Volume 21,Issue 7,2010 Table of Contents

Other Issues:  
  
Contents

  • Subtyping Algorithm with Pruning Optimization
  • DAI Xiao-Jun and CHEN Hai-Ming
  • 2010,21(7):1481-1490 [Abstract(4404)]  [View PDF(5862)571.22 K]
  • Improved SMT-Based Bounded Model Checking for Real-Time Systems
  • XU Liang
  • 2010,21(7):1491-1502 [Abstract(5191)]  [View PDF(7072)631.43 K]
  • Research on Relationship Between Patterns and Text in String Matching Algorithms
  • LIU Ping,LIU Ping,LIU Yan-Bing,GUO Li and FANG Bin-Xing
  • 2010,21(7):1503-1514 [Abstract(4488)]  [View PDF(6933)1007.40 K]
  • Improved Parameterized Algorithm for the Multicut Problem
  • LIU Yun-Long,WANG Jian-Xin and CHEN Jian-Er
  • 2010,21(7):1515-1523 [Abstract(4879)]  [View PDF(6286)663.52 K]
  • Graph-Based Optimal Cache Deployment Algorithm for Distributed Caching Systems
  • LI Wen-Zhong,CHEN Dao-Xu and LU Sang-Lu
  • 2010,21(7):1524-1535 [Abstract(5192)]  [View PDF(6892)665.38 K]
  • Specification-Based Logic Coverage Testing Criteria
  • QIAN Zhong-Sheng and MIAO Huai-Kou
  • 2010,21(7):1536-1549 [Abstract(4914)]  [View PDF(6537)746.98 K]
  • Skyband Cardinality Estimation Based on the Inclusion-Exclusion Principle
  • ZHAO Jia-Kui,YANG Dong-Qing and CHEN Li-Jun
  • 2010,21(7):1550-1560 [Abstract(4502)]  [View PDF(6081)797.43 K]
  • Maximum Lifetime Genetic Routing Algorithm in Wireless Sensor Networks
  • TANG Wei and GUO Wei
  • 2010,21(7):1646-1656 [Abstract(4599)]  [View PDF(7383)680.53 K]
  • Cross-Layer Optimal Congestion Control Scheme in Mobile Ad Hoc Networks
  • XU Wei-Qiang,WANG Ya-Ming,YU Cheng-Hai,LIU Liang-Gui and ZHANG Yun-Hua
  • 2010,21(7):1667-1678 [Abstract(5269)]  [View PDF(7973)705.74 K]
  • Dynamic Key Management Scheme for Wireless Sensor Network
  • KONG Fan-Rui and LI Chun-Wen
  • 2010,21(7):1679-1691 [Abstract(5193)]  [View PDF(6713)696.61 K]
  • Adaptively Imperceptible Video Watermarking Algorithm Using Entropy Model
  • LI Zhi and CHEN Xiao-Wei
  • 2010,21(7):1692-1703 [Abstract(5138)]  [View PDF(6592)725.30 K]
  • Enhancing the Ability of Inter-Domain IP Spoofing Prevention
  • Lü Gao-Feng,SUN Zhi-Gang and LU Xi-Cheng
  • 2010,21(7):1704-1716 [Abstract(4786)]  [View PDF(6863)947.72 K]
  • Provably Secure Approach for Multiple Node-Disjoint Paths Source Routing Protocol
  • FENG Tao,GUO Xian,MA Jian-Feng and LI Xing-Hua
  • 2010,21(7):1717-1731 [Abstract(4362)]  [View PDF(6374)733.96 K]
  • Compact Routing Scheme for Scale-Free Networks
  • TANG Ming-Dong,ZHANG Guo-Qing,YANG Jing and ZHANG Guo-Qiang
  • 2010,21(7):1732-1743 [Abstract(4595)]  [View PDF(6863)645.41 K]
  • Exact Algorithm for Multi-Constrained Shortest Link-Disjoint Paths
  • XIONG Ke,QIU Zheng-Ding,GUO Yu-Chun,ZHANG Hong-Ke and QIN Ya-Juan
  • 2010,21(7):1744-1757 [Abstract(4043)]  [View PDF(6527)913.06 K]
  • Construction of Boolean Functions with Maximum Algebraic Immunity
  • MENG Qiang,CHEN Lu-Sheng and FU Fang-Wei
  • 2010,21(7):1758-1767 [Abstract(4301)]  [View PDF(6098)580.83 K]
  • Security Analysis of 3GPP Authentication and Key Agreement Protocol
  • LU Feng,LU Feng,ZHENG Kang-Feng,NIU Xin-Xin,YANG Yi-Xian and LI Zhong-Xian
  • 2010,21(7):1768-1782 [Abstract(4989)]  [View PDF(9586)872.46 K]
  • Review Articles

  • Transport Protocols for Fast Long Distance Networks
  • REN Yong-Mao,TANG Hai-Na,LI Jun and QIAN Hua-Lin
  • 2010,21(7):1576-1588 [Abstract(8748)]  [View PDF(14183)664.60 K]
  • Disruption-Free Forwarding Survivable Routing Protocols on Internet
  • SU Jin-Shu,HU Qiao-Lin and ZHAO Bao-Kang
  • 2010,21(7):1589-1604 [Abstract(6937)]  [View PDF(10743)827.17 K]
  • Research on Cyberspace Situational Awareness
  • GONG Zheng-Hu and ZHUO Ying
  • 2010,21(7):1605-1619 [Abstract(10075)]  [View PDF(21292)856.25 K]
  • Broadcasting Methods in Vehicular Ad Hoc Networks
  • LI Li-Jun,LIU Hong-Fei,YANG Zu-Yuan,GE Li-Jia and HUANG Xi-Yue
  • 2010,21(7):1620-1634 [Abstract(12594)]  [View PDF(21623)765.23 K]
  • End-System Performance Aware Transport Protocols
  • WANG Wei-Hang,REN Yong-Mao,TANG Ming-Jie,LI Jun and QIAN Hua-Lin
  • 2010,21(7):1635-1645 [Abstract(7807)]  [View PDF(9507)637.59 K]
  • Online First

  • Clustering Web Images by Correlation Mining of Image-Text
  • WU Fei,HAN Ya-Hong,ZHUANG Yue-Ting and SHAO Jian
  • 2010,21(7):1561-1575 [Abstract(7245)]  [View PDF(9486)784.24 K]
  • Model of the Resource Addressing in the Internet of Things
  • KONG Ning,LI Xiao-Dong,LUO Wan-Ming and YAN Bao-Ping
  • 2010,21(7):1657-1666 [Abstract(7150)]  [View PDF(9148)566.91 K]