Volume 24,Issue 5,2013 Table of ContentsDownload Contents
Subnettrees for Strict Pattern Matching with General Gaps and Length ConstraintsWU You-Xi,LIU Ya-Wei,GUO Lei and WU Xin-Dong2013,24(5):915-932 [Abstract(5400)] [View PDF(4315)1.03 M]Commutativity of Quantum Weakest Liberal Precondition and Its PropertiesLEI Hong-Xuan,XI Zheng-Jun and LI Yong-Ming2013,24(5):933-941 [Abstract(3825)] [View PDF(3271)623.22 K]Model-Based Change Impact Analysis for Component-Based SoftwareTAO Chuan-Qi,LI Bi-Xin,Jerry GAO and SUN Xiao-Bing2013,24(5):942-960 [Abstract(4350)] [View PDF(3807)1.74 M]From User Requirements to Software Specifications:An Approach Based on Problem TransformationLI Zhi and JIN Zhi2013,24(5):961-976 [Abstract(5001)] [View PDF(4129)1.07 M]Technique of Software Fault Localization Based on Hierarchical Slicing SpectrumWEN Wan-Zhi,LI Bi-Xin,SUN Xiao-Bing and LIU Cui-Cui2013,24(5):977-992 [Abstract(4896)] [View PDF(4898)986.02 K]Sound and Complete Set of Reduction Rules of Free Choice WF-NetsZHANG Man,DUAN Zhen-Hua and WANG Xiao-Bing2013,24(5):993-1005 [Abstract(3557)] [View PDF(3266)909.46 K]Web-Based Dynamic Multi-Document Summarization System FrameworkLIU Mei-Ling,REN Hong-E,YU Yang,ZHENG De-Quan and ZHAO Tie-Jun2013,24(5):1006-1021 [Abstract(4128)] [View PDF(3404)1001.06 K]Implicit Discourse Relation Recognition Based on Tree KernelXU Fan,ZHU Qiao-Ming and ZHOU Guo-Dong2013,24(5):1022-1035 [Abstract(3971)] [View PDF(3413)935.04 K]Subjectivity Ranking of Verbs and Adjectives with an Unlabeled CorpusXU Ge,MENG Xin-Fan and WANG Hou-Feng2013,24(5):1036-1050 [Abstract(3721)] [View PDF(3876)982.02 K]Open Domain New Word Detection Using Condition Random Field MethodCHEN Fei,LIU Yi-Qun,WEI Chao,ZHANG Yun-Liang,ZHANG Min and MA Shao-Ping2013,24(5):1051-1060 [Abstract(4062)] [View PDF(9579)820.24 K]Building Entity Relationship Models for PDDL and Developing Planners Based on Stored ProceduresRAO Dong-Ning,JIANG Zhi-Hua and JIANG Yun-Fei2013,24(5):1061-1077 [Abstract(3503)] [View PDF(5407)1.42 M]Reliable Dynamic Source Routing Protocol Based on Local Trust SystemSUN Yu-Xing,XIE Li and CHEN Yi-Fei2013,24(5):1098-1110 [Abstract(3549)] [View PDF(3558)1.04 M]Algebraic Truncated Differential Cryptanalysis of 5-Round Salsa20GUAN Jie and ZHANG Zhong-Ya2013,24(5):1111-1126 [Abstract(3578)] [View PDF(3544)925.00 K]Extensible User Interface Description LanguageDU Yi,DENG Chang-Zhi,TIAN Feng,REN Lei and DAI Guo-Zhong2013,24(5):1127-1142 [Abstract(4449)] [View PDF(3899)2.15 M]Sparsity and Smoothing Multi-Regularization Constraints for Blind Image DeblurringTANG Shu,GONG Wei-Guo and ZHONG Jian-Hua2013,24(5):1143-1154 [Abstract(3440)] [View PDF(4281)2.07 M]Weighted Cost Sensitive Locality Preserving Projection for Face RecognitionWAN Jian-Wu,YANG Ming,JI Gen-Lin and CHEN Yin-Juan2013,24(5):1155-1164 [Abstract(3967)] [View PDF(4258)1.19 M]
Research on OpenFlow-Based SDN TechnologiesZUO Qing-Yun,CHEN Ming,ZHAO Guang-Song,XING Chang-You,ZHANG Guo-Min and JIANG Pei-Cheng2013,24(5):1078-1097 [Abstract(11830)] [View PDF(18170)1.74 M]