Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2002 Issue 7
An Accelerate Algorithm on Fast Wavelet Transform for Signal Processing
li jian ping ; yan zhong hong ; zhang wan ping
..............page:1338-1344
Mobile Agent System by Incremental Timestamp Security Technique
wan yan ; sun yong qiang ; zhu xiang hua ; tang jin
..............page:1331-1337
Maintaining Temporal Views in Data Warehouses
li zuo ; bai ying cai
..............page:1324-1330
A Hypermedia Retrieval Model Based on Pattern Matching
zhou xue hai ; li guang ya ; li zuo ; gong yu chang ; zhao zhen xi
..............page:1318-1323
Study on the Proof Method of Authentication Protocols Based on Strand Space
liu dong xi ; bai ying cai
..............page:1313-1317
A Unified Resource Mapping Strategy in Computational Grid Environments
ding zuo ; chen guo liang ; gu jun
..............page:1303-1308
Intention Tracking in Agent-Group
li yi ; shi chun yi
..............page:1298-1302
An Intelligent Mobile Agents-Based Architecture for Network Fault Detection
zhang pu han ; sun yu fang
..............page:1209-1219
Honeycomb Subdivision
zhang hong zuo ; wang guo zuo
..............page:1199-1208
Mapping of Nested Loops to Multiprocessors
yin xin chun ; chen ; xie li
..............page:1193-1198
A Secure and Efficient General VSS Protocol
zhang fu tai ; zhang fang guo ; wang yu min
..............page:1187-1192
An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain
huang da ren ; liu jiu fen ; huang ji wu
..............page:1290-1297
Estimation of QoS Parameters Based on Measurement and Its Application
zhao bin ; liu zeng ji ; li xiao
..............page:1284-1289
Analysis of Digital Video Effect Shot Transition Detection Algorithm
bai xue sheng ; zhang zi yin ; xu guang dai ; yang shi qiang ; shi yuan chun
..............page:1278-1283
A New Formal System of Intention Consequences Lm5c
zhu zi ru ; chen xiao ping ; zhou zuo
..............page:1271-1277
Constraints for Fusion Algorithms in Meta Search Engine Systems
yang xiao hua ; liu zhen yu ; tan min sheng ; liu jie ; zhang min jie
..............page:1264-1270
A Polynomial Algorithm to Decide Liveness and Boundedness of ESAC Nets
jiao li ; lu wei ming
..............page:1257-1263
A Java Virtual Machine Based on Hybrid Concurrent Compilation and Execution Model
yang bo ; wang ding xing ; zheng wei min
..............page:1250-1256
Plane-Based Warping
zhang yan ci ; wu en hua
..............page:1242-1249
Using Distributed Active Agents to Detect the Symmetry Axes in Gray Images
liu jun yi ; wang run sheng
..............page:1238-1241
Overviews on Software Architecture Research
sun chang ai ; jin mao zhong ; liu chao
..............page:1228-1237
Using Adaptive Router Throttles Against Distributed Denial-of-Service Attacks
liang feng ;david yau
..............page:1220-1227