Volume 25,Issue 3,2014 Table of Contents

Other Issues:  
  
Contents

  • Visual Debugging Concurrent Programs with Event Structure
  • WU Xiao-Quan and WEI Jun
  • 2014,25(3):457-471 [Abstract(1914)]  [View PDF(2494)937.79 K]
  • Efficient Scene-Sensitive Fault Detection Approach
  • ZHONG Lu-Jie,HUO Wei,LI Long,LI Feng,FENG Xiao-Bing and ZHANG Zhao-Qing
  • 2014,25(3):472-488 [Abstract(1793)]  [View PDF(1971)874.75 K]
  • Formal Semantics Model for Automatic Test of Safety Critical Systems
  • LÜ Jiang-Hua,MA Shi-Long,LI Xian-Jun and GAO Shi-Wei
  • 2014,25(3):489-505 [Abstract(2411)]  [View PDF(2360)874.67 K]
  • Dynamic Result Optimization for Keyword Search over Relational Databases
  • LIN Zi-Yu,ZOU Quan,LAI Yong-Xuan and LIN Chen
  • 2014,25(3):528-546 [Abstract(2827)]  [View PDF(3029)1.03 M]
  • Dynamic Community Detection Based on Information Flow Analysis
  • SUO Bo,LI Zhan-Huai,CHEN Qun and WANG Zhong
  • 2014,25(3):547-559 [Abstract(2050)]  [View PDF(2525)1.37 M]
  • Index Structure for Multivariate Time Series under DTW Distance Metric
  • LI Zheng-Xin,ZHANG Feng-Ming,LI Ke-Wu and ZHANG Xiao-Feng
  • 2014,25(3):560-575 [Abstract(2088)]  [View PDF(2540)853.28 K]
  • Scheduling Scheme Algorithm in Low-Duty-Cycle WSN
  • CHEN Liang-Yin,WANG Jin-Lei,ZHANG Jing-Yu,WANG Qiang,LIU Yan,YIN Feng and LUO Qian
  • 2014,25(3):631-641 [Abstract(1895)]  [View PDF(2449)609.35 K]
  • Contents

  • Securing Prefixes Against BGP Hijacking in a Cooperative Way
  • WANG Xiao-Qiang,ZHU Pei-Dong and LU Xi-Cheng
  • 2014,25(3):642-661 [Abstract(1987)]  [View PDF(1848)2.33 M]
  • Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution Environment
  • LIU Chuan-Yi,LIN Jie and TANG Bo
  • 2014,25(3):662-674 [Abstract(3150)]  [View PDF(4828)1.26 M]
  • Contents

  • Saliency Texture Structure Descriptor and its Application in Pedestrian Detection
  • XIAO De-Gui,XIN Chen,ZHANG Ting,ZHU Huan and LI Xiao-Le
  • 2014,25(3):675-689 [Abstract(2006)]  [View PDF(2531)1.10 M]
  • Review Articles

  • Mobile User Requirements Acquisition Techniques and Their Applications
  • MENG Xiang-Wu,WANG Fan,SHI Yan-Cui and ZHANG Yu-Jie
  • 2014,25(3):439-456 [Abstract(5472)]  [View PDF(4524)867.41 K]
  • Survey on Quality Evaluation and Control of Online Reviews
  • LIN Yu-Ming,WANG Xiao-Ling,ZHU Tao and ZHOU Ao-Ying
  • 2014,25(3):506-527 [Abstract(5722)]  [View PDF(4514)1021.48 K]
  • Survey on Privacy Preserving Techniques for Publishing Social Network Data
  • LIU Xiang-Yu,WANG Bin and YANG Xiao-Chun
  • 2014,25(3):576-590 [Abstract(5910)]  [View PDF(5054)830.93 K]
  • Survey on Research and Progress of Low-Rate Denial of Service Attacks
  • WEN Kun,YANG Jia-Hai and ZHANG Bin
  • 2014,25(3):591-605 [Abstract(4681)]  [View PDF(2924)768.21 K]
  • Rendezvous in Cognitive Radio Networks:A Survey
  • LIU Quan,ZHAO Guang-Sheng,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2014,25(3):606-630 [Abstract(4956)]  [View PDF(3487)1.37 M]