Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2011 Issue 11
Software Behavior Model Based on System Objects
FU Jian-Ming;TAO Fen;WANG Dan;ZHANG Huan-Guo
..............page:2716-2728
Multi-Level Component Behavior Matching Model Based on Finite Automata
CHU Dian-Hui;MENG Fan-Chao;ZHAN De-Chen;XU Xiao-Fei
..............page:2668-2683
Unified Formal Modeling and Analyzing both Functionality and QoS of Web Services Composition
XIAO Fang-Xiong;HUANG Zhi-Qiu;CAO Zi-Ning;TU Li-Zhong;ZHU Yi
..............page:2698-2715
Universal Composable Password Authenticated Key Exchange Protocol in the Standard Model
HU Xue-Xian;ZHANG Zhen-Feng;LIU Wen-Fen
..............page:2820-2832
P2P Weak State Routing Scheme Based on Decaying Bloom Filters
ZHU Gui-Ming;GUO De-Ke;JIN Shi-Yao
..............page:2810-2819
Algorithm for Generating Short Sentences from Grammars Based on Branch Coverage Criterion
ZHENG Li-Xiao;XU Zhi-Wu;CHEN Hai-Ming
..............page:2564-2576
Some Properties of Pigeon-Hole Formulas
XU Dao-Yun;WEI Li;WANG Xiao-Feng
..............page:2553-2563
Documentation-Based Approach to Reveal Architectural View Conflicts
ZHU Wen-Hui;HUANG Gang;SUN Yan-Chun;MEI Hong
..............page:2577-2592
ruan jian xue bao tou gao zhi nan
..............page:封3
Computational Error Handling as Aspects: A Case Study and Evaluation
CUI Zhan-Qi;WANG Lin-Zhang;LIU Hui-Gen;LI Xuan-Dong
..............page:2639-2651
Resource Control Model for QoS in the Trustworthy and Controllable Network
QU Yan-Sheng;LI Wei;LUO Jun-Zhou;WANG Peng
..............page:2782-2794
Approach for Evaluating the Trustworthiness of Service Agent
ZHU Man-Ling;JIN Zhi
..............page:2593-2609
Two Party Certificateless Key Agreement Schemes
LIU Wen-Hao;XU Chun-Xiang
..............page:2843-2852
Two-Phase Clustering Algorithm for Complex Distributed Data
GONG Mao-Guo;WANG Shuang;MA Meng;CAO Yu;JIAO Li-Cheng;MA Wen-Ping
..............page:2760-2772
Analysis and Transformation of Overlapped Patterns in BPEL Process Modeling
ZHANG Man;DUAN Zhen-Hua;WANG Xiao-Bing
..............page:2684-2697
Coded Retransmission Algorithm Based on Matching Theory for Wireless Broadcasting
DAI Bin;CAO Zhi-Gang;YANG Jun;HUANG Chen;WANG Fu-Rong
..............page:2833-2842
Rate-Based Component Software Reliability Process Simulation
HOU Chun-Yan;CUI Gang;LIU Hong-Wei
..............page:2749-2759
Flash Crowd Control Model Based on Time Delay
XIAO Jun;YUN Xiao-Chun;ZHANG Yong-Zheng
..............page:2795-2809
Monitoring Enabled Distributed Software Construction Method
LIU Dong-Hong;GUO Chang-Guo;WANG Huai-Min;WANG Tao
..............page:2610-2624
Coordinating of Dynamic Updating Controlled by Transaction in Service- Oriented System
WANG De-Jun;HUANG Lin-Peng;XU Xiao-Hui
..............page:2652-2667
Query Dependent Learning to Model Based on Ordered Multiple Hyperplanes
SUN He-Li;HUANG Jian-Bin;FENG Bo-Qin;ZHAO Zhi-Qin;LIU Jun;ZHENG Qing-Hua
..............page:2773-2781