Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2000 Issue 5
Accurate Baum-Welch Algorithm Free from Overflow
JIA Bin;ZHU Xiao-yan;LUO Yu-pin;HU Dong-cheng
..............page:707-710
A Framework for Analyzing Object-Oriented Programs Based on Class Hierarchy Graph
LI Bi-xin;LIANG Jia;ZHANG Yong-xiang;FAN Xiao-cong;ZHENG Guo-liang
..............page:694-700
Design and Performance Analysis of a Hybrid Real-Time Scheduling Algorithm with Fault-Tolerance
QIN Xiao;HAN Zong-fen;PANG Li-ping;LI Sheng-li
..............page:686-693
Modeling Object Relationships in Programming Language
WAN Jian-cheng;ZHANG Shu-ming
..............page:679-685
Spatial Data Classification Based on Rough Set
SHI Yun;SUN Yu-fang;ZUO Chun
..............page:673-678
Field Theory Based Adaptive Resonance Neural Network Classifier
ZHOU Zhi-hua;CHEN Zhao-qian;CHEN Shi-fu
..............page:667-672
Bayesian Network for Data Mining
MU Chun-di;DAI Jian-bin;YE Jun
..............page:660-666
A Scheduling and Dropping Algorithm for Packets in QoS Controlling
WANG Xiao-chun;ZHANG Yao-xue
..............page:654-659
Flow Dependence Analysis for VLIW Architectures
RONG Hong-bo;TANG Zhi-zhong
..............page:646-653
Design and Implementation of an Agent-Based Firewall System
ZHANG Lei;QING Si-han
..............page:642-645
Component Metrics in Jade Bird Component Library System
MEI Hong;XIE Tao;YUAN Wang-hong;YANG Fu-qing
..............page:634-341
Performance Analysis for Massive Problem Data Parallel Computing
SHU Ji-wu;ZHENG Wei-min;SHEN Mei-ming;WANG Dong-sheng
..............page:628-633
Reversible DCT Mapping Integers to Integers and Lossless Image Compression
YAN Yu-song;SHI Qing-yun
..............page:620-627
Research on a New Type Integrated Security System
MENG Yang;LIU Ke-long;QING Si-han
..............page:616-619
From Petri Nets to Formal Description Techniques and Protocol Engineering
LUO Jun-zhou;SHEN Jun;GU Guan-qun
..............page:606-615
On Liveness and Safeness of Asymmetric Choice Nets
ZHEN Qiang;LU Wei-ming
..............page:590-605
Abuses of Ajtai-Dwork Cryptosystem
ZHAO Zhu
..............page:584-589
An Application of Domain Theory to Logical Design of VLSI Circuits
SUN Yong;HU Yi
..............page:569-583