Recent advances in program verification through computer algebra Lu YangChaochen ZhouBican Xia Review Article 05 February 2010 Pages: 1 - 16
Static worst-case execution time analysis of the μC/OS-II real-time kernel Mingsong LvNan GuanYi Wang Research Article 16 February 2010 Pages: 17 - 27
A semantic model of confinement and Locality theorem Shuling WangQin ShuZongyan Qiu Research Article 05 February 2010 Pages: 28 - 46
TRainbow: a new trusted virtual machine based platform Yuzhong SunHaifeng FangYunwei Gao Research Article 01 February 2010 Pages: 47 - 64
Formal verification of concurrent programs with read-write locks Ming FuYu ZhangYong Li Research Article 25 January 2010 Pages: 65 - 77
A new model for model checking: cycle-weighted Kripke structure Jiaqi ZhuHanpin WangChunxiang Xu Research Article 13 January 2010 Pages: 78 - 88
Mining non-redundant diverse patterns: an information theoretic perspective Chaofeng ShaJian GongAoying Zhou Research Article 25 January 2010 Pages: 89 - 99
A constraint-based topic modeling approach for name disambiguation Feng WangJie TangKehong Wang Research Article 16 February 2010 Pages: 100 - 111
Improved feedback modeling of transport in enlarging urban areas of developing countries Xuesong FengJunyi ZhangHirokazu Kato Research Article 28 January 2010 Pages: 112 - 122
Efficient distributed location verification in wireless sensor networks Qiyuan ZhangXuehai Zhou Research Article 28 January 2010 Pages: 123 - 134
An effective scheduling scheme for multi-hop multicast in wireless mesh networks Zheng LiuHeng DaiJufeng Dai Review Article 27 January 2010 Pages: 135 - 142
A MANET accessing Internet routing algorithm based on dynamic gateway adaptive selection Xin LiZhe Li Research Article 12 December 2009 Pages: 143 - 150