Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2005 Issue 10
ruan jian xue bao tou gao zhi nan
..............page:封三
jing gao zuo zhe
..............page:1756
Optimization to Prevent Cache Penalty in Modulo Scheduling
LIU Li;LI Wen-Long;GUO Zhen-Yu;LI Sheng-Mei;TANG Zhi-Zhong
..............page:1842-1852
Hiding Memory Access Latency in Software Pipelining
LIU Li;LI Wen-Long;CHEN Yu;LI Sheng-Mei;TANG Zhi-Zhong
..............page:1833-1841
Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
LI Wen-Long;CHEN Yu;LIN Hai-Bo;TANG Zhi-Zhong
..............page:1822-1832
An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
SUN Zhong-Wei;FENG Deng-Guo;WU Chuan-Kun
..............page:1816-1821
A Study of Online Financial Trading Confirmation Scheme
CHEN Shun;YAO Qian;XIE Li
..............page:1811-1815
An Extended Resources Model Based on Distributed Cognition Theory
WANG Chang-Qing;DENG Chang-Zhi;MA Cui-Xia;HUA Qing-Yi;DAI Guo-Zhong
..............page:1717-1725
Effective Synchronization Removal in Concurrent Java Programs
WU Ping;CHEN Yi-Yun;ZHANG Jian
..............page:1708-1716
A Practical Algorithm for Haplotyping by Maximum Parsimony
ZHANG Qiang-Feng;CHE Hao-Yang;CHEN Guo-Liang;SUN Guang-Zhong
..............page:1699-1707
Approximate-Backbone Guided Fast Ant Algorithms to QAP
ZOU Peng;ZHOU Zhi;CHEN Guo-Liang;JIANG He;GU Jun
..............page:1691-1698
An Electronic Voting Scheme
LI Yan-Jiang;MA Chuan-Gui;HUANG Liu-Sheng
..............page:1805-1810
A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
SUN Zhong-Wei;FENG Deng-Guo
..............page:1798-1804
P2P-Oriented Secure Reliable Storage System
CHEN Ming;YANG Guang-Wen;LIU Xue-Zheng;SHI Shu-Ming;WANG Ding-Xing
..............page:1790-1797
Extending the Theory of Strand Spaces
SHEN Hai-Feng;XUE Rui;HUANG He-Yan;CHEN Zhao-Xiong
..............page:1784-1789
A Generic Audit Policy Model on Multilevel Secure DBMS
HE Yong-Zhong;LI Lan;FENG Deng-Guo
..............page:1774-1783
A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
CAO Jia;LU Shi-Wen
..............page:1766-1773
A Formal Method for Analyzing Electronic Commerce Protocols
QING Si-Han
..............page:1757-1765
Research on Theory and Approach of Provable Security
FENG Deng-Guo
..............page:1743-1756
Event Constraint Based Software Process Validation
GU Qing;CHEN Dao-Xu
..............page:1735-1742
A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
YI Hui-Zhan;CHEN Juan;YANG Xue-Jun;LIU Zhe
..............page:1726-1734