We use cookies to improve your experience with our site.

Preface
Xiao-Ming Li, Xiaodong Zhang
2011, 26(4): 567-568. doi: 10.1007/s11390-011-1156-1
Abstract
Understanding Science Through the Computational Lens
Richard M. Karp
2011, 26(4): 569-577. doi: 10.1007/s11390-011-1157-0
Abstract
New Methodologies for Parallel Architecture
Dong-Rui Fan, Xiao-Wei Li, Guo-Jie Li
2011, 26(4): 578-587. doi: 10.1007/s11390-011-1158-z
Abstract
Internetware: An Emerging Software Paradigm for Internet Computing
Hong Mei, Xuan-Zhe Liu
2011, 26(4): 588-599. doi: 10.1007/s11390-011-1159-y
Abstract
A Programming Language Approach to Internet-Based Virtual Computing Environment
Ji Wang, Rui Shen, Huai-Min Wang
2011, 26(4): 600-615. doi: 10.1007/s11390-011-1160-5
Abstract
Three New Concepts of Future Computer Science
Zhi-Wei Xu, Dan-Dan Tu
2011, 26(4): 616-624. doi: 10.1007/s11390-011-1161-4
Abstract
Possibilities for Healthcare Computing
Peter Szolovits
2011, 26(4): 625-631. doi: 10.1007/s11390-011-1162-3
Abstract
Overview of Center for Domain-Specific Computing
Jason Cong
2011, 26(4): 632-635. doi: 10.1007/s11390-011-1163-2
Abstract
The Challenges of Multidisciplinary Education in Computer Science
Fred S. Roberts
2011, 26(4): 636-642. doi: 10.1007/s11390-011-1164-1
Abstract
DHC: Distributed, Hierarchical Clustering in Sensor Networks
Xiu-Li Ma, Hai-Feng Hu, Shuang-Feng Li, Hong-Mei Xiao, Qiong Luo, Dong-Qing Yang, Shi-Wei Tang
2011, 26(4): 643-662. doi: 10.1007/s11390-011-1165-0
Abstract
Bootstrapping Object Coreferencing on the Semantic Web
Wei Hu, Yu-Zhong Qu, Xing-Zhi Sun
2011, 26(4): 663-675. doi: 10.1007/s11390-011-1166-z
Abstract
Guided Structure-Aware Review Summarization
Feng Jin, Min-Lie Huang, Xiao-Yan Zhu
2011, 26(4): 676-684. doi: 10.1007/s11390-011-1167-y
Abstract
Aggressive Complex Event Processing with Confidence over Out-of-Order Streams
Chuan-Wen Li, Yu Gu, Ge Yu, Bonghee Hong
2011, 26(4): 685-696. doi: 10.1007/s11390-011-1168-x
Abstract
Provably Secure Role-Based Encryption with Revocation Mechanism
Yan Zhu, Hong-Xin Hu, Gail-Joon Ahn, Huai-Xi Wang, Shan-Biao Wang
2011, 26(4): 697-710. doi: 10.1007/s11390-011-1169-9
Abstract
Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs
Seleviawati Tarmizi, Prakash Veeraraghavan, Somnath Ghosh
2011, 26(4): 711-721. doi: 10.1007/s11390-011-1170-3
Abstract
Differential Attack on Five Rounds of the SC2000 Block Cipher
Ji-Qiang Lv
2011, 26(4): 722-731. doi: 10.1007/s11390-011-1171-2
Abstract
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
Xiao-Ming Deng, Yan Xiong
2011, 26(4): 732-743. doi: 10.1007/s11390-011-1172-1
Abstract
Impossible Differential Attacks on 13-Round CLEFIA-128
Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
2011, 26(4): 744-750. doi: 10.1007/s11390-011-1173-0
Abstract
Current Issue Cover