Volume 21,Issue 7,2010 Table of Contents
Subtyping Algorithm with Pruning OptimizationDAI Xiao-Jun and CHEN Hai-Ming2010,21(7):1481-1490 [Abstract(4404)] [View PDF(5862)571.22 K]Improved SMT-Based Bounded Model Checking for Real-Time SystemsXU Liang2010,21(7):1491-1502 [Abstract(5191)] [View PDF(7072)631.43 K]Research on Relationship Between Patterns and Text in String Matching AlgorithmsLIU Ping,LIU Ping,LIU Yan-Bing,GUO Li and FANG Bin-Xing2010,21(7):1503-1514 [Abstract(4488)] [View PDF(6933)1007.40 K]Improved Parameterized Algorithm for the Multicut ProblemLIU Yun-Long,WANG Jian-Xin and CHEN Jian-Er2010,21(7):1515-1523 [Abstract(4879)] [View PDF(6286)663.52 K]Graph-Based Optimal Cache Deployment Algorithm for Distributed Caching SystemsLI Wen-Zhong,CHEN Dao-Xu and LU Sang-Lu2010,21(7):1524-1535 [Abstract(5192)] [View PDF(6892)665.38 K]Specification-Based Logic Coverage Testing CriteriaQIAN Zhong-Sheng and MIAO Huai-Kou2010,21(7):1536-1549 [Abstract(4914)] [View PDF(6537)746.98 K]Skyband Cardinality Estimation Based on the Inclusion-Exclusion PrincipleZHAO Jia-Kui,YANG Dong-Qing and CHEN Li-Jun2010,21(7):1550-1560 [Abstract(4502)] [View PDF(6081)797.43 K]Maximum Lifetime Genetic Routing Algorithm in Wireless Sensor NetworksTANG Wei and GUO Wei2010,21(7):1646-1656 [Abstract(4599)] [View PDF(7383)680.53 K]Cross-Layer Optimal Congestion Control Scheme in Mobile Ad Hoc NetworksXU Wei-Qiang,WANG Ya-Ming,YU Cheng-Hai,LIU Liang-Gui and ZHANG Yun-Hua2010,21(7):1667-1678 [Abstract(5269)] [View PDF(7973)705.74 K]Dynamic Key Management Scheme for Wireless Sensor NetworkKONG Fan-Rui and LI Chun-Wen2010,21(7):1679-1691 [Abstract(5193)] [View PDF(6713)696.61 K]Adaptively Imperceptible Video Watermarking Algorithm Using Entropy ModelLI Zhi and CHEN Xiao-Wei2010,21(7):1692-1703 [Abstract(5138)] [View PDF(6592)725.30 K]Enhancing the Ability of Inter-Domain IP Spoofing PreventionLü Gao-Feng,SUN Zhi-Gang and LU Xi-Cheng2010,21(7):1704-1716 [Abstract(4786)] [View PDF(6863)947.72 K]Provably Secure Approach for Multiple Node-Disjoint Paths Source Routing ProtocolFENG Tao,GUO Xian,MA Jian-Feng and LI Xing-Hua2010,21(7):1717-1731 [Abstract(4362)] [View PDF(6374)733.96 K]Compact Routing Scheme for Scale-Free NetworksTANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang2010,21(7):1732-1743 [Abstract(4595)] [View PDF(6863)645.41 K]Exact Algorithm for Multi-Constrained Shortest Link-Disjoint PathsXIONG Ke,QIU Zheng-Ding,GUO Yu-Chun,ZHANG Hong-Ke and QIN Ya-Juan2010,21(7):1744-1757 [Abstract(4043)] [View PDF(6527)913.06 K]Construction of Boolean Functions with Maximum Algebraic ImmunityMENG Qiang,CHEN Lu-Sheng and FU Fang-Wei2010,21(7):1758-1767 [Abstract(4301)] [View PDF(6098)580.83 K]Security Analysis of 3GPP Authentication and Key Agreement ProtocolLU Feng,LU Feng,ZHENG Kang-Feng,NIU Xin-Xin,YANG Yi-Xian and LI Zhong-Xian2010,21(7):1768-1782 [Abstract(4989)] [View PDF(9586)872.46 K]
Transport Protocols for Fast Long Distance NetworksREN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin2010,21(7):1576-1588 [Abstract(8748)] [View PDF(14183)664.60 K]Disruption-Free Forwarding Survivable Routing Protocols on InternetSU Jin-Shu,HU Qiao-Lin and ZHAO Bao-Kang2010,21(7):1589-1604 [Abstract(6937)] [View PDF(10743)827.17 K]Research on Cyberspace Situational AwarenessGONG Zheng-Hu and ZHUO Ying2010,21(7):1605-1619 [Abstract(10075)] [View PDF(21292)856.25 K]Broadcasting Methods in Vehicular Ad Hoc NetworksLI Li-Jun,LIU Hong-Fei,YANG Zu-Yuan,GE Li-Jia and HUANG Xi-Yue2010,21(7):1620-1634 [Abstract(12594)] [View PDF(21623)765.23 K]End-System Performance Aware Transport ProtocolsWANG Wei-Hang,REN Yong-Mao,TANG Ming-Jie,LI Jun and QIAN Hua-Lin2010,21(7):1635-1645 [Abstract(7807)] [View PDF(9507)637.59 K]
Clustering Web Images by Correlation Mining of Image-TextWU Fei,HAN Ya-Hong,ZHUANG Yue-Ting and SHAO Jian2010,21(7):1561-1575 [Abstract(7245)] [View PDF(9486)784.24 K]Model of the Resource Addressing in the Internet of ThingsKONG Ning,LI Xiao-Dong,LUO Wan-Ming and YAN Bao-Ping2010,21(7):1657-1666 [Abstract(7150)] [View PDF(9148)566.91 K]