default search action
Journal of Software, Volume 5
Volume 5, Number 1, January 2010
- Qihai Zhou, Qiang Liu:
Guest Editorial. 1-2 - Qihai Zhou, Yan Li:
New Algorithm for Indefinite Multi-objective Decision Making Based on Multiple-valued Intuitive Fuzzy Set Theory. 3-10 - Junjie Wu, Xiaohui Pan, Xuejun Yang:
Software Prepromotion for Non-Uniform Cache Architecture. 11-19 - Zhiming Xu, Yu Wang, Jingguo Zhu:
A Reliable Multicast Routing Protocol for High-speed Mobile Ad Hoc Networks: R-ODMRP. 20-27 - Genyuan Du, Fang Miao, Shengli Tian, Xi-rong Guo:
Remote Sensing Image Sequence Segmentation Based on the Modified Fuzzy C-means. 28-35 - Xin Qi, Jianjian Chen:
Multi-Agent Coalition Formation Tactic Based on Grid. 36-43 - Xiangwei Qi, Yusup Abaydulla:
The study of mathematical expression recognition and the embedded system design. 44-53 - Jubiao Yao, Keyu Jiang, Chaoyi Yao:
Analysis of LPG Engine PID Parameter Control of Transient Air-fuel Ration Based on Improved Elman Neural Network. 54-64 - Jing Qin, Huawei Zhao:
k out of n Oblivious Transfer Protocols from Bilinear Pairings. 65-72 - Hongjian Liu, Defeng Guo, Quan Zhou, Kenji Nagamatsu, Qinghua Sun:
A Pre-Identification Method for Chinese Named Entity Recognition. 73-80 - Lin Yang, Wei Sun, Chi-long Zhao, Honglei Tu:
On Practice of Big Software Designing. 81-88 - Hao Liang, Wanli Zuo, Fei Ren:
Describing the Semantic Relation of the Deep Web Query Interfaces Using Ontology Extended LAV. 89-98 - Huanchun Yang:
Risk Evaluation Model on Enterprises' Complex Information System: A Study Based on the BP Neural Network. 99-106 - Fang Yao, Wenyong Wang, Shaochun Zhong, Ye Tian, Yang Chang, Runtao Gong:
Construction and Visualization of Wheat Roots Model Based on Artificial Life. 107-114 - Qiang Zhao, Danyan Chen:
The Research on Power SCADA Based on J2EE Framework and IEC 61970. 115-122 - Wenyu Chen, Xiaobin Wang, Xiaoou Cheng, Shixin Sun:
Turing Compute Model for Non-negative Binary Numbers. 123-130
Volume 5, Number 2, February 2010
- Hyunseung Choo, Sang-goo Lee, Katsumi Tanaka, Chin-Chen Chang:
Guest Editorial. 131-132 - Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Brandon Unger, Baihua Zheng:
Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments. 133-145 - Akiko Hino, Katsumi Tanaka:
Small Knowledge Canvas: Software for Managing Fragmental Knowledge. 146-153 - Katsumi Tanaka, Satoshi Nakamura, Hiroaki Ohshima, Yusuke Yamamoto, Yusuke Yanbe, Makoto P. Kato:
Improving Search and Information Credibility Analysis from Interaction between Web1.0 and Web2.0 Content. 154-159 - Hyunja Lee, Junho Shim:
Pivoted Table Index for Querying Product-Property-Value Information. 160-167 - Akira Takahashi, Masashi Tatedoko, Toshiyuki Shimizu, Hiroko Kinutani, Masatoshi Yoshikawa:
Metadata Management for Integration and Analysis of Earth Observation Data. 168-178 - Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee:
PicAChoo: A Text Analysis Tool for Customizable Feature Selection with Dynamic Composition of Primitive Methods. 179-186 - Myungha Jang, Joyce Jiyoung Whang, Coleen S. Lewis, Hyun Seok Park:
An Interpretation of Biological Metabolites and their Reactions Based on Relation Degree of Compound Pairs in KEGG XML Files. 187-194 - Hiroaki Ohshima, Katsumi Tanaka:
High-speed Detection of Ontological Knowledge and Bi-directional Lexico-Syntactic Patterns from the Web. 195-205 - Dingding Li, Hai Jin, Yingzhe Shao, Xiaofei Liao, Zongfen Han, Kai Chen:
A High-Performance Inter-Domain Data Transferring System for Virtual Machines. 206-213 - Chia-Chen Lin, Pei-Feng Shiu:
DCT-based Reversible Data Hiding Scheme. 214-224 - Xiangfeng Luo, Jun Zhang, Fangfang Liu, Yi Du, Zhian Yu, Weimin Xu:
Merging Textual Knowledge Represented by Element Fuzzy Cognitive Maps. 225-234
- Xiangquan Gui, Yuanping Zhang, Xiaohong Hao:
An almost Linear I/O Algorithm for Skyline Query. 235-242 - Xianmin Wang, Ruiqing Niu:
Lithology Intelligent Analysis in Three Gorges Based on Remote Sensing Image. 243-250 - Hai Guo, Jing-ying Zhao:
A Chinese Minority Script Recognition Method Based on Wavelet Feature and Modified KNN. 251-258
Volume 5, Number 3, March 2010
- Yasunori Shiono, Zhongli Kuang, Yoshitaka Nakagawa, Takaaki Goto, Kensei Tsuchida:
Cooperative Software Development and Usability Evaluation: A Web-based Work Management System for Construction Sites. 259-268 - Ye Li, Yan Chen:
A Genetic Algorithm for Job-Shop Scheduling. 269-274 - Guiwu Wei, Rui Lin:
Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information. 275-279 - Yu Zhang, Shenghui Wang, Ke Xiong, Zhengding Qiu, Dongmei Sun:
DPCM Compression for Real-Time Logging While Drilling Data. 280-287 - Jin Gou, Zhiqiang Zhao, Weibin Chen, Wei Luo:
N-D Normal Membership Cloud Model Based on Region Partition. 288-295 - Zichang Shangguan, Shouju Li, Wei Sun, Maotian Luan:
Estimating Model Parameters of Conditioned Soils by using Artificial Network. 296-303 - Shang Gao, Zaiyue Zhang, Cungen Cao:
Calculating Weights Methods in Complete Matrices and Incomplete Matrices. 304-311 - Guoqiang Zhang, Suling Jia, Qiang Wang:
Construct Ontology-based Enterprise Information Metadata Framework. 312-319 - Haipeng Chen, Xuanjing Shen, Yingda Lv:
A New Digital Signature Algorithm Similar to ELGamal Type. 320-327 - Sheng Sun, Yuanzhen Wang:
Research and Application of an improved Support Vector Clustering Algorithm on Anomaly Detection. 328-335 - Hui Chen, Chen Li:
Data Association Approach for Two Dimensional Tracking Based on Bearing-Only Measurements in Clutter Environment. 336-343 - Jianqi Zhu, Yanheng Liu, Ke-xin Yin:
A Novel Planar IPPCT Tree Structure and Characteristics Analysis. 344-351
Volume 5, Number 4, April 2010
- Huawang Shi, Wanqing Li:
Evolving Artificial Neural Networks Using Simulated Annealing-based Hybrid Genetic Algorithms. 353-360 - Junfeng Man, Lu-Ming Yang, Lanjun Wan Man, Xiangbing Wen:
Research on Online Monitoring and Analyzing of Interactive Behavior of Distributed Software. 361-368 - Weihui Dai, Dan Yu, Yue Yu:
Research on Knowledge-Based Optimization Model for Top Management Team. 369-377 - Jie Zhao, Peiquan Jin:
Conceptual Modeling for Competitive Intelligence Hiding in the Internet. 378-386 - Linlan Liu, Jun Li, Jian Shu, Zhenhua Wu, Yebin Chen:
CCI-Based Link Quality Estimation Mechanism for Wireless Sensor Networks under Perceive Packet Loss. 387-395 - JianHong Ye, Wen Song:
Transformation of BPMN Diagrams to YAWL Nets. 396-404 - Dunlu Peng, Qingkui Chen, Huan Huo:
A Fuzzy Partial Ordering Approach for QoS-based Selection of Web Services. 405-412 - Xiang-wei Zhu:
Research of Blind Watermark Detection Algorithm Based on Generalized Gaussian Distribution. 413-420 - Jun He, Zhi-bin Li, Hai-feng Qian:
Cryptography based on Spatiotemporal Chaos System and Multiple Maps. 421-428 - Haiyan Yu, Jiu-Lun Fan:
A Blind Watermarking Using Orthogonal Finite Ridgelet Transform and Fuzzy C-Means. 429-436 - Shanchao Yang, Zhiqiang Yao:
A Data Hiding Scheme based on Local Coordinate System for 3D Triangle Mesh Models. 437-446 - Zhi-hang Tang:
A Novel Extension Data Mining Approach based on Rough Sets Pair Analysis. 447-454
Volume 5, Number 5, May 2010
- Fei Yu, Chin-Chen Chang, Jian Shu, Guiping Liao, Guangxue Yue:
Guest Editorial. 455-457 - Zhiming Cui, Guangming Zhang:
A Novel Medical Image Dynamic Fuzzy Classification Model Based on Ridgelet Transform. 458-465 - Wei-Chih Chen, Jyh-Horng Jeng:
The Generalization of WOSF and Corresponding Outputs. 466-473 - Chu-Jiao Wang, Shi-Xiong Xia:
Application of Probabilistic Causal-effect Model based Artificial Fish-Swarm Algorithm for Fault Diagnosis in Mine Hoist. 474-481 - Xiaoyan Zhang, Ting Wang:
Topic Tracking with Dynamic Topic Model and Topic-based Weighting Method. 482-489 - Shixi Fan, Xuan Wang, Xiaolong Wang:
A Novel Probabilistic Model for Dependency Parsing. 490-497 - Changbing Jiang:
Integrating the Use of Spreadsheet Software and VBA in Inventory Simulation. 498-505 - Qingzhong Li, Yanhui Ding, An Feng, Yongquan Dong:
A Novel Method for Extracting Information from Web Pages with Multiple Presentation Templates. 506-513 - Yong-Zhong He, Zhen Han, Huirong Fu, Guangzhi Qu:
The Formal Model of DBMS Enforcing Multiple Security Polices. 514-521 - Guoqiang Zhang, Suling Jia, Qiang Wang, Qi Liu:
REA-based Enterprise Business Domain Ontology Construction. 522-529 - Lin Yao, Chengjie Sun, Xiaolong Wang, Xuan Wang:
Combining Self Learning and Active Learning for Chinese Named Entity Recognition. 530-537 - Zhihong Li, Tao Zhu, Haiyan Wang:
A Study on the Influencing Factors of the Intention to Share Tacit Knowledge in the University Research Team. 538-545 - Xiaoming Meng:
Study on Combining of E-commerce and E-marketing. 546-553 - Guoxi Cui, Kecheng Liu:
Organizational Readiness Analysis for Enterprise Information Systems Implementation. 554-561
Volume 5, Number 6, 2010
- Jason C. Hung:
Foreword of Special Issue on "Information Education and Technological Application". 563-564
- Iván A. García, Carla L. Pacheco:
Constructivism in Mexican Elementary School Education: Designing a Platform for Cooperative Learning. 565-572 - Anand Paul, Yung-Chuan Jiang, Jhing-Fa Wang:
Computation Aware Scheme for Visual Signal Processing. 573-578 - Rafael Martínez-Peláez, Francisco Rico-Novella, Cristina Satizábal:
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached. 579-584 - Neil Y. Yen, Jason C. Hung, Hui-Huang Hsu, Timothy K. Shih, Louis R. Chao:
Service-Oriented Authoring System to Achieve Interoperability among E-Learning Environment. 585-592 - Chi-Chao Lu, Wen-Yuan Jen:
A Historical Review of Computer User's Illegal Behavior Based on Containment Theory. 593-599 - Jui-Chi Chang, Hsuan-Fu Wang, Fang-Biau Ueng:
Iterative Equalizer for OFDM-CDMA Multiple Access Communication Systems. 600-606 - Hsing-I Wang:
The Use of Terminological Theory Approach in the Development of Ontology Based Bilingual Terminology System on College Campus of Taiwan. 607-614 - Hsien-Wei Yang, Kuo-Feng Hwang, Shou-Shiung Chou:
Interleaving Max-Min Difference Histogram Shifting Data Hiding Method. 615-621 - Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan:
A P2P-based Three-Dimensional Virtual Environment Management and Collaborative Streaming System. 622-629 - Sherin M. Moussa, Gul A. Agha:
Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management. 630-636 - Chouyin Hsu, Minfeng Lee:
Towards the Context-oriented Model of Project Management for Virtual Enterprises. 637-643
- Ali M. Alakeel:
An Algorithm for Efficient Assertions-Based Test Data Generation. 644-653 - Asmaa Alsumait, Asma Al-Osaimi:
Usability Heuristics Evaluation for Child E-learning Applications. 654-661 - Xu Zhou, Guangxue Yue, ZhiBang Yang, Kenli Li:
A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing. 662-670 - Xiaoliang Meng, Yichun Xie, Fuling Bian:
Distributed Geospatial Analysis through Web Processing Service: A Case Study of Earthquake Disaster Assessment. 671-679
Volume 5, Number 7, 2010
- Dong Kun Noh:
Enhanced Multi-Site Hybrid Simulations Using an Internet-based Grid System for Construction and Civil Engineering Facilities. 681-688 - Surendra Kumar:
Object-Oriented Finite Element Programming for Engineering Analysis in C++. 689-696 - Zuowen Tan:
Improvement on a Threshold Authenticated Encryption Scheme. 697-704 - Jun He, Hua Zhang:
Feature Extraction in Speechreading. 705-712 - Hao Liang, Fei Ren, Wanli Zuo, Fengling He:
Ontology Based Automatic Attributes Extracting and Queries Translating for Deep Web. 713-720 - Hongzhen Xu, Guosun Zeng, Bo Chen:
Description and Verification of Dynamic Software Architectures for Distributed Systems. 721-728 - Min Gao, Zhongfu Wu:
Incorporating Personalized Contextual Information in Item-based Collaborative Filtering Recommendation. 729-736 - Huawang Shi, Wanqing Li:
Integration of Fuzzy Logic, Particle Swarm Optimization and Neural Networks in Quality Assessment of Construction Project. 737-744 - Songjie Gong:
A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering. 745-752 - Shihua Wang, Jianliang Ai, Weihui Dai, Yuanwei Li:
Robust Model for the Design of Controller in Saucer UAV. 753-760 - Changbing Jiang:
A Reliable Solver of Euclidean Traveling Salesman Problems with Microsoft Excel Add-in Tools for Small-size Systems. 761-768 - Jian Wu, Yuanfeng Yang, Sheng-Rong Gong, Zhiming Cui:
A New Quadtree-based Terrain LOD Algorithm. 769-776 - Chih-Ming Kung, Shu-Tsung Chao:
Support Vector Machine for Fast Fractal Image Compression Base on Structure Similarity. 777-784 - Weihui Dai, Yue Yu, Yonghui Dai, Bin Deng:
Text Steganography System Using Markov Chain Source Model and DES Algorithm. 785-792 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:
Quantitative Analysis of System Based on Extended UML State Diagrams and Probabilistic Model Checking. 793-800
Volume 5, Number 8, 2010
- Ian R. Greenshields:
Guest Editorial. 801
- Angela Hsiang-Ling Chen, Chiuh-Cheng Chyu:
Applying Memetic Algorithm in Multi-Objective Resource Allocation among Competing Projects. 802-809 - Hao Zhang, Zhijing Liu, Haiyong Zhao:
Automated Classification of Two Persons' Interactive Activities. 810-817 - Hao Zhang, Zhijing Liu, Haiyong Zhao, Guojian Cheng:
Recognizing Human Activities by Key Frame in Video Sequences. 818-825 - Jie Zhao, Peiquan Jin, Yanhong Liu:
Business Relations in the Web: Semantics and a Case Study. 826-833 - Hongchun Sun:
A New Type Algorithm for the Generalized Linear Complementarity Problem Over a Polyhedral Cone In Engineering and Equilibrium Modeling. 834-841 - Jianjun Yuan, Changjun Jiang, Zuowen Jiang:
Progressive Ranking and Composition of Web Services with Interaction Relationship. 842-850 - Fugui Chen, Baojian Zhang, Linfeng Bai:
Design and Realization of Case-indexing Model Based on AHP. 851-857 - Tao Zhang, Dong Yuxi, Zhang Wen:
AVS-P3: Algorithm and Implementation. 858-865
- Hardeep Singh, Rupinder Singh:
On Formal Models and Deriving Metrics for Service-Oriented Architecture. 866-871 - Salvatore Distefano, Antonio Puliafito, Marco Scarpa:
Implementation of the Software Performance Engineering Development Process. 872-882 - Qing Wu, Chunbo Zhao, Ying Li:
Analysis and Verification of Component Behavior Equivalence for ScudWare Middleware in Ubiquitous Computing Environments. 883-890 - Min Liu:
Optimization of an Indicator System for Measuring E-commerce Development: A Further Study at Firm Level. 891-898 - Yafeng Zheng, Qiaorong Zhang, Zhao Zhang:
Damped Newton based Iterative Non-negative Matrix Factorization for Intelligent Wood Defects Detection. 899-906 - Qingsheng Zhu, Yanxia Wang, Huijun Liu:
Auto-Corner Detection Based on the Eigenvalues Product of Covariance Matrices over Multi-Regions of Support. 907-914 - Liyi Zhang, Si Zhou, Zhefeng Sun:
A Mediator-Based Approach for Process Mediation of Web Services. 915-922
Volume 5, Number 9, 2010
- Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Naiping Hu:
Guest Editorial. 923-925
- Xixu Fu, Hui Wei:
Cognition Inspired Object Oriented Knowledge Warehouse Architecture. 926-933 - De-xin Gao, Jingjing Wang:
An Approximate Optimal Damping Control Method for Nonlinear Time-delay Systems with Disturbances. 934-941 - Bo Meng, Zimao Li, Jun Qin:
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme. 942-949 - Yan Gao, Jilin Yang, Weifeng Du:
The Topological Properties of the Approximation Operators on A CCD Lattice. 950-957 - Pengliu Tan, Jian Shu, Zhenhua Wu:
A Hybrid Real-Time Scheduling Approach on Multi-Core Architectures. 958-965 - Ahmed Ali, Kenji Terada:
A General Framework for Multi-Human Tracking. 966-973 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:
Performance Analysis of System Model Based on UML State Diagrams and Continuous-time Markov Chains. 974-981 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Caizhu Yu:
An Approach to Analyzing User Preference based Dynamic Service Composition. 982-989 - Liqiong Chen, Guisheng Fan, Yunxiang Liu:
An Approach to Formally Modeling and Verifying Distributed Real-time Embedded Software. 990-997
- Abdallah Alashqur:
RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases. 998-1005 - Guangming Zhang, Zhiming Cui, Jianming Chen, Jian Wu:
CT Image De-noising Model Based on Independent Component Analysis and Curvelet Transform. 1006-1013 - Xuemin Zhang, Chang Liu, Langlang Wang, Qiuhong Piao:
Effects of Violent and Non-violent Computer Video Games on Explicit and Implicit Aggression. 1014-1021 - Jie-xian Zeng, Yong-Gang Zhao, Xiang Fu:
A Novel Shape Representation and Retrieval Algorithm: Distance Autocorrelogram. 1022-1029 - Rongsheng Dong, Zhao Wei, Xiangyu Luo, Fang Liu:
Testing Conformance of BPEL Business Process Based on Model Checking. 1030-1037 - Jinwei Li, Guiping Liao, Xiaojuan Yu, Zhao Tong:
Plumpness Recognition and Quantification of Rapeseeds using Computer Vision. 1038-1047
Volume 5, Number 10, 2010
- Feng Gao, Bin Wang, Deyun Yang, Junhu Zhang, Shifei Ding:
Guest Editorial. 1049-1051
- Yanzhong Jin, Xiaoyuan Bao:
An Efficient XML Index for Keyword Query with Semantic Path in Database. 1052-1059 - Jinhe Wang, Jing Zhao, Bing Yan:
Realtime & Embedded System Testing for Biomedical Applications. 1060-1067 - Hui-Jian Han, Caiming Zhang:
Color Map and Polynomial Coefficient Map Mapping. 1068-1076 - Jianli Dong, Ningguo Shi:
A Study on Framework and Realizing Mechanism of ISEE Based on Product Line. 1077-1083 - Jing Zhang, XinGuang Li:
Cross-platform Transplant of Embedded Smart Devices. 1084-1090 - Hong Yang, Rong Chen, Yaqing Liu:
A Metrics Method for Software Architecture Adaptability. 1091-1098 - Qing Yin, Fei Huang, Liehui Jiang:
ARM Static Library Identification Framework. 1099-1106 - Meng Lan, Ting-rong Xu, Ling Peng:
Solving Flexible Multi-objective JSP Problem Using A Improved Genetic Algorithm. 1107-1113 - Cheng-Gang Wang, Zi-zhen Wang:
Design and Implementation of Safety Expert Information Management System of Coal Mine Based on Fault Tree. 1114-1120 - Ling Peng, Ting-rong Xu, Meng Lan:
A New Community Division based on Coring Graph Clustering. 1121-1127
- Imtiaz Ahmad, Muhammad K. Dhodhi, Ishfaq Ahmad:
Multiprocessor Scheduling by Simulated Evolution. 1128-1136 - Huan-Chao Keh, Ding-An Chiang, Chih-Cheng Hsu, Hui-Hua Huang:
The Chinese Text Categorization System with Category Priorities. 1137-1143 - Neeraj Suri, Purnendu Sinha:
A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation. 1144-1161 - Irfan Syamsuddin, Junseok Hwang:
The Use of AHP in Security Policy Decision Making: An Open Office Calc Application. 1162-1169 - Imane Boussebough, Ramdane Maamri, Zaïdi Sahnoun:
Adaptive Multi-agent System: cooperation and structures emergence. 1170-1177
Volume 5, Number 11, 2010
- Shang Gao, Zaiyue Zhang, Cungen Cao:
A Novel Ant Colony Genetic Hybrid Algorithm. 1179-1186 - Luning Xie, Pengzhu Zhang:
Idea Management System for Team Creation. 1187-1194 - Limin Wang, Xuebai Zang, Peijuan Xu:
Induction of a Novel Hybrid Decision Forest Model based on Information Theory. 1195-1199 - Xiang Li, Xuan Zhan:
A New EPMA Image Fusion Algorithm based on Contourlet-lifting Wavelet Transform and Regional Variance. 1200-1207 - Zhigang Ji:
The Research on Modeling Document Summarization for Audio-Based Knowledge Management. 1208-1215 - Malin Song:
Analysis of the Operating Efficiency of Online Game Industry in China Actualized by DEA. 1216-1223 - Li-ying Wang, Wei-guo Zhao, Jian-xi Wang:
Application Research on Load Allocation of Hydraulic Unit based on Multi-objective Optimized Methods. 1224-1227 - Wen Long:
Research on Development Method of MES Based on Component and Driven by Ontology. 1228-1235 - Zhi-Hua Hu, Bin Yang, You-Fang Huang, Yan-Ping Meng:
Visualization Framework for Container Supply Chain by Information Acquisition and Presentation Technologies. 1236-1242 - Dongsheng Liu:
Improved Genetic Algorithm Based on Simulated Annealing and Quantum Computing Strategy for Mining Association Rules. 1243-1249 - Aimin Yang, Chunfeng Liu, Jincai Chang, Xiaoqiang Guo:
Research on Parallel LU Decomposition Method and It's Application in Circle Transportation. 1250-1255 - Yuanzhi Wang, Liwei Chen, Fei Zhang, Shanhe Jiang, Lijuan Sun:
Analysis and Study of Embedded Capability to HSBH by SPA. 1256-1261 - Chaoqun Li, Hongwei Li:
A Survey of Distance Metrics for Nominal Attributes. 1262-1269 - Ahmed S. Ghiduk:
Using Dominance for Aiding the Search-Based Testing to Overcome the Limitations of the Control-Dependencies. 1270-1278 - Elhillali Kerkouche, Allaoua Chaoui, El-Bay Bourennane, Ouassila Labbani:
On the Use of Graph Transformation in the Modeling and Verification of Dynamic Behavior in UML Models. 1279-1291 - Chengying Mao:
Control Flow Complexity Metrics for Petri Net-based Web Service Composition. 1292-1299 - Shibin Su, Zhengbing Hu:
Conflict Analysis between Information Sharing and Webpage Propriety in Webpage of EC: Evident from China. 1300-1305 - Jiabin Deng, Juanli Hu, Anthony Chak Ming Liu:
Virtualization, Application Streaming & Private Cloud Computing In a Training Laboratory. 1306-1313
Volume 5, Number 12, 2010
- Deng-Yiv Chiu, Chen-Shu Wang, Wen-Chih Chang:
Guest Editorial. 1315-1316
- Wen-Jen Yu, Shrane Koung Chou:
A Bibliometric Study of Search Engine Literature in the SSCI Database. 1317-1322 - Chi-Chung Lee:
Maximizing Read Accuracy by Using Genetic Algorithms to Locate RFID Reader Antennas at the Portals. 1323-1326 - Yung-Ping Fang, I-Hsien Ting:
Applying Reinforcement Learning for the AI in a Tank-Battle Game. 1327-1333 - Deng-Yiv Chiu, Chi-Chung Lee, Ya-Chen Pan:
An Automated Error Detection for News Webpages of Chinese Portal. 1334-1341 - Da-Jinn Wang, Chao-Ho Chen, Chien-Tsung Lee:
People Recognition for Entering and Leaving a Video Surveillance Area. 1342-1348 - Deng-Yiv Chiu, Chen-Shu Wang, Tien-Tsun Chung:
Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach. 1349-1354 - Chih-Kun Ke, Mei-Yu Wu:
Adaptive Support for Student Learning in an e-Portfolio Platform by Knowledge Discovery and Case-based Reasoning. 1355-1362 - Wen-Chih Chang, Te-Hua Wang, Mao-Fan Li:
Learning Ability Clustering in Collaborative Learning. 1363-1370 - Hui-Huang Hsu, Cheng-Wei Hsieh:
Feature Selection via Correlation Coefficient Clustering. 1371-1377 - Ming-Hsiung Ying, Shao-Hsuan Huang, Luen-Ruei Wu:
An Item Selection Strategy Based on Association Rules and Genetic Algorithms. 1378-1383
- Cobra Rahmani, Azad H. Azadmanesh, Lotfi Najjar:
A Comparative Analysis of Open Source Software Reliability. 1384-1394 - Xin Lin, Huiping Yuan, Yabo Luo:
Tactics, Algorithm and Experiences in Schedule Optimization for CNC Resources Grid. 1395-1401 - Junwu Zhu, Yi Jiang, Bin Li:
On Formal Representation of Procedure Knowledge and its Application to Interactive Electronic technology Manual. 1402-1408 - Deng Wei, Neng Wang:
Research on Hybrid Assessment Algorithm based on Local Search for Risk Management in Virtual Enterprise. 1409-1416 - Qing Wu, Chunbo Zhao:
Component Dynamic Behavioral Compatibility Analysis of ScudWare Middleware for Ubiquitous Computing. 1417-1424 - Rui Xu, Fengsheng Hou:
Integrating LCA and LCC Study of FGD System at a Thermal Power Plant in China. 1425-1433 - Xuemin Zhang, Bin Yang:
Effects of Action Video Game on Spatial Attention Distribution in Low and High Perceptual Load Task. 1434-1441 - Mingli Zhang, Qingmin Kong:
The Role of Sex Types in Relationship Benefits Management: Based on Data Mining. 1442-1449
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.