Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2003 Issue 6
Analyzing and Improving the TCP Stability in Wireless Ad Hoc Networks
li yun ; chen qian bin ; long ke ping ; wu shi qi
..............page:1178-1186
A Digital Fingerprinting Algorithm Based on Binary Codes
wang yan ; lv shu wang ; xu han liang
..............page:1172-1177
Two Classes of Robust Threshold Key Escrow Schemes
cao zhen fu
..............page:1164-1171
A Multimedia Authentication System Combining Digital Signature and Digital Watermarking
hu jun quan ; huang ji wu ; zhang long jun ; huang da ren
..............page:1157-1163
A Security Model for Cryptographic Protocols
liu zuo wen ; li wei qin ; feng deng guo
..............page:1148-1156
A Web Pre-Fetching Model Based on Analyzing User Access Pattern
xu huan qing ; wang yong cheng
..............page:1142-1147
Towards Adaptive Load Balancing Services for Web Application Servers
fan guo chuang ; zhu zuo ; huang tao ; feng yu lin
..............page:1134-1141
A High Performance Web Server Based on Pipeline
yao nian min ; zheng ming yang ; ju jiu bin
..............page:1127-1133
A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming
su zuo zuo ; li de quan ; feng deng guo
..............page:1120-1126
An Improved Elman Model and Recurrent Back-Propagation Control Neural Networks
shi xiao hu ; liang yan chun ; xu xu
..............page:1110-1119
A Multiple Classifiers Integration Method Based on Full Information Matrix
tang chun sheng ; jin yi hui
..............page:1103-1109
A Self-Learning Model under Uncertain Condition
wang guo zuo ; he xiao
..............page:1096-1102
A Fast Clustering Algorithm Based on Reference and Density
ma shuai ; wang teng zuo ; tang shi wei ; yang dong qing ; gao jun
..............page:1089-1095
A Method for Singularity Detection in Fingerprint Images
tan tai zhe ; ning xin bao ; yin yi long ; zhan xiao si ; chen yun
..............page:1082-1088
Super-Resolution Restoration with Multi-Scale Edge-Preserving Regularization
zhang xin ming ; shen lan zuo
..............page:1075-1081
Research on Component Composition and Its Formal Reasoning
ren hong min ; qian le qiu
..............page:1066-1074
Priority Mapping in Real-Time Middleware
guo chang guo ; wang huai min ; zou peng ; wang feng
..............page:1060-1065
Study and Application of a Workflow Meta-Model
zhao wen ; hu wen zuo ; zhang shi zuo ; wang li fu
..............page:1052-1059
Design of a Trust Valuation Model in Software Service Coordination
xu feng ; lv jian ; zheng zuo ; cao chun
..............page:1043-1051
Application of Net Reduction to Feedback Controller Design of Petri Nets
wang shou guang ; yan gang feng ; jiang jing ping
..............page:1037-1042
Performance Analysis of Strictly Synchronized Stochastic Petri Nets
liu hong ; lin chuang ; wu jian ping
..............page:1029-1036