Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2011 Issue 6
Optimization of Points-to Analysis for Java
LI Qian;TANG En-Yi;DAI Xue-Feng;WANG Lin-Zhang;ZHAO Jian-Hua
..............page:1140-1154
Efficient and Secure Identity-Based Signature Scheme
GU Ke;JIA Wei-Jia;JIANG Chun-Lin
..............page:1350-1360
Uncertain-Graph Based Method for Network Vulnerability Analysis
LIU Qiang;YIN Jian-Ping;CAI Zhi-Ping;CHENG Jie-Ren
..............page:1398-1412
P2P Traffic Identification
LU Gang;ZHANG Hong-Li;YE Lin
..............page:1281-1298
Preface to special issue on formal methods and tools
WANG Ji;Li Xuan-Dong
..............page:1121-1122
Reliability Analysis and Assessment Tool for AADL Model
DONG Yun-Wei;WANG Guang-Ren;ZHANG Fan;GAO Lei
..............page:1252-1266
Optimal Actor Nodes Deployment Strategy Under Real-Time Constraint in WSANs
CHE Nan;LI Zhi-Jun;JIANG Shou-Xu
..............page:1361-1372
Attribute-Based Encryption Schemes
SU Jin-Shu;CAO Dan;WANG Xiao-Feng;SUN Yi-Pin;HU Qiao-Lin
..............page:1299-1315
Time Petri Net Model with Mixed Semantics
PAN Li;DING Zhi-Juu;GUO Guan-Qi
..............page:1199-1209
Evaluation Method with Measureable Space-Time Dynamic Properties for Mobile Ad Hoc Networks
WANG Wei;GUAN Xiao-Hong;WANG Bei-Zhan;WANG Ya-Ping
..............page:1333-1349
Solving Chinese Postman Problem on Time Varying Network with Timed Automata
TAN Guo-Zhen;SUN Jing-Hao;WANG Bao-Cai;YAO Wei-Hong
..............page:1267-1280
Cycle Symmetry Reduction and Its Extension on Three-Valued Models
WEI Ou;YUAN Yong;CAI Xin-Ye;HUANG Zhi-Qiu;XU Bing-Feng
..............page:1169-1184
Crawler-Based Measurement of Large Scale P2P IPTV Systems
JIANG Zhi-Hong;WANG Hui;FAN Peng-Yi
..............page:1373-1388
Anti-Monitoring Algorithm for Mobile Object in Anisotropic Sensory Networks
WANG Lei;JIANG Xin-Hua;WANG Yi-Min;LIN Ya-Ping
..............page:1389-1397
Automatic Test Case Generator for Object-Z Specification
XU Qing-Guo;MIAO Huai-Kou;CAO Xiao-Xia;HU Xiao-Bo
..............page:1155-1168
Strategy Driven Modeling and Analysis of Reliable Embedded Systems
FAN Gui-Sheng;YU Hui-Qun;CHEN Li-Qiong;LIU Dong-Mei
..............page:1123-1139
Conditional Hypergraph Grammars and Its Analysis of Dynamic Evolution of Software Architectures
XU Hong-Zhen;ZENG Guo-Sun;CHEN Bo
..............page:1210-1223
Schedulability Analysis Tool for Distributed Real-Time Systems Based on Automata Theory
GUI Sheng-Lin;LUO Lei;LI Yun;YU Miao;XU Jian-Hua
..............page:1236-1251
Scenario-Driven Service Behavior Manipulation
LIU Xi;YANG Lu;PAN Min-Xue;WANG Lin-Zhang
..............page:1185-1198
Research on Certificateless Public Key Cryptography
ZHANG Fu-Tai;SUN Yin-Xia;ZHANG Lei;GENG Man-Man;LI Su-Juan
..............page:1316-1332
Conflicts Detection in Runtime Verification Based on AOP
ZHANG Xian;DONG Wei;QI Zhi-Chang
..............page:1224-1235
xin xi dong tai
..............page:封3,封4