Volume 22,Issue 3,2011 Table of Contents

Other Issues:  
  
Contents

  • Fast Continuous Weak Hashes in Strings and Its Applications
  • XU Ze-Ming and HOU Zi-Feng
  • 2011,22(3):353-365 [Abstract(3582)]  [View PDF(3820)361.86 K]
  • Complete Axiomatization for Projection Temporal Logic with Finite Time
  • SHU Xin-Feng and DUAN Zhen-Hua
  • 2011,22(3):366-380 [Abstract(3483)]  [View PDF(3621)471.13 K]
  • Software Reliability Assessment Models Incorporating Software Defect Correlation
  • XU Gao-Chao,LIU Xin-Zhong,HU Liang,FU Xiao-Dong and DONG Yu-Shuang
  • 2011,22(3):439-450 [Abstract(3464)]  [View PDF(3868)331.34 K]
  • Load-Similar Node Distribution for Solving Energy Hole Problem in Wireless Sensor Networks
  • LI Qiao-Qin,LIU Ming,YANG Mei and CHEN Gui-Hai
  • 2011,22(3):451-465 [Abstract(3431)]  [View PDF(3427)560.96 K]
  • Distributed Real-Time Information Based Routing Protocol in Vehicular Ad-Hoc Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2011,22(3):466-480 [Abstract(3232)]  [View PDF(4450)442.21 K]
  • Information Sharing Mechanism for Inter-Domain Routing Cooperative Monitoring
  • HU Ning,ZHU Pei-Dong and ZOU Peng
  • 2011,22(3):481-494 [Abstract(3556)]  [View PDF(3314)593.74 K]
  • Network Security Situation Awareness Approach Based on Markov Game Model
  • ZHANG Yong,TAN Xiao-Bin,CUI Xiao-Lin and XI Hong-Sheng
  • 2011,22(3):495-508 [Abstract(4071)]  [View PDF(7520)938.71 K]
  • Formal Logic for Fair Exchange Protocols
  • CHEN Ming,WU Kai-Gui,WU Chang-Ze,XU Jie and WU Zhong-Fu
  • 2011,22(3):509-521 [Abstract(3600)]  [View PDF(3546)413.35 K]
  • Obfuscated Malware Detection Based on Boosting Multilevel Features
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,GONG Tao and SHUAI Jian-Mei
  • 2011,22(3):522-533 [Abstract(4081)]  [View PDF(4256)342.56 K]
  • Time-Dependent Cryptographic Protocol Logic and Its Formal Semantics
  • LEI Xin-Feng,LIU Jun and XIAO Jun-Mo
  • 2011,22(3):534-557 [Abstract(3569)]  [View PDF(3672)563.34 K]
  • Generation and Extension of Linear Network Coding
  • PU Bao-Xing,YANG Lu-Ming and WANG Wei-Ping
  • 2011,22(3):558-571 [Abstract(3720)]  [View PDF(4115)347.29 K]
  • Access Driven Cache Timing Attack Against AES
  • ZHAO Xin-Jie,WANG Tao,GUO Shi-Ze and ZHENG Yuan-Yuan
  • 2011,22(3):572-591 [Abstract(3556)]  [View PDF(5127)962.39 K]
  • Review Articles

  • Empirical Study on the Characteristics of Complex Networks in Networked Software
  • MA Yu-Tao,HE Ke-Qing,LI Bing and LIU Jing
  • 2011,22(3):381-407 [Abstract(7717)]  [View PDF(9505)614.69 K]
  • Mining Invocation Specifications for API Libraries
  • ZHONG Hao,ZHANG Lu and MEI Hong
  • 2011,22(3):408-416 [Abstract(6198)]  [View PDF(4601)369.19 K]
  • Dynamic Evolution of Processes in Process-Aware Information Systems
  • SONG Wei,MA Xiao-Xing,HU Hao and Lü Jian
  • 2011,22(3):417-438 [Abstract(6030)]  [View PDF(4969)509.47 K]