Volume 27,Issue 12,2016 Table of Contents
Satisfiability Threshold of the Regular Random (k,r)-SAT ProblemZHOU Jin-Cheng, XU Dao-Yun and LU You-Jun2016,27(12):2985-2993 [Abstract(2981)] [View PDF(4290)1.14 M]Exogenous Quantum Markov Chains and Reachability AnalysisLIN Yun-Guo and LI Yong-Ming2016,27(12):2994-3002 [Abstract(2571)] [View PDF(4336)1.10 M]Sufficient Conditions for Convergence of the Warning Propagation AlgorithmWANG Xiao-Feng and XU Dao-Yun2016,27(12):3003-3013 [Abstract(2828)] [View PDF(4116)1.36 M]Improving the Performance of Defect Prediction Based on Evolution DataWANG Dan-Dan and WANG Qing2016,27(12):3014-3029 [Abstract(2166)] [View PDF(3741)1.79 M]Research on Multi-Scale Data Mining MethodLIU Meng-Meng, ZHAO Shu-Liang, HAN Yu-Hui, SU Dong-Hai, LI Xiao-Chao and CHEN Min2016,27(12):3030-3050 [Abstract(3531)] [View PDF(5000)3.17 M]Optimizing Top-k Similarity Join AlgorithmWANG Hong-Ya, YANG Li-Hong and LIU Xiao-Qiang2016,27(12):3051-3066 [Abstract(2581)] [View PDF(4084)1.77 M]Technique Based on Shared Execution Strategy for Optimizing Interval QueryZHOU Xin, ZHANG Xiao, XUE Zhong-Bin and WANG Shan2016,27(12):3067-3084 [Abstract(1645)] [View PDF(2986)2.27 M]Real-Time and Passive Wormhole Detection for Wireless Sensor NetworksLU Li, Muhammad Jawad HUSSAIN and ZHU Jin-Qi2016,27(12):3085-3103 [Abstract(2828)] [View PDF(3955)2.24 M]Software Defined Security Networking Mechanism Against DDoS AttacksWANG Xiu-Lei, CHEN Ming, XING Chang-You, SUN Zhi and WU Quan-Feng2016,27(12):3104-3119 [Abstract(3424)] [View PDF(4939)2.50 M]Coverage Prediction Model and Number Estimation for Directional Sensor NetworksLIU Zhi-Min, JIA Wei-Jia and WANG Guo-Jun2016,27(12):3120-3130 [Abstract(2000)] [View PDF(3293)1.32 M]Shape Recognition Using Unordered Point-Set Description and Matching of Object ContourWANG Bin2016,27(12):3131-3142 [Abstract(2456)] [View PDF(3671)2.08 M]Method of Formal Design and Verification of OS on Assembly LayerQIAN Zhen-Jiang, HUANG Hao and SONG Fang-Min2016,27(12):3143-3157 [Abstract(2617)] [View PDF(4191)1.77 M]Fault Tolerant Global Scheduling with Non-Preemptive BackupsPENG Hao, LU Yang, SUN Feng and HAN Jiang-Hong2016,27(12):3158-3171 [Abstract(1851)] [View PDF(2997)1.59 M]Data Characteristics-Based Kernel Malware DetectionCHEN Zhi-Feng, LI Qing-Bao, ZHANG Ping and DING Wen-Bo2016,27(12):3172-3191 [Abstract(3158)] [View PDF(4465)2.23 M]Load Balancing Framework for Metadata Service of Distributed File SystemsSUN Yao, LIU Jie, YE Dan and ZHONG Hua2016,27(12):3192-3207 [Abstract(2949)] [View PDF(4972)1.91 M]Approach of Measuring and Predicting Software System State Based on Hidden Markov ModelWU Jia, ZENG Wei-Ru, CHEN Han-Lin and TANG Xue-Fei2016,27(12):3208-3222 [Abstract(1910)] [View PDF(4936)1.96 M]