Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Software
1000-9825
2007 Issue 1
A Time Petri Net Extended with Price Information
LIU Xian-Ming;LI Shi-Xian;LI Wen-Jun;PAN Li
..............
page:1-10
Timing Constraint Petri Nets and Their Schedulability Analysis and Verification
SONG Wei;DOU Wan-Chun;LIU Xi-Ping
..............
page:11-21
Property Analysis of Synthesis of Petri Nets Shared PP-Type Subnets
XIA Chuan-Liang;JIAO Li;LU Wei-Ming
..............
page:22-32
A Method of Heuristic Web Services Composition Based on Goal Distance Estimate
WEN Jia-Jia;CHEN Jun-Liang;PENG Yong
..............
page:85-93
A Model-Based Approach to Detecting Feature Interactions
ZUO Ji-Hong;WANG Qian-Xiang;MEI Hong
..............
page:94-104
A Trace Label Based Consistency Maintenance Algorithm in Unstructured P2P Systems
XIE Kun;ZHANG Da-Fang;XIE Gao-Gang;WEN Ji-Gang
..............
page:105-116
RSA Verifiable Signature Sharing Scheme Based on Secure Distributed Key Generations
L(U) Ke-Wei
..............
page:168-176
Theory of α-Truth Degrees in n-Valued G(o)del Propositional Logic
LI Jun;WANG Guo-Jun
..............
page:33-39
On the Structure of Binary Feedforward Inverse Finite Automata with Delay 3
WANG Hong-Ji;YAO Gang
..............
page:40-49
Scenario-Driven Component Behavior Derivation
ZHANG Yan;HU Jun;YU Xiao-Feng;ZHANG Tian;LI Xuan-Dong;ZHENG Guo-Liang
..............
page:50-61
A Method for Testing Real-Time System Based on Timed Automata
CHEN Wei;XUE Yun-Zhi;ZHAO Chen;LI Ming-Shu
..............
page:62-73
An Approach of Data-Flow Analysis Based on Exception Propagation Analysis
JIANG Shu-Juan;XU Bao-Wen;SHI Liang
..............
page:74-84
Fast Packet Inspection Using State-Based Bloom Filter Engine
YE Ming-Jiang;CUI Yong;XU Ke;WU Jian-Ping
..............
page:117-126
Analysis for Multi-Coverage Problem in Wireless Sensor Networks
LIU Ming;CAO Jian-Nong;ZHENG Yuan;CHEN Li-Jun;XIE Li
..............
page:127-136
Risk Propagation Model for Assessing Network Information Systems
ZHANG Yong-Zheng;FANG Bin-Xing;CHI Yue;YUN Xiao-Chun
..............
page:137-145
A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs
CHEN Yi-Feng;HE Yan-Xiang;CAO Jian-Nong
..............
page:146-156
A Trust Model Based on Similarity-Weighted Recommendation for P2P Environments
LI Jing-Tao;JING Yi-Nan;XIAO Xiao-Chun;WANG Xue-Ping;ZHANG Gen-Du
..............
page:157-167