Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2001 Issue 12
An Operational Semantics for UML Statechart Diagrams
li liu ying ; wang zuo ; qi zhi chang
..............page:1864-1873
Reasoning of Topology Spatial Objects in GIS
liu ya bin ; liu da you
..............page:1859-1863
Measuring JAVA Cohesion Based on Data Slice
li bi xin ; zhu ping ; tan yi ; li xuan dong ; zheng guo liang ; nan jing da xue
..............page:1851-1858
On Liveness and Boundedness of Weighted Asymmetric Choice Nets
jiao li ; lu wei ming
..............page:1843-1850
SQA Model Based on ISO9000
wang qing
..............page:1837-1842
A Cooperative Design Approach Supporting Dynamic Task Assignation
liu hong ; lin zong kai
..............page:1830-1836
Research on the Socially Rationality of Agent
cheng xian yi ; shi chun yi
..............page:1825-1829
An Incremental SVM Learning Algorithm α-ISVM
xiao zuo ; wang ji cheng ; sun zheng xing ; zhang fu yan
..............page:1818-1824
An Approach for Hierarchy Slicing Object-Oriented Program
li bi xin ; liu xiao dong ; zheng tao ; li xuan dong ; zheng guo liang
..............page:1810-1817
A Fast IP Classification Algorithm Applying to Multiple Fields
yu zhong chao ; xu zuo ; wu jian ping
..............page:1801-1809
Uniformity of Bisimulation Equivalences of Chi Processes
lin min ; fu yu xi
..............page:1793-1800
Face Detection Based on Skin Color and Template
ai hai zhou ; liang lu hong ; xu guang ; zhang zuo
..............page:1784-1792
Drift Conditions for Time Complexity of Evolutionary Algorithms
he jun ; yao xin ; kang li shan
..............page:1775-1783
An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
wang xin bing ; ma zheng ; huang lian sheng ; zhou hong bin
..............page:1769-1774
Segmentation of Ultrasound Images with Interactive B-SplineSnakes and Its Application
lu ai dong ; tang long ; xu yu hua ; tang ze sheng
..............page:1760-1768
A Hierarchical Mixed Mode Placement Algorithm
wu wei min ; hong xian long ; cai zuo ci
..............page:1752-1759
Some Results on Optimal Search in Discrete Spaces
zhu qing xin ; zhou ming tian ;john oommen
..............page:1748-1751
Policy-Based Access Control Framework for Large Networks
duan hai xin ; wu jian ping ; li xing
..............page:1739-1747