Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2009 Issue 10
Efficient Scheduling Algorithm for Hard Real-Time Tasks in Primary-Backup Based Multiprocessor Systems
wang jian ; sun jian ling ; wang xin yu ; yang xiao hu ; wang shen kang ; chen jun bo
..............page:2628-2636
Refactoring Generic Instantiations Based on Type Propagation Analysis
chen lin ; xu bao wen ; qian ju ; zhou tian lin ; zhou zuo ming
..............page:2617-2627
Similarity Search in Data Stream with Adaptive Segmental Approximations
wu feng ; zhong zuo ; wu quan yuan ; jia yan ; yang shu qiang
..............page:2867-2884
Verifying Mobile Ad-Hoc Security Routing Protocols with Type Inference
li qin ; zeng qing kai
..............page:2822-2833
Finding and Ranking Semantic Web Sites
zhang xiang ; ge wei yi ; zuo yu zhong
..............page:2834-2843
Education Resource Grid Model and Replica Creation Strategies
xing chang ming ; liu fang ai ; yang lin ; li wen
..............page:2844-2856
Sreface
zheng wei min
..............page:2857-2858
Importance Sampling Method of Software Reliability Estimation
zhang de ping ; nie chang hai ; xu bao wen
..............page:2859-2866
Traffic Load-Based Interference-Aware Routing Protocol for Mobile Ad Hoc Networks
zhang xin ming ; liu qiong ; dai shi fang ; liu yong zhen
..............page:2721-2728
ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor Networks
song chao ; liu ming ; gong hai gang ; chen gui hai ; wang xiao min
..............page:2729-2743
Route-Sign-Based Adaptive Void Handling Geographical Routing Algorithm
zhang heng yang ; wang ling ; liu yun hui ; cai xuan ping
..............page:2744-2751
Cache System Based on Disk Media for Network Storage
yin yang ; liu zhen jun ; xu lu
..............page:2752-2765
Distributed Proving Oriented Language and Method for Trust Negotiation
wang xiao feng ; su jin shu ; zhang qiang ; zhang yi ming
..............page:2776-2786
Addressing Protocols for Wireless Sensor Networks
du zhi gao ; qian de pei ; liu zuo
..............page:2787-2798
Overcome the Limitation on Authentication Test
liu jia fen ; zhou ming tian
..............page:2799-2809
Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption
lai xin ; he da ke
..............page:2810-2821
Experimental Study to Compare the Use of Metamorphic Testing and Assertion Checking
zhang zhen yu ; chen rong guang ; xie jun qian ; hu pei feng
..............page:2637-2654
Algorithms for Rule Generation and Matchmaking in Context-Aware System
liu dong ; meng xiang wu ; chen jun liang ; xia ya mei
..............page:2655-2666
Structure Matching Method Based on Functional Dependencies
li guo hui ; du xiao kun ; hu fang xiao ; yang bing ; tang xiang hong
..............page:2667-2678
View-Invariant Action Recognition Based on Action Graphs
yang yue dong ; hao ai min ; zuo qing jun ; zhao qin ping ; wang li li
..............page:2679-2691
Internet Traffic Classification Using C4.5 Decision Tree
xu peng ; lin sen
..............page:2692-2704
Distributed Secure Clustering Protocol in Wireless Sensor Networks
yu lei ; li jian zhong ; luo ji zhou
..............page:2705-2720
Robust Feedback Credibility-Based Distributed P2P Trust Model
hu jian li ; wu quan yuan ; zhou bin ; liu jia hong
..............page:2885-2898
Sketch-Based Anomalies Detection with IP Address Traceability
luo na ; li ai ping ; wu quan yuan ; lu hua biao
..............page:2899-2906
Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
pang liao jun ; li hui xian ; jiao li cheng ; wang yu min
..............page:2907-2914
ruan jian xue bao tou gao zhi nan
..............page:封3