Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2010 Issue 3
An Approach of Software Reliability Evaluation in the Open Environment
lu wen ; xu feng ; lv jian
..............page:452-462
A Breakpoint Debugging Method for LR(k) Grammars
xu fu ; jin mao zhong ; li hu ; song zuo
..............page:483-492
A Survey on Management of Data Provenance
gao ming ; jin che qing ; wang xiao ling ; tian xiu xia ; zhou ao ying
..............page:373-389
Grid Security Interoperation and Its Application
zou de qing ; zou yong qiang ; qiang wei zhong ; jin hai ; zuo an ; wang kai
..............page:514-525
A Technique of 3D Reconstruction of Blood Vessel\'s Skeleton Based on Snakes
cao zhi guo ; peng bo ; sang nong ; zhang tian xu
..............page:603-612
A Novel General Steganalysis Technique Based on Cover Image Describing
mao jia fa ; lin jia jun
..............page:569-579
An Abstract Domain of One-Variable Interval Linear Inequalities
chen li qian ; wang zuo ; hou su ning
..............page:427-439
Symbolic Test Generation and Execution of Route Protocol
xing zuo ; ye xin ming ; xie gao gang
..............page:589-595
A New Manifold Reconstruction Method Based on Isomap
meng de yu ; xu chen ; xu zong ben
..............page:545-555
A Novel Intelligent Single Particle Optimizer
ji zhen ; zhou jia rui ; liao hui lian ; wu qing hua
..............page:556-561
Research on the Implement Mechanism of EPON VoD QoS Multicast Based on Utility
zhang jin yu ; liu li ; yang wei
..............page:580-588
Detecting Memory Leak Via VMM
wang xiao lin ; wang zhen lin ; sun yi feng ; liu yi ; zhang bin bin ; luo ying wei
..............page:463-472
Formal Definition of Generalized Virus and Its Identifying Algorithm
he hong jun ; luo li ; dong li ming ; he xiu xiong ; hou fang yong ; zhong guang jun
..............page:562-568
Software Stability Analysis Based on Change Impact Simulation
zhang li ; qian guan qun ; li lin
..............page:440-451
A Multi-QoS Based Local Optimal Model of Service Selection
hu jian qiang ; li zuo zi ; liao gui ping
..............page:526-534
Studies of Network Coordinative Forensics Computing
zhang you dong ; zeng qing kai ; wang jian dong
..............page:504-513
Exploring Multiple Execution Paths Based on Dynamic Lazy Analysis
chen zuo ; feng deng guo ; su zuo zuo
..............page:493-503
A Generating System to Generate Legitimate and Reasonable Sentences
hu ; gao xiao yu ; li li ; gao qing shi
..............page:535-544
A Model Checking Approach for Solving Epistemic Riddles
luo xiang yu ; su kai le ; gu ming
..............page:406-414
A Monadic Slicing Algorithm for a Program with Pointers
zhang ying zhou ; wu zhong qiang ; qian ju ; zhang wei feng ; xu bao wen
..............page:473-482
Research on Trust Mechanism for Peer-to-Peer Network
li yong jun ; dai ya fei
..............page:390-405
Method for Computing Minimal Siphons in Petri Nets and the Performance Analysis
zhang jin quan ; ni li na ; jiang chang jun ; zhang jun qi
..............page:596-602