Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Software
1000-9825
2003 Issue 1
guo jia zi ran ke xue ji jin wei yuan hui xin xi ke xue bu ji suan ji ke xue chu 2001 nian 12 yue jie ti ping jia yi lan biao
..............
page:157-158
Key Management for Secure Multicast Using Huffman Hierarchy
qu jin ; ge jian hua ; jiang ming
..............
page:151-156
Cheat-Proof Secret Share Schemes Based on RSA and One-Way Function
fei ru chun ; wang li na
..............
page:146-150
Commitment of Mobile Distributed Real-Time Nested Transaction
liu yun sheng ; liao guo qiong ; li guo hui ; xia jia li
..............
page:139-145
A Clustering Algorithm Applied to the Management of Mobile Ad Hoc Network
feng yong xin ; wang guang xing ; liu zhi guo ; jiang yue qiu
..............
page:132-138
A Theory of Generalized Multi-Rate Multicast Weight-Based Fair Rate Allocation
di ming yu ; gu guan qun
..............
page:124-131
A Distributed Web Server System Based on Cooperative Cache Using Tag
lin man zuo ; qian hua lin
..............
page:117-123
A Survey on Internet Measurement and Analysis
zhang hong li ; fang bin xing ; hu ming zeng ; jiang yu ; zhan chun yan ; zhang shu feng
..............
page:110-116
A UML-Based Model Analysis Method in Hardware-Software Codesign
chen si gong ; qin xiao ; zhang heng li
..............
page:103-109
Research and Implementation of Jade Bird Object-Oriented Software Modeling Tool
ma zhi yi ; zhao jun feng ; meng xiang wen ; zhang wen juan
..............
page:97-102
Translating (-Calculus into Action Calculus
jin ying ; jin cheng zhi
..............
page:16-22
Characterizations of Quantum Automata
qiu dao wen
..............
page:9-15
Diagnostic Information Generation in Model Checking Value-Passing Processes
liu jian ; lin hui min
..............
page:1-8
History Sensitivity of the Multilevel Security Policies
shi wen chang ; sun yu fang
..............
page:91-96
Analysis for Scheduling Theory and Approach of Open Real-Time System
zou yong ; li ming shu ; wang qing
..............
page:83-90
Task-Based Access Control Model
deng ji bo ; hong fan
..............
page:76-82
An Approach to Static Prediction and Visual Analysis of Program Execution Time
sun chang ai ; jin mao zhong ; liu chao ; jin ruo ming
..............
page:68-75
A Process Meta-Model Supporting Dynamic Change of Workflow
sun rui zhi ; shi mei lin
..............
page:62-67
Specification and Verification of the Triple-Modular Redundancy Fault-Tolerant System
guo liang ; tang zhi song
..............
page:54-61
Improvement of a Distributed Termination Detection Algorithm
liu xu min ; su yun lin
..............
page:49-53
A Cooperative Checkpointing Algorithm with Message Complexity O(n)
wang dong sheng ; shao ming zuo
..............
page:43-48
A Multilevel Reduction Algorithm to TSP
zou peng ; zhou zhi ; chen guo liang ; gu jun
..............
page:35-42
A Massive Data Sort Algorithm Based on Serpentine Tape
li jian zhong ; zhang yan qiu
..............
page:28-34
Automata and Grammars Theory Based on Quantum Logic
qiu dao wen
..............
page:23-27