Volume 22,Issue 11,2011 Table of Contents

Other Issues:  
  
Contents

  • Some Properties of Pigeon-Hole Formulas
  • XU Dao-Yun,WEI Li and WANG Xiao-Feng
  • 2011,22(11):2553-2563 [Abstract(3378)]  [View PDF(3096)566.33 K]
  • Algorithm for Generating Short Sentences from Grammars Based on Branch Coverage Criterion
  • ZHENG Li-Xiao,XU Zhi-Wu and CHEN Hai-Ming
  • 2011,22(11):2564-2576 [Abstract(3065)]  [View PDF(3376)696.70 K]
  • Documentation-Based Approach to Reveal Architectural View Conflicts
  • ZHU Wen-Hui,HUANG Gang,SUN Yan-Chun and MEI Hong
  • 2011,22(11):2577-2592 [Abstract(2672)]  [View PDF(2682)890.72 K]
  • Approach for Evaluating the Trustworthiness of Service Agent
  • ZHU Man-Ling and JIN Zhi
  • 2011,22(11):2593-2609 [Abstract(3321)]  [View PDF(3359)975.29 K]
  • Monitoring Enabled Distributed Software Construction Method
  • LIU Dong-Hong,GUO Chang-Guo,WANG Huai-Min and WANG Tao
  • 2011,22(11):2610-2624 [Abstract(3223)]  [View PDF(3290)862.60 K]
  • Specification and Verification of UML2.0 Sequence Diagrams Based on Event Deterministic Finite Automata
  • ZHANG Chen,DUAN Zhen-Hua and TIAN Cong
  • 2011,22(11):2625-2638 [Abstract(2942)]  [View PDF(3468)981.94 K]
  • Computational Error Handling as Aspects: A Case Study and Evaluation
  • CUI Zhan-Qi,WANG Lin-Zhang,LIU Hui-Gen and LI Xuan-Dong
  • 2011,22(11):2639-2651 [Abstract(2737)]  [View PDF(3199)775.38 K]
  • Coordinating of Dynamic Updating Controlled by Transaction in Service-Oriented System
  • WANG De-Jun,HUANG Lin-Peng and XU Xiao-Hui
  • 2011,22(11):2652-2667 [Abstract(2956)]  [View PDF(2901)804.38 K]
  • Multi-Level Component Behavior Matching Model Based on Finite Automata
  • CHU Dian-Hui,MENG Fan-Chao,ZHAN De-Chen and XU Xiao-Fei
  • 2011,22(11):2668-2683 [Abstract(2835)]  [View PDF(2904)813.29 K]
  • Analysis and Transformation of Overlapped Patterns in BPEL Process Modeling
  • ZHANG Man,DUAN Zhen-Hua and WANG Xiao-Bing
  • 2011,22(11):2684-2697 [Abstract(3282)]  [View PDF(3007)799.88 K]
  • Unified Formal Modeling and Analyzing both Functionality and QoS of Web Services Composition
  • XIAO Fang-Xiong,HUANG Zhi-Qiu,CAO Zi-Ning,TU Li-Zhong and ZHU Yi
  • 2011,22(11):2698-2715 [Abstract(3092)]  [View PDF(3886)845.47 K]
  • Software Behavior Model Based on System Objects
  • FU Jian-Ming,TAO Fen,WANG Dan and ZHANG Huan-Guo
  • 2011,22(11):2716-2728 [Abstract(3280)]  [View PDF(3605)648.43 K]
  • Integration of Security Grid Dependent Tasks Scheduling Double-Objective Optimization Model and Algorithm
  • ZHU Hai and WANG Yu-Ping
  • 2011,22(11):2729-2748 [Abstract(3130)]  [View PDF(3261)1.15 M]
  • Rate-Based Component Software Reliability Process Simulation
  • HOU Chun-Yan,CUI Gang and LIU Hong-Wei
  • 2011,22(11):2749-2759 [Abstract(3076)]  [View PDF(3050)983.76 K]
  • Two-Phase Clustering Algorithm for Complex Distributed Data
  • GONG Mao-Guo,WANG Shuang,MA Meng,CAO Yu,JIAO Li-Cheng and MA Wen-Ping
  • 2011,22(11):2760-2772 [Abstract(3034)]  [View PDF(4200)1.14 M]
  • Query Dependent Learning to Model Based on Ordered Multiple Hyperplanes
  • SUN He-Li,HUANG Jian-Bin,FENG Bo-Qin,ZHAO Zhi-Qin,LIU Jun and ZHENG Qing-Hua
  • 2011,22(11):2773-2781 [Abstract(2725)]  [View PDF(3357)562.80 K]
  • Resource Control Model for QoS in the Trustworthy and Controllable Network
  • QU Yan-Sheng,LI Wei,LUO Jun-Zhou and WANG Peng
  • 2011,22(11):2782-2794 [Abstract(2837)]  [View PDF(3097)1.29 M]
  • Flash Crowd Control Model Based on Time Delay
  • XIAO Jun,YUN Xiao-Chun and ZHANG Yong-Zheng
  • 2011,22(11):2795-2809 [Abstract(2724)]  [View PDF(3003)793.73 K]
  • P2P Weak State Routing Scheme Based on Decaying Bloom Filters
  • ZHU Gui-Ming,GUO De-Ke and JIN Shi-Yao
  • 2011,22(11):2810-2819 [Abstract(2782)]  [View PDF(2958)626.48 K]
  • Universal Composable Password Authenticated Key Exchange Protocol in the Standard Model
  • HU Xue-Xian,ZHANG Zhen-Feng and LIU Wen-Fen
  • 2011,22(11):2820-2832 [Abstract(3624)]  [View PDF(3281)692.13 K]
  • Coded Retransmission Algorithm Based on Matching Theory for Wireless Broadcasting
  • DAI Bin,CAO Zhi-Gang,YANG Jun,HUANG Chen and WANG Fu-Rong
  • 2011,22(11):2833-2842 [Abstract(2340)]  [View PDF(2809)731.63 K]
  • Two Party Certificateless Key Agreement Schemes
  • LIU Wen-Hao and XU Chun-Xiang
  • 2011,22(11):2843-2852 [Abstract(2736)]  [View PDF(3173)544.66 K]