Volume 25,Issue 3,2014 Table of Contents

Other Issues:  
  
Contents

  • Visual Debugging Concurrent Programs with Event Structure
  • WU Xiao-Quan and WEI Jun
  • 2014,25(3):457-471 [Abstract(2041)]  [View PDF(2570)937.79 K]
  • Efficient Scene-Sensitive Fault Detection Approach
  • ZHONG Lu-Jie,HUO Wei,LI Long,LI Feng,FENG Xiao-Bing and ZHANG Zhao-Qing
  • 2014,25(3):472-488 [Abstract(1895)]  [View PDF(2101)874.75 K]
  • Formal Semantics Model for Automatic Test of Safety Critical Systems
  • LÜ Jiang-Hua,MA Shi-Long,LI Xian-Jun and GAO Shi-Wei
  • 2014,25(3):489-505 [Abstract(2527)]  [View PDF(2463)874.67 K]
  • Dynamic Result Optimization for Keyword Search over Relational Databases
  • LIN Zi-Yu,ZOU Quan,LAI Yong-Xuan and LIN Chen
  • 2014,25(3):528-546 [Abstract(2999)]  [View PDF(3123)1.03 M]
  • Dynamic Community Detection Based on Information Flow Analysis
  • SUO Bo,LI Zhan-Huai,CHEN Qun and WANG Zhong
  • 2014,25(3):547-559 [Abstract(2136)]  [View PDF(2570)1.37 M]
  • Index Structure for Multivariate Time Series under DTW Distance Metric
  • LI Zheng-Xin,ZHANG Feng-Ming,LI Ke-Wu and ZHANG Xiao-Feng
  • 2014,25(3):560-575 [Abstract(2242)]  [View PDF(2680)853.28 K]
  • Scheduling Scheme Algorithm in Low-Duty-Cycle WSN
  • CHEN Liang-Yin,WANG Jin-Lei,ZHANG Jing-Yu,WANG Qiang,LIU Yan,YIN Feng and LUO Qian
  • 2014,25(3):631-641 [Abstract(1994)]  [View PDF(2561)609.35 K]
  • Contents

  • Securing Prefixes Against BGP Hijacking in a Cooperative Way
  • WANG Xiao-Qiang,ZHU Pei-Dong and LU Xi-Cheng
  • 2014,25(3):642-661 [Abstract(2065)]  [View PDF(1943)2.33 M]
  • Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution Environment
  • LIU Chuan-Yi,LIN Jie and TANG Bo
  • 2014,25(3):662-674 [Abstract(3236)]  [View PDF(4887)1.26 M]
  • Contents

  • Saliency Texture Structure Descriptor and its Application in Pedestrian Detection
  • XIAO De-Gui,XIN Chen,ZHANG Ting,ZHU Huan and LI Xiao-Le
  • 2014,25(3):675-689 [Abstract(2137)]  [View PDF(2579)1.10 M]
  • Review Articles

  • Mobile User Requirements Acquisition Techniques and Their Applications
  • MENG Xiang-Wu,WANG Fan,SHI Yan-Cui and ZHANG Yu-Jie
  • 2014,25(3):439-456 [Abstract(5678)]  [View PDF(4607)867.41 K]
  • Survey on Quality Evaluation and Control of Online Reviews
  • LIN Yu-Ming,WANG Xiao-Ling,ZHU Tao and ZHOU Ao-Ying
  • 2014,25(3):506-527 [Abstract(5994)]  [View PDF(4590)1021.48 K]
  • Survey on Privacy Preserving Techniques for Publishing Social Network Data
  • LIU Xiang-Yu,WANG Bin and YANG Xiao-Chun
  • 2014,25(3):576-590 [Abstract(6197)]  [View PDF(5240)830.93 K]
  • Survey on Research and Progress of Low-Rate Denial of Service Attacks
  • WEN Kun,YANG Jia-Hai and ZHANG Bin
  • 2014,25(3):591-605 [Abstract(4857)]  [View PDF(2993)768.21 K]
  • Rendezvous in Cognitive Radio Networks:A Survey
  • LIU Quan,ZHAO Guang-Sheng,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2014,25(3):606-630 [Abstract(5142)]  [View PDF(3545)1.37 M]