default search action
Journal of Software, Volume 7
Volume 7, Number 1, 2012
- Mingfu Wang:
The New Algorithm for Finding the Paths based on Coding Graph. 1-8 - Jun Chu, Gui-mei Zhang:
Match Planar Curve Based on Affine Invariant. 9-16 - Kaiji Liao, Junqin Luo:
Knowledge Management in Collaborative Product Design-An Activity Theory Perspective. 17-24 - Haifeng Li, Ning Zhang, Zhixin Chen:
A Simple but Effective Maximal Frequent Itemset Mining Algorithm over Streams. 25-32 - Dan Liu, Shengchen Li, Tianchi Yang:
Competitive Business Model in Audio-book Industry: A Case of China. 33-40 - Kaiji Liao, Huihui Xiong, Donghai Ye, Chunyang Zhang:
A Method of Emergency Management based on Knowledge Element Theory. 41-48 - Dingjun Chen, Kaiteng Wu:
Research on Optimization Model and Algorithm of Initial Schedule of Intercity Passenger Trains based on Fuzzy Sets. 49-54 - Peiqiang Chen:
Software Behavior Based Trustworthiness Attestation For Computing Platform. 55-60 - Jun Zhou, Keiichi Watanuki:
Skill Ontology for Mechanical Design of Learning Contents. 61-67 - Ling Xiang, Aijun Hu:
Comparison of Methods for Different Time-frequency Analysis of Vibration Signal. 68-74 - Xinyu Duan, Weijun Chen:
Constructive Theory Foundation and Three Dimension Virtual Study Mode Application. 75-80 - Wei Chen, Ji-zheng Wu, Qing Li, PengHui Rong:
Complex Maneuverable Events Detection Based On REFNN. 81-87 - Fuqing Zhao, XinYing Li, Qiuyu Zhang, Jonrinaldi:
Polar-Radius-Invariant-Moment Based on Key-Points for Hand Gesture Shape Recognition. 88-94 - Xinwu Li:
A New Text Clustering Algorithm Based on Improved K_means. 95-101 - Ying Zhang, Xiaoming Liu, Zhixue Wang, Li Chen:
An Efficient Method for QoS-aware Service Discovery and Composition. 102-109 - Jun Hu, Yang Yu:
A Controllable Reputation BDI Model. 110-117 - Shaobo Zhong, Zhongshi He:
Application of Particle Swarm Optimization Algorithm based on Classification Strategies to Grid Task Scheduling. 118-124 - Yan Ma, Yuanyuan Liang, Mingyong Li:
A Sort of Knowledge Metadata Management Model in Semantic Grid Environment. 125-132 - Lin Du, Guorong Xiao, Daming Li:
A Novel Approach to Construct Object-Oriented System Dependence Graph and Algorithm Design. 133-140 - Ping Hu, Changsheng Wang, Baojun Li, Mingzeng Liu:
Filling Holes in Triangular Meshes in Engineering. 141-148 - Bin Li, Yan Xu, Jun Wu, Junwu Zhu:
A Petri-net and QoS Based Model for Automatic Web Service Composition. 149-155 - Nabil El-Kadhi, Karim Hadjar, Nahla El Zant:
A Mobile Agents and Artificial Neural Networks for Intrusion Detection. 156-160 - Zhiwu Wang, Yanhui Zhang:
A Novel Algorithm for Composite Service Choosing. 161-168 - Zhikun Zhao, Wei Li:
Specifying Dynamic Software Architectures with Dynamic Description Logic. 169-175 - Jui-Fa Chen, Ying-Hong Wang, Jingo Chenghorng Liao, Chen-An Wang:
Content Adaptation For Context-Aware Service. 176-185 - Antonio Juarez Alencar, Erica Castilho Grão, Eber Assis Schmitz, Alexandre L. Correa, Otavio H. Figueiredo:
Evaluating the Efficiency in which Risk is Managed in a Portfolio of IT Projects: A Data Envelopment Analysis Approach. 186-195 - Chao Shao, Yongqiang Yang:
Distance-Preserving SOM: A New Data Visualization Algorithm. 196-203 - Chengying Mao:
A Heuristic Algorithm for Bipartite Community Detection in Social Networks. 204-211 - Amir Hossein Ghapanchi, Aybüke Aurum, Farhad Daneshgar:
The Impact of Process Effectiveness on User Interest in Contributing to the Open Source Software Projects. 212-219 - Mohammad Reza Keyvanpour, Fereshteh Azizani:
Classification and Analysis of Frequent Subgraphs Mining Algorithms. 220-227 - Xinpan Yuan, Jun Long, Zuping Zhang, Yueyi Luo, Hao Zhang, Weihua Gui:
f-Fractional Bit Minwise Hashing. 228-236 - Hassan Hajjdiab, Al Shaima Taleb, Jauhar Ali:
An Industrial Case Study for Scrum Adoption. 237-242 - Yongqiang Zhang, Jing Xiao, Shengjuan Sun:
BS-GEP Algorithm for Prediction of Software Failure Series. 243-248
Volume 7, Number 2, 2012
- Jin Li:
Research on Team Orienteering Problem with Dynamic Travel Times. 249-255 - Shuqin Li, Dongming Li, Xiaohua Yuan:
Research and Implementation of Dots-and-Boxes Game System. 256-262 - Haiyan Chen, Jiandong Wang, Lirong Feng:
Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction. 263-268 - Lizhi Qin, Qingsong Li:
A New Construction of Job-Shop Scheduling System Integrating ILOG and MAS. 269-276 - Jia Chen, Zheqiong Yan, Rui Gu:
Design and Implementation of Middle Layer for DetachedCriteria Query Based on JSF and Hibernate Framework. 277-283 - LanFeng Zhou, Jian Jiang:
Navigation Approach For Lunar Rover Based On Slip Prediction. 284-289 - Jun Luo, Hengyu Li, Lei Li, Shuping Li, Shaorong Xie:
A Novel Method to Eliminate Blind Areas for Moving Double Cameras System Based on Biomimetic Eyes. 290-295 - Pengzhong Li, Weimin Zhang, Can Chen:
Prediction of Operating Loads Contribution to Assembly Relation and Product Behavior. 296-302 - Haigang Li, Deming Wang, Yong Zhang:
Knowledge-based genetic algorithms data fusion and its application in mine mixed-gas detection. 303-307 - Yanhong Qin, Guangxing Wei:
Product Configuration Flow from Obtaining Customer Requirement to Providing the Final Customized Product. 308-315 - Fachao Jiang, Molin Wang, Lin Li:
Software Design of Engine Characteristic Simulation. 316-321 - Huamao Gu, Jin-Qin Shi, Xun Wang:
Deciding the SHOQ(D)-Satisfiability with a Fully Tiered Clause Group. 322-331 - Chun-Xiang Zhang, Xue-Yao Gao, Zhimao Lu, Da-Song Sun, Yong Liu:
Phrase Alignment Based on Combination of Multiple Strategies. 332-338 - Shaomei Yang, Qian Zhu, Zhibin Liu:
Research on Application of Power System Reliability Model Based on Principal-agent Mechanism. 339-345 - Yu Bai, Wenqing Chen, Kun Xue:
Association of Signal-Controlled Method at Roundabout and Delay. 346-351 - Yan Lin, Zhiquan Feng, Bo Yang, Wei Gai, XianHui Song:
Research on State Prediction Based on Multi-Model Fusion. 352-357 - Ying Zhang, Xiaoming Liu, Zhixue Wang, Li Chen:
A Service-Oriented Method for System-of-Systems Requirements Analysis and Architecture Design. 358-365 - Ming Luo, Chun-hua Zou, Jianfeng Xu:
An Efficient Identity-based Broadcast Signcryption Scheme. 366-373 - Cristiano Barros, Mark A. J. Song:
Automatized Checking of Business Rules for Activity Execution Sequence in Workflows. 374-381 - Peng Xiao, Zhigang Hu, Xilong Qu:
Hybrid-Policy Co-allocation Model in Computational Grid. 382-388 - Faheem Ahmed:
Software Requirements Engineer: An Empirical Study about Non-Technical Skills. 389-397 - Lijun Dong, Xiaojun Kang, Maocai Wang:
How to Find a Rigorous Set of Roles for Application of RBAC. 398-407 - Karim O. Elish, Mohammad R. Alshayeb:
Using Software Quality Attributes to Classify Refactoring to Patterns. 408-419 - Xiaoyong Mei, Yiyan Fan, Changqin Huang, Xiaolin Zheng:
A Comprehensive Failure Recovery Algorithm for LRTs Based on Paired Net. 420-430 - Hang Qiu, Leiting Chen, Jim X. Chen, Yugang Liu:
Dynamic Simulation of Grass Field Swaying in Wind. 431-439 - Yong Hu, Xizhu Mo, Xiangzhou Zhang, Yuran Zeng, Jianfeng Du, Kang Xie:
Intelligent Analysis Model for Outsourced Software Project Risk Using Constraint-based Bayesian Network. 440-449 - Kátia Romero Felizardo, Stephen G. MacDonell, Emilia Mendes, José Carlos Maldonado:
A Systematic Mapping on the use of Visual Data Mining to Support the Conduct of Systematic Literature Reviews. 450-461 - Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri:
Software Productivity: Harmonization in ISO/IEEE Software Engineering Standards. 462-470 - Amir Seyed Danesh, Rodina Binti Ahmad, Mahmoud Reza Saybani, Amjed Tahir:
Companies Approaches in Software Release Planning - Based on Multiple Case Studies. 471-478 - Lasheng Yu, Mukwende Placide:
Information Decay in Building Predictive Models Using Temporal Data. 479-484 - Ziqiang Li, Yan He, Zhuojun Tian:
Overlapping Area Computation between Irregular Polygons for Its Evolutionary Layout Based on Convex Decomposition. 485-492 - Jian Hu, Jiangsheng Liu:
Research on an Indeterminacy Causal Induction Auto-Reasoning Mechanism in Expert System. 493-498
Volume 7, Number 3, 2012
- Fei Pu:
Compositional Verification of Liveness Property in Inhibitor-arc Connections of Petri Net Systems. 499-507 - Abdullah Alrefae, Eric Pardede, Binh Viet Phan:
Caching Mechanism in Peer-to-Peer Networks through Active XML. 508-515 - Andreu Carminati, Rômulo Silva de Oliveira, Luís Fernando Friedrich:
Implementation and Evaluation of the Synchronization Protocol Immediate Priority Ceiling in PREEMPT-RT Linux. 516-525 - Xiaodan Zhang:
A New Algorithm for Uncertain Problem of WEB Page Classification. 526-531 - Li Shi, Shanlin Yang, Kai Li, Ben-gong Yu:
Developing an Evaluation Approach for Software Trustworthiness Using Combination Weights and TOPSIS. 532-543 - YuQing Yan, Shixian Li, Weijun Sun:
Dependency based Technique for Identifying the Ripple Effect of Requirements Evolution. 544-550 - Yanqin Zhang, Xibei Yang:
Intuitionistic Fuzzy Dominance-based Rough Set Approach: Model and Attribute Reductions. 551-563 - Toufik Messaoud Maarouk, Djamel-Eddine Saïdouni, Mohamed Khergag:
Towards a Calculus for Distributed, Real-Time and Mobile Systems. 564-574 - Hanane Becha, Daniel Amyot:
Non-Functional Properties in Service Oriented Architecture - A Consumer's Perspective. 575-587 - Lizhen Liu, Wentao Wang, Maohong Zhang:
The Quality Assessment of Student Learning Based on Cloud Model. 588-593 - Song Zhao, Yan Xu, Hengjian Li, Heng Yang:
A Comparison of Lossless Compression Methods for Palmprint Images. 594-598 - Min Wei:
Analysis of Information Systems Applied to Evaluating Tourism Service Quality Based on Organizational Impact. 599-607 - Lichen Zhang:
Aspect-Oriented Development Method for Non-Functional Characteristics of Cyber Physical Systems Based on MDA Approach. 608-619 - Shaomei Yang, Qian Zhu, Zhibin Liu:
The Simulated Annealing Algorithm and Its Application on Resource-saving Society Construction. 620-625 - Yu Bai, Wenqing Chen, Kun Xue:
Study of the Coordinate Design Method of Urban Streets and Environment. 626-631 - LanFeng Zhou, Jian Jiang:
An Approach To Navigation For Lunar Rover Based On Virtual Reality Technology. 632-637 - Lijuan Huang, Jie Yu, Xingwang Huang:
Modeling Agricultural Logistics Distribution Center Location Based on ISM. 638-643 - Houxing Tang:
Multiple-Attribute Decision Making Based on Attribute Preference. 644-650 - Tanggong Chen, Youhua Wang, Jianwei Li:
Artificial Tribe Algorithm and Its Performance Analysis. 651-656 - Qian Zhang, Ming Li, Xuesong Wang, Yong Zhang:
Reinforcement Learning in Robot Path Optimization. 657-662 - Yonghui Wang, Xiaoyu Song, Shoujin Wang:
An Improved Base State with Amendments Spatio-Temporal Data Model. 663-669 - Xianwu Hu:
The Establishment of Supply Chain with Game Model of Competition and Cooperation. 670-677 - Jialei Tan, Yushu Xie, Tong Wang:
Fire and Explosion Hazard Prediction Base on Virtual Reality in Tank Farm. 678-682 - Lin Yan, Shuo Yan:
Granular Reasoning and Decision System's Decomposition. 683-690 - Changfeng Yuan, Guibing Pang, Wanlei Wang:
Approach of Customer Requirement Analysis Based on Requirement Element and Improved HoQ in Product Configuration Design. 691-698 - Ruliang Xiao:
Using Pattern Perspective to Model Key Business Process Performance. 699-704 - Xue-Yao Gao, Chun-Xiang Zhang, Ming-Yuan Ren, Shang-Min Gao, Yong Liu:
A New Mechanism of Naming Topological Entities for Semantic Feature Operations. 705-711 - Juan Liu, Yajun Liu, Wei Pan, Xianghong Sun, Kan Zhang:
Future Computer-aided Decision-making Support Systems: Concerning more about the Mechanism of Human Behavior. 712-717 - Zhenchao Wang, Pei Du:
Multifractal Analysis and Modeling of Chaotic Channels. 718-723
Volume 7, Number 4, 2012
- Dongye Su, Ran Chen:
Guest Editorial. 725-726 - Lijuan Zhou, Zhang Zhang:
Efficient Mining Algorithms of Finding Frequent Datasets. 727-732 - Xiao Xue, Zhe Wei, Zhifeng Zeng:
Framework of Analyzing Service-Centric Cluster Supply Chain: A Case Study of Collaborative Procurement. 733-740 - Wei Zhan, Zhi-Qing Luo:
Research of Vehicle Type Recognition System Based on Audio Video Interleaved Flow for Toll Station. 741-744 - Shih-Ming Pi, Hsiu-Li Liao, SuHoun Liu, Chen-Wen Lin:
Content Classification by folksonomies: Framework of Social Bookmarking System. 745-748 - Zheng Liu, Hua Yan, Huijian Han:
Mining Large-Scale Social Images with Rich Metadata and Its Application. 749-756 - Yong Xu, Qiqi Hu:
Unified Electronic Currency and its Software Design based on the Fourth Party Platform Integrated Payment Service. 757-764 - Wenjun Zhang:
2-Tier Cloud Architecture and Application in Electronic Health Record. 765-772 - Guoxiang Yao, Quanlong Guan, Kaibin Ni:
Test Model for Security Vulnerability in Web Controls based on Fuzzing. 773-778 - Fangzhou Liu, You Zhou:
Automatic Feature Template Generation for Prosodic Phrasing. 779-785 - Cheng-jun Chen, Yi-qi Zhou:
Virtual Reality-based Chemical Process Simulation of Pipeline System. 786-791 - Kuo-Hsiung Liao, Hao-En Chueh:
Medical Organization Information Security Management Based on ISO27001 Information Security Standard. 792-797 - Haiwang Cao, Chaogai Xue:
Optimization of Enterprise Information System based on Object-based Knowledge Mesh and Binary Tree with Maximum User Satisfaction. 798-803 - Xingyu Jiang, Xueyan Sun, Shijie Wang, Rui Wang:
Intelligent Process Quality Control System for Mass Customization. 804-809 - Wenxing Li, Liming Lian:
Multiple Faces Tracking Based on Relevance Vector Machine. 810-813 - Hanning Wang, Weixiang Xu, Chaolong Jia:
Metadata-oriented Data Model Supporting Railway Distributed System Integration. 814-822
- Lichen Zhang:
Aspect-Oriented Formal Techniques of Cyber Physical Systems. 823-834 - Kun Bai, Shaoxi Li, Tao Liu, Jing Tian:
A Novel Method for Modeling RFID Data. 835-843 - Cui Jin, Naijia Liu, Li Qi:
Research and Application of Data Archiving based on Oracle Dual Database Structure. 844-848 - Yiwen Liang, Huan Yang, Jun Fu, Chengyu Tan, Aolin Liu, Shiwen Zhu:
The Effect of Real-valued Negative Selection Algorithm on Web Server Aging Detection. 849-855