Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2009 Issue 3
Fixpoint Semantics and Reasoning of Terminological Cycles in Description Logic εLN
JIANG Yun-Cheng;WANG Ju;SHI Zhong-Zhi;TANG Yong
..............page:477-490
Semantics and Reasoning of Description Logic μALCQO
JIANG Yun-Cheng;WANG Ju;TANG Yong;DENG Pei-Min
..............page:491-504
On the Step Problem for Petri Nets
PAN Li;ZHAO Wei-Dong;WANG Zhi-Cheng;ZHOU Xin-Min;LIU Xian-Hui
..............page:505-514
Satisfiability and Compactness of NMG-Logic System
ZHOU Hong-Jun;WANG Guo-Jun
..............page:515-523
Systematic Review of Software Process Modeling and Analysis
LI Ming-Shu;YANG Qiu-Song;ZHAI Jian
..............page:524-545
Random-QoS-Aware Reliable Web Service Composition
FAN Xiao-Qin;JIANG Chang-Jun;WANG Jun-Li;PANG Shan-Chen
..............page:546-556
Adaptive Agent Negotiation for Software Process Modeling
LI Nao;LI Ming-Shu;WANG Qing;ZHAO Chen;DU Shuan-Zhu
..............page:557-566
Quality Evaluation of Foundational Software Platform
LAN Yu-Qing;ZHAO Tong;GAO Jing;JIE Hui;JIN Mao-Zhong
..............page:567-582
Refactoring C++ Programs Physically
ZHOU Tian-Lin;SHI Liang;XU Bao-Wen;ZHOU Yu-Ming
..............page:597-607
QoS Differentiation Based Adaptive p-Persistent MAC Scheme for Dynamic Optimization of the Channel Utilization
BAI Xiang;MAO Yu-Ming;LENG Su-Peng;MAO Jian-Bing;XIE Jun
..............page:608-619
Internet Registry Mechanism for Preventing Prefix Hijacks
LIU Xin;ZHU Pei-Dong;PENG Yu-Xing
..............page:620-629
A Scalable Unbiased Sampling Method Based on Multi-Peer Adaptive Random Walk
FU Yong-Quan;WANG Yi-Jie;ZHOU Jing
..............page:630-643
Self-Adaptive Load Balancing Method in Structured P2P Protocol
XIONG Wei;XIE Dong-Qing;JIAO Bing-Wang;LIU Jie
..............page:660-670
Research on Smart Space Oriented Location Awareness Method
MING Liang;ZHAO Gang;XIE Gui-Hai;WANG Chun-Lei
..............page:671-681
Hash Functions Based on Block Ciphers
LIN Pin;WU Wen-Ling;WU Chuan-Kun
..............page:682-691
Certificateless Proxy Signature Scheme with Provable Security
CHEN Hu;ZHANG Fu-Tai;SONG Ru-Shun
..............page:692-701
Simulation of Autumn Leaves
CHI Xiao-Yu;SHENG Bin;YANG Meng;CHEN Yan-Yun;WU En-Hua
..............page:702-712
Mesh Simplification for 3D Models with Feature-Preserving
LU Wei;ZENG Ding-Hao;PAN Jin-Gui
..............page:713-723
3D Face Deformable Model Based on Feature Points
GONG Xun;WANG Guo-Yin
..............page:724-733
Tone Mapping for High Dynamic Range Image Using a Probabilistic Model
SONG Ming-Li;WANG Hui-Qiong;CHEN Chun;YE Xiu-Qing;GU Wei-Kang
..............page:734-743
A Scheduling Algorithm for Long Duration Transaction Based on Cost of Compensation
ZHU Rui;GUO Chang-Guo;WANG Huai-Min
..............page:744-753
An Efficient Fine Granularity Multi-Version File System
XIANG Xiao-Jia;SHU Ji-Wu;ZHENG Wei-Min
..............page:754-765
Scheduling of Real-Time Signal Processing in Cluster-Based Software Radio Systems
ZHU Xiao-Min;LU Pei-Zhong
..............page:766-778