Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2010 Issue 10
Keyword Search over Relational Databases
lin zi yu ; yang dong qing ; wang teng zuo ; zhang dong zhan
..............page:2454-2476
Strategy of Content Location of P2P Based on the Social Network
huang yong sheng ; meng xiang wu ; zhang yu jie
..............page:2622-2630
Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature Schemes
jing ji wu ; wang jing ; lin zuo ; xie yong quan ; gu qing
..............page:2631-2641
Space-Efficient Fair Packet Sampling Algorithm
zhang jin ; zuo jiang xing ; niu xiao na
..............page:2642-2655
xin xi dong tai
..............page:封4
Opportunistic Routing Protocols for Wireless Multihop Networks
tian ke ; zhang bao xian ; ma jian ; yao zheng
..............page:2542-2553
e-MAC: A High Throughput MAC Protocol for Ad Hoc Networks
zhang ke wang ; pan zuo ; zhang qiong ; zhang de yun
..............page:2666-2676
Web Relationship Mining Based on Extended Concept Lattice
jiang feng ; fan yu shun
..............page:2432-2444
Sparse Coding Model Based on Structural Similarity
li zhi qing ; shi zhi ping ; li zhi xin ; shi zhong zhi
..............page:2410-2419
Routing Protocols for Delay and Disruption Tolerant Networks
zhang long ; zhou xian wei ; wang jian ping ; deng yu ; wu qi wu
..............page:2554-2572
Mining Frequent Jump Patterns from Graph Databases
liu yong ; li jian zhong ; gao hong
..............page:2477-2493
Co-Monitor: Collaborative Monitoring Mechanism for Detecting Prefix Hijacks
liu xin ; zhu pei dong ; peng yu xing
..............page:2584-2598
What-If Query Processing Policy of Main-Memory OLAP System
zhang yan song ; xiao yan qin ; wang shan ; chen hong
..............page:2494-2512
Scalable Routing for the Internet
tang ming dong ; zhang guo qing ; yang jing ; zhang guo qiang
..............page:2524-2541
Density Sensitive Based Multi-Agent Evolutionary Clustering Algorithm
pan xiao ying ; liu fang ; jiao li cheng
..............page:2420-2431
Adaptive Algorithm for Soft Subspace Clustering
chen li fei ; guo gong de ; jiang qing shan
..............page:2513-2523
Anomaly Detection Based on Traffic Information Structure
zhu ying wu ; yang jia hai ; zhang jin xiang
..............page:2573-2583
Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding
wang jie ; wang jian xin ; chen jian er
..............page:2599-2609
ID-Based Channel Reservation Multiple Access for Mobile Ad Hoc Networks
xing xiao qin ; liu kai
..............page:2690-2700
Greedy Approximation Algorithm of Minimum Cover Set in Wireless Sensor Networks
lu ke zhong ; sun hong yuan
..............page:2656-2665
Heuristic Fault Localization Algorithm Based on Bayesian Suspected Degree
zhang cheng ; liao jian xin ; zhu xiao min
..............page:2610-2621
Replication in Intermittently Connected Mobile Ad Hoc Networks
shi ke ; dong yan
..............page:2677-2689
Mining Evolutionary Events from Multi-Streams Based on Spectral Clustering
yang ning ; tang chang jie ; wang yue ; chen zuo ; zheng zuo ling
..............page:2395-2409
Semi-Supervised Discriminant Analysis Based on Manifold Distance
wei lai ; wang shou jue
..............page:2445-2453