Volume 27,Issue 2,2016 Table of Contents

Other Issues:  
  
Contents

  • Sound and Complete Gentzen Deduction System for Intermediate Propositional Logic
  • ZHU Wu-Jia, LI Wei, SUI Yue-Fei and LUO Jie
  • 2016,27(2):209-218 [Abstract(1804)]  [View PDF(1426)509.27 K]
  • Contents

  • Approach for Detecting Soft Error by Using Program Invariant
  • MA Jun-Chi and WANG Yun
  • 2016,27(2):219-230 [Abstract(1939)]  [View PDF(1687)640.57 K]
  • Contents

  • Modeling Complex Collaboration Network for Service-Oriented Software Based on Execution Behaviors
  • ZHANG Xi-Zhe, LÜ Tian-Yang and ZHANG Bin
  • 2016,27(2):231-246 [Abstract(1792)]  [View PDF(1494)2.45 M]
  • Semantics-Based Joint Model of Chinese Event Trigger Extraction
  • LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming
  • 2016,27(2):280-294 [Abstract(2019)]  [View PDF(2911)631.48 K]
  • Optimal Approximation Sets of Rough Sets
  • ZHANG Qing-Hua, XUE Yu-Bin and WANG Guo-Yin
  • 2016,27(2):295-308 [Abstract(1726)]  [View PDF(1653)774.42 K]
  • Negation and Uncertainty Information Extraction Oriented to Natural Language Text
  • ZOU Bo-Wei, QIAN Zhong, CHEN Zhan-Cheng, ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2016,27(2):309-328 [Abstract(1847)]  [View PDF(2762)780.88 K]
  • Mining Moving Object Gathering Pattern Method Via Spatio-Temporal Graph
  • ZHANG Jun-Ming, LI Jing-Lin, WANG Shang-Guang, LIU Zhi-Han, YUAN Quan and YANG Fang-Chun
  • 2016,27(2):348-362 [Abstract(2119)]  [View PDF(2295)1.01 M]
  • Link-Block Method for the Semantic Overlapping Community Detection
  • XIN Yu, YANG Jing and XIE Zhi-Qiang
  • 2016,27(2):363-380 [Abstract(1491)]  [View PDF(2394)1.71 M]
  • Streaming Histogram Publication Method with Differential Privacy
  • ZHANG Xiao-Jian and MENG Xiao-Feng
  • 2016,27(2):381-393 [Abstract(1981)]  [View PDF(1923)693.07 K]
  • Algorithm for Enhancing Probabilistic Coverage in Wireless Sensor Network
  • FAN Xing-Gang, YANG Jing-Jing and WANG Heng
  • 2016,27(2):418-431 [Abstract(1677)]  [View PDF(1668)718.40 K]
  • Data Delivery for Vehicular Ad Hoc Networks Based on Parking Backbone
  • ZHU Jin-Qi, MA Chun-Mei, LIU Ming, CHEN Gui-Hai, GONG Hai-Gang and LIU Bin
  • 2016,27(2):432-450 [Abstract(1708)]  [View PDF(1583)1.31 M]
  • Secure and Efficient Roaming Authentication Protocol with Controllable Anonymity for Heterogeneous Wireless Network
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2016,27(2):451-465 [Abstract(1343)]  [View PDF(1667)899.08 K]
  • Virtual Machine Image Deduplication Method Based on Clustering
  • XU Ji-Wei, ZHANG Wen-Bo, WEI Jun, ZHONG Hua and HUANG Tao
  • 2016,27(2):466-480 [Abstract(1803)]  [View PDF(1655)939.83 K]
  • Secure and Efficient Kernel Monitoring Model Based on Hardware Virtualization
  • HUANG Xiao, DENG Liang, SUN Hao and ZENG Qing-Kai
  • 2016,27(2):481-494 [Abstract(1860)]  [View PDF(1677)2.88 M]
  • Review Articles

  • Survey on Bigraph and Its Applications
  • XU Dong, WANG Jing-Jing and LI Jing
  • 2016,27(2):195-208 [Abstract(3394)]  [View PDF(2142)922.21 K]
  • Survey on Predicting Information Propagation in Microblogs
  • LI Yang, CHEN Yi-Heng and LIU Ting
  • 2016,27(2):247-263 [Abstract(4204)]  [View PDF(5936)703.93 K]
  • Research Progress in Distributed Constraint Optimization Method
  • DUAN Pei-Bo, ZHANG Chang-Sheng and ZHANG Bin
  • 2016,27(2):264-279 [Abstract(4032)]  [View PDF(2915)756.88 K]
  • Survey on Spatial Keyword Search
  • LIU Xi-Ping, WAN Chang-Xuan, LIU De-Xi and LIAO Guo-Qiong
  • 2016,27(2):329-347 [Abstract(3927)]  [View PDF(3379)869.80 K]
  • Traffic Engineering for Software Defined Networks
  • ZHOU Tong-Qing, CAI Zhi-Ping, XIA Jing and XU Ming
  • 2016,27(2):394-417 [Abstract(4680)]  [View PDF(4710)1.31 M]