Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2007 Issue 10
A Real-Time Dynamic Database Crash Recovery Strategy
XIAO Ying-Yuan;LIU Yun-Sheng;LIAO Guo-Qiong;DENG Hua-Feng
..............page:2516-2527
A Data Mining Approach Based on the Integration of Ontology and Context Knowledge
CHEN Ying;XU Gang;GU Guo-Chang
..............page:2507-2515
Ontology-Based Query Division and Reformulation for Heterogeneous Information Integration
LI Jian;SONG Jing-Yu;ZHONG Hua
..............page:2495-2506
A Hierarchically Differential P2P Storage Architecture
GAO Qian;YANG Zhi;TIAN Jing;DAI Ya-Fei
..............page:2481-2494
An Efficient Frequent Subgraph Mining Algorithm
LI Xian-Tong;LI Jian-Zhong;GAO Hong
..............page:2469-2480
Representation of RCC11 Composition Table
LI Yong-Ming;LI San-Jiang
..............page:2458-2468
Exploiting SVC Algorithm for Multifocus Image Fusion
ZHANG Cheng-Cheng;HU Jin-Chun
..............page:2445-2457
A Collaborative Filtering Recommendation Algorithm Based on Cloud Model
ZHANG Guang-Wei;LI De-Yi;LI Peng;KANG Jian-Chu;CHEN Gui-Sheng
..............page:2403-2411
Dynamic Inlining Based on Continuous Monitoring
WANG Lei;ZHOU Jing;JIN Mao-Zhong
..............page:2393-2402
A Tri-Dimensional Requirements Model and Its Support for Stakeholder Coordination
WANG Ji-Zhe;LI Ming-Shu
..............page:2380-2392
Description and Proof of Property Preservation of Model Transformations
LIU Hui;MA Zhi-Yi;SHAO Wei-Zhong
..............page:2369-2379
ruan jian xue bao tou gao zhi nan
..............page:封3
jing gao zuo zhe
..............page:2668
Chameleon Signature from Bilinear Pairing
DU Xin-Jun;WANG Ying;GE Jian-Hua;WANG Yu-Min
..............page:2662-2668
Router Numbering Based Adaptive Packet Marking
LI De-Quan;SU Pu-Rui;WEI Dong-Mei;FENG Deng-Guo
..............page:2652-2661
Energy Dissipation Bounds on Three Dimensional UWB Wireless Sensor Network
XU Juan;HONG Yong-Fa;JIANG Chang-Jun;CHEN Lin
..............page:2645-2651
Fuzzy Decision Tree Based Inference Techniques for Network Forensic Analysis
LIU Zai-Qiang;LIN Dong-Dai;FENG Deng-Guo
..............page:2635-2644
CR:Scalable Routers Based on a New Architecture
YUE Zu-Hui;WU Jian-Ping;ZHAO You-Jian
..............page:2624-2634
Defending DDos Attacks Based on the Source and Destination IP Address Database
SUN Zhi-Xin;LI Qing-Dong
..............page:2613-2623
Timeslot-Reservation Based Weighted Fair Scheduling
LI Ji;ZENG Hua-Xin;GUO Zi-Rong
..............page:2605-2612
A Network Anomaly Detection Method Based on Transduction Scheme
LI Yang;FANG Bin-Xing;GUO Li;CHEN You
..............page:2595-2604
Internet Services Fault Management: Layering Model and Algorithm
HUANG Xiao-Hui;ZOU Shi-Hong;CHU Ling-Wei;CHENG Shi-Duan;WANG Wen-Dong
..............page:2584-2594
Half Overlay Multicast Routing for Hybrid Networks
LIN Tong;QIAN Hua-Lin;GE Jing-Guo;NIU Guang-Feng
..............page:2572-2583
Performance Analysis and Adaptive Scheme of Route Optimization in Mobile IPv6
XIAO Wen-Shu;ZHANG Yu-Jun;LI Zhong-Cheng
..............page:2564-2571
A Reputation-Based Trust Mechanism for P2P E-Commerce Systems
JIANG Shou-Xu;LI Jian-Zhong
..............page:2551-2563
Implementation of Scalable Routers with Direct Networks
YUE Zu-Hui;ZHAO You-Jian;WU Jian-Ping
..............page:2538-2550
An Approach to Mining Two-Dimensional Optimized Association Rules for Numeric Attributes
HE Zhi;TIAN Sheng-Feng;HUANG Hou-Kuan
..............page:2528-2537
Super-Resolution Reconstruction Based on Generalized Huber-MRF Image Modeling
SHAO Wen-Ze;WEI Zhi-Hui
..............page:2434-2444
An Approach to Tracking Deformable Hand Gesture for Real-Time Interaction
WANG Xi-Ying;ZHANG Xi-Wen;DAI Guo-Zhong
..............page:2423-2433
Density-Sensitive Semi-Supervised Spectral Clustering
WANG Ling;BO Lie-Feng;JIAO Li-Cheng
..............page:2412-2422