Volume 26,Issue 1,2015 Table of Contents
Technique of Cooperative Reverse Reasoning in Related Path Static AnalysisGUO Xi and WANG Pan2015,26(1):1-13 [Abstract(8197)] [View PDF(7568)731.52 K]
Optimized Software Testing Strategy Based on the Defect Correlation Markov ModelBAO Xiao-An,XIE Xiao-Ming,ZHANG Na,CAO Jian-Wen and GUI Ning2015,26(1):14-25 [Abstract(5441)] [View PDF(5086)651.88 K]Research on the Robust Illumination of the Likelihood Similarity Function in Tracking TargetDI Nan,ZHU Ming and HAN Guang-Liang2015,26(1):52-61 [Abstract(3785)] [View PDF(4703)1.90 M]Joint Adaptation Algorithm of Rate, Mode and Channel for IEEE 802.11nCHEN Jian,LI He-Wu,ZHANG Xiao-Yan and ZHOU Jun2015,26(1):98-108 [Abstract(3995)] [View PDF(5134)728.49 K]Proxy Re-Signature Scheme for Stream ExchangeSUN Yi,CHEN Xing-Yuan,DU Xue-Hui,CHEN Liang and XU Jian2015,26(1):129-144 [Abstract(3515)] [View PDF(4740)1.83 M]
Survey on Transfer Learning ResearchZHUANG Fu-Zhen,LUO Ping,HE Qing and SHI Zhong-Zhi2015,26(1):26-39 [Abstract(13585)] [View PDF(16257)763.52 K]Computational Metaphor ProcessingTIAN Jia,SU Chang and CHEN Yi-Jiang2015,26(1):40-51 [Abstract(7774)] [View PDF(6264)617.70 K]State-of-the-Art Survey on Software-Defined Networking (SDN)ZHANG Chao-Kun,CUI Yong,TANG He-Yi and WU Jian-Ping2015,26(1):62-81 [Abstract(15817)] [View PDF(26417)1.04 M]Survey on Network-Coding-Aware Routing in Wireless NetworkCHEN Chen,DONG Chao,MAO Ya-Fei,CHEN Gui-Hai and WANG Hai2015,26(1):82-97 [Abstract(7268)] [View PDF(6598)915.67 K]Survey on the Searchable EncryptionLI Jing-Wei,JIA Chun-Fu,LIU Zhe-Li,LI Jin and LI Min2015,26(1):109-128 [Abstract(9361)] [View PDF(13769)850.63 K]Research on Indexing for Cloud Data ManagementMA You-Zhong and MENG Xiao-Feng2015,26(1):145-166 [Abstract(9258)] [View PDF(8568)1.65 M]Progress and Challenges of Graph Aggregation and Summarization TechniquesPAN Qiu-Ping,YOU Jin-Guo,ZHANG Zhi-Peng,DONG Peng-Zhi and HU Bao-Li2015,26(1):167-177 [Abstract(8192)] [View PDF(5914)621.82 K]