Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2006 Issue 8
Development of Palmprint Verification System Using Biometrics
G. Shobha;M. Krishna;S.C. Sharma
..............page:1824-1836
A Fast Outlier Detection Algorithm for Data Streams Based on Dynamic Grids
YANG Yi-Dong;SUN Zhi-Hui;ZHU Yu-Quan;YANG Ming;ZHANG Bo-Li
..............page:1796-1803
An Energy-Efficient Data Dissemination Protocol in Large-Scale Sensor Networks
SHI Gao-Tao;LIAO Ming-Hong
..............page:1785-1795
Time Stratified Packet Sampling Based on Measurement Buffer for Flow Measurement
WANG Hong-Bo;WEI An-Ming;LIN Yu;CHENG Shi-Duan
..............page:1775-1784
An Effective Method for Privacy Preserving Association Rule Mining
ZHANG Peng;TONG Yun-Hai;TANG Shi-Wei;YANG Dong-Qing;MA Xiu-Li
..............page:1764-1774
An Anti-Noise Algorithm for Mining Asynchronous Coincidence Pattern in Multi-Streams
CHEN An-Long;TANG Chang-Jie;YUAN Chang-An;PENG Jing;HU Jian-Jun
..............page:1753-1763
An Iceberg Cube Algorithm for Large Compressed Data Warehouses
LUO Ji-Zhou;LI Jian-Zhong;ZHAO Kai
..............page:1743-1752
Representation of Mathematical Knowledge in National Knowledge Infrastructure
CAO Cun-Gen;SUI Yue-Fei;SUN Yu;ZENG Qing-Tian
..............page:1731-1742
P2P Data Management
YU Min;LI Zhan-Huai;ZHANG Long-Bo
..............page:1717-1730
A Distributed Trust Model with High-Compatibility Based on Bridge CA
ZHU Peng-Fei;DAI Ying-Xia;BAO Xu-Hua
..............page:1818-1823
A Key Agreement Scheme for Mobile Ad Hoc Networks Based on Password Authentication
WANG Xiao-Feng;ZHANG Jing;WANG Shang-Ping;ZHANG Ya-Ling;QIN Bo
..............page:1811-1817
Security Analysis on Administrative Model of Role-Based Access Control
YANG Qiu-Wei;HONG Fan;YANG Mu-Xiang;ZHU Xian
..............page:1804-1810
An Action Semantic-Based Approach to UML1.X-2.0 Model Transformation
CHEN Xiu-Hong;HE Ke-Qing;HE Lu-Lu
..............page:1698-1706
An Automated Approach for Structural Test Data Generation Based on Messy GA
XUE Yun-Zhi;CHEN Wei;WANG Yong-Ji;ZHAO Chen;WANG Qing
..............page:1688-1697
Software Reliability Modeling Based on Unascertained Theory
ZHANG Yong-Qiang;SUN Sheng-Juan
..............page:1681-1687
A PDCA-Based Software Process Control and Improvement Model
WU Zhan-Chun;WANG Qing;LI Ming-Shu
..............page:1669-1680
A Functional Requirement Based Hierarchical Agglomerative Approach to Program Clustering
ZHAO Wei;ZHANG Lu;MEI Hong;SUN Jia-Su
..............page:1661-1668