Sparsity and Smoothing Multi-Regularization Constraints for Blind Image DeblurringTANG Shu,GONG Wei-Guo and ZHONG Jian-Hua2013,24(5):1143-1154 [Abstract(3506)] [View PDF(4286)2.07 M]Weighted Cost Sensitive Locality Preserving Projection for Face RecognitionWAN Jian-Wu,YANG Ming,JI Gen-Lin and CHEN Yin-Juan2013,24(5):1155-1164 [Abstract(4041)] [View PDF(4319)1.19 M]
Research on OpenFlow-Based SDN TechnologiesZUO Qing-Yun,CHEN Ming,ZHAO Guang-Song,XING Chang-You,ZHANG Guo-Min and JIANG Pei-Cheng2013,24(5):1078-1097 [Abstract(12110)] [View PDF(18792)1.74 M]