Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2008 Issue 10
ruan jian xue bao tou gao zhi nan
..............page:封3
jing gao zuo zhe
..............page:2666
Research on Development Tools for Collaborative Pen-Based User Interfaces
ZHOU Ming-Jun;XU Li-Shuang;TIAN Feng;DAI Guo-Zhong
..............page:2780-2788
Cross-Entropy Method Based on Markov Decision Process for Optimal Software Testing
ZHANG De-Ping;NIE Chang-Hai;XU Bao-Wen
..............page:2770-2779
Performance Analysis Based on Packet Arrival Rate for the IEEE 802.11 DCF
YANG Wei-Dong;MA Jian-Feng;LI Ya-Hui
..............page:2762-2769
Negotiation-Based Dynamic Role Transition in Data Access across Multi-VOs
FU Chang-Sheng;XIAO Nong;ZHAO Ying-Jie;CHEN Tao
..............page:2754-2761
An Intrusion Response Method Based on Attack Graph
SHI Jin;GUO Shan-Qing;LU Yin;XIE Li
..............page:2746-2753
An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme
PANG Liao-Jun;PEI Qing-Qi;JIAO Li-Cheng;WANG Yu-Min
..............page:2739-2745
A High Performance XML Parser OnceXMLParser
JIN Bei-Hong;CAO Dong-Lei;REN Xin;YU Shuang;DAI Bei-Jie
..............page:2728-2738
A Method for Code Safety Proof Construction
GUO Yu;CHEN Yi-Yun;LIN Chun-Xiao
..............page:2720-2727
P2P Web Search Technology
FANG Qi-Ming;YANG Guang-Wen;WU Yong-Wei;ZHENG Wei-Min
..............page:2706-2719
U-Tree Based Indexing Method for Uncertain Moving Objects
DING Xiao-Feng;LU Yan-Sheng;PAN Peng;HONG Liang;WEI Qiong
..............page:2696-2705
Preface
ZHENG Wei-Min
..............page:2694-2695
A Conceptual Framework for Developing Adaptive Pen-Based User Interface
XU Li-Shuang;ZHOU Ming-Jun;DENG Chang-Zhi;TIAN Feng;LIU Yuan-Yuan;DAI Guo-Zhong
..............page:2681-2693
An Integrated Indexing Structure for Large-Scale Cross-Media Retrieval
ZHUANG Yi;ZHUANG Yue-Ting;WU Fei
..............page:2667-2680
Rectangle and Boomerang Attacks on DES
ZHANG Lei;WU Wen-Ling
..............page:2659-2666
Multicast Fast Handover Algorithm Based on Neighbor Information Exchange
ZHANG Hui;ZHANG Hong-Ke
..............page:2648-2658
A Method for Multipath Routing Based on Network Coding in Wireless Sensor Network
LI Shan-Shan;LIAO Xiang-Ke;ZHU Pei-Dong;XIAO Nong
..............page:2638-2647
ServLoc: Secure Location Service for Wireless Sensor and Actuator Network
MA Jian-Qing;ZHONG Yi-Ping;ZHANG Shi-Yong
..............page:2628-2637
Service Selection Approach Considering the Trustworthiness of QoS Data
LI Yan;ZHOU Ming-Hui;LI Rui-Chao;CAO Dong-Gang;MEI Hong
..............page:2620-2627
Structural Query Expansion Based on Weighted Query Term for XML Documents
WAN Chang-Xuan;LU Yuan
..............page:2611-2619
Credible Association Rule and Its Mining Algorithm Based on Maximum Clique
XIAO Bo;XU Qian-Fang;LIN Zhi-Qing;GUO Jun;LI Chun-Guang
..............page:2597-2610
Main Memory Database TPC-H Workload Characterization on Modern Processor
LIU Da-Wei;LUAN Hua;WANG Shan;QIN Biao
..............page:2573-2584
FJ Extended Calculus for Multi-Version Class Dynamic Update
ZHANG Shi;HUANG Lin-Peng
..............page:2562-2572
Value Equality Analysis in C Program API Conformance Validation
MENG Ce;HE Ye-Ping;LUO Yu-Xiang
..............page:2550-2561
Design Calculus Based Approach to Modeling Use Case
CHEN Xin;LI Xuan-Dong
..............page:2539-2549
An Approach to Solve Deadlock Problem of Component Connection
MAO Fei-Qiao;QI De-Yu;LIN Wei-Wei
..............page:2527-2538
Dynamics Analysis Method of Cellular Automata for Complex Networking Storage System
CHEN Jin-Cai;HE Ping;GE Xiong-Zi
..............page:2517-2526
Extended Fuzzy Description Logics with Comparisons Between Fuzzy Membership Degrees
KANG Da-Zhou;XU Bao-Wen;LU Jian-Jiang;LI Yan-Hui
..............page:2498-2507
LCS and MSC Reasoning of Hybrid Terminological Cycles in Description Logic εL
JIANG Yun-Cheng;WANG Ju;ZHOU Sheng-Ming;TANG Yong
..............page:2483-2497