Volume 22,Issue 3,2011 Table of Contents

Other Issues:  
  
Contents

  • Fast Continuous Weak Hashes in Strings and Its Applications
  • XU Ze-Ming and HOU Zi-Feng
  • 2011,22(3):353-365 [Abstract(3618)]  [View PDF(3835)361.86 K]
  • Complete Axiomatization for Projection Temporal Logic with Finite Time
  • SHU Xin-Feng and DUAN Zhen-Hua
  • 2011,22(3):366-380 [Abstract(3534)]  [View PDF(3661)471.13 K]
  • Software Reliability Assessment Models Incorporating Software Defect Correlation
  • XU Gao-Chao,LIU Xin-Zhong,HU Liang,FU Xiao-Dong and DONG Yu-Shuang
  • 2011,22(3):439-450 [Abstract(3511)]  [View PDF(3888)331.34 K]
  • Load-Similar Node Distribution for Solving Energy Hole Problem in Wireless Sensor Networks
  • LI Qiao-Qin,LIU Ming,YANG Mei and CHEN Gui-Hai
  • 2011,22(3):451-465 [Abstract(3488)]  [View PDF(3451)560.96 K]
  • Distributed Real-Time Information Based Routing Protocol in Vehicular Ad-Hoc Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2011,22(3):466-480 [Abstract(3281)]  [View PDF(4501)442.21 K]
  • Information Sharing Mechanism for Inter-Domain Routing Cooperative Monitoring
  • HU Ning,ZHU Pei-Dong and ZOU Peng
  • 2011,22(3):481-494 [Abstract(3614)]  [View PDF(3345)593.74 K]
  • Network Security Situation Awareness Approach Based on Markov Game Model
  • ZHANG Yong,TAN Xiao-Bin,CUI Xiao-Lin and XI Hong-Sheng
  • 2011,22(3):495-508 [Abstract(4161)]  [View PDF(7564)938.71 K]
  • Formal Logic for Fair Exchange Protocols
  • CHEN Ming,WU Kai-Gui,WU Chang-Ze,XU Jie and WU Zhong-Fu
  • 2011,22(3):509-521 [Abstract(3640)]  [View PDF(3573)413.35 K]
  • Obfuscated Malware Detection Based on Boosting Multilevel Features
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,GONG Tao and SHUAI Jian-Mei
  • 2011,22(3):522-533 [Abstract(4136)]  [View PDF(4294)342.56 K]
  • Time-Dependent Cryptographic Protocol Logic and Its Formal Semantics
  • LEI Xin-Feng,LIU Jun and XIAO Jun-Mo
  • 2011,22(3):534-557 [Abstract(3632)]  [View PDF(3701)563.34 K]
  • Generation and Extension of Linear Network Coding
  • PU Bao-Xing,YANG Lu-Ming and WANG Wei-Ping
  • 2011,22(3):558-571 [Abstract(3758)]  [View PDF(4142)347.29 K]
  • Access Driven Cache Timing Attack Against AES
  • ZHAO Xin-Jie,WANG Tao,GUO Shi-Ze and ZHENG Yuan-Yuan
  • 2011,22(3):572-591 [Abstract(3607)]  [View PDF(5173)962.39 K]
  • Review Articles

  • Empirical Study on the Characteristics of Complex Networks in Networked Software
  • MA Yu-Tao,HE Ke-Qing,LI Bing and LIU Jing
  • 2011,22(3):381-407 [Abstract(7851)]  [View PDF(9645)614.69 K]
  • Mining Invocation Specifications for API Libraries
  • ZHONG Hao,ZHANG Lu and MEI Hong
  • 2011,22(3):408-416 [Abstract(6343)]  [View PDF(4661)369.19 K]
  • Dynamic Evolution of Processes in Process-Aware Information Systems
  • SONG Wei,MA Xiao-Xing,HU Hao and Lü Jian
  • 2011,22(3):417-438 [Abstract(6112)]  [View PDF(4997)509.47 K]