Volume 25,Issue 11,2014 Table of Contents

Other Issues:  
  
Contents

  • Higher-Order π-Calculus with the Mismatch Operator
  • XU Xian
  • 2014,25(11):2433-2451 [Abstract(1872)]  [View PDF(2441)1.06 M]
  • Bounded Model Checking of C Programs Using Event Automaton Specifications
  • KAN Shuang-Long,HUANG Zhi-Qiu,CHEN Zhe and XU Bing-Feng
  • 2014,25(11):2452-2472 [Abstract(2501)]  [View PDF(2470)1.14 M]
  • Web Service Quality Metric Algorithm Employing Objective and Subjective Weight
  • MA You,WANG Shang-Guang,SUN Qi-Bo and YANG Fang-Chun
  • 2014,25(11):2473-2485 [Abstract(2641)]  [View PDF(3386)831.32 K]
  • Prioritizing Pointer Analysis Algorithm Based on Points-to Updating
  • LIU Peng,ZHAO Rong-Cai,PANG Jian-Min and YAO Yuan
  • 2014,25(11):2486-2498 [Abstract(2090)]  [View PDF(2556)856.52 K]
  • Bug Prediction Method for Fine-Grained Source Code Changes
  • YUAN Zi,YU Li-Li and LIU Chao
  • 2014,25(11):2499-2517 [Abstract(2764)]  [View PDF(2647)1.93 M]
  • Aggregation and Decomposition of Bipolar Information
  • WANG Guo-Jun and DUAN Jing-Yao
  • 2014,25(11):2518-2527 [Abstract(1802)]  [View PDF(2385)650.48 K]
  • Parallel Inference: A Method of Implicit Discourse Relation Detection
  • HONG Yu,YAN Wei-Rong,CHE Ting-Ting,LIANG Ying-Hong,YAO Jian-Min,ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2014,25(11):2528-2555 [Abstract(2120)]  [View PDF(2312)1.53 M]
  • Approach to Network Services Recommendation Based on Mobile Users' Location
  • LIU Shu-Dong and MENG Xiang-Wu
  • 2014,25(11):2556-2574 [Abstract(2842)]  [View PDF(3780)1.12 M]
  • Flash-Aware Multi-Level Cache Management Strategy
  • WANG Jiang-Tao,LAI Wen-Yu and MENG Xiao-Feng
  • 2014,25(11):2575-2586 [Abstract(1980)]  [View PDF(2799)820.94 K]
  • Study and Application of Temporal Quasi-Order Data Structure
  • YE Xiao-Ping,TANG Yong,LIN Yan-Chong,CHEN Zhao-Ying and ZHANG Zhi-Bo
  • 2014,25(11):2587-2601 [Abstract(2284)]  [View PDF(2516)991.15 K]
  • Effective Link-Based Measure of Node Similarity on Information Networks
  • ZHANG Ying-Long,LI Cui-Ping and CHEN Hong
  • 2014,25(11):2602-2615 [Abstract(2195)]  [View PDF(3058)855.51 K]
  • Hybrid Cutting Algorithm for Packet Classification
  • HAN Wei-Tao,YI Peng and ZHANG Xia
  • 2014,25(11):2616-2626 [Abstract(2153)]  [View PDF(2305)764.76 K]
  • Analysis of Real Solutions Number by Four-Anchor Node Localization for Sensor Networks
  • JI Jing,LIU Gui-Xiong and YU Wen-Sheng
  • 2014,25(11):2627-2635 [Abstract(1825)]  [View PDF(2513)658.68 K]
  • Indoor Location Method Based on Support Vector Regression in 802.11 Wireless Environments
  • SHI Ke,CHEN Hong-Sheng and ZHANG Ren-Tong
  • 2014,25(11):2636-2651 [Abstract(2328)]  [View PDF(2567)1.53 M]
  • Detecting Unknown Recommendation Attacks Based on Bionic Pattern Recognition
  • ZHOU Quan-Qiang,ZHANG Fu-Zhi and LIU Wen-Yuan
  • 2014,25(11):2652-2665 [Abstract(1984)]  [View PDF(2643)904.70 K]
  • Design and Analysis of Kinematic Delay MAC for Non-Uniform Ad Hoc Network
  • WEI Xiao-Long,LI Jian-Hai,XU Hao-Jun and YANG Hai-Dong
  • 2014,25(11):2666-2674 [Abstract(2332)]  [View PDF(2527)814.24 K]
  • Image Segmentation Based on Rough Set and Differential Immune Fuzzy Clustering Algorithm
  • MA Wen-Ping,HUANG Yuan-Yuan,LI Hao,LI Xiao-Ting and JIAO Li-Cheng
  • 2014,25(11):2675-2689 [Abstract(2396)]  [View PDF(2589)1.68 M]
  • Multi-Mode Decision Under Computational Resource Constraints for Video Coding
  • LU Ji-Yuan,HOU Fang,HUANG Cheng-Hui,LIU Yu-Xi and CHAO Hong-Yang
  • 2014,25(11):2690-2701 [Abstract(2456)]  [View PDF(2651)1.10 M]
  • Approach of Virtual Machine Failure Recovery Based on Hidden Markov Model
  • ZHANG Jian-Hua,ZHANG Wen-Bo,XU Ji-Wei,WEI Jun,ZHONG Hua and HUANG Tao
  • 2014,25(11):2702-2714 [Abstract(2109)]  [View PDF(2827)919.98 K]
  • Operator-Based Extendable Complex Event Processing Model
  • MENG You,LUAN Zhong-Zhi,XIE Ming and QIAN De-Pei
  • 2014,25(11):2715-2730 [Abstract(1953)]  [View PDF(2574)1.30 M]