Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2010 Issue 4
MIMO Muti-Hop Wireless Networks
li fang min ; ma xiao lin ; fang yi lin ; wu peng
..............page:732-749
Cache-Conscious Computation of Closed Iceberg Cubes
zuo hua ; du xiao yong ; wang shan
..............page:620-631
Research of the QoS-Supporting IEEE 802.11 EDCA Performance
mao jian bing ; mao yu ming ; leng peng ; bai xiang
..............page:750-770
Efficient Algorithm for Sequence Similarity Search Based on Reference Indexing
dai dong bo ; xiong zuo ; zhu yang yong
..............page:718-731
Semi-Supervised SAR Target Recognition Based on Laplacian Regularized Least Squares Classification
zhang xiang rong ; yang chun ; jiao li cheng
..............page:586-596
ruan jian xue bao tou gao zhi nan
..............page:封3
Sequence Clustering Algorithms Based on Global and Local Similarity
dai dong bo ; tang chun lei ; xiong zuo
..............page:702-717
Automatic Labeling of Semantic Roles on Chinese FrameNet
li ji hong ; wang rui bo ; wang wei lin ; li guo chen
..............page:597-611
Worm Detection System Based on Positive Selection
hong zheng ; wu li fa
..............page:816-826
Two Formal Analyses of Attack Graphs
chen feng ; zhang zuo ; su jin shu ; han wen bao
..............page:838-848
Analysis on Belief Reachability and Convergence Rate of Multi-Agent System in Controllable Networks
wang peng ; luo jun zhou ; li wei ; bian zheng ai ; qu yan sheng
..............page:782-792
Correlation Estimating Algorithm of XML Stream Based on Hamming Norms
sun he ; zhu hong
..............page:672-679
Fast Unified Mining of Hyperclique Patterns and Maximal Hyperclique Patterns
xiao bo ; zhang liang ; xu qian fang ; zuo zhi qing ; guo jun
..............page:659-671
Rendezvous Multicast: A Novel Architecture for MPLS QoS Multicast
jiang yong ; hu song hua
..............page:827-837
Memory Consistency Verification of Chip Multi-Processor
wang peng yu ; chen yun zuo ; shen hai hua ; chen tian shi ; zhang zuo
..............page:863-874
Identity-Reserved Anonymity in Privacy Preserving Data Publishing
tong yun hai ; tao you dong ; tang shi wei ; yang dong qing
..............page:771-781
Data Query Protocol Based on Ant Colony Optimization for Wireless Sensor Networks
cui yan rong ; li ke qing
..............page:793-801
Wavelet Synopsis Based Clustering of Parallel Data Streams
chen hua hui ; shi bo le ; qian jiang bo ; chen ye fang
..............page:644-658
Dynamic Logic Model of Time Axes in Temporal Database
liu dong ning ; tang yong
..............page:694-701
Clustering-Based Approach for Data Anonymization
wang zhi hui ; xu jian ; wang wei ; shi bo le
..............page:680-693
Anisotropic Diffusion Analysis of Gradient Vector Flow
ning ji feng ; wu cheng ke ; jiang guang ; liu shi gang
..............page:612-619
Efficient RFID Data Cleaning Model Based on Dynamic Clusters of Monitored Objects
gu yu ; yu ge ; hu xiao long ; wang yi
..............page:632-643