Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2010 Issue 1
Topology Inference Based on Network Tomography
zhao hong hua ; chen ming
..............page:133-146
Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy
zhou zhou yi ; he ye ping ; liang hong liang
..............page:98-106
Belief Revision Based on Incomplete Valuations
xiao wen jie ; zhu chao zuo
..............page:47-54
Container Product Line Architecture Based on Component Model Analysis
liu guo liang ; wei jun ; feng yu lin
..............page:68-83
Cognitive Model of Dynamic Trust Forecasting
li xiao yong ; gui xiao lin
..............page:163-176
Efficient Data Gathering Approach in Sensor Networks with Path-Fixed Sinks
zuo shuai ; zhang hong ke ; xu huai song
..............page:147-162
Clone Selection Algorithm to Solve Preference Multi-Objective Optimization
yang zuo zuo ; jiao li cheng ; gong mao guo ; yu hang
..............page:14-33
BDD-Based Approach to the Verification of Feature Models
zuo hua ; zhang wei ; zhao hai yan ; mei hong
..............page:84-97
Family of Extended Dynamic Description Logics
chang liang ; shi zhong zhi ; chen li min ; niu wen jia
..............page:1-13
False Data Filtering Algorithm Using Cooperation Watermarks for WSN
yi ye qing ; lin ya ping ; li xiao long ; yang si qing ; you zhi qiang
..............page:107-118
ruan jian xue bao tou gao zhi nan
..............page:封3
Pipeline-Based Multi-Query Optimization for Similarity Queries in Grid Environment
hu hua ; zhuang yi ; hu hai yang ; zhao ge hua
..............page:55-67
Routing Techniques on Delay/Disruption Tolerant Networks
su jin shu ; hu qiao lin ; zhao bao kang ; peng wei
..............page:119-132