Volume 22,Issue 6,2011 Table of Contents

Other Issues:  
  
Contents

  • Evaluation Method with Measureable Space-Time Dynamic Properties for Mobile Ad Hoc Networks
  • WANG Wei,GUAN Xiao-Hong,WANG Bei-Zhan and WANG Ya-Ping
  • 2011,22(6):1333-1349 [Abstract(3367)]  [View PDF(6039)561.52 K]
  • Efficient and Secure Identity-Based Signature Scheme
  • GU Ke,JIA Wei-Jia and JIANG Chun-Ling
  • 2011,22(6):1350-1360 [Abstract(4797)]  [View PDF(3926)585.42 K]
  • Optimal Actor Nodes Deployment Strategy Under Real-Time Constraint in WSANs
  • CHE Nan,LI Zhi-Jun and JIANG Shou-Xu
  • 2011,22(6):1361-1372 [Abstract(3984)]  [View PDF(3070)749.26 K]
  • Crawler-Based Measurement of Large Scale P2P IPTV Systems
  • JIANG Zhi-Hong,WANG Hui and FAN Peng-Yi
  • 2011,22(6):1373-1388 [Abstract(4213)]  [View PDF(3654)877.73 K]
  • Anti-Monitoring Algorithm for Mobile Object in Anisotropic Sensory Networks
  • WANG Lei,JIANG Xin-Hua,WANG Yi-Min and LIN Ya-Ping
  • 2011,22(6):1389-1397 [Abstract(3085)]  [View PDF(2635)757.51 K]
  • Uncertain-Graph Based Method for Network Vulnerability Analysis
  • LIU Qiang,YIN Jian-Ping,CAI Zhi-Ping and CHENG Jie-Ren
  • 2011,22(6):1398-1412 [Abstract(3407)]  [View PDF(3926)617.70 K]
  • Review Articles

  • P2P Traffic Identification
  • LU Gang,ZHANG Hong-Li and YE Lin
  • 2011,22(6):1281-1298 [Abstract(6729)]  [View PDF(8669)840.72 K]
  • Attribute-Based Encryption Schemes
  • SU Jin-Shu,CAO Dan,WANG Xiao-Feng,SUN Yi-Pin and HU Qiao-Lin
  • 2011,22(6):1299-1315 [Abstract(7356)]  [View PDF(13153)987.90 K]
  • Research on Certificateless Public Key Cryptography
  • ZHANG Fu-Tai,SUN Yin-Xia,ZHANG Lei,GENG Man-Man and LI Su-Juan
  • 2011,22(6):1316-1332 [Abstract(6701)]  [View PDF(7540)817.61 K]
  • Special Issue's Articles

  • 形式化方法与工具专刊前言
  • **王戟
  • 2011,22(6):1121-1122 [Abstract(6365)]  [View PDF(3927)181.15 K]
  • Strategy Driven Modeling and Analysis of Reliable Embedded Systems
  • FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
  • 2011,22(6):1123-1139 [Abstract(5477)]  [View PDF(3945)568.31 K]
  • Optimization of Points-to Analysis for Java
  • LI Qian,TANG En-Yi,DAI Xue-Feng,WANG Lin-Zhang and ZHAO Jian-Hua
  • 2011,22(6):1140-1154 [Abstract(6250)]  [View PDF(4874)723.13 K]
  • Automatic Test Case Generator for Object-Z Specification
  • XU Qing-Guo,MIAO Huai-Kou,CAO Xiao-Xia and HU Xiao-Bo
  • 2011,22(6):1155-1168 [Abstract(6682)]  [View PDF(6719)926.87 K]
  • Cycle Symmetry Reduction and Its Extension on Three-Valued Models
  • WEI Ou,YUAN Yong,CAI Xin-Ye,HUANG Zhi-Qiu and XU Bing-Feng
  • 2011,22(6):1169-1184 [Abstract(6698)]  [View PDF(3570)769.28 K]
  • Scenario-Driven Service Behavior Manipulation
  • LIU Xi,YANG Lu,PAN Min-Xue and WANG Lin-Zhang
  • 2011,22(6):1185-1198 [Abstract(6216)]  [View PDF(3486)789.46 K]
  • Time Petri Net Model with Mixed Semantics
  • PAN Li,DING Zhi-Jun and GUO Guan-Qi
  • 2011,22(6):1199-1209 [Abstract(6132)]  [View PDF(4055)623.71 K]
  • Conditional Hypergraph Grammars and Its Analysis of Dynamic Evolution of Software Architectures
  • XU Hong-Zhen,ZENG Guo-Sun and CHEN Bo
  • 2011,22(6):1210-1223 [Abstract(6089)]  [View PDF(4208)466.11 K]
  • Conflicts Detection in Runtime Verification Based on AOP
  • ZHANG Xian,DONG Wei and QI Zhi-Chang
  • 2011,22(6):1224-1235 [Abstract(6333)]  [View PDF(3795)603.94 K]
  • Schedulability Analysis Tool for Distributed Real-Time Systems Based on Automata Theory
  • GUI Sheng-Lin,LUO Lei,LI Yun,YU Miao and XU Jian-Hua
  • 2011,22(6):1236-1251 [Abstract(6490)]  [View PDF(4031)915.24 K]
  • Reliability Analysis and Assessment Tool for AADL Model
  • DONG Yun-Wei,WANG Guang-Ren,ZHANG Fan and GAO Lei
  • 2011,22(6):1252-1266 [Abstract(6890)]  [View PDF(5520)882.34 K]
  • Solving Chinese Postman Problem on Time Varying Network with Timed Automata
  • TAN Guo-Zhen,SUN Jing-Hao,WANG Bao-Cai and YAO Wei-Hong
  • 2011,22(6):1267-1280 [Abstract(7084)]  [View PDF(3984)627.04 K]