Volume 27,Issue 12,2016 Table of Contents

Other Issues:  
  
Contents

  • Satisfiability Threshold of the Regular Random (k,r)-SAT Problem
  • ZHOU Jin-Cheng, XU Dao-Yun and LU You-Jun
  • 2016,27(12):2985-2993 [Abstract(1955)]  [View PDF(1965)1.14 M]
  • Exogenous Quantum Markov Chains and Reachability Analysis
  • LIN Yun-Guo and LI Yong-Ming
  • 2016,27(12):2994-3002 [Abstract(1794)]  [View PDF(1998)1.10 M]
  • Sufficient Conditions for Convergence of the Warning Propagation Algorithm
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(12):3003-3013 [Abstract(2057)]  [View PDF(1929)1.36 M]
  • Improving the Performance of Defect Prediction Based on Evolution Data
  • WANG Dan-Dan and WANG Qing
  • 2016,27(12):3014-3029 [Abstract(1311)]  [View PDF(1639)1.79 M]
  • Research on Multi-Scale Data Mining Method
  • LIU Meng-Meng, ZHAO Shu-Liang, HAN Yu-Hui, SU Dong-Hai, LI Xiao-Chao and CHEN Min
  • 2016,27(12):3030-3050 [Abstract(2296)]  [View PDF(2238)3.17 M]
  • Optimizing Top-k Similarity Join Algorithm
  • WANG Hong-Ya, YANG Li-Hong and LIU Xiao-Qiang
  • 2016,27(12):3051-3066 [Abstract(1807)]  [View PDF(2126)1.77 M]
  • Technique Based on Shared Execution Strategy for Optimizing Interval Query
  • ZHOU Xin, ZHANG Xiao, XUE Zhong-Bin and WANG Shan
  • 2016,27(12):3067-3084 [Abstract(1008)]  [View PDF(1413)2.27 M]
  • Real-Time and Passive Wormhole Detection for Wireless Sensor Networks
  • LU Li, Muhammad Jawad HUSSAIN and ZHU Jin-Qi
  • 2016,27(12):3085-3103 [Abstract(1993)]  [View PDF(1825)2.24 M]
  • Software Defined Security Networking Mechanism Against DDoS Attacks
  • WANG Xiu-Lei, CHEN Ming, XING Chang-You, SUN Zhi and WU Quan-Feng
  • 2016,27(12):3104-3119 [Abstract(2348)]  [View PDF(2457)2.50 M]
  • Coverage Prediction Model and Number Estimation for Directional Sensor Networks
  • LIU Zhi-Min, JIA Wei-Jia and WANG Guo-Jun
  • 2016,27(12):3120-3130 [Abstract(1232)]  [View PDF(1413)1.32 M]
  • Shape Recognition Using Unordered Point-Set Description and Matching of Object Contour
  • WANG Bin
  • 2016,27(12):3131-3142 [Abstract(1554)]  [View PDF(1624)2.08 M]
  • Method of Formal Design and Verification of OS on Assembly Layer
  • QIAN Zhen-Jiang, HUANG Hao and SONG Fang-Min
  • 2016,27(12):3143-3157 [Abstract(1630)]  [View PDF(1921)1.77 M]
  • Fault Tolerant Global Scheduling with Non-Preemptive Backups
  • PENG Hao, LU Yang, SUN Feng and HAN Jiang-Hong
  • 2016,27(12):3158-3171 [Abstract(1138)]  [View PDF(1328)1.59 M]
  • Data Characteristics-Based Kernel Malware Detection
  • CHEN Zhi-Feng, LI Qing-Bao, ZHANG Ping and DING Wen-Bo
  • 2016,27(12):3172-3191 [Abstract(2085)]  [View PDF(2211)2.23 M]
  • Load Balancing Framework for Metadata Service of Distributed File Systems
  • SUN Yao, LIU Jie, YE Dan and ZHONG Hua
  • 2016,27(12):3192-3207 [Abstract(1887)]  [View PDF(2841)1.91 M]
  • Approach of Measuring and Predicting Software System State Based on Hidden Markov Model
  • WU Jia, ZENG Wei-Ru, CHEN Han-Lin and TANG Xue-Fei
  • 2016,27(12):3208-3222 [Abstract(1156)]  [View PDF(2041)1.96 M]