Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2006 Issue 1
Reachability Checking of Finite Precision Timed Automata
YAN Rong-Jie;LI Guang-Yuan;XU Yu-Bo;LIU Chun-Ming;TANG Zhi-Song
..............page:1-10
Petri Net Refinement and Its Application in System Design
XIA Chuan-Liang;JIAO Li;LU Wei-Ming
..............page:11-19
Fuzzy ER Modeling with Description Logics
JIANG Yun-Cheng;TANG Yong;WANG Ju
..............page:20-30
A Task-Type Aware Transaction Scheduling Algorithm in J2EE
DING Xiao-Ning;ZHANG Xin;JIN Bei-Hong;HUANG Tao
..............page:31-38
Feature-Based Component Model and Normalized Design Process
WANG Zhong-Jie;XU Xiao-Fei;ZHAN De-Chen
..............page:39-47
Scenario-Based Consistency Verification of Component-Based Real-Time System Designs
HU Jun;YU Xiao-Feng;ZHANG Yan;LI Xuan-Dong;ZHENG Guo-Liang
..............page:48-58
Directed Hypergraph Based and Resource Constrained Enterprise Process Structure Optimization
SUN Xue-Dong;XU Xiao-Fei;WANG Gang
..............page:59-68
A Domain Model of Pen-Based User Interface Software and Its Usage
QIN Yan-Yan;TIAN Feng;WANG Xiao-Chun;DAI Guo-Zhong
..............page:69-78
A Method of Task Generation for Personalized Collaborative Learning
LIU Jun;LI Ren-Hou;ZHENG Qing-Hua
..............page:79-85
A Fast Multicast Handoff Based Hierarchical Mobile Multicast Architecture
WU Qian;WU Jian-Ping;XU Ming-Wei;CUI Yong
..............page:86-95
Construction of Peer-to-Peer Multiple-Grain Trust Model
ZHANG Qian;ZHANG Xia;WEN Xue-Zhi;LIU Ji-Ren;Ting Shan
..............page:96-107
An End-to-End Available Bandwidth Estimation Methodology
LIU Min;LI Zhong-Cheng;GUO Xiao-Bing;DENG Hui
..............page:108-116
Distributed Monitoring Model with Bounded Delay for Evolving Networks
CAI Zhi-Ping;YIN Jian-Ping;LIU Fang;LIU Xiang-Hui
..............page:117-123
Research on Automated Trust Negotiation
LI Jian-Xin;HUAI Jin-Peng;LI Xian-Xian
..............page:124-133
Underlying Techniques for Large-Scale Distributed Computing Oriented Publish/Subscribe System
MA Jian-Gang;HUANG Tao;WANG Jin-Ling;XU Gang;YE Dan
..............page:134-147
Analysis of Security Protocols Based on Authentication Test
YANG Ming;LUO Jun-Zhou
..............page:148-156
Ownership Proofs of Digital Works Based on Secure Multiparty Computation
ZHU Yan;YANG Yong-Tian;SUN Zhong-Wei;FENG Deng-Guo
..............page:157-166
Precomputation for Multi-Constrained QoS Routing in GMPLS Networks
HUA Yu;WU Chan-Le;WANG Yong
..............page:167-174