Volume 22,Issue 3,2011 Table of Contents

Other Issues:  
  
Contents

  • Fast Continuous Weak Hashes in Strings and Its Applications
  • XU Ze-Ming and HOU Zi-Feng
  • 2011,22(3):353-365 [Abstract(3706)]  [View PDF(3913)361.86 K]
  • Complete Axiomatization for Projection Temporal Logic with Finite Time
  • SHU Xin-Feng and DUAN Zhen-Hua
  • 2011,22(3):366-380 [Abstract(3635)]  [View PDF(3803)471.13 K]
  • Software Reliability Assessment Models Incorporating Software Defect Correlation
  • XU Gao-Chao,LIU Xin-Zhong,HU Liang,FU Xiao-Dong and DONG Yu-Shuang
  • 2011,22(3):439-450 [Abstract(3596)]  [View PDF(4021)331.34 K]
  • Load-Similar Node Distribution for Solving Energy Hole Problem in Wireless Sensor Networks
  • LI Qiao-Qin,LIU Ming,YANG Mei and CHEN Gui-Hai
  • 2011,22(3):451-465 [Abstract(3597)]  [View PDF(3585)560.96 K]
  • Distributed Real-Time Information Based Routing Protocol in Vehicular Ad-Hoc Networks
  • SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
  • 2011,22(3):466-480 [Abstract(3378)]  [View PDF(4687)442.21 K]
  • Information Sharing Mechanism for Inter-Domain Routing Cooperative Monitoring
  • HU Ning,ZHU Pei-Dong and ZOU Peng
  • 2011,22(3):481-494 [Abstract(3715)]  [View PDF(3393)593.74 K]
  • Network Security Situation Awareness Approach Based on Markov Game Model
  • ZHANG Yong,TAN Xiao-Bin,CUI Xiao-Lin and XI Hong-Sheng
  • 2011,22(3):495-508 [Abstract(4349)]  [View PDF(7779)938.71 K]
  • Formal Logic for Fair Exchange Protocols
  • CHEN Ming,WU Kai-Gui,WU Chang-Ze,XU Jie and WU Zhong-Fu
  • 2011,22(3):509-521 [Abstract(3727)]  [View PDF(3702)413.35 K]
  • Obfuscated Malware Detection Based on Boosting Multilevel Features
  • KONG De-Guang,TAN Xiao-Bin,XI Hong-Sheng,GONG Tao and SHUAI Jian-Mei
  • 2011,22(3):522-533 [Abstract(4255)]  [View PDF(4374)342.56 K]
  • Time-Dependent Cryptographic Protocol Logic and Its Formal Semantics
  • LEI Xin-Feng,LIU Jun and XIAO Jun-Mo
  • 2011,22(3):534-557 [Abstract(3731)]  [View PDF(3849)563.34 K]
  • Generation and Extension of Linear Network Coding
  • PU Bao-Xing,YANG Lu-Ming and WANG Wei-Ping
  • 2011,22(3):558-571 [Abstract(3848)]  [View PDF(4199)347.29 K]
  • Access Driven Cache Timing Attack Against AES
  • ZHAO Xin-Jie,WANG Tao,GUO Shi-Ze and ZHENG Yuan-Yuan
  • 2011,22(3):572-591 [Abstract(3729)]  [View PDF(5378)962.39 K]
  • Review Articles

  • Empirical Study on the Characteristics of Complex Networks in Networked Software
  • MA Yu-Tao,HE Ke-Qing,LI Bing and LIU Jing
  • 2011,22(3):381-407 [Abstract(8124)]  [View PDF(9790)614.69 K]
  • Mining Invocation Specifications for API Libraries
  • ZHONG Hao,ZHANG Lu and MEI Hong
  • 2011,22(3):408-416 [Abstract(6603)]  [View PDF(4785)369.19 K]
  • Dynamic Evolution of Processes in Process-Aware Information Systems
  • SONG Wei,MA Xiao-Xing,HU Hao and Lü Jian
  • 2011,22(3):417-438 [Abstract(6339)]  [View PDF(5063)509.47 K]