Volume 22,Issue 11,2011 Table of Contents
Some Properties of Pigeon-Hole FormulasXU Dao-Yun,WEI Li and WANG Xiao-Feng2011,22(11):2553-2563 [Abstract(5332)] [View PDF(6425)566.33 K]Algorithm for Generating Short Sentences from Grammars Based on Branch Coverage CriterionZHENG Li-Xiao,XU Zhi-Wu and CHEN Hai-Ming2011,22(11):2564-2576 [Abstract(4697)] [View PDF(6509)696.70 K]Documentation-Based Approach to Reveal Architectural View ConflictsZHU Wen-Hui,HUANG Gang,SUN Yan-Chun and MEI Hong2011,22(11):2577-2592 [Abstract(4285)] [View PDF(5512)890.72 K]Approach for Evaluating the Trustworthiness of Service AgentZHU Man-Ling and JIN Zhi2011,22(11):2593-2609 [Abstract(4895)] [View PDF(6768)975.29 K]Monitoring Enabled Distributed Software Construction MethodLIU Dong-Hong,GUO Chang-Guo,WANG Huai-Min and WANG Tao2011,22(11):2610-2624 [Abstract(4851)] [View PDF(6879)862.60 K]Specification and Verification of UML2.0 Sequence Diagrams Based on Event Deterministic Finite AutomataZHANG Chen,DUAN Zhen-Hua and TIAN Cong2011,22(11):2625-2638 [Abstract(4422)] [View PDF(6844)981.94 K]Computational Error Handling as Aspects: A Case Study and EvaluationCUI Zhan-Qi,WANG Lin-Zhang,LIU Hui-Gen and LI Xuan-Dong2011,22(11):2639-2651 [Abstract(4312)] [View PDF(6335)775.38 K]Coordinating of Dynamic Updating Controlled by Transaction in Service-Oriented SystemWANG De-Jun,HUANG Lin-Peng and XU Xiao-Hui2011,22(11):2652-2667 [Abstract(4358)] [View PDF(6375)804.38 K]Multi-Level Component Behavior Matching Model Based on Finite AutomataCHU Dian-Hui,MENG Fan-Chao,ZHAN De-Chen and XU Xiao-Fei2011,22(11):2668-2683 [Abstract(4566)] [View PDF(6090)813.29 K]Analysis and Transformation of Overlapped Patterns in BPEL Process ModelingZHANG Man,DUAN Zhen-Hua and WANG Xiao-Bing2011,22(11):2684-2697 [Abstract(4785)] [View PDF(5976)799.88 K]Unified Formal Modeling and Analyzing both Functionality and QoS of Web Services CompositionXIAO Fang-Xiong,HUANG Zhi-Qiu,CAO Zi-Ning,TU Li-Zhong and ZHU Yi2011,22(11):2698-2715 [Abstract(4709)] [View PDF(7073)845.47 K]Software Behavior Model Based on System ObjectsFU Jian-Ming,TAO Fen,WANG Dan and ZHANG Huan-Guo2011,22(11):2716-2728 [Abstract(5087)] [View PDF(7229)648.43 K]Integration of Security Grid Dependent Tasks Scheduling Double-Objective Optimization Model and AlgorithmZHU Hai and WANG Yu-Ping2011,22(11):2729-2748 [Abstract(4992)] [View PDF(6998)1.15 M]Rate-Based Component Software Reliability Process SimulationHOU Chun-Yan,CUI Gang and LIU Hong-Wei2011,22(11):2749-2759 [Abstract(4641)] [View PDF(6056)983.76 K]Two-Phase Clustering Algorithm for Complex Distributed DataGONG Mao-Guo,WANG Shuang,MA Meng,CAO Yu,JIAO Li-Cheng and MA Wen-Ping2011,22(11):2760-2772 [Abstract(5221)] [View PDF(8281)1.14 M]Query Dependent Learning to Model Based on Ordered Multiple HyperplanesSUN He-Li,HUANG Jian-Bin,FENG Bo-Qin,ZHAO Zhi-Qin,LIU Jun and ZHENG Qing-Hua2011,22(11):2773-2781 [Abstract(4035)] [View PDF(6337)562.80 K]Resource Control Model for QoS in the Trustworthy and Controllable NetworkQU Yan-Sheng,LI Wei,LUO Jun-Zhou and WANG Peng2011,22(11):2782-2794 [Abstract(4445)] [View PDF(6265)1.29 M]Flash Crowd Control Model Based on Time DelayXIAO Jun,YUN Xiao-Chun and ZHANG Yong-Zheng2011,22(11):2795-2809 [Abstract(4206)] [View PDF(6198)793.73 K]P2P Weak State Routing Scheme Based on Decaying Bloom FiltersZHU Gui-Ming,GUO De-Ke and JIN Shi-Yao2011,22(11):2810-2819 [Abstract(4318)] [View PDF(5995)626.48 K]Universal Composable Password Authenticated Key Exchange Protocol in the Standard ModelHU Xue-Xian,ZHANG Zhen-Feng and LIU Wen-Fen2011,22(11):2820-2832 [Abstract(5918)] [View PDF(7634)692.13 K]Coded Retransmission Algorithm Based on Matching Theory for Wireless BroadcastingDAI Bin,CAO Zhi-Gang,YANG Jun,HUANG Chen and WANG Fu-Rong2011,22(11):2833-2842 [Abstract(3926)] [View PDF(5453)731.63 K]Two Party Certificateless Key Agreement SchemesLIU Wen-Hao and XU Chun-Xiang2011,22(11):2843-2852 [Abstract(4475)] [View PDF(6817)544.66 K]