Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Software

ISSN: 1796--217X
Publisher: ACADEMY PUBLISHER


ADD TO MY LIST
 
A New Ensemble Learning Approach for Microcalcification Clusters Detection

Author(s): Xinsheng Zhang
Volume: 4
Issue: 9
Year: 2009
A Naïve Five-Element String Algorithm

Author(s): Yanhong Cui | Renkuan Guo | Danni Guo
Volume: 4
Issue: 9
Year: 2009
An Open Approach for the Applied Pi Calculus

Author(s): Han Zhu | Yonggen Gu | Xiaohong Wu
Volume: 3
Issue: 9
Year: 2008
Research on Information Retrieval System Based on Ant Clustering Algorithm

Author(s): Peiyu Liu | Zhenfang Zhu | Lina Zhao
Volume: 4
Issue: 9
Year: 2009
An Improved Clonal Algorithm in Multiobjective Optimization

Author(s): Jianyong Chen | Qiuzhen Lin | Qingbin Hu
Volume: 4
Issue: 9
Year: 2009
Assuring Information Quality in Sharing Platform for Disaster Management

Author(s): Ying Su | Jie Peng | Zhanming Jin
Volume: 4
Issue: 9
Year: 2009
A Novel Fusion Method for Semantic Concept Classification in Video

Author(s): Li Tan | Yuanda Cao | Minghua Yang | Jiong Yu
Volume: 4
Issue: 9
Year: 2009
Reasoning Principles for Negotiating Agent

Author(s): Mu-kun Cao | Yu-qiang Feng
Volume: 3
Issue: 9
Year: 2008
Application of Genetic Algorithms for a Tyre Production Scheduling Information System

Author(s): Lin Liu | Xinbao Liu | Hao Cheng | Ying Guo | Shanlin Yang
Volume: 4
Issue: 9
Year: 2009
A Service Clustering Approach Based on Semantics Ant Colony Algorithm

Author(s): Xiang-bing Zhou | Qi Luo
Volume: 4
Issue: 9
Year: 2009
The Implementation and Optimization of AMR on Mobile Device

Author(s): Jie Yang | Shengsheng Yu | Jingli Zhou
Volume: 4
Issue: 9
Year: 2009
Segmenting Histogram-based Robust Audio Watermarking Approach

Author(s): Xiaoming Zhang
Volume: 3
Issue: 9
Year: 2008
Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems

Author(s): Solahuddin B Shamsuddin | Mike E Woodward
Volume: 3
Issue: 9
Year: 2008
Editorial

Author(s): Fei Yu | Chin-Chen Chang | Ben M. Chen | Yongjun Chen | Zhigang Chen
Volume: 3
Issue: 9
Year: 2008
Semantic Information Retrieval Based on Fuzzy Ontology for Electronic Commerce

Author(s): Jun Zhai | Yiduo Liang | Yi Yu | Jiatao Jiang
Volume: 3
Issue: 9
Year: 2008
A Novel Probability Binary Particle Swarm Optimization Algorithm and Its Application

Author(s): Ling Wang | Xiuting Wang | Jingqi Fu | Lanlan Zhen
Volume: 3
Issue: 9
Year: 2008
An Approach to Discover Dependencies between Service Operations

Author(s): Shuying Yan | Jing Wang | Chen Liu | Lei Liu
Volume: 3
Issue: 9
Year: 2008
Formal Models for Architecture Aspects and Their Weaving

Author(s): Chunhua Yang | Haiyang Wang
Volume: 3
Issue: 9
Year: 2008
Integrating E-services with a Telecommunication E-commerce using Service-Oriented Architecture

Author(s): Tung-Hsiang Chou | Yu-Min Lee
Volume: 3
Issue: 9
Year: 2008
Towards a Collaborative and Systematic Approach to Alert Verification

Author(s): Xuejiao Liu | Debao Xiao | Xi Peng
Volume: 3
Issue: 9
Year: 2008
Secure and Fast Hashing Algorithm with Multiple Security Levels

Author(s): Hassan M. Elkamchouchi | Mohammed Nasr | Roayat Ismail
Volume: 4
Issue: 9
Year: 2009
Essay on Semantics Definition in MDE - An Instrumented Approach for Model Verification

Author(s): Benoît Combemale | Xavier Crégut | Pierre-Loïc Garoche | Xavier Thirioux
Volume: 4
Issue: 9
Year: 2009
Context and Adaptivity in Pervasive Computing Environments: Links with Software Engineering and Ontological Engineering

Author(s): Ahmet Soylu | Patrick De Causmaecker | Piet Desmet
Volume: 4
Issue: 9
Year: 2009
Fuzzy Linguistic Hybrid Harmonic Mean Operator and Its Application to Software Selection

Author(s): Guiwu Wei | Wende Yi
Volume: 4
Issue: 9
Year: 2009
Optimizing Large Query by Simulated Annealing Algorithm Based On Graph-Based Approach

Author(s): Yongheng Chen | Wanli Zuo | Fengling He | Kerui Chen
Volume: 6
Issue: 9
Year: 2011
Cyclops – Snapshot Translation System Based on Mobile Device

Author(s): Fai Wong | Sam Chao | Wai Kit Chan
Volume: 6
Issue: 9
Year: 2011
Road Traffic Freight Volume Forecast Using Support Vector Machine Combining Forecasting

Author(s): Shang Gao | Zaiyue Zhang | Cungen Cao
Volume: 6
Issue: 9
Year: 2011
Process Algebra with Timed-Priority Executing Policy

Author(s): Zhongxian Li | Miao Jiang | Gao Chen | Qinglin Zha | Guang Zheng
Volume: 6
Issue: 9
Year: 2011
An Empirical Study of the Influencing Factors of User Adoption on Mobile Securities Services

Author(s): Zhihong Li | Xue Bai
Volume: 6
Issue: 9
Year: 2011
A Hierarchical Computational Model of Selective Visual Attention

Author(s): Qiaorong Zhang | Huimin Xiao | Haibo Liu
Volume: 6
Issue: 9
Year: 2011
Enriched Format Text Categorization Using A Component Similarity Approach

Author(s): Fei Zhu | Jiong Yang | Yong Zhou
Volume: 6
Issue: 9
Year: 2011
Search Engine System Based on Ontology of Technological Resources

Author(s): Weihui Dai | Yu You | Wenjuan Wang | Yiming Sun | Tong Li
Volume: 6
Issue: 9
Year: 2011
A Network Analysis of Investment Firms as Resource Routers in Chinese Innovation Ecosystem

Author(s): Neil Rubens | Kaisa Still | Jukka Huhtamaki | Martha G. Russell
Volume: 6
Issue: 9
Year: 2011
A Line Segments Matching Method based on Epipolar-line Constraint and Line Segment Features

Author(s): Jie-xian Zeng | Sheng Yu | Xiang Fu | Chao-xia Li
Volume: 6
Issue: 9
Year: 2011
A New Fuzzy Risk Analysis Method based on Generalized Fuzzy Numbers

Author(s): Xiaoyan Su | Wen Jiang | Jianling Xu | Peida Xu | Yong Deng
Volume: 6
Issue: 9
Year: 2011
Analyzing Schedulability of Energy-oriented Distributed Real-time Embedded Software

Author(s): Liqiong Chen | Guisheng Fan | Yunxiang Liu
Volume: 6
Issue: 9
Year: 2011
Internetware Structure Description and Research of the Petri Net Method

Author(s): Zhijian Wang | Yuping Hu | Shaohua Li | Dingguo Wei
Volume: 6
Issue: 9
Year: 2011
The Switching Glitch Power Leakage Model

Author(s): Hongying Liu | Guoyu Qian | Yukiyasu Tsunoo | Satoshi Goto
Volume: 6
Issue: 9
Year: 2011
Towards the Rapid Application Development Based on Predefined Frameworks

Author(s): Dongjin Yu
Volume: 6
Issue: 9
Year: 2011
A Geometric Distortion Resilient Image Watermark Algorithm Based on DWT-DFT

Author(s): Yuping Hu | Zhijian Wang | Hui Liu | Guangjun Guo
Volume: 6
Issue: 9
Year: 2011
A Prediction-Based Adaptive Reversible Data Embedding Scheme

Author(s): Chin-Feng Lee | Ying-Hsuan Huang | Chin-Chen Chang | Tien-Chung Liu
Volume: 6
Issue: 9
Year: 2011
Modeling of Failure Detector Based on Message Delay Prediction Mechanism

Author(s): Bin Liu | Shifei Yang | Lei Shi | Xiaoguang Ding | Qian Zhang
Volume: 6
Issue: 9
Year: 2011
A Web Predictive Model Based on Dependency Graph

Author(s): Bin Liu | Haizhen Shi | Lei Shi | Lin Wei | Zhanhong Wang
Volume: 6
Issue: 9
Year: 2011
An Improved Algorithm of Bayesian Text Categorization

Author(s): Tao Dong | Wenqian Shang | Haibin Zhu
Volume: 6
Issue: 9
Year: 2011
RFID-Based Intelligent Storage and Retrieval Systems in Automated Warehouse

Author(s): Yinghua Xue | Hongpeng Liu
Volume: 6
Issue: 9
Year: 2011
Solving Min-Max Vehicle Routing Problem

Author(s): chunyu ren
Volume: 6
Issue: 9
Year: 2011
Development of an Expert System for Dust Explosion Risk Management Based on ASP.Net and Prolog

Author(s): Qian Zhang | Shengjun Zhong | Guanyu Jiang
Volume: 6
Issue: 9
Year: 2011
Research and Application on Multi-Layer Matter-Element Extension Synthesis Evaluation Method for Software Quality

Author(s): Jianli DONG | Ningguo SHI | Jianzhou WANG
Volume: 6
Issue: 9
Year: 2011
A RSA Key Security Gradating Algorithm Based on Threshold Attack Time

Author(s): Wenxue Tan | Jinju Xi | Xiping Wang
Volume: 6
Issue: 9
Year: 2011
Guest Editorial

Author(s): Fei Yu | Xuange Peng | Juefu Liu | Jiexian Zeng | Chin-Chen Chang
Volume: 6
Issue: 9
Year: 2011
On a Generalization of Cubic Spline Interpolation

Author(s): Shang Gao | Zaiyue Zhang | Cungen Cao
Volume: 6
Issue: 9
Year: 2011
Research on Component Composition and Replacement with Formal Semantics

Author(s): Ruzhi Xu | Quansheng Wu | Peiguang Lin
Volume: 6
Issue: 9
Year: 2011
Credit-based Repeated Game Model Applied in Transfer Decision of Opportunistic Network

Author(s): Cheng Zhang | Qing-sheng Zhu | Zi-yu Chen
Volume: 6
Issue: 9
Year: 2011
Guest Editorial

Author(s): Fei Yu | Chin-Chen Chang | Jian Shu | Guangxue Yue | Naiping Hu
Volume: 5
Issue: 9
Year: 2010
Cognition Inspired Object Oriented Knowledge Warehouse Architecture

Author(s): Xixu Fu | Hui Wei
Volume: 5
Issue: 9
Year: 2010
An Approximate Optimal Damping Control Method for Nonlinear Time-delay Systems with Disturbances

Author(s): De-xin Gao | Jingjing Wang
Volume: 5
Issue: 9
Year: 2010
The Topological Properties of the Approximation Operators on A CCD Lattice

Author(s): Yan Gao | Jilin Yang | Weifeng Du
Volume: 5
Issue: 9
Year: 2010
A Hybrid Real-Time Scheduling Approach on Multi-Core Architectures

Author(s): Pengliu Tan | Jian Shu | Zhenhua Wu
Volume: 5
Issue: 9
Year: 2010
A General Framework for Multi-Human Tracking

Author(s): Ali Ahmed | Kenji Terada
Volume: 5
Issue: 9
Year: 2010
Performance Analysis of System Model Based on UML State Diagrams and Continuous-time Markov Chains

Author(s): Yefei Zhao | Zongyuan Yang | Jinkui Xie | Qiang Liu
Volume: 5
Issue: 9
Year: 2010
An Approach to Analyzing User Preference based Dynamic Service Composition

Author(s): Guisheng Fan | Huiqun Yu | Liqiong Chen | Caizhu Yu
Volume: 5
Issue: 9
Year: 2010
An Approach to Formally Modeling and Verifying Distributed Real-time Embedded Software

Author(s): Liqiong Chen | Guisheng Fan | Yunxiang Liu
Volume: 5
Issue: 9
Year: 2010
RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases

Author(s): Abdallah Alashqur
Volume: 5
Issue: 9
Year: 2010
CT Image De-noising Model Based on Independent Component Analysis and Curvelet Transform

Author(s): Guangming Zhang | Zhiming Cui | Jianming Chen | Jian Wu
Volume: 5
Issue: 9
Year: 2010
Effects of Violent and Non-violent Computer Video Games on Explicit and Implicit Aggression

Author(s): Xuemin Zhang | Chang Liu | Langlang Wang | Qiuhong Piao
Volume: 5
Issue: 9
Year: 2010
A Novel Shape Representation and Retrieval Algorithm: Distance Autocorrelogram

Author(s): Jie-xian Zeng | Yong-gang Zhao | Xiang Fu
Volume: 5
Issue: 9
Year: 2010
Testing Conformance of BPEL Business Process Based on Model Checking

Author(s): Rongsheng Dong | Zhao Wei | Xiangyu Luo | Fang Liu
Volume: 5
Issue: 9
Year: 2010
Plumpness Recognition and Quantification of Rapeseeds using Computer Vision

Author(s): Jinwei Li | Guiping Liao | Xiaojuan Yu | Zhao Tong
Volume: 5
Issue: 9
Year: 2010
Integrating Heterogeneous Data Source Using Ontology

Author(s): Jinpeng Wang | Jianjiang Lu | Yafei Zhang | Zhuang Miao | Bo Zhou
Volume: 4
Issue: 8
Year: 2009
Towards Semantically Enhanced File-Sharing

Author(s): Alan Davoust | Babak Esfandiari
Volume: 4
Issue: 8
Year: 2009
Selforganisation in a Storage for Semantic Information

Author(s): Robert Tolksdorf | Anne Augustin
Volume: 4
Issue: 8
Year: 2009
A Structure-based Approach for Dynamic Services Composition

Author(s): Canghong Jin | Minghui Wu | Jing Ying
Volume: 4
Issue: 8
Year: 2009
Modeling and Analysis the Web Structure Using Stochastic Timed Petri Nets

Author(s): Po-Zung Chen | Chu-Hao Sun | Shih-Yang Yang
Volume: 3
Issue: 8
Year: 2008
An Object-oriented Design and Push Web Server based Framework for Physical Object Interactions and Services

Author(s): Runhe Huang | Kei Nakanishi | Jianhua Ma | Bernady O. Apduhan
Volume: 3
Issue: 8
Year: 2008
Interactive Traveling Assistant based on Agent Technologies and Mobile Computing

Author(s): Han-Bin Chang | Hsuan-Pu Chang | Jason C. Huang
Volume: 3
Issue: 8
Year: 2008
Exemplar-based Image Inpainting base on Structure Construction

Author(s): Jason C. Hung | Chun-Hong Hwang | Yi-Chun Liao | Nick C. Tang | Ta-Jen Chen
Volume: 3
Issue: 8
Year: 2008
Towards a Scalable Infrastructure for Semantic Web Services Execution

Author(s): Antonio J. Roa-Valverde | José F. Aldana-Montes
Volume: 4
Issue: 8
Year: 2009
A Framework for Model Checking Concurrent Java Components

Author(s): Brad Long
Volume: 4
Issue: 8
Year: 2009
An Aggregation Tree Approach for Event Detection in Wireless Sensor Networks

Author(s): Shu-kui Zhang | Sheng-Rong Gong | Zhi-Ming Cui | Quan Liu | Jian-Xi Fan
Volume: 4
Issue: 8
Year: 2009
Affective Modeling and Recognition of Learning Emotion: Application to E-learning

Author(s): Yanwen Wu | Tingting Wang | Xiaonian Chu
Volume: 4
Issue: 8
Year: 2009
Intergrating Salient Regions with New Perceptual Texture Features Based on Wavelet Transform for Image Retrieval

Author(s): Muwei Jian | Ningbo Hao | Ping Ma | Junyu Dong
Volume: 4
Issue: 8
Year: 2009
An Intelligent Home Environment based on Service Planning over Peer-to-Peer Overlay Network

Author(s): Chuan-Feng Chiu | Steen J. Hsu | Sen-Ren Jan
Volume: 3
Issue: 8
Year: 2008
Automatic Discovery of Semantic Relations Based on Association Rule

Author(s): Xiangfeng Luo | Kai Yan | Xue Chen
Volume: 3
Issue: 8
Year: 2008
Reasoning with Semantic Web Technologies in Ubiquitous Computing Environment

Author(s): WenYing Guo
Volume: 3
Issue: 8
Year: 2008
Adaptive Semantic Interoperability Strategies for Knowledge Based Networking

Author(s): Song Guo | John Keeney | David Lewis | Declan O’Sullivan
Volume: 4
Issue: 8
Year: 2009
Binary Activity Chain Modes for Compositional Web Service and Its Compliance Verification

Author(s): Bo Chen | Chungui Li | Qixian Cai
Volume: 4
Issue: 8
Year: 2009
Forward of Special Issue on “Mobile System, Agent Technology, and Web Services”

Author(s): Jason C. Hung
Volume: 3
Issue: 8
Year: 2008
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments

Author(s): Ding-Jung Chiang | Hwei-Jen Lin | Timothy K. Shih
Volume: 3
Issue: 8
Year: 2008
Using Data Mining in MURA Graphic Problems

Author(s): Wen-Hsing Kao | Jason C. Hung | Victoria Hsu
Volume: 3
Issue: 8
Year: 2008
Guest Editorial

Author(s): Reto Krummenacher | Elena Simperl | Ronaldo Menezes
Volume: 4
Issue: 8
Year: 2009
Sharing Choreographies in OpenKnowledge: A Novel Approach to Interoperability

Author(s): Paolo Besana | Vivek Patkar | Adam Barker | David Robertson | David Glasspool
Volume: 4
Issue: 8
Year: 2009
A Personalized Stock Investors Alert System

Author(s): Jameela Al-Jaroodi | Nader Mohamed
Volume: 4
Issue: 8
Year: 2009
A new Method for Shot Identification in Basketball Video

Author(s): Yun Liu | Xueying Liu | Chao Huang
Volume: 6
Issue: 8
Year: 2011
A Novel Intelligent Technique for Recognition of Coke Optical Texture

Author(s): Fang Zhou | Guangxue Yue | Jianguo Jiang | Peizhen Wang
Volume: 6
Issue: 8
Year: 2011
Design and Implement of Customer Communication Behavior Analysis System

Author(s): Qingzhang Chen | Yanqing Ou | Hang Sun
Volume: 6
Issue: 8
Year: 2011
The Dissemination Simulation of Paroxysmal Public Crisis Information Based on Polya Distribution

Author(s): Zhihong Li | Yuehui Chen | Guanggang Zhou | Xue Bai
Volume: 6
Issue: 8
Year: 2011
Research on Mobile Agent System for Agile Supply Chain Management

Author(s): Wenjuan Wang | Weihui Dai | Weidong Zhao | Tong Li | Guangxue Yue | Chen Xu
Volume: 6
Issue: 8
Year: 2011
Extraction and Credibility Evaluation of Web-based Competitive Intelligence

Author(s): Jie Zhao | Peiquan Jin
Volume: 6
Issue: 8
Year: 2011
A Novel Weighted Phrase-Based Similarity for Web Documents Clustering

Author(s): Ruilong Yang | Qingsheng Zhu | Yunni Xia
Volume: 6
Issue: 8
Year: 2011
Emotion Recognition of EMG Based on Improved L-M BP Neural Network and SVM

Author(s): Shanxiao Yang | Guangying Yang
Volume: 6
Issue: 8
Year: 2011
Decision Making Model for Intelligent Agent in Automated Negotiation

Author(s): mukun cao
Volume: 6
Issue: 8
Year: 2011
A New Vertex Similarity Metric for Community Discovery: a Local Flow Model

Author(s): Yueping Li | Yunming Ye | Xiaolin Du
Volume: 6
Issue: 8
Year: 2011
GPU Accelerated 2-D Staggered-grid Finite Difference Seismic Modelling

Author(s): Zhangang Wang | Suping Peng | Tao Liu
Volume: 6
Issue: 8
Year: 2011
Power Aware Job Scheduling with QoS Guarantees Based on Feedback Control

Author(s): Congfeng Jiang | Xianghua Xu | Jian Wan | Jilin Zhang | Yinghui Zhao
Volume: 6
Issue: 8
Year: 2011
Design and Implement of Enterprise Knowledge - In case of Zhejiang Electric Power Test and Research Institute

Author(s): Qingzhang Chen | Yujie Pei | Yan Jin | Hui Zhou
Volume: 6
Issue: 8
Year: 2011
A Framework of Transferring Mobile Services with Agent Based Middleware

Author(s): Weidong Zhao | Haifeng Wu | Weihui Dai | Wenjuan Wang | Guangxue Yue
Volume: 6
Issue: 8
Year: 2011
A Design of Criminal Investigation Expert System Based on CILS

Author(s): Ping He | Weidong Tao
Volume: 6
Issue: 8
Year: 2011
Flocking Motion, Obstacle Avoidance and Formation Control of Range Limit Perceived Groups Based on Swarm Intelligence Strategy

Author(s): Zhibin Xue | Jianchao Zeng | Caili Feng | Zhen Liu
Volume: 6
Issue: 8
Year: 2011
Automatic Extraction of Drainage Networks from DEMs Base on Heuristic Search

Author(s): Kun Hou | Jigui Sun | Wei Yang | Tieli Sun | Ying Wang | Sijun Ma
Volume: 6
Issue: 8
Year: 2011
Water Quality Retrieval and Performance Analysis Using Landsat Thermatic Mapper Imagery Based on LS-SVM

Author(s): Wei Huang | Fengchen Huang | Jing Song
Volume: 6
Issue: 8
Year: 2011
A Graph-based Approach for Deploying Component-based Applications into Channel-based Distributed Environments

Author(s): Abbas Heydarnoori | Walter Binder
Volume: 6
Issue: 8
Year: 2011
Two-Dimension Relaxed Reservation Policy for Independent Tasks in Grid Computing

Author(s): Peng Xiao | Zhigang Hu
Volume: 6
Issue: 8
Year: 2011
Automatically Extracting Academic Papers from Web Pages Using Conditional Random Fields Model

Author(s): Wei Liu | Jianxun Zeng
Volume: 6
Issue: 8
Year: 2011
Orientation Mining-Driven Approach to Analyze Web Public Sentiment

Author(s): Feng Zhao | Qianqiao Hu | Xiaolin Xu | Runxi Zeng | Yi Lin
Volume: 6
Issue: 8
Year: 2011
Algorithm for Detecting the Image of River Sediment Based on Hydrometric Cableway

Author(s): Bing Zhu | Xuyan Zhou | Bin Tan | Xue-mou Liu
Volume: 6
Issue: 8
Year: 2011
Unsupervised Posture Modeling and Recognition based on Gaussian Mixture Model and EM Estimation

Author(s): zhu xijun | Wang Chuanxu
Volume: 6
Issue: 8
Year: 2011
The Application of SOFM Fuzzy Neural Network in Project Cost Estimate

Author(s): WenFeng Feng | WenJuan Zhu
Volume: 6
Issue: 8
Year: 2011
Based on the profile of complex three dimensional stratum modeling

Author(s): Ning Zhao | Rui Wang
Volume: 6
Issue: 8
Year: 2011
Guest Editorial

Author(s): Ian Greenshields
Volume: 5
Issue: 8
Year: 2010
Applying Memetic Algorithm in Multi-Objective Resource Allocation among Competing Projects

Author(s): Angela H. L. Chen | Chiuh-Cheng Chyu
Volume: 5
Issue: 8
Year: 2010
Automated Classification of Two Persons' Interactive Activities

Author(s): Hao Zhang | Zhijing Liu | Haiyong Zhao
Volume: 5
Issue: 8
Year: 2010
Recognizing Human Activities by Key Frame in Video Sequences

Author(s): Hao Zhang | Zhijing Liu | Haiyong Zhao | Guojian Cheng
Volume: 5
Issue: 8
Year: 2010
Business Relations in the Web: Semantics and a Case Study

Author(s): Jie Zhao | Peiquan Jin | Yanhong Liu
Volume: 5
Issue: 8
Year: 2010
Progressive Ranking and Composition of Web Services with Interaction Relationship

Author(s): Jianjun Yuan | Changjun Jiang | Zuowen Jiang
Volume: 5
Issue: 8
Year: 2010
Design and Realization of Case-indexing Model Based on AHP

Author(s): Fugui Chen | Baojian Zhang | Linfeng Bai
Volume: 5
Issue: 8
Year: 2010
AVS-P3: Algorithm and Implementation

Author(s): Tao Zhang | Dong Yuxi | Zhang Wen
Volume: 5
Issue: 8
Year: 2010
On Formal Models and Deriving Metrics for Service-Oriented Architecture

Author(s): Hardeep Singh | Rupinder Singh
Volume: 5
Issue: 8
Year: 2010
Implementation of the Software Performance Engineering Development Process

Author(s): Salvatore Distefano | Antonio Puliafito | Marco Scarpa
Volume: 5
Issue: 8
Year: 2010
Damped Newton based Iterative Non-negative Matrix Factorization for Intelligent Wood Defects Detection

Author(s): Yafeng Zheng | Qiaorong Zhang | Zhao Zhang
Volume: 5
Issue: 8
Year: 2010
Auto-Corner Detection Based on the Eigenvalues Product of Covariance Matrices over Multi-Regions of Support

Author(s): Qingsheng Zhu | Yanxia Wang | Huijun Liu
Volume: 5
Issue: 8
Year: 2010
A Mediator-Based Approach for Process Mediation of Web Services

Author(s): Liyi Zhang | Si Zhou | Zhefeng Sun
Volume: 5
Issue: 8
Year: 2010
The Comparison of WML, cHTML, and XHTML-MP in m-Commerce

Author(s): Jongwook Woo | Minseok Jang
Volume: 3
Issue: 7
Year: 2008
A Comparison of GIS Architectures for Implementing Indoor Location-based Services

Author(s): Valerio Vianello | Cristiano di Flora | Christian Prehofer
Volume: 4
Issue: 7
Year: 2009
QoS Perceived by Users of Ubiquitous UMTS: Compositional Models and Thorough Analysis

Author(s): Andrea Bondavalli | Paolo Lollini | Leonardo Montecchi
Volume: 4
Issue: 7
Year: 2009
An Intelligent Model for Urban Demand-responsive Transport System Control

Author(s): Jin Xu | Zhe Huang
Volume: 4
Issue: 7
Year: 2009
Fuzzy Semantic Retrieval for Traffic Information Based on Fuzzy Ontology and RDF on the Semantic Web

Author(s): Jun Zhai | Yan Chen | Yi Yu | Yiduo Liang | Jiatao Jiang
Volume: 4
Issue: 7
Year: 2009
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments

Author(s): Brahim Ayari | Abdelmajid Khelil | Neeraj Suri
Volume: 4
Issue: 7
Year: 2009
Multi-hop Multi-path Cooperative Connectivity Guided by Mobility, Throughput, and Energy Awareness: a Middleware Approach

Author(s): Paolo Bellavista | Antonio Corradi | Carlo Giannelli
Volume: 4
Issue: 7
Year: 2009
CARISMA – A Service-Oriented, Real-Time Organic Middleware Architecture

Author(s): Manuel Nickschas | Uwe Brinkschulte
Volume: 4
Issue: 7
Year: 2009
Introducing the New Editor-in-Chief of the Journal of Software

Author(s): George J. Sun
Volume: 3
Issue: 7
Year: 2008
Analysis and Visualization of Gene Expressions and Protein Structures

Author(s): Ashraf S. Hussein
Volume: 3
Issue: 7
Year: 2008
Estimating and Prediction of Turn around Time for Incidents in Application Service Maintenance Projects

Author(s): M. J. Basavaraj | K. C. Shet
Volume: 3
Issue: 7
Year: 2008
An Application Directed Adaptive Framework for Autonomic Software

Author(s): Bridget Meehan | Girijesh Prasad | T. M. McGinnity
Volume: 3
Issue: 7
Year: 2008
Graphical Mission Specification and Partitioning for Unmanned Underwater Vehicles

Author(s): Gary Giger | Mahmut Kandemir | John Dzielski
Volume: 3
Issue: 7
Year: 2008
Guest Editorial

Author(s): Uwe Brinkschulte | Marcello Cinque | Tony Givargis | Stefano Russo
Volume: 4
Issue: 7
Year: 2009
Fault and Error Containment of Gateways in Distributed Real-Time Systems

Author(s): Roman Obermaisser
Volume: 4
Issue: 7
Year: 2009
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices

Author(s): Federica Paci | Elisa Bertino | Sam Kerr | Anna Squicciarini | Jungha Woo
Volume: 4
Issue: 7
Year: 2009
Modeling and Analyzing the Dependability of Short Range Wireless Technologies via Field Failure Data Analysis

Author(s): Gabriella Carrozza | Marcello Cinque
Volume: 4
Issue: 7
Year: 2009
Model Based Synthesis of Embedded Software

Author(s): Samar Abdi | Daniel Gajski | Ines Viskic
Volume: 4
Issue: 7
Year: 2009
Deterministic Service Guarantees for NAND Flash using Partial Block Cleaning

Author(s): Siddharth Choudhuri | Tony Givargis
Volume: 4
Issue: 7
Year: 2009
Chemical Programming of Future Service-oriented Architectures

Author(s): Jean-Pierre Banâtre | Thierry Priol
Volume: 4
Issue: 7
Year: 2009
DRACON: QoS Management for Large-Scale Distributed Real-Time Databases

Author(s): Woochul Kang | Sang H. Son | John A. Stankovic
Volume: 4
Issue: 7
Year: 2009
Study of Hybrid Strategy for Ambulatory ECG Waveform Clustering

Author(s): Gang Zheng | Tian Yu
Volume: 6
Issue: 7
Year: 2011
An Efficient Discriminant Analysis Algorithm for Document Classification

Author(s): Ziqiang Wang | Xia Sun
Volume: 6
Issue: 7
Year: 2011
Key Technology of Predicting Dynamic Surface Subsidence Based on Knothe Time Function

Author(s): Qing-Feng Hu | Xi-Min Cui | Guo Wang | Meng-Ru Wang | Yin-Xiao Ji | Wei Xue
Volume: 6
Issue: 7
Year: 2011
A Parallel Particle Swarm Optimization Algorithm for Reference Stations Distribution

Author(s): Bo Shao | Jiansheng Liu | Zhigang Huang | Rui Li
Volume: 6
Issue: 7
Year: 2011
Automatic Cloud Detection and Removal Algorithm for MODIS Remote Sensing Imagery

Author(s): Lingjia Gu | Ruizhi Ren | Shuang Zhang
Volume: 6
Issue: 7
Year: 2011
The chaos differential evolution optimization algorithm and its application to support vector regression machine

Author(s): Wei Liang | Laibin Zhang | Mingda Wang
Volume: 6
Issue: 7
Year: 2011
A New Method for Cartridge Case Image Mosaic

Author(s): Man Luo | Miao Qi
Volume: 6
Issue: 7
Year: 2011
Non-Parameter Local Transformation of Low Frequency Wavelet Coefficients Applied in Aerial Texture Retrieval

Author(s): Xubing Zhang | Cai Bo | Xinrong Hu | Min Li
Volume: 6
Issue: 7
Year: 2011
Social Network Analysis Layout Algorithm under Ontology Model

Author(s): Peng Wu | SiKun Li
Volume: 6
Issue: 7
Year: 2011
An Implicit ELGamal Digital Signature Scheme

Author(s): Haipeng Chen | Xuanjing Shen | Yingda Lv
Volume: 6
Issue: 7
Year: 2011
Manifold Learning Based Gait Feature Reduction and Recognition

Author(s): Suyuan Wei | Chao Ning | Youxing Gong
Volume: 6
Issue: 7
Year: 2011
Effective Improved Graph Transduction

Author(s): Jun Chen | Yu Zhou | Yajun Gao | Bo Wang | Linbo Luo | Wenyu Liu
Volume: 6
Issue: 7
Year: 2011
An Empirical Study on Class Probability Estimates in Decision Tree Learning

Author(s): Liangxiao Jiang | Chaoqun Li
Volume: 6
Issue: 7
Year: 2011
Guest Editorial

Author(s): Feng Gao | Tokuro Matsuo | Junhu Zhang | Shifei Ding
Volume: 6
Issue: 7
Year: 2011
Incremental Learning Algorithm for Support Vector Data Description

Author(s): xiaopeng hua | Shifei Ding
Volume: 6
Issue: 7
Year: 2011
A Super Data-sharing Model in Common Platform of Geographic Information

Author(s): Xin Liu | Chengming Li | Zhaoting Ma | Jizhou Wang | Wei Sun
Volume: 6
Issue: 7
Year: 2011
Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets

Author(s): Yang Xu | Xiao yao Xie | Huan guo Zhang
Volume: 6
Issue: 7
Year: 2011
Design and Implementation of Coastal Zone Remote Sensing Information Extraction Platform

Author(s): Ruifu Wang | Quanbo Xin | Aichao Liu | Shaojie Zhao
Volume: 6
Issue: 7
Year: 2011
Analysis of the Aerosol Optical Depth and the Air Quality in Qingdao, China

Author(s): Jinshan Zhu | Dahai Liu | Qingliu Zeng
Volume: 6
Issue: 7
Year: 2011
On Formalism of Continuous Knowledge Discovery and Temporal Granularity

Author(s): Ding Pan
Volume: 6
Issue: 7
Year: 2011
Applications of Matlab in Mathematical Analysis

Author(s): Feng Gao
Volume: 6
Issue: 7
Year: 2011
The Trend of Cloud Computing in China

Author(s): Chunmei Chi | Feng Gao
Volume: 6
Issue: 7
Year: 2011
The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision

Author(s): songsen yu | yun Peng | Jian Yang | jiajing Zhang
Volume: 6
Issue: 7
Year: 2011
Data Processing Model of Bank Credit Evaluation System

Author(s): guorong xiao
Volume: 6
Issue: 7
Year: 2011
Description and Verification of Dynamic Software Architectures for Distributed Systems

Author(s): Hongzhen Xu | Guosun Zeng | Bo Chen
Volume: 5
Issue: 7
Year: 2010
Robust Model for the Design of Controller in Saucer UAV

Author(s): Shihua Wang | Jianliang Ai | Weihui Dai | Yuanwei Li
Volume: 5
Issue: 7
Year: 2010
A New Quadtree-based Terrain LOD Algorithm

Author(s): Jian Wu | Yuan-feng Yang | Sheng-rong Gong | Zhi-ming Cui
Volume: 5
Issue: 7
Year: 2010
Support Vector Machine for Fast Fractal Image Compression Base on Structure Similarity

Author(s): Chih-Ming Kung | Shu-Tsung Chao
Volume: 5
Issue: 7
Year: 2010
Text Steganography System Using Markov Chain Source Model and DES Algorithm

Author(s): Weihui Dai | Yue Yu | Yonghui Dai | Bin Deng
Volume: 5
Issue: 7
Year: 2010
Quantitative Analysis of System Based on Extended UML State Diagrams and Probabilistic Model Checking

Author(s): Yefei Zhao | Zongyuan Yang | Jinkui Xie | Qiang Liu
Volume: 5
Issue: 7
Year: 2010
Object-Oriented Finite Element Programming for Engineering Analysis in C++

Author(s): Surendra Kumar
Volume: 5
Issue: 7
Year: 2010
Improvement on a Threshold Authenticated Encryption Scheme

Author(s): Zuowen Tan
Volume: 5
Issue: 7
Year: 2010
Feature Extraction in Speechreading

Author(s): Jun He | Hua Zhang
Volume: 5
Issue: 7
Year: 2010
Ontology Based Automatic Attributes Extracting and Queries Translating for Deep Web

Author(s): Hao Liang | Fei Ren | Wanli Zuo | Fengling He
Volume: 5
Issue: 7
Year: 2010
Fine-Grained and Scalable Message Protection in Sensitive Organizations

Author(s): Joon S. Park | Ganesh Devarajan
Volume: 2
Issue: 6
Year: 2007
An Information System Platform for Anonymous Product Recycling

Author(s): Shinsuke Tamura | Kazuya Kouro | Masatoshi Sasatani | Kazi MD. Rokibul Alam | Hazim Anas
Volume: 3
Issue: 6
Year: 2008
Agent IDS based on Misuse Approach

Author(s): Farah Barika Ktata | Nabil El Kadhi | Khaled Ghédira
Volume: 4
Issue: 6
Year: 2009
A Role-Based Approach in Dynamic Task Delegation in Agent Teamwork

Author(s): Yu Zhang
Volume: 3
Issue: 6
Year: 2008
Constraint-based Trend Template for Intrusion Detection

Author(s): Md. Ahsan Habib | Krisna Prasad Pawdel | Mohammad Rajiullah | Prashanta Man Shrestha
Volume: 3
Issue: 6
Year: 2008
Thresholding Images of Historical Documents Using a Tsallis-Entropy Based Algorithm

Author(s): Carlos A.B. Mello | Luciana A. Schuler
Volume: 3
Issue: 6
Year: 2008
Influence Control for Dynamic Reconfiguration of Data Flow Systems

Author(s): Wei Li | Zhikun Zhao
Volume: 2
Issue: 6
Year: 2007
Anomaly Detection Using System Call Sequence Sets

Author(s): Surekha Mariam Varghese | K.Poulose Jacob
Volume: 2
Issue: 6
Year: 2007
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model

Author(s): Dil Muhammad Akbar Hussain
Volume: 2
Issue: 6
Year: 2007
A Decision Support System base line Flexible Architecture to Intrusion Detection

Author(s): Marcello Castellano | Giuseppe Mastronardi | Angela Aprile | Mirko Minardi | Pierpaolo Catalano | Vito Dicensi | Gianfranco Tarricone
Volume: 2
Issue: 6
Year: 2007
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems

Author(s): Veselina G. Jecheva | Evgeniya P. Nikolova
Volume: 2
Issue: 6
Year: 2007
Using Aspect Programming to Secure Web Applications

Author(s): Gabriel Hermosillo | Roberto Gomez | Lionel Seinturier | Laurence Duchien
Volume: 2
Issue: 6
Year: 2007
On Remote and Virtual Experiments in eLearning

Author(s): Sabina Jeschke | Harald Scheel | Thomas Richter | Christian Thomsen
Volume: 2
Issue: 6
Year: 2007
In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games

Author(s): Alexander Höhfeld
Volume: 2
Issue: 6
Year: 2007
Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software

Author(s): Yoshinobu Tamura | Shigeru Yamada
Volume: 3
Issue: 6
Year: 2008
Information Storage and Retrieval Schemes for Recycling Products

Author(s): Takayuki Tsuchida | Teppei Shimada | Tatsuo Tsuji | Ken Higuchi
Volume: 3
Issue: 6
Year: 2008
Model-Driven User Requirements Specification using SysML

Author(s): Michel dos Santos Soares | Jos Vrancken
Volume: 3
Issue: 6
Year: 2008
Role-Based Chatting

Author(s): Haibin Zhu | Rob Alkins | Matthew Grenier
Volume: 3
Issue: 6
Year: 2008
Public Service System for SMEs in E-government

Author(s): Weihui Dai | Xiaolan Zhang
Volume: 4
Issue: 6
Year: 2009
Software Components Assembly with an Appreciated Qos

Author(s): Abdallah Chouarfia | Mebarka Yahlali
Volume: 4
Issue: 6
Year: 2009
Integrated Multimodal Copy-Paste Checking

Author(s): Narayanan Kulathuramaiyer | Bilal Zaka
Volume: 4
Issue: 6
Year: 2009
A Study on the Contribution Factors and Challenges to the Implementation of E-Government in Cambodia

Author(s): Sinawong Sang | Jeong-Dong Lee | Jongsu Lee
Volume: 4
Issue: 6
Year: 2009
Reliable Routing against Selective Packet Drop Attack in DSR based MANET

Author(s): N. Bhalaji | A. Shanmugam
Volume: 4
Issue: 6
Year: 2009
A Foresight based Framework for E-government Strategic Planning

Author(s): Kolsoom Abbasi Shahkooh | Ali Abdollahi | Mehdi Fasanghari | Mohammad Azadnia
Volume: 4
Issue: 6
Year: 2009
EEG Based Brain Computer Interface

Author(s): Syed M. Saddique | Laraib Hassan Siddiqui
Volume: 4
Issue: 6
Year: 2009
A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms

Author(s): Mohammad Naderi Dehkordi | Kambiz Badie | Ahmad Khadem Zadeh
Volume: 4
Issue: 6
Year: 2009
Softwtre Engineering Ethical Principles based on Islamic Values

Author(s): Shihab A. Hameed
Volume: 4
Issue: 6
Year: 2009
Estimating User Preferences by Managing Contextual History in Context Aware Systems

Author(s): Nazir A Malik | Muhammad Younus Javed | Umar Mahmud
Volume: 4
Issue: 6
Year: 2009
Proposed E-government Foresight Framework in Developing Countries, A Systematic Approach

Author(s): Fatemeh Saghafi | Kolsoom Abbasi Shahkooh | Akbar Kary Dolat Abadi | Behrouz Zarei
Volume: 4
Issue: 6
Year: 2009
Factors Influencing the Adoption of E-government Services

Author(s): Suha AlAwadhi | Anne Morris
Volume: 4
Issue: 6
Year: 2009
Determinants of Strategic Utilization of Information Systems: A Conceptual Framework

Author(s): Mohamad Noorman Masrek | Adnan Jamaludin | Dang Merduwati Hashim
Volume: 4
Issue: 6
Year: 2009
Research on Spatial Location Unit Distribution Model in Pervasive Computing

Author(s): Hai-cheng Li | Yan Zhou
Volume: 4
Issue: 6
Year: 2009
Study on CEP-Based BCEPS Model of RFID-Based RLTLUM System

Author(s): Guangqian Zhang | Li Zhang | Xin Liu
Volume: 4
Issue: 6
Year: 2009
Risk Analysis and Web Project Management

Author(s): Thamer Al-Rousan | Shahida Sulaiman | Rosalina Abdul Salam
Volume: 4
Issue: 6
Year: 2009
Incremental Learning for Dynamic Collaborative Filtering

Author(s): Shuli Han | Yujiu Yang | Wenhuang Liu
Volume: 6
Issue: 6
Year: 2011
Symbolic Representation for Rough Set Attribute Reduction Using Ordered Binary Decision Diagrams

Author(s): Qianjin Wei | Tianlong Gu
Volume: 6
Issue: 6
Year: 2011
Emerging Patterns and Classification Algorithms for DNA Sequence

Author(s): Xiaoyun Chen | Jinhua Chen
Volume: 6
Issue: 6
Year: 2011
A New Similarity Measure Based on Adjusted Euclidean Distance for Memory-based Collaborative Filtering

Author(s): Huifeng Sun | Yong Peng | Junliang Chen | Chuanchang Liu | Yuzhuo Sun
Volume: 6
Issue: 6
Year: 2011
Advertisement Data Management and Application Design in WBCs

Author(s): Zhanlin Ji | Ivan Ganchev | Mairtin O’Droma
Volume: 6
Issue: 6
Year: 2011
Realtime Encrypted Traffic Identification using Machine Learning

Author(s): Chengjie Gu | Shunyi Zhang | Yanfei Sun
Volume: 6
Issue: 6
Year: 2011
Novel Learning Algorithm for System Model of Traditional Chinese Drug Fumigation

Author(s): Ping Zhang | XiaoHong Hao | HengJie Li | WeiTao Xu
Volume: 6
Issue: 6
Year: 2011
Identity Attributes Mining, Metrics Composition and Information Fusion Implementation Using Fuzzy Inference System

Author(s): Jackson Phiri | Tie-Jun Zhao | Jameson Mbale
Volume: 6
Issue: 6
Year: 2011
Selection of the Suitable Parameter Value for ISOMAP

Author(s): Li Jing | Chao Shao
Volume: 6
Issue: 6
Year: 2011
Accelerometer Based Gesture Recognition Using Fusion Features and SVM

Author(s): Zhenyu He
Volume: 6
Issue: 6
Year: 2011
RAAP: A Requirements Analysis and Assessment Process Framework for Component-Based System (Invited Paper)

Author(s): Richard Lai | Sajjad Mahmood | Shaoying Liu
Volume: 6
Issue: 6
Year: 2011
Nonlinear Robust PLS Modeling of Wastewater Effluent Quality Indices

Author(s): Lijie Zhao | Decheng Yuan | Jian Tang | Wei Wang | Tianyou Chai
Volume: 6
Issue: 6
Year: 2011
Lateral Control for Autonomous Parking System with Fractional Order Controller

Author(s): Qingyang Chen | Tongtong Chen | Huiying Yu | Jinze Song | Daxue Liu
Volume: 6
Issue: 6
Year: 2011
A BP Neural Network Realization in the Measurement of Material Permittivity

Author(s): Qian Chen | Kama Huang | Xiaoqing Yang | Ming Luo | Huacheng Zhu
Volume: 6
Issue: 6
Year: 2011
Dynamic Role-Based Access Control Model

Author(s): Jun Zheng | kun Qi Zhang | wen Shang Zheng | an Yu Tan
Volume: 6
Issue: 6
Year: 2011
Urban Delivery Distribution Routing Optimizing Key Technology Based on Web GIS

Author(s): Yongchang Ren | Tao Xing | Haijun Song | Xiaoji Chen
Volume: 6
Issue: 6
Year: 2011
Research on Quantitative Method about Driver Reliability

Author(s): Yihu Wu | Jiajia Li | Dan Yu | Haitao Cheng
Volume: 6
Issue: 6
Year: 2011
Image Denoising Algorithm Based on Dyadic Contourlet Transform

Author(s): Hui Fan | Yongliang Wang | Jinjiang Li
Volume: 6
Issue: 6
Year: 2011
Multi-source Information Fusion Based on Data Driven

Author(s): Xin Zhang | Li Yang | Yan Zhang | Jinxue Sui
Volume: 6
Issue: 6
Year: 2011
Research on Real-time Publish/Subscribe System supported by Data-Integration

Author(s): Lidong Zhai | Li Guo | Xiang Cui | Shuhao Li
Volume: 6
Issue: 6
Year: 2011
SA Based Software Deployment Reliability Estimation Considering Component Reliability of Exponential Distribution

Author(s): Xihong Su | Hongwei Liu | Zhibo Wu | Xiaozong Yang | Decheng Zuo
Volume: 6
Issue: 6
Year: 2011
Guest Editorial

Author(s): Tianlong Gu | Shenghui Li
Volume: 6
Issue: 6
Year: 2011
WS-DAI-DM: An Interface Specification for Data Mining in Grid Environments

Author(s): Yan Zhang | Luoming Meng | Honghui Li | Alexander Woehrer | Peter Brezany
Volume: 6
Issue: 6
Year: 2011
Usability Heuristics Evaluation for Child E-learning Applications

Author(s): Asmaa A. Alsumait | Asma Al-Osaimi
Volume: 5
Issue: 6
Year: 2010
Distributed Geospatial Analysis through Web Processing Service: A Case Study of Earthquake Disaster Assessment

Author(s): Xiaoliang Meng | Yichun Xie | Fuling Bian
Volume: 5
Issue: 6
Year: 2010
Constructivism in Mexican Elementary School Education: Designing a Platform for Cooperative Learning

Author(s): Ivan A. Garcia | Carla L. Pacheco
Volume: 5
Issue: 6
Year: 2010
Computation Aware Scheme for Visual Signal Processing

Author(s): Anand Paul | Yung Chuan Jiang | Jhing Fa Wang
Volume: 5
Issue: 6
Year: 2010
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached

Author(s): Rafael Martínez-Peláez | Francisco Rico-Novella | Cristina Satizábal
Volume: 5
Issue: 6
Year: 2010
Service-Oriented Authoring System to Achieve Interoperability among E-Learning Environment

Author(s): Neil Y. Yen | Jason C. Hung | Hui-Huang Hsu | Timothy K. Shih | Louis R. Chao
Volume: 5
Issue: 6
Year: 2010
A Historical Review of Computer User’s Illegal Behavior Based on Containment Theory

Author(s): Chi-Chao Lu | Wen-Yuan Jen
Volume: 5
Issue: 6
Year: 2010
Iterative Equalizer for OFDM-CDMA Multiple Access Communication Systems

Author(s): Jui-Chi Chang | Hsuan-Fu Wang | Fang-Biau Ueng
Volume: 5
Issue: 6
Year: 2010
Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

Author(s): Hsien-Wei Yang | Kuo-Feng Hwang | Shou-Shiung Chou
Volume: 5
Issue: 6
Year: 2010
A P2P-based Three-Dimensional Virtual Environment Management and Collaborative Streaming System

Author(s): Chuan-Feng Chiu | Steen J. Hsu | Sen-Ren Jan
Volume: 5
Issue: 6
Year: 2010
Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management

Author(s): Sherin M. Moussa | Gul A. Agha
Volume: 5
Issue: 6
Year: 2010
Towards the Context-oriented Model of Project Management for Virtual Enterprises

Author(s): Chouyin Hsu | Minfeng Lee
Volume: 5
Issue: 6
Year: 2010
An Algorithm for Efficient Assertions-Based Test Data Generation

Author(s): Ali M. Alakeel
Volume: 5
Issue: 6
Year: 2010
A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing

Author(s): Xu Zhou | GuangXue Yue | ZhiBang Yang | KenLi Li
Volume: 5
Issue: 6
Year: 2010
A Novel Probabilistic Model for Dependency Parsing

Author(s): Shixi Fan | Xuan Wang | Xiaolong Wang
Volume: 5
Issue: 5
Year: 2010
Organizational Readiness Analysis for Enterprise Information Systems Implementation

Author(s): Guoxi Cui | Kecheng Liu
Volume: 5
Issue: 5
Year: 2010
The Generalization of WOSF and Corresponding Outputs

Author(s): Wei-Chih Chen | Jyh-Horng Jeng
Volume: 5
Issue: 5
Year: 2010
H∞ Control of Fuzzy Impulsive Systems with Quantized Feedback

Author(s): Yingqi Zhang | Caixia Liu
Volume: 4
Issue: 5
Year: 2009
A Study on the Influencing Factors of the Intention to Share Tacit Knowledge in the University Research Team

Author(s): Zhihong Li | Tao Zhu | Haiyan Wang
Volume: 5
Issue: 5
Year: 2010
Integrating the Use of Spreadsheet Software and VBA in Inventory Simulation

Author(s): Changbing Jiang
Volume: 5
Issue: 5
Year: 2010
Nonblocking Distributed Replication of Versioned Files

Author(s): Lukáš Hejtmánek | Luděk Matyska
Volume: 2
Issue: 5
Year: 2007
The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology

Author(s): Anabel Fraga | Juan LLorens
Volume: 2
Issue: 5
Year: 2007
Combining Self Learning and Active Learning for Chinese Named Entity Recognition

Author(s): Lin Yao | Chengjie Sun | Xiaolong Wang | Xuan Wang
Volume: 5
Issue: 5
Year: 2010
The Formal Model of DBMS Enforcing Multiple Security Polices

Author(s): Yongzhong He | Zhen Han | Huirong Fu | Guangzhi Qu
Volume: 5
Issue: 5
Year: 2010
Save time & money - Smart Internet Solutions      Why do you need a reservation system?