Volume 25,Issue 3,2014 Table of Contents

Other Issues:  
  
Contents

  • Visual Debugging Concurrent Programs with Event Structure
  • WU Xiao-Quan and WEI Jun
  • 2014,25(3):457-471 [Abstract(2338)]  [View PDF(2894)937.79 K]
  • Efficient Scene-Sensitive Fault Detection Approach
  • ZHONG Lu-Jie,HUO Wei,LI Long,LI Feng,FENG Xiao-Bing and ZHANG Zhao-Qing
  • 2014,25(3):472-488 [Abstract(2196)]  [View PDF(2309)874.75 K]
  • Formal Semantics Model for Automatic Test of Safety Critical Systems
  • LÜ Jiang-Hua,MA Shi-Long,LI Xian-Jun and GAO Shi-Wei
  • 2014,25(3):489-505 [Abstract(2978)]  [View PDF(2774)874.67 K]
  • Dynamic Result Optimization for Keyword Search over Relational Databases
  • LIN Zi-Yu,ZOU Quan,LAI Yong-Xuan and LIN Chen
  • 2014,25(3):528-546 [Abstract(3479)]  [View PDF(3559)1.03 M]
  • Dynamic Community Detection Based on Information Flow Analysis
  • SUO Bo,LI Zhan-Huai,CHEN Qun and WANG Zhong
  • 2014,25(3):547-559 [Abstract(2460)]  [View PDF(2840)1.37 M]
  • Index Structure for Multivariate Time Series under DTW Distance Metric
  • LI Zheng-Xin,ZHANG Feng-Ming,LI Ke-Wu and ZHANG Xiao-Feng
  • 2014,25(3):560-575 [Abstract(2660)]  [View PDF(3032)853.28 K]
  • Scheduling Scheme Algorithm in Low-Duty-Cycle WSN
  • CHEN Liang-Yin,WANG Jin-Lei,ZHANG Jing-Yu,WANG Qiang,LIU Yan,YIN Feng and LUO Qian
  • 2014,25(3):631-641 [Abstract(2360)]  [View PDF(3063)609.35 K]
  • Contents

  • Securing Prefixes Against BGP Hijacking in a Cooperative Way
  • WANG Xiao-Qiang,ZHU Pei-Dong and LU Xi-Cheng
  • 2014,25(3):642-661 [Abstract(2395)]  [View PDF(2260)2.33 M]
  • Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution Environment
  • LIU Chuan-Yi,LIN Jie and TANG Bo
  • 2014,25(3):662-674 [Abstract(3577)]  [View PDF(5200)1.26 M]
  • Contents

  • Saliency Texture Structure Descriptor and its Application in Pedestrian Detection
  • XIAO De-Gui,XIN Chen,ZHANG Ting,ZHU Huan and LI Xiao-Le
  • 2014,25(3):675-689 [Abstract(2568)]  [View PDF(2899)1.10 M]
  • Review Articles

  • Mobile User Requirements Acquisition Techniques and Their Applications
  • MENG Xiang-Wu,WANG Fan,SHI Yan-Cui and ZHANG Yu-Jie
  • 2014,25(3):439-456 [Abstract(6254)]  [View PDF(6516)867.41 K]
  • Survey on Quality Evaluation and Control of Online Reviews
  • LIN Yu-Ming,WANG Xiao-Ling,ZHU Tao and ZHOU Ao-Ying
  • 2014,25(3):506-527 [Abstract(6547)]  [View PDF(4932)1021.48 K]
  • Survey on Privacy Preserving Techniques for Publishing Social Network Data
  • LIU Xiang-Yu,WANG Bin and YANG Xiao-Chun
  • 2014,25(3):576-590 [Abstract(6964)]  [View PDF(5785)830.93 K]
  • Survey on Research and Progress of Low-Rate Denial of Service Attacks
  • WEN Kun,YANG Jia-Hai and ZHANG Bin
  • 2014,25(3):591-605 [Abstract(5423)]  [View PDF(3273)768.21 K]
  • Rendezvous in Cognitive Radio Networks:A Survey
  • LIU Quan,ZHAO Guang-Sheng,WANG Xiao-Dong and ZHOU Xing-Ming
  • 2014,25(3):606-630 [Abstract(5733)]  [View PDF(3797)1.37 M]