Volume 27,Issue 2,2016 Table of Contents

Other Issues:  
  
Contents

  • Sound and Complete Gentzen Deduction System for Intermediate Propositional Logic
  • ZHU Wu-Jia, LI Wei, SUI Yue-Fei and LUO Jie
  • 2016,27(2):209-218 [Abstract(1941)]  [View PDF(1568)509.27 K]
  • Contents

  • Approach for Detecting Soft Error by Using Program Invariant
  • MA Jun-Chi and WANG Yun
  • 2016,27(2):219-230 [Abstract(2116)]  [View PDF(1826)640.57 K]
  • Contents

  • Modeling Complex Collaboration Network for Service-Oriented Software Based on Execution Behaviors
  • ZHANG Xi-Zhe, LÜ Tian-Yang and ZHANG Bin
  • 2016,27(2):231-246 [Abstract(1959)]  [View PDF(1551)2.45 M]
  • Semantics-Based Joint Model of Chinese Event Trigger Extraction
  • LI Pei-Feng, ZHOU Guo-Dong and ZHU Qiao-Ming
  • 2016,27(2):280-294 [Abstract(2175)]  [View PDF(3222)631.48 K]
  • Optimal Approximation Sets of Rough Sets
  • ZHANG Qing-Hua, XUE Yu-Bin and WANG Guo-Yin
  • 2016,27(2):295-308 [Abstract(1972)]  [View PDF(1800)774.42 K]
  • Negation and Uncertainty Information Extraction Oriented to Natural Language Text
  • ZOU Bo-Wei, QIAN Zhong, CHEN Zhan-Cheng, ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2016,27(2):309-328 [Abstract(2021)]  [View PDF(2956)780.88 K]
  • Mining Moving Object Gathering Pattern Method Via Spatio-Temporal Graph
  • ZHANG Jun-Ming, LI Jing-Lin, WANG Shang-Guang, LIU Zhi-Han, YUAN Quan and YANG Fang-Chun
  • 2016,27(2):348-362 [Abstract(2343)]  [View PDF(2461)1.01 M]
  • Link-Block Method for the Semantic Overlapping Community Detection
  • XIN Yu, YANG Jing and XIE Zhi-Qiang
  • 2016,27(2):363-380 [Abstract(1639)]  [View PDF(2597)1.71 M]
  • Streaming Histogram Publication Method with Differential Privacy
  • ZHANG Xiao-Jian and MENG Xiao-Feng
  • 2016,27(2):381-393 [Abstract(2156)]  [View PDF(2143)693.07 K]
  • Algorithm for Enhancing Probabilistic Coverage in Wireless Sensor Network
  • FAN Xing-Gang, YANG Jing-Jing and WANG Heng
  • 2016,27(2):418-431 [Abstract(1819)]  [View PDF(1741)718.40 K]
  • Data Delivery for Vehicular Ad Hoc Networks Based on Parking Backbone
  • ZHU Jin-Qi, MA Chun-Mei, LIU Ming, CHEN Gui-Hai, GONG Hai-Gang and LIU Bin
  • 2016,27(2):432-450 [Abstract(1908)]  [View PDF(1760)1.31 M]
  • Secure and Efficient Roaming Authentication Protocol with Controllable Anonymity for Heterogeneous Wireless Network
  • ZHOU Yan-Wei, YANG Bo and ZHANG Wen-Zheng
  • 2016,27(2):451-465 [Abstract(1509)]  [View PDF(1818)899.08 K]
  • Virtual Machine Image Deduplication Method Based on Clustering
  • XU Ji-Wei, ZHANG Wen-Bo, WEI Jun, ZHONG Hua and HUANG Tao
  • 2016,27(2):466-480 [Abstract(1971)]  [View PDF(1781)939.83 K]
  • Secure and Efficient Kernel Monitoring Model Based on Hardware Virtualization
  • HUANG Xiao, DENG Liang, SUN Hao and ZENG Qing-Kai
  • 2016,27(2):481-494 [Abstract(2007)]  [View PDF(1882)2.88 M]
  • Review Articles

  • Survey on Bigraph and Its Applications
  • XU Dong, WANG Jing-Jing and LI Jing
  • 2016,27(2):195-208 [Abstract(3674)]  [View PDF(2361)922.21 K]
  • Survey on Predicting Information Propagation in Microblogs
  • LI Yang, CHEN Yi-Heng and LIU Ting
  • 2016,27(2):247-263 [Abstract(4519)]  [View PDF(6294)703.93 K]
  • Research Progress in Distributed Constraint Optimization Method
  • DUAN Pei-Bo, ZHANG Chang-Sheng and ZHANG Bin
  • 2016,27(2):264-279 [Abstract(4297)]  [View PDF(3148)756.88 K]
  • Survey on Spatial Keyword Search
  • LIU Xi-Ping, WAN Chang-Xuan, LIU De-Xi and LIAO Guo-Qiong
  • 2016,27(2):329-347 [Abstract(4206)]  [View PDF(3581)869.80 K]
  • Traffic Engineering for Software Defined Networks
  • ZHOU Tong-Qing, CAI Zhi-Ping, XIA Jing and XU Ming
  • 2016,27(2):394-417 [Abstract(4989)]  [View PDF(5156)1.31 M]