Volume 21,Issue 7,2010 Table of Contents
Subtyping Algorithm with Pruning OptimizationDAI Xiao-Jun and CHEN Hai-Ming2010,21(7):1481-1490 [Abstract(4433)] [View PDF(6004)571.22 K]Improved SMT-Based Bounded Model Checking for Real-Time SystemsXU Liang2010,21(7):1491-1502 [Abstract(5219)] [View PDF(7214)631.43 K]Research on Relationship Between Patterns and Text in String Matching AlgorithmsLIU Ping,LIU Ping,LIU Yan-Bing,GUO Li and FANG Bin-Xing2010,21(7):1503-1514 [Abstract(4510)] [View PDF(7080)1007.40 K]Improved Parameterized Algorithm for the Multicut ProblemLIU Yun-Long,WANG Jian-Xin and CHEN Jian-Er2010,21(7):1515-1523 [Abstract(4926)] [View PDF(6432)663.52 K]Graph-Based Optimal Cache Deployment Algorithm for Distributed Caching SystemsLI Wen-Zhong,CHEN Dao-Xu and LU Sang-Lu2010,21(7):1524-1535 [Abstract(5223)] [View PDF(7023)665.38 K]Specification-Based Logic Coverage Testing CriteriaQIAN Zhong-Sheng and MIAO Huai-Kou2010,21(7):1536-1549 [Abstract(4952)] [View PDF(6673)746.98 K]Skyband Cardinality Estimation Based on the Inclusion-Exclusion PrincipleZHAO Jia-Kui,YANG Dong-Qing and CHEN Li-Jun2010,21(7):1550-1560 [Abstract(4549)] [View PDF(6267)797.43 K]Maximum Lifetime Genetic Routing Algorithm in Wireless Sensor NetworksTANG Wei and GUO Wei2010,21(7):1646-1656 [Abstract(4630)] [View PDF(7533)680.53 K]Cross-Layer Optimal Congestion Control Scheme in Mobile Ad Hoc NetworksXU Wei-Qiang,WANG Ya-Ming,YU Cheng-Hai,LIU Liang-Gui and ZHANG Yun-Hua2010,21(7):1667-1678 [Abstract(5314)] [View PDF(8299)705.74 K]Dynamic Key Management Scheme for Wireless Sensor NetworkKONG Fan-Rui and LI Chun-Wen2010,21(7):1679-1691 [Abstract(5229)] [View PDF(6898)696.61 K]Adaptively Imperceptible Video Watermarking Algorithm Using Entropy ModelLI Zhi and CHEN Xiao-Wei2010,21(7):1692-1703 [Abstract(5172)] [View PDF(6732)725.30 K]Enhancing the Ability of Inter-Domain IP Spoofing PreventionLü Gao-Feng,SUN Zhi-Gang and LU Xi-Cheng2010,21(7):1704-1716 [Abstract(4814)] [View PDF(7007)947.72 K]Provably Secure Approach for Multiple Node-Disjoint Paths Source Routing ProtocolFENG Tao,GUO Xian,MA Jian-Feng and LI Xing-Hua2010,21(7):1717-1731 [Abstract(4382)] [View PDF(6514)733.96 K]Compact Routing Scheme for Scale-Free NetworksTANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang2010,21(7):1732-1743 [Abstract(4638)] [View PDF(7031)645.41 K]Exact Algorithm for Multi-Constrained Shortest Link-Disjoint PathsXIONG Ke,QIU Zheng-Ding,GUO Yu-Chun,ZHANG Hong-Ke and QIN Ya-Juan2010,21(7):1744-1757 [Abstract(4072)] [View PDF(6703)913.06 K]Construction of Boolean Functions with Maximum Algebraic ImmunityMENG Qiang,CHEN Lu-Sheng and FU Fang-Wei2010,21(7):1758-1767 [Abstract(4338)] [View PDF(6271)580.83 K]Security Analysis of 3GPP Authentication and Key Agreement ProtocolLU Feng,LU Feng,ZHENG Kang-Feng,NIU Xin-Xin,YANG Yi-Xian and LI Zhong-Xian2010,21(7):1768-1782 [Abstract(5025)] [View PDF(9784)872.46 K]
Transport Protocols for Fast Long Distance NetworksREN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin2010,21(7):1576-1588 [Abstract(8810)] [View PDF(14689)664.60 K]Disruption-Free Forwarding Survivable Routing Protocols on InternetSU Jin-Shu,HU Qiao-Lin and ZHAO Bao-Kang2010,21(7):1589-1604 [Abstract(6978)] [View PDF(11362)827.17 K]Research on Cyberspace Situational AwarenessGONG Zheng-Hu and ZHUO Ying2010,21(7):1605-1619 [Abstract(10129)] [View PDF(22732)856.25 K]Broadcasting Methods in Vehicular Ad Hoc NetworksLI Li-Jun,LIU Hong-Fei,YANG Zu-Yuan,GE Li-Jia and HUANG Xi-Yue2010,21(7):1620-1634 [Abstract(12654)] [View PDF(22600)765.23 K]End-System Performance Aware Transport ProtocolsWANG Wei-Hang,REN Yong-Mao,TANG Ming-Jie,LI Jun and QIAN Hua-Lin2010,21(7):1635-1645 [Abstract(7841)] [View PDF(10088)637.59 K]
Clustering Web Images by Correlation Mining of Image-TextWU Fei,HAN Ya-Hong,ZHUANG Yue-Ting and SHAO Jian2010,21(7):1561-1575 [Abstract(7271)] [View PDF(9655)784.24 K]Model of the Resource Addressing in the Internet of ThingsKONG Ning,LI Xiao-Dong,LUO Wan-Ming and YAN Bao-Ping2010,21(7):1657-1666 [Abstract(7192)] [View PDF(9268)566.91 K]