


default search action
Journal of Software, Volume 9
Volume 9, Number 1, 2014
- Wenxue Tan, Chunjiang Zhao, Huarui Wu, Xiping Wang:
An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform. 1-10 - Jianbin Ma
, Ying Li, Guifa Teng:
CWAAP: An Authorship Attribution Forensic Platform for Chinese Web Information. 11-19 - Shiliang Luo, Lianglun Cheng, Bin Ren, Quanmin Zhu:
An Improved Intelligent Ant Colony Algorithm for the Reliability Optimization Problem in Cyber-Physical Systems. 20-25 - Hong Liu, Yuanyuan Li, Hanchao Yu:
The Population-Based Optimization Algorithms for Role Modelling and Path Generation in Group Animation. 26-36 - Chaozheng Hu, Feng Shao, Gangyi Jiang, Mei Yu, Fucui Li, Zongju Peng:
Quality Assessment for Stereoscopic Images by Distortion Separation. 37-43 - Le Wang, Lin Feng, Mingfei Wu:
UDS-FIM: An Efficient Algorithm of Frequent Itemsets Mining over Uncertain Transaction Data Streams. 44-56 - Heng Li, Dan Yang, Xiaohong Zhang:
Research on Multi-Tenant Distributed Indexing for SaaS Application. 57-62 - Zhuangya Zhang, Haiguang Zhang, Yuanyuan Liu, Qingxi Hu:
Hybrid Intelligent Recommending System for Process Parameters in Differential Pressure Vacuum Casting. 63-69 - Chijun Zhang, Guanyu Mu, He Chen, Tiezheng Sun, Liyan Pang:
Distributed Service Discovery Algorithm Based on Ant Colony Algorithm. 70-75 - Marfizah Abdul Rahman, Rozilawati Razali, Dalbir Singh:
A Risk Model of Requirements Change Impact Analysis. 76-81 - Brahim Belattar, Abdelhabib Bourouis
:
Yet Another Java Based Discrete-Event Simulation Library. 82-88 - Tingrui Pei, Hongzhi Zhang, Zhetao Li, Youngjune Choi:
Survey of Community Structure Segmentation in Complex Networks. 89-93 - Zuohua Ding, Hui Zhou, Hui Shen, Qi-Wei Ge:
A Public-Key Cryptosystem Based On Stochastic Petri Net. 94-103 - Shang Gao, Ling Qiu, Cungen Cao:
Estimation of Distribution Algorithms for Knapsack Problem. 104-110 - Basem Y. Alkazemi
:
A Framework to Assess Legacy Software Systems. 111-115 - Ruifu Wang, Nannan Liu, Maojing Xu, Xiangchao Kong:
Research on the Open Source GIS Development Oriented to Marine Oil Spill Application. 116-120 - Chao Yun, Xiaomin Li:
Research on UAV Flight Dynamic Simulation Model Based on Multi-Agent. 121-128 - Jian Xu, Xuefeng Li, Yi Zhong, Hong Zhang:
Availability Modeling and Analysis of a Single-Server Virtualized System with Rejuvenation. 129-139 - Jin Li, Yedi Yang, Qunxin Zhao:
Study on Passenger Flow Simulation in Urban Subway Station Based on Anylogic. 140-146 - Zhiyu Zhou, Dichong Wu, Xiaolong Peng, Zefei Zhu, Kaikai Luo:
Object Tracking Based on Camshift with Multi-feature Fusion. 147-153 - Qingqi Pei, Jie Yu:
A Secure Dynamic Identity based Single Sign-On Authentication Protocol. 154-161 - Tiancheng Zhang, Yifang Yin
, Dejun Yue, Xirui Wang, Ge Yu:
Research and Implementation of an RFID Simulation System Supporting Trajectory Analysis. 162-168 - Xiangyou Li, Qingxiang Zhang:
Duality of Multi-objective Programming. 169-176 - Yichun Peng, Yunpeng Wang, Yi Niu, Qiwei Hu:
Application Study on Intrusion Detection System Using IRBF. 177-183 - Jiechang Wen, Suxian Zhang, Junjie Yang:
A Fast Algorithm for Undedetermined Mixing Matrix Identification Based on Mixture of Guassian (MoG) Sources Model. 184-189 - Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. 190-194 - Jianhui Yang, Wei Dou:
A new Prediction method of Gold price: EMD-PSO-SVM. 195-202 - Minguang Song, Ping Guo
:
Combining Local Binary Patterns for Scene Recognition. 203-210 - Jing Zhang:
Balanced Growth Solutions and Related Problems of Hua's Macroeconomic Model. 211-215 - Wei-Qiang Zhang, Yi-Mei Song, Jiqiang Feng:
A New Image Denoising Method Based on Wave Atoms and Cycle Spinning. 216-221 - Yuan Zhou, Hai-Lin Liu, Wenqin Chen, Jingqian Li:
A Novel Multi-objective Evolutionary Algorithm Solving Portfolio Problem. 222-229 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen
, Rongfang Bie, Xiaolei Wang, Ping Guo
, Kai Zenger:
Optimal Classification of Epileptic EEG Signals Using Neural Networks and Harmony Search Methods. 230-239 - Dongjiang Ji, Wenzhang He:
A Fractional Order Integral Approach for Reconstructing from Noisy Data. 240-245 - De-jin Kong, Xiao-ling Yao:
An Ad Hoc Network Load Balancing Energy-Efficient Multipath Routing Protocol. 246-250 - Yuhuang Zheng:
A Model-Based Fault Detection Framework for Vacuum Circuit Breaker by Trip Coil Analysis. 251-257 - Yanyang Guo, Gang Wang, Fengmei Hou, Qingling Mei:
Recent Frequent Item Mining Algorithm in a Data Stream Based on Flexible Counter Windows. 258-263
Volume 9, Number 2, 2014
- Lin Yan, Shuo Yan:
Researches on Rough Truth of Rough Axioms Based on Granular Computing. 265-273 - Hanshi Wang, Lizhen Liu, Wei Song, Jingli Lu:
Feature-based Sentiment Analysis Approach for Product Reviews. 274-279 - Changlei Dongye, Yongguo Zheng, Donghuan Jiang:
A Fast Global Minimization of Region-Scalable Fitting Model for Medical Image Segmentation. 280-286 - Jinyu Guo, Haibin Chen, Yuan Li:
Palmprint Recognition Based on Local Fisher Discriminant Analysis. 287-292 - Zhipeng Liu, Yefan Hong, Dechang Pi:
A Large-Scale Study of Web Password Habits of Chinese Network Users. 293-297 - Kwan Yong Sim
, Chin S. Low, Fei-Ching Kuo:
Eliminating Human Visual Judgment from Testing of Financial Charting Software. 298-312 - Xinli Wang:
Least-square Support Vector Machine for Financial Crisis Forecast Based on Particle Swarm Optimization. 313-318 - Dingli Yang, Qiuchan Bai, Yulin Zhang, Rendong Ji, Huanyu Zhao:
Eye Location Based on Hough Transform and Direct Least Square Ellipse Fitting. 319-323 - Chijun Zhang, Yongjian Yang, Xiaoyu Guo, Zhanwei Du, Na Lin:
The Improved Algorithm of Semantic Similarity Based on the Multi-dictionary. 324-328 - Jianhua Wang, Lianglun Cheng, Jun Liu, Shiliang Luo:
A High Efficient Tables Look-up Algorithm for CAVLC Decoding. 329-335 - Chunguang Kuang, Chunlei Wang, Minhuan Huang:
Memory-Size-Assisted Buffer Overflow Detection. 336-342 - Alaa Mustafa El-Halees:
Software Usability Evaluation Using Opinion Mining. 343-349 - Xuewen Xia, Jingnan Liu, Yuanxiang Li:
Particle Swarm Optimization Algorithm with Reverse-Learning and Local-Learning Behavior. 350-357 - Ying Xing, Junfei Huang, Yunzhan Gong, Yawen Wang, Xuzhou Zhang:
An Intelligent Method Based on State Space Search for Automatic Test Case Generation. 358-364 - Yuanyuan Guo, Chaoyou Wang, Yuqiang Feng:
The Moderating Effect of Organizational Learning Culture on Individual Motivation and ERP System Assimilation at Individual Level. 365-373 - Yu-Li Chen:
Virtual Reality Software Usage in an EFL Scenario: An Empirical Study. 374-381 - Ema Utami
:
The Advantages of Using CHECK Constraints in The Academic Database Tables. 382-388 - Jianmin Zhu, Donger Zhou, Fucai Li, Tingting Fu:
Improved Real Coded Genetic Algorithm and Its Simulation. 389-397 - Youcong Ni, Bei Chen, Peng Ye, Chunyan Wang:
A Framework for iOS Application Development. 398-403 - Zhiguang Zhang:
An Approach to Multi-attribute Group Decision Making and Its Application to Project Risk Assessment. 404-408 - Zhao Li, Shouzhi Xu, Yi Zhao, Peng Liang
, Keqing He:
Using SWRL and Protégé 4.1 to Optimize and Reason with Policies of the Cooperation between Goal and Process. 409-416 - Hongyu Li, Yuxin Wang, Jiazheng Yuan:
Adding Domain Model Description for Web Services. 417-424 - Dingrong Yuan, Shenglong Fang, Yaqiong Liu:
The Design of Smart Home Monitoring System Based on WiFi Electronic Trash. 425-428 - Mingqing Zhang, Shudong Hao, Yanyan Xu, Dengfeng Ke, Hengli Peng:
Automated Essay Scoring Using Incremental Latent Semantic Analysis. 429-436 - Xiuli Sang, Song Gao, Jianxin Xu, Hua Wang, Kun Zhang:
Modeling and Prediction of Rainfall-runoff Relationship in the Yuanjiang, Red River Basin. 437-442 - Shengjun Xue, Fei Liu, Xiaolong Xu
:
An Improved Algorithm Based on NSGA-II for Cloud PDTs Scheduling. 443-450 - Zhi-hang Tang, Wen-bin Tian:
A New Data Mining Approach Combined with Extension Set and Rough Set. 451-457 - Shucong Liu, Yanxing Song, Jingsong Yang:
Image Encryption Algorithm Based on Wavelet Transforms and Dual Chaotic Maps. 458-465 - Shengjun Xue, Mengying Li, Xiaolong Xu
, Jingyi Chen:
An ACO-LB Algorithm for Task Scheduling in the Cloud Environment. 466-473 - Yu Zhang, Feng Liu:
ETER: Encounter Time Estimating Routing for Satellite IP Networks. 474-481 - Ting Wang, Ruihua Di, Jicheng Song:
A Novel Online Encyclopedia-Oriented Approach for Large-Scale Knowledge Base Construction. 482-489 - Hongzhe Liu
, Pengfei Wang:
Assessing Text Semantic Similarity Using Ontology. 490-497 - Bing Wu, Baiwei Lei, Zhenjiang Yu:
Study on Integrated Command Platform for Emergency Rescue in Coal Mines Based on WebGIS. 498-506 - Xirong Bao, Jiahua Xie, Lingqiao Nan, Shuanglong Li:
WRECS: an Improved Cluster Heads Selection Algorithm for WSNs. 507-514 - Lun Gao, Taifu Li, Lizhong Yao, Feng Wen:
Research and Application of Data Mining Feature Selection Based on Relief Algorithm. 515-522 - Xiaoying Zhang, Zheng Jiang, Ning Ding:
Three-phase Magnitude-phase Detection Based on T/4 Time-lapse Elimination Method. 523-529
Volume 9, Number 3, 2014
- Jinyu Guo, Haibin Chen, Yuan Li:
Palmprint Recognition Using 2D-FLDA From a Single Image Per Person. 531-535 - Guang Zheng, Kai Cui, Junping Zhan, Zekun Ning, Miao Jiang, Cheng Lu, Aiping Lu:
Bisimulation-based Consistency Checking on Syndrome Feng-Shi-Re-Bi in Rheumatoid Arthritis. 536-540 - Fangjun Wu:
Comparative Analysis of Software Network and CK Metrics: Implications for Pre- and Post-release Faults. 541-552 - Zhanlin Yu, Longchang Zhang:
QoS-aware SaaS Services Selection with Interval Numbers for Group User. 553-559 - Erzhou Zhu, Feng Liu, Xianyong Fang, Xuejun Li, Yindong Yang, Alei Liang:
DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs. 560-568 - Guofeng Yan, Yuxing Peng, Shuhong Chen
, Junyi Liu:
Design and Implementation of AIRF: A Anycast-Based Integrated Routing Framework for WSNs. 569-575 - Puyu Hao, Yufen Feng, Weijun Ge, Guangfeng Zhao:
Animation Simulation of Visualization Management System in the Iron and Steel Enterprises: The Design and Its Implementation. 576-581 - Qiaoli Zhuang, Wenzhan Dai:
A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net. 582-588 - Yuying Wang, Ning Yang:
Test Case Generation of Web Service Composition based on CP-nets. 589-595 - Xiao Liang, Hongyu Yang, Yinling Qian, Yanci Zhang:
A Fast Kd-tree Construction for Ray Tracing based on Efficient Ray Distribution. 596-604 - Hsu-Chen Cheng, Wen-Wei Liao:
Blog Interface Producing Mechanism in Learning Management System. 605-612 - Jiangang Pang, Lina Jie, Fan Xu:
Study on the Group Cooperative Innovation Based on WEB2.0. 613-620 - Xin-kan Mu, Yong-hong Chen:
SMS-based Remote Computer Supervisory Control System Design. 621-626 - Qing Zhou, Chaorui Bu, Yuwen Feng:
Layout of Gas Station Based on Multi-Agent Simulation. 627-633 - Ya Xie, Zhonghua Huang:
Statistics Based Q-learning Algorithm for Multi-Agent System and Application in RoboCup. 634-640 - Yuanyuan Zhang, Qinyan Zhang, Guanfu Jiang:
A DOM-based Anchor-Hop-T Method for Web Application Information Extraction. 641-647 - Hao Zhang, Ling Huang, Xianru Liu:
Effective Scanned-Certification Image Retrieval Based on Local Object and Block Matching. 648-654 - Hongqin Shi:
DWT and SVD based Watermarking Scheme with Circulation. 655-662 - Jianing Zheng, Hao Hu, Yizhou Li, Daozheng Huang:
Fuzzy Expert System for the Competitiveness Evaluation of Shipbuilding Companies. 663-667 - Zhaoman Zhong, Cunhua Li, Hongwei Dai:
Incorporating Content and Time Features for Chinese Story Subtopic Identification. 668-675 - Lijuan Zhou, Xiang Wang:
Research of the FP-Growth Algorithm Based on Cloud Environments. 676-683 - Zhurong Zhou, Dengwu Yang:
Personalized Recommendation of Preferred Paths Based On Web Log. 684-688 - Yating Yuan, Yi Zhuang, Ying Huo:
Research and Application of Data Integration in Aircraft Designing Based on SDO. 689-696 - Renqing Li, Shihai Wang:
An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets. 697-704 - Hao Yuan, Changbing Li, Maokang Du:
Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing. 705-708 - Kai Su, Liangli Ma, Xiaoming Guo, Yufei Sun:
An Efficient Discrete Invasive Weed Optimization Algorithm for Web Services Selection. 709-715 - Jie Xue, Xiyu Liu:
A K-nearest Based Clustering Algorithm by P Systems with Active Membranes. 716-725 - Xiaowen Liang, Wei Gong, Wenlong Fu, Jing Qi:
A Selection Algorithm of Training Set Based on Similar Classification. 726-731 - Ping Jin, Shichao Qu, Yu Zong, Xin Li:
CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone. 732-737 - Haifei Zhang:
A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration. 738-742 - Derong Zhu:
A Heuristic Optimization Algorithm in System Structure Optimization. 743-747 - Xue Zhang, Jian Cheng Lv:
Sparse Affinity Propagation for Image Analysis. 748-756 - Ming Jiang, Jingcheng Huang, Xingqi Wang, Jingfan Tang, Chunming Wu:
An Approach for Crowd Density and Crowd Size Estimation. 757-762 - Yujie Zhao, Xinxing Luo:
The Multiple Attribute Group Decision Making model for Web Software Trustworthiness. 763-776 - Liping Sun, Yonglong Luo, Yalei Yu, Xintao Ding:
Voronoi Diagram Generation Algorithm based on Delaunay Triangulation. 777-784 - Yuling Tian:
The Clonal Expansion and Memory Strategy Applied to Network Detection. 785-791
Volume 9, Number 4, 2014
- Yuying Wang, Ning Yang:
Web Service Composition Verification of Safety Properties Based on Predicate Abstraction. 793-799 - Jiufu Liu, Jianyong Zhou, Chunsheng Liu, Zhong Yang, Zhisheng Wang, Yifan Zhang:
Modeling and Analyzing Flight Control Software of Unmanned Aerial Vehicle Using UML and B Method. 800-806 - Haiyang Xu, Yi Zhuang:
A Formal Transformation Approach for Embedded Software Modeling. 807-813 - Lian-Lei Lin, Yue Ma, Ling-Yu Li:
Design of Resource Repository in Virtual Test Architecture. 814-819 - Xiaoling Hao, Songqiao Han:
Measurement and Control of Operational Risk of Banking Industry based on Complex Network. 820-828 - Ardiansyah Ardiansyah,