Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Software
1000-9825
2006 Issue 1
Reachability Checking of Finite Precision Timed Automata
YAN Rong-Jie;LI Guang-Yuan;XU Yu-Bo;LIU Chun-Ming;TANG Zhi-Song
..............
page:1-10
Petri Net Refinement and Its Application in System Design
XIA Chuan-Liang;JIAO Li;LU Wei-Ming
..............
page:11-19
Fuzzy ER Modeling with Description Logics
JIANG Yun-Cheng;TANG Yong;WANG Ju
..............
page:20-30
A Task-Type Aware Transaction Scheduling Algorithm in J2EE
DING Xiao-Ning;ZHANG Xin;JIN Bei-Hong;HUANG Tao
..............
page:31-38
Feature-Based Component Model and Normalized Design Process
WANG Zhong-Jie;XU Xiao-Fei;ZHAN De-Chen
..............
page:39-47
Scenario-Based Consistency Verification of Component-Based Real-Time System Designs
HU Jun;YU Xiao-Feng;ZHANG Yan;LI Xuan-Dong;ZHENG Guo-Liang
..............
page:48-58
Directed Hypergraph Based and Resource Constrained Enterprise Process Structure Optimization
SUN Xue-Dong;XU Xiao-Fei;WANG Gang
..............
page:59-68
A Domain Model of Pen-Based User Interface Software and Its Usage
QIN Yan-Yan;TIAN Feng;WANG Xiao-Chun;DAI Guo-Zhong
..............
page:69-78
A Method of Task Generation for Personalized Collaborative Learning
LIU Jun;LI Ren-Hou;ZHENG Qing-Hua
..............
page:79-85
A Fast Multicast Handoff Based Hierarchical Mobile Multicast Architecture
WU Qian;WU Jian-Ping;XU Ming-Wei;CUI Yong
..............
page:86-95
Construction of Peer-to-Peer Multiple-Grain Trust Model
ZHANG Qian;ZHANG Xia;WEN Xue-Zhi;LIU Ji-Ren;Ting Shan
..............
page:96-107
An End-to-End Available Bandwidth Estimation Methodology
LIU Min;LI Zhong-Cheng;GUO Xiao-Bing;DENG Hui
..............
page:108-116
Distributed Monitoring Model with Bounded Delay for Evolving Networks
CAI Zhi-Ping;YIN Jian-Ping;LIU Fang;LIU Xiang-Hui
..............
page:117-123
Research on Automated Trust Negotiation
LI Jian-Xin;HUAI Jin-Peng;LI Xian-Xian
..............
page:124-133
Underlying Techniques for Large-Scale Distributed Computing Oriented Publish/Subscribe System
MA Jian-Gang;HUANG Tao;WANG Jin-Ling;XU Gang;YE Dan
..............
page:134-147
Analysis of Security Protocols Based on Authentication Test
YANG Ming;LUO Jun-Zhou
..............
page:148-156
Ownership Proofs of Digital Works Based on Secure Multiparty Computation
ZHU Yan;YANG Yong-Tian;SUN Zhong-Wei;FENG Deng-Guo
..............
page:157-166
Precomputation for Multi-Constrained QoS Routing in GMPLS Networks
HUA Yu;WU Chan-Le;WANG Yong
..............
page:167-174