


default search action
Journal of Software, Volume 5
Volume 5, Number 1, January 2010
- Qihai Zhou, Qiang Liu:

Guest Editorial. 1-2 - Qihai Zhou, Yan Li:

New Algorithm for Indefinite Multi-objective Decision Making Based on Multiple-valued Intuitive Fuzzy Set Theory. 3-10 - Junjie Wu, Xiaohui Pan, Xuejun Yang:

Software Prepromotion for Non-Uniform Cache Architecture. 11-19 - Zhiming Xu, Yu Wang, Jingguo Zhu:

A Reliable Multicast Routing Protocol for High-speed Mobile Ad Hoc Networks: R-ODMRP. 20-27 - Genyuan Du, Fang Miao, Shengli Tian, Xi-rong Guo:

Remote Sensing Image Sequence Segmentation Based on the Modified Fuzzy C-means. 28-35 - Xin Qi, Jianjian Chen:

Multi-Agent Coalition Formation Tactic Based on Grid. 36-43 - Xiangwei Qi, Yusup Abaydulla:

The study of mathematical expression recognition and the embedded system design. 44-53 - Jubiao Yao, Keyu Jiang, Chaoyi Yao:

Analysis of LPG Engine PID Parameter Control of Transient Air-fuel Ration Based on Improved Elman Neural Network. 54-64 - Jing Qin

, Huawei Zhao:
k out of n Oblivious Transfer Protocols from Bilinear Pairings. 65-72 - Hongjian Liu, Defeng Guo, Quan Zhou, Kenji Nagamatsu, Qinghua Sun:

A Pre-Identification Method for Chinese Named Entity Recognition. 73-80 - Lin Yang, Wei Sun, Chi-long Zhao, Honglei Tu:

On Practice of Big Software Designing. 81-88 - Hao Liang, Wanli Zuo, Fei Ren:

Describing the Semantic Relation of the Deep Web Query Interfaces Using Ontology Extended LAV. 89-98 - Huanchun Yang:

Risk Evaluation Model on Enterprises' Complex Information System: A Study Based on the BP Neural Network. 99-106 - Fang Yao, Wenyong Wang, Shaochun Zhong, Ye Tian, Yang Chang, Runtao Gong:

Construction and Visualization of Wheat Roots Model Based on Artificial Life. 107-114 - Qiang Zhao, Danyan Chen:

The Research on Power SCADA Based on J2EE Framework and IEC 61970. 115-122 - Wenyu Chen, Xiaobin Wang, Xiaoou Cheng, Shixin Sun:

Turing Compute Model for Non-negative Binary Numbers. 123-130
Volume 5, Number 2, February 2010
- Hyunseung Choo, Sang-goo Lee, Katsumi Tanaka, Chin-Chen Chang:

Guest Editorial. 131-132 - Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong

, Brandon Unger, Baihua Zheng
:
Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments. 133-145 - Akiko Hino, Katsumi Tanaka:

Small Knowledge Canvas: Software for Managing Fragmental Knowledge. 146-153 - Katsumi Tanaka, Satoshi Nakamura

, Hiroaki Ohshima
, Yusuke Yamamoto
, Yusuke Yanbe, Makoto P. Kato:
Improving Search and Information Credibility Analysis from Interaction between Web1.0 and Web2.0 Content. 154-159 - Hyunja Lee, Junho Shim

:
Pivoted Table Index for Querying Product-Property-Value Information. 160-167 - Akira Takahashi, Masashi Tatedoko, Toshiyuki Shimizu, Hiroko Kinutani, Masatoshi Yoshikawa:

Metadata Management for Integration and Analysis of Earth Observation Data. 168-178 - Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee:

PicAChoo: A Text Analysis Tool for Customizable Feature Selection with Dynamic Composition of Primitive Methods. 179-186 - Myungha Jang, Joyce Jiyoung Whang, Coleen S. Lewis, Hyun Seok Park:

An Interpretation of Biological Metabolites and their Reactions Based on Relation Degree of Compound Pairs in KEGG XML Files. 187-194 - Hiroaki Ohshima

, Katsumi Tanaka:
High-speed Detection of Ontological Knowledge and Bi-directional Lexico-Syntactic Patterns from the Web. 195-205 - Dingding Li, Hai Jin, Yingzhe Shao, Xiaofei Liao, Zongfen Han, Kai Chen:

A High-Performance Inter-Domain Data Transferring System for Virtual Machines. 206-213 - Chia-Chen Lin

, Pei-Feng Shiu:
DCT-based Reversible Data Hiding Scheme. 214-224 - Xiangfeng Luo, Jun Zhang, Fangfang Liu

, Yi Du, Zhian Yu, Weimin Xu:
Merging Textual Knowledge Represented by Element Fuzzy Cognitive Maps. 225-234
- Xiangquan Gui, Yuanping Zhang, Xiaohong Hao:

An almost Linear I/O Algorithm for Skyline Query. 235-242 - Xianmin Wang, Ruiqing Niu:

Lithology Intelligent Analysis in Three Gorges Based on Remote Sensing Image. 243-250 - Hai Guo, Jing-ying Zhao:

A Chinese Minority Script Recognition Method Based on Wavelet Feature and Modified KNN. 251-258
Volume 5, Number 3, March 2010
- Yasunori Shiono, Zhongli Kuang, Yoshitaka Nakagawa, Takaaki Goto

, Kensei Tsuchida:
Cooperative Software Development and Usability Evaluation: A Web-based Work Management System for Construction Sites. 259-268 - Ye Li, Yan Chen:

A Genetic Algorithm for Job-Shop Scheduling. 269-274 - Guiwu Wei, Rui Lin:

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information. 275-279 - Yu Zhang, Shenghui Wang, Ke Xiong, Zhengding Qiu, Dongmei Sun:

DPCM Compression for Real-Time Logging While Drilling Data. 280-287 - Jin Gou, Zhiqiang Zhao, Weibin Chen, Wei Luo:

N-D Normal Membership Cloud Model Based on Region Partition. 288-295 - Zichang Shangguan, Shouju Li, Wei Sun, Maotian Luan:

Estimating Model Parameters of Conditioned Soils by using Artificial Network. 296-303 - Shang Gao, Zaiyue Zhang, Cungen Cao:

Calculating Weights Methods in Complete Matrices and Incomplete Matrices. 304-311 - Guoqiang Zhang, Suling Jia, Qiang Wang:

Construct Ontology-based Enterprise Information Metadata Framework. 312-319 - Haipeng Chen, Xuanjing Shen, Yingda Lv:

A New Digital Signature Algorithm Similar to ELGamal Type. 320-327 - Sheng Sun, Yuanzhen Wang:

Research and Application of an improved Support Vector Clustering Algorithm on Anomaly Detection. 328-335 - Hui Chen, Chen Li:

Data Association Approach for Two Dimensional Tracking Based on Bearing-Only Measurements in Clutter Environment. 336-343 - Jianqi Zhu, Yanheng Liu, Ke-xin Yin:

A Novel Planar IPPCT Tree Structure and Characteristics Analysis. 344-351
Volume 5, Number 4, April 2010
- Huawang Shi, Wanqing Li:

Evolving Artificial Neural Networks Using Simulated Annealing-based Hybrid Genetic Algorithms. 353-360 - Junfeng Man, Lu-Ming Yang, Lanjun Wan Man, Xiangbing Wen:

Research on Online Monitoring and Analyzing of Interactive Behavior of Distributed Software. 361-368 - Weihui Dai

, Dan Yu, Yue Yu:
Research on Knowledge-Based Optimization Model for Top Management Team. 369-377 - Jie Zhao, Peiquan Jin:

Conceptual Modeling for Competitive Intelligence Hiding in the Internet. 378-386 - Linlan Liu, Jun Li, Jian Shu, Zhenhua Wu, Yebin Chen:

CCI-Based Link Quality Estimation Mechanism for Wireless Sensor Networks under Perceive Packet Loss. 387-395 - JianHong Ye, Wen Song:

Transformation of BPMN Diagrams to YAWL Nets. 396-404 - Dunlu Peng, Qingkui Chen, Huan Huo:

A Fuzzy Partial Ordering Approach for QoS-based Selection of Web Services. 405-412 - Xiang-wei Zhu:

Research of Blind Watermark Detection Algorithm Based on Generalized Gaussian Distribution. 413-420 - Jun He, Zhi-bin Li, Hai-feng Qian:

Cryptography based on Spatiotemporal Chaos System and Multiple Maps. 421-428 - Haiyan Yu, Jiu-Lun Fan

:
A Blind Watermarking Using Orthogonal Finite Ridgelet Transform and Fuzzy C-Means. 429-436 - Shanchao Yang, Zhiqiang Yao:

A Data Hiding Scheme based on Local Coordinate System for 3D Triangle Mesh Models. 437-446 - Zhi-hang Tang:

A Novel Extension Data Mining Approach based on Rough Sets Pair Analysis. 447-454
Volume 5, Number 5, May 2010
- Fei Yu, Chin-Chen Chang, Jian Shu, Guiping Liao, Guangxue Yue:

Guest Editorial. 455-457 - Zhiming Cui, Guangming Zhang:

A Novel Medical Image Dynamic Fuzzy Classification Model Based on Ridgelet Transform. 458-465 - Wei-Chih Chen, Jyh-Horng Jeng:

The Generalization of WOSF and Corresponding Outputs. 466-473 - Chu-Jiao Wang, Shi-Xiong Xia:

Application of Probabilistic Causal-effect Model based Artificial Fish-Swarm Algorithm for Fault Diagnosis in Mine Hoist. 474-481 - Xiaoyan Zhang, Ting Wang:

Topic Tracking with Dynamic Topic Model and Topic-based Weighting Method. 482-489 - Shixi Fan, Xuan Wang, Xiaolong Wang:

A Novel Probabilistic Model for Dependency Parsing. 490-497 - Changbing Jiang

:
Integrating the Use of Spreadsheet Software and VBA in Inventory Simulation. 498-505 - Qingzhong Li, Yanhui Ding, An Feng, Yongquan Dong:

A Novel Method for Extracting Information from Web Pages with Multiple Presentation Templates. 506-513 - Yong-Zhong He, Zhen Han, Huirong Fu, Guangzhi Qu:

The Formal Model of DBMS Enforcing Multiple Security Polices. 514-521 - Guoqiang Zhang, Suling Jia, Qiang Wang, Qi Liu:

REA-based Enterprise Business Domain Ontology Construction. 522-529 - Lin Yao, Chengjie Sun, Xiaolong Wang, Xuan Wang:

Combining Self Learning and Active Learning for Chinese Named Entity Recognition. 530-537 - Zhihong Li, Tao Zhu, Haiyan Wang:

A Study on the Influencing Factors of the Intention to Share Tacit Knowledge in the University Research Team. 538-545 - Xiaoming Meng:

Study on Combining of E-commerce and E-marketing. 546-553 - Guoxi Cui, Kecheng Liu:

Organizational Readiness Analysis for Enterprise Information Systems Implementation. 554-561
Volume 5, Number 6, 2010
- Jason C. Hung:

Foreword of Special Issue on "Information Education and Technological Application". 563-564
- Iván A. García, Carla L. Pacheco:

Constructivism in Mexican Elementary School Education: Designing a Platform for Cooperative Learning. 565-572 - Anand Paul

, Yung-Chuan Jiang, Jhing-Fa Wang:
Computation Aware Scheme for Visual Signal Processing. 573-578 - Rafael Martínez-Peláez

, Francisco Rico-Novella, Cristina Satizábal
:
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached. 579-584 - Neil Y. Yen, Jason C. Hung, Hui-Huang Hsu, Timothy K. Shih, Louis R. Chao:

Service-Oriented Authoring System to Achieve Interoperability among E-Learning Environment. 585-592 - Chi-Chao Lu, Wen-Yuan Jen:

A Historical Review of Computer User's Illegal Behavior Based on Containment Theory. 593-599 - Jui-Chi Chang, Hsuan-Fu Wang, Fang-Biau Ueng:

Iterative Equalizer for OFDM-CDMA Multiple Access Communication Systems. 600-606 - Hsing-I Wang:

The Use of Terminological Theory Approach in the Development of Ontology Based Bilingual Terminology System on College Campus of Taiwan. 607-614 - Hsien-Wei Yang, Kuo-Feng Hwang, Shou-Shiung Chou:

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method. 615-621 - Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan:

A P2P-based Three-Dimensional Virtual Environment Management and Collaborative Streaming System. 622-629 - Sherin M. Moussa

, Gul A. Agha:
Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management. 630-636 - Chouyin Hsu, Minfeng Lee:

Towards the Context-oriented Model of Project Management for Virtual Enterprises. 637-643
- Ali M. Alakeel:

An Algorithm for Efficient Assertions-Based Test Data Generation. 644-653 - Asmaa Alsumait, Asma Al-Osaimi:

Usability Heuristics Evaluation for Child E-learning Applications. 654-661 - Xu Zhou, Guangxue Yue, ZhiBang Yang

, Kenli Li:
A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing. 662-670 - Xiaoliang Meng

, Yichun Xie, Fuling Bian:
Distributed Geospatial Analysis through Web Processing Service: A Case Study of Earthquake Disaster Assessment. 671-679
Volume 5, Number 7, 2010
- Dong Kun Noh:

Enhanced Multi-Site Hybrid Simulations Using an Internet-based Grid System for Construction and Civil Engineering Facilities. 681-688 - Surendra Kumar

:
Object-Oriented Finite Element Programming for Engineering Analysis in C++. 689-696 - Zuowen Tan:

Improvement on a Threshold Authenticated Encryption Scheme. 697-704 - Jun He, Hua Zhang:

Feature Extraction in Speechreading. 705-712 - Hao Liang, Fei Ren, Wanli Zuo, Fengling He:

Ontology Based Automatic Attributes Extracting and Queries Translating for Deep Web. 713-720 - Hongzhen Xu, Guosun Zeng, Bo Chen:

Description and Verification of Dynamic Software Architectures for Distributed Systems. 721-728 - Min Gao

, Zhongfu Wu:
Incorporating Personalized Contextual Information in Item-based Collaborative Filtering Recommendation. 729-736 - Huawang Shi, Wanqing Li:

Integration of Fuzzy Logic, Particle Swarm Optimization and Neural Networks in Quality Assessment of Construction Project. 737-744 - Songjie Gong:

A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering. 745-752 - Shihua Wang, Jianliang Ai, Weihui Dai, Yuanwei Li:

Robust Model for the Design of Controller in Saucer UAV. 753-760 - Changbing Jiang

:
A Reliable Solver of Euclidean Traveling Salesman Problems with Microsoft Excel Add-in Tools for Small-size Systems. 761-768 - Jian Wu, Yuanfeng Yang, Sheng-Rong Gong, Zhiming Cui:

A New Quadtree-based Terrain LOD Algorithm. 769-776 - Chih-Ming Kung, Shu-Tsung Chao:

Support Vector Machine for Fast Fractal Image Compression Base on Structure Similarity. 777-784 - Weihui Dai, Yue Yu, Yonghui Dai, Bin Deng:

Text Steganography System Using Markov Chain Source Model and DES Algorithm. 785-792 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:

Quantitative Analysis of System Based on Extended UML State Diagrams and Probabilistic Model Checking. 793-800
Volume 5, Number 8, 2010
- Ian R. Greenshields:

Guest Editorial. 801
- Angela Hsiang-Ling Chen, Chiuh-Cheng Chyu:

Applying Memetic Algorithm in Multi-Objective Resource Allocation among Competing Projects. 802-809 - Hao Zhang, Zhijing Liu, Haiyong Zhao:

Automated Classification of Two Persons' Interactive Activities. 810-817 - Hao Zhang, Zhijing Liu, Haiyong Zhao, Guojian Cheng:

Recognizing Human Activities by Key Frame in Video Sequences. 818-825 - Jie Zhao, Peiquan Jin, Yanhong Liu:

Business Relations in the Web: Semantics and a Case Study. 826-833 - Hongchun Sun:

A New Type Algorithm for the Generalized Linear Complementarity Problem Over a Polyhedral Cone In Engineering and Equilibrium Modeling. 834-841 - Jianjun Yuan, Changjun Jiang, Zuowen Jiang:

Progressive Ranking and Composition of Web Services with Interaction Relationship. 842-850 - Fugui Chen, Baojian Zhang, Linfeng Bai:

Design and Realization of Case-indexing Model Based on AHP. 851-857 - Tao Zhang, Dong Yuxi, Zhang Wen:

AVS-P3: Algorithm and Implementation. 858-865
- Hardeep Singh, Rupinder Singh:

On Formal Models and Deriving Metrics for Service-Oriented Architecture. 866-871 - Salvatore Distefano

, Antonio Puliafito
, Marco Scarpa:
Implementation of the Software Performance Engineering Development Process. 872-882 - Qing Wu, Chunbo Zhao, Ying Li:

Analysis and Verification of Component Behavior Equivalence for ScudWare Middleware in Ubiquitous Computing Environments. 883-890 - Min Liu:

Optimization of an Indicator System for Measuring E-commerce Development: A Further Study at Firm Level. 891-898 - Yafeng Zheng, Qiaorong Zhang, Zhao Zhang:

Damped Newton based Iterative Non-negative Matrix Factorization for Intelligent Wood Defects Detection. 899-906 - Qingsheng Zhu, Yanxia Wang, Huijun Liu:

Auto-Corner Detection Based on the Eigenvalues Product of Covariance Matrices over Multi-Regions of Support. 907-914 - Liyi Zhang, Si Zhou, Zhefeng Sun:

A Mediator-Based Approach for Process Mediation of Web Services. 915-922
Volume 5, Number 9, 2010
- Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Naiping Hu:

Guest Editorial. 923-925
- Xixu Fu, Hui Wei:

Cognition Inspired Object Oriented Knowledge Warehouse Architecture. 926-933 - De-xin Gao, Jingjing Wang:

An Approximate Optimal Damping Control Method for Nonlinear Time-delay Systems with Disturbances. 934-941 - Bo Meng, Zimao Li, Jun Qin:

A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme. 942-949 - Yan Gao, Jilin Yang, Weifeng Du:

The Topological Properties of the Approximation Operators on A CCD Lattice. 950-957 - Pengliu Tan, Jian Shu, Zhenhua Wu:

A Hybrid Real-Time Scheduling Approach on Multi-Core Architectures. 958-965 - Ahmed Ali, Kenji Terada:

A General Framework for Multi-Human Tracking. 966-973 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:

Performance Analysis of System Model Based on UML State Diagrams and Continuous-time Markov Chains. 974-981 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Caizhu Yu:

An Approach to Analyzing User Preference based Dynamic Service Composition. 982-989 - Liqiong Chen, Guisheng Fan, Yunxiang Liu:

An Approach to Formally Modeling and Verifying Distributed Real-time Embedded Software. 990-997
- Abdallah Alashqur:

RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases. 998-1005 - Guangming Zhang, Zhiming Cui, Jianming Chen, Jian Wu:

CT Image De-noising Model Based on Independent Component Analysis and Curvelet Transform. 1006-1013 - Xuemin Zhang, Chang Liu, Langlang Wang, Qiuhong Piao:

Effects of Violent and Non-violent Computer Video Games on Explicit and Implicit Aggression. 1014-1021 - Jie-xian Zeng, Yong-Gang Zhao, Xiang Fu:

A Novel Shape Representation and Retrieval Algorithm: Distance Autocorrelogram. 1022-1029 - Rongsheng Dong, Zhao Wei, Xiangyu Luo, Fang Liu:

Testing Conformance of BPEL Business Process Based on Model Checking. 1030-1037 - Jinwei Li, Guiping Liao, Xiaojuan Yu, Zhao Tong:

Plumpness Recognition and Quantification of Rapeseeds using Computer Vision. 1038-1047
Volume 5, Number 10, 2010
- Feng Gao, Bin Wang, Deyun Yang, Junhu Zhang, Shifei Ding:

Guest Editorial. 1049-1051
- Yanzhong Jin, Xiaoyuan Bao:

An Efficient XML Index for Keyword Query with Semantic Path in Database. 1052-1059 - Jinhe Wang, Jing Zhao, Bing Yan:

Realtime & Embedded System Testing for Biomedical Applications. 1060-1067 - Hui-Jian Han

, Caiming Zhang:
Color Map and Polynomial Coefficient Map Mapping. 1068-1076 - Jianli Dong, Ningguo Shi:

A Study on Framework and Realizing Mechanism of ISEE Based on Product Line. 1077-1083 - Jing Zhang, XinGuang Li:

Cross-platform Transplant of Embedded Smart Devices. 1084-1090 - Hong Yang, Rong Chen, Yaqing Liu:

A Metrics Method for Software Architecture Adaptability. 1091-1098 - Qing Yin, Fei Huang, Liehui Jiang:

ARM Static Library Identification Framework. 1099-1106 - Meng Lan, Ting-rong Xu, Ling Peng:

Solving Flexible Multi-objective JSP Problem Using A Improved Genetic Algorithm. 1107-1113 - Cheng-Gang Wang, Zi-zhen Wang:

Design and Implementation of Safety Expert Information Management System of Coal Mine Based on Fault Tree. 1114-1120 - Ling Peng, Ting-rong Xu, Meng Lan:

A New Community Division based on Coring Graph Clustering. 1121-1127
- Imtiaz Ahmad, Muhammad K. Dhodhi, Ishfaq Ahmad:

Multiprocessor Scheduling by Simulated Evolution. 1128-1136 - Huan-Chao Keh, Ding-An Chiang, Chih-Cheng Hsu, Hui-Hua Huang:

The Chinese Text Categorization System with Category Priorities. 1137-1143 - Neeraj Suri

, Purnendu Sinha:
A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation. 1144-1161 - Irfan Syamsuddin

, Junseok Hwang:
The Use of AHP in Security Policy Decision Making: An Open Office Calc Application. 1162-1169 - Imane Boussebough

, Ramdane Maamri
, Zaïdi Sahnoun:
Adaptive Multi-agent System: cooperation and structures emergence. 1170-1177
Volume 5, Number 11, 2010
- Shang Gao, Zaiyue Zhang, Cungen Cao:

A Novel Ant Colony Genetic Hybrid Algorithm. 1179-1186 - Luning Xie, Pengzhu Zhang:

Idea Management System for Team Creation. 1187-1194 - Limin Wang, Xuebai Zang, Peijuan Xu:

Induction of a Novel Hybrid Decision Forest Model based on Information Theory. 1195-1199 - Xiang Li, Xuan Zhan:

A New EPMA Image Fusion Algorithm based on Contourlet-lifting Wavelet Transform and Regional Variance. 1200-1207 - Zhigang Ji:

The Research on Modeling Document Summarization for Audio-Based Knowledge Management. 1208-1215 - Malin Song:

Analysis of the Operating Efficiency of Online Game Industry in China Actualized by DEA. 1216-1223 - Liying Wang, Weiguo Zhao

, Jian-xi Wang:
Application Research on Load Allocation of Hydraulic Unit based on Multi-objective Optimized Methods. 1224-1227 - Wen Long:

Research on Development Method of MES Based on Component and Driven by Ontology. 1228-1235 - Zhi-Hua Hu

, Bin Yang, You-Fang Huang, Yan-Ping Meng:
Visualization Framework for Container Supply Chain by Information Acquisition and Presentation Technologies. 1236-1242 - Dongsheng Liu:

Improved Genetic Algorithm Based on Simulated Annealing and Quantum Computing Strategy for Mining Association Rules. 1243-1249 - Aimin Yang, Chunfeng Liu, Jincai Chang, Xiaoqiang Guo:

Research on Parallel LU Decomposition Method and It's Application in Circle Transportation. 1250-1255 - Yuanzhi Wang, Liwei Chen, Fei Zhang, Shanhe Jiang, Lijuan Sun:

Analysis and Study of Embedded Capability to HSBH by SPA. 1256-1261 - Chaoqun Li, Hongwei Li:

A Survey of Distance Metrics for Nominal Attributes. 1262-1269 - Ahmed S. Ghiduk

:
Using Dominance for Aiding the Search-Based Testing to Overcome the Limitations of the Control-Dependencies. 1270-1278 - Elhillali Kerkouche, Allaoua Chaoui

, El-Bay Bourennane, Ouassila Labbani:
On the Use of Graph Transformation in the Modeling and Verification of Dynamic Behavior in UML Models. 1279-1291 - Chengying Mao

:
Control Flow Complexity Metrics for Petri Net-based Web Service Composition. 1292-1299 - Shibin Su, Zhengbing Hu

:
Conflict Analysis between Information Sharing and Webpage Propriety in Webpage of EC: Evident from China. 1300-1305 - Jiabin Deng, Juanli Hu, Anthony Chak Ming Liu:

Virtualization, Application Streaming & Private Cloud Computing In a Training Laboratory. 1306-1313
Volume 5, Number 12, 2010
- Deng-Yiv Chiu, Chen-Shu Wang, Wen-Chih Chang:

Guest Editorial. 1315-1316
- Wen-Jen Yu, Shrane Koung Chou:

A Bibliometric Study of Search Engine Literature in the SSCI Database. 1317-1322 - Chi-Chung Lee:

Maximizing Read Accuracy by Using Genetic Algorithms to Locate RFID Reader Antennas at the Portals. 1323-1326 - Yung-Ping Fang, I-Hsien Ting:

Applying Reinforcement Learning for the AI in a Tank-Battle Game. 1327-1333 - Deng-Yiv Chiu, Chi-Chung Lee, Ya-Chen Pan:

An Automated Error Detection for News Webpages of Chinese Portal. 1334-1341 - Da-Jinn Wang, Chao-Ho Chen, Chien-Tsung Lee:

People Recognition for Entering and Leaving a Video Surveillance Area. 1342-1348 - Deng-Yiv Chiu, Chen-Shu Wang, Tien-Tsun Chung:

Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach. 1349-1354 - Chih-Kun Ke, Mei-Yu Wu:

Adaptive Support for Student Learning in an e-Portfolio Platform by Knowledge Discovery and Case-based Reasoning. 1355-1362 - Wen-Chih Chang, Te-Hua Wang, Mao-Fan Li:

Learning Ability Clustering in Collaborative Learning. 1363-1370 - Hui-Huang Hsu, Cheng-Wei Hsieh:

Feature Selection via Correlation Coefficient Clustering. 1371-1377 - Ming-Hsiung Ying, Shao-Hsuan Huang, Luen-Ruei Wu:

An Item Selection Strategy Based on Association Rules and Genetic Algorithms. 1378-1383
- Cobra Rahmani, Azad H. Azadmanesh, Lotfi Najjar:

A Comparative Analysis of Open Source Software Reliability. 1384-1394 - Xin Lin, Huiping Yuan, Yabo Luo:

Tactics, Algorithm and Experiences in Schedule Optimization for CNC Resources Grid. 1395-1401 - Junwu Zhu, Yi Jiang, Bin Li:

On Formal Representation of Procedure Knowledge and its Application to Interactive Electronic technology Manual. 1402-1408 - Deng Wei, Neng Wang:

Research on Hybrid Assessment Algorithm based on Local Search for Risk Management in Virtual Enterprise. 1409-1416 - Qing Wu, Chunbo Zhao:

Component Dynamic Behavioral Compatibility Analysis of ScudWare Middleware for Ubiquitous Computing. 1417-1424 - Rui Xu, Fengsheng Hou:

Integrating LCA and LCC Study of FGD System at a Thermal Power Plant in China. 1425-1433 - Xuemin Zhang, Bin Yang:

Effects of Action Video Game on Spatial Attention Distribution in Low and High Perceptual Load Task. 1434-1441 - Mingli Zhang, Qingmin Kong:

The Role of Sex Types in Relationship Benefits Management: Based on Data Mining. 1442-1449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














