Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2011 Issue 8
Network Cross-Layer Mapping Based on Utility Maximization
LI Shi-Yong;YANG Dong;QIN Ya-Juan;ZHANG Hong-Ke
..............page:1855-1871
Mining Hotspots from Multiple Text Streams Based on Stream Information Distance
YANG Ning;TANG Chang-Jie;WANG Yue;CHEN Yu;ZHENG Jiao-Ling;LI Hong-Jun
..............page:1761-1770
Impossible Differential and Integral Cryptanalysis of Zodiac
SUN Bing;ZHANG Peng;LI Chao
..............page:1911-1917
Finding High Quality Threads in Web Forums
CHEN You;CHENG Xue-Qi;YANG Sen
..............page:1785-1804
Semantic Role Labeling in Chinese Language for Nominal Predicates
LI Jun-Hui;ZHOU Guo-Dong;ZHU Qiao-Ming;QIAN Pei-De
..............page:1725-1737
Efficient Rendering of SinglePass Order-Independent Transparency via CUDA Renderer
HUANG Meng-Cheng;LIU Fang;LIU Xue-Hui;WU En-Hua
..............page:1927-1933
Dynamic Niche-Based Self-Organizing Learning Algorithm
ZHOU Chuan-Hua;XIE An-Shi
..............page:1738-1748
Near Duplicated Web Pages Detection Based on Concept and Semantic Network
CAO Yu-Juan;NIU Zhen-Dong;ZHAO Kun;PENG Xue-Ping
..............page:1816-1826
Research on Markov Logic Networks
XU Cong-Fu;HAO Chun-Liang;SU Bao-Jun;LOU Jun-Jie
..............page:1699-1713
Indexing the World Wide Web: Intelligent Query Suggestion Based on Term Relation Network
LI Ya-Nan;WANG Bin;LI Jin-Tao;LI Peng
..............page:1771-1784
Fuzzy Description and Extracting Methods of Complex Feature Regions in Flow Fields
XU Hua-Xun;LI Si-Kun;MA Qian-Li;CAI Xun
..............page:1960-1972
Regular Expressions Matching for Network Security
ZHANG Shu-Zhuang;LUO Hao;FANG Bin-Xing
..............page:1838-1854
Certificateless Signcryption Scheme Without Bilinear Pairing
LIU Wen-Hao;XU Chun-Xiang
..............page:1918-1926
Collusion-Resistant Digital Fingerprinting Based on Residual Characters Tracking
WANG Zu-Xi;WANG Wen-Zong;GE Qiang;HU Hart-Ping
..............page:1884-1896
Efficient Cluster Analysis Method for Protein Sequences
TANG Dong-Ming;ZHU Qing-Xin;YANG Fan;CHEN Ke
..............page:1827-1837
Retrieval Effectiveness Analysis for Anchor Texts
ZHOU BO;LIU Yi-Qun;ZHANG Min;JIN Yi-Jiang;MAShao-Ping
..............page:1714-1724
All-Frequency Shadows Rendering Algorithm for Dynamic Scenes Based on Harr Wavelets
ZHAO Qin-Ping;CHE Ying-Hui
..............page:1948-1959
Continuous K Nearest Neighbor Queries over Moving Objects Based on Multi-Core and MultiThreading
ZHAO Liang;JING Ning;CHEN Luo;LIAO Wei;ZHONG Zhi-Nong
..............page:1805-1815
Detection Approach of DDoS Attacks Based on Conditional Random Fields
LIU Yun;CAI Zhi-Ping;ZHONG Ping;YIN Jian-Ping;CHENG Jie-Ren
..............page:1897-1910
ruan jian xue bao tou gao zhi nan
..............page:封三
Learning and Synchronized Privacy Preserving Frequent Pattern Mining
GUO Yu-Hong;TONG Yun-Hai;TANG Shi-Wei;WU Leng-Dong
..............page:1749-1760