Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2009 Issue 4
Throughput Analytical Model and Adaptive MAC Scheme for IEEE 802.11e EDCA Based on AIFS Differentiation
BAI Xiang;MAO Yu-Ming;LENG Su-Peng;MAO Jian-Bing;XIE Jun
..............page:779-794
An Efficient Algorithm of XML Twig Pattern Matching Without Merging
TAO Shi-Qun;FU Li-Zhen
..............page:795-803
Functional Verification of"ShenWei-1" High Performance Microprocessor
HUANG Yong-Qin;ZHU Ying;JU Peng-Jin;WU Zhi-Yong;CHEN Cheng
..............page:1077-1086
Efficient Verifiably Encrypted Signature Scheme without Random Oracles
YANG Hao-Miao;SUN Shi-Xin;XU Ji-You
..............page:1069-1076
Attacking Algorithms Against Continuous Queries in LBS and Anonymity Measurement
LIN Xin;LI Shan-Ping;YANG Zhao-Hui
..............page:1058-1068
Implicit Authorization Analysis of Role-Based Administrative Model
LIU Wei;CAI Jia-Yong;HE Ye-Ping
..............page:1048-1057
Optimal Sensor Deployment Based on Secure Connection in Mobile Sensor Network
JIA Jie;CHEN Jian;CHANG Gui-Ran;WEN Ying-You
..............page:1038-1047
Clustering-Based Approximate Scheme for Data Aggregation over Sensor Networks
XIE Lei;CHEN Li-Jun;CHEN Dao-Xu;XIE Li
..............page:1023-1037
Algorithm of Voronoi Tessellation Based Data Compression over Sensor Networks
XIE Zhi-Jun;WANG Lei;CHEN Hong
..............page:1014-1022
Methodology for Measuring Available Bandwidth on Arbitrary Links
HE Li;YU Shun-Zheng
..............page:997-1013
New Definition of Small Message Criterion and Its Application in Transaction Covert Channel Mitigating
ZENG Hai-Tao;WANG Yong-Ji;ZU Wei;CAI Jia-Yong;RUAN Li
..............page:985-996
Maximal Coverage Scheduling in Wireless Directional Sensor Networks
CHENG Wei-Fang;LIAO Xiang-Ke;SHEN Chang-Xiang
..............page:975-984
LBS-Oriented Creation Method and Implementation for Telecommunication Value-Added Services
YANG Qin;CHEN Jan-Liang;MENG Xiang-Wu
..............page:965-974
High Throughput MAC Protocol for Static Ad Hoc Network
ZHANG Ke-Wang;ZHANG De-Yun;JIANG Wei-Hua
..............page:954-964
Performance Analysis of Stochastic Delivery Transport Protocols in WSNs
XIONG Bin-Bin;LIN Chuang;REN Feng-Yuan
..............page:942-953
A Low-Rate DoS Detection Method Based on Feature Extraction Using Wavelet Transform
HE Yan-Xiang;CAO Qiang;LIU Tao;HAN Yi;XIONG Qi
..............page:930-941
A Cost-Based Heuristic Algorithm for Repairing Inconsistent XML Document
WU Ai-Hua;WANG Xian-Sheng;TAN Zi-Jing;WANG Wei
..............page:918-929
An XML Keyword Retrieval Algorithm Based on Nearest Pair
JI Cong-Rui;DENG Zhi-Hong;TANG Shi-Wei
..............page:910-917
An Integrity Check Method for Fine-Grained Data
CHEN Long;WANG Guo-Yin
..............page:902-909
Optimization Crossover Scale for Improving Performance of Crossover Operator
CHEN Hao;CUI Du-Wu;LI Xue;WEI Hong-Li
..............page:890-901
Dynamic Vague Region Relations Based on Vague Sets
HAO Zhong-Xiao;LI Song
..............page:878-889
Chinese Chunking with Large Margin Method
ZHOU Jun-Sheng;DAI Xin-Yu;CHEN Jia-Jun;QU Wei-Guang
..............page:870-877
Method of Hierarchical States in Planning Based on Model Checking
WEN Zhong-Hua;HUANG Wei;LIU Ren-Ren;JIANG Yun-Fei
..............page:858-869
On Modeling and Deploying an Effective Scan Monitoring System
MA Li-Bo;LI Xing;ZHANG Liang
..............page:845-857
A Local Learning Approach for Natural Image Matting
PENG Hong-Jing;CHEN Song-Can;ZHANG Dao-Qiang
..............page:834-844
A Latent Variable Model for Cluster Ensemble
WANG Hong-Jun;LI Zhi-Shu;CHENG Yang;ZHOU Peng;ZHOU Wei
..............page:825-833
Geodesic Distance-Based Generalized Gaussian Laplacian Eigenmap
ZENG Xian-Hua;LUO Si-Wei;WANG Jiao;ZHAO Jia-Li
..............page:815-824
Data Reduction Based on Artificial Immune System
GONG Mao-Guo;HAO Lin;JIAO Li-Cheng;WANG Xiao-Hua;SUN Yi-Fei
..............page:804-814