Volume 22,Issue 6,2011 Table of Contents
Evaluation Method with Measureable Space-Time Dynamic Properties for Mobile Ad Hoc NetworksWANG Wei,GUAN Xiao-Hong,WANG Bei-Zhan and WANG Ya-Ping2011,22(6):1333-1349 [Abstract(4545)] [View PDF(9228)561.52 K]Efficient and Secure Identity-Based Signature SchemeGU Ke,JIA Wei-Jia and JIANG Chun-Ling2011,22(6):1350-1360 [Abstract(6754)] [View PDF(7272)585.42 K]Optimal Actor Nodes Deployment Strategy Under Real-Time Constraint in WSANsCHE Nan,LI Zhi-Jun and JIANG Shou-Xu2011,22(6):1361-1372 [Abstract(5443)] [View PDF(5719)749.26 K]Crawler-Based Measurement of Large Scale P2P IPTV SystemsJIANG Zhi-Hong,WANG Hui and FAN Peng-Yi2011,22(6):1373-1388 [Abstract(5547)] [View PDF(6571)877.73 K]Anti-Monitoring Algorithm for Mobile Object in Anisotropic Sensory NetworksWANG Lei,JIANG Xin-Hua,WANG Yi-Min and LIN Ya-Ping2011,22(6):1389-1397 [Abstract(4465)] [View PDF(5534)757.51 K]Uncertain-Graph Based Method for Network Vulnerability AnalysisLIU Qiang,YIN Jian-Ping,CAI Zhi-Ping and CHENG Jie-Ren2011,22(6):1398-1412 [Abstract(4967)] [View PDF(7072)617.70 K]
P2P Traffic IdentificationLU Gang,ZHANG Hong-Li and YE Lin2011,22(6):1281-1298 [Abstract(9575)] [View PDF(14581)840.72 K]Attribute-Based Encryption SchemesSU Jin-Shu,CAO Dan,WANG Xiao-Feng,SUN Yi-Pin and HU Qiao-Lin2011,22(6):1299-1315 [Abstract(11538)] [View PDF(26444)987.90 K]Research on Certificateless Public Key CryptographyZHANG Fu-Tai,SUN Yin-Xia,ZHANG Lei,GENG Man-Man and LI Su-Juan2011,22(6):1316-1332 [Abstract(11524)] [View PDF(18515)817.61 K]
形式化方法与工具专刊前言**王戟2011,22(6):1121-1122 [Abstract(8550)] [View PDF(7216)181.15 K]Strategy Driven Modeling and Analysis of Reliable Embedded SystemsFAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei2011,22(6):1123-1139 [Abstract(7959)] [View PDF(8861)568.31 K]Optimization of Points-to Analysis for JavaLI Qian,TANG En-Yi,DAI Xue-Feng,WANG Lin-Zhang and ZHAO Jian-Hua2011,22(6):1140-1154 [Abstract(8921)] [View PDF(9823)723.13 K]Automatic Test Case Generator for Object-Z SpecificationXU Qing-Guo,MIAO Huai-Kou,CAO Xiao-Xia and HU Xiao-Bo2011,22(6):1155-1168 [Abstract(9089)] [View PDF(11247)926.87 K]Cycle Symmetry Reduction and Its Extension on Three-Valued ModelsWEI Ou,YUAN Yong,CAI Xin-Ye,HUANG Zhi-Qiu and XU Bing-Feng2011,22(6):1169-1184 [Abstract(9252)] [View PDF(8057)769.28 K]Scenario-Driven Service Behavior ManipulationLIU Xi,YANG Lu,PAN Min-Xue and WANG Lin-Zhang2011,22(6):1185-1198 [Abstract(8685)] [View PDF(7614)789.46 K]Time Petri Net Model with Mixed SemanticsPAN Li,DING Zhi-Jun and GUO Guan-Qi2011,22(6):1199-1209 [Abstract(8319)] [View PDF(8035)623.71 K]Conditional Hypergraph Grammars and Its Analysis of Dynamic Evolution of Software ArchitecturesXU Hong-Zhen,ZENG Guo-Sun and CHEN Bo2011,22(6):1210-1223 [Abstract(8613)] [View PDF(8746)466.11 K]Conflicts Detection in Runtime Verification Based on AOPZHANG Xian,DONG Wei and QI Zhi-Chang2011,22(6):1224-1235 [Abstract(8854)] [View PDF(8431)603.94 K]Schedulability Analysis Tool for Distributed Real-Time Systems Based on Automata TheoryGUI Sheng-Lin,LUO Lei,LI Yun,YU Miao and XU Jian-Hua2011,22(6):1236-1251 [Abstract(8791)] [View PDF(8234)915.24 K]Reliability Analysis and Assessment Tool for AADL ModelDONG Yun-Wei,WANG Guang-Ren,ZHANG Fan and GAO Lei2011,22(6):1252-1266 [Abstract(10022)] [View PDF(12686)882.34 K]Solving Chinese Postman Problem on Time Varying Network with Timed AutomataTAN Guo-Zhen,SUN Jing-Hao,WANG Bao-Cai and YAO Wei-Hong2011,22(6):1267-1280 [Abstract(9713)] [View PDF(9070)627.04 K]