Journal of Software Engineering and Applications, Volume 2 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 2, Number 1, 2009

Ashraf Armoush
, Falk Salewski, Stefan Kowalewski:
Design Pattern Representation for Safety-Critical Embedded Systems. 1-12

Jingbai Tian, Keqing He, Chong Wang, Huafeng Chen:
An Approach to Generation of Process-Oriented Requirements Specification. 13-19

Ki-Hyun Jung, Kee-Young Yoo:
Data Hiding Method with Quality Control for Binary Images. 20-24

Ning Huang, Xiaojuan Wang, Camilo Rocha:
Formal Semantics of OWL-S with Rewrite Logic. 25-33

Weiping Li, Weijie Chu, Ying Liu:
Call for Implementation: A New Software Development Mode for Leveraging the Resources of Open Community. 34-39

Mingxing Cai, Jintao Zheng, Ping Shi, Xiaohui Li:
Three-Tier Knowledge Management System Based on .NET. 40-43

Maolin Tang:
QoS-Aware Reference Station Placement for Regional Network RTK. 44-49

Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi:
Research on Survivability of Mobile Ad-hoc Network. 50-54

Sheng Li:
A Semantic Vector Retrieval Model for Desktop Documents. 55-59
Volume 2, Number 2, 2009

Sabah S. Al-Fedaghi:
Interpretation of Information Processing Regulations. 67-76

Nazir Ahmad Zafar, Ajmal Hussain, Amir Ali:
Refinement in Formal Proof of Equivalence in Morphisms over Strongly Connected Algebraic Automata. 77-85

Ying Hou:
Lossy-to-Lossless Compression of Hyperspectral Image Using the 3D Set Partitioned Embedded ZeroBlock Coding Algorithm. 86-95

Yepeng Guan:
Adaptive Motion Segmentation for Changing Background. 96-102

Kun Zhang, Man-Wu Xu, Hong Zhang:
Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System. 103-110

Xiaodong Wang, Lei Wang, Yingjie Wu:
An Optimal Algorithm for Prufer Codes. 111-115

Guohua Wu, Wenning Liu, Qiuhua Zheng, Zhen Zhang:
Model Interpretation Development: Analysis Design of Automatic Control System. 116-121

Jing Zhang, Lei Guo, Meiling Zhou, Jian-Min Yao:
Transliterated Word Identification and Application to Query Translation Mining. 122-126

Amal A. Abd El-Raouf
, Tahany A. Fergany, Reda A. Ammar, Safwat H. Hamad:
A Performance-Driven Approach for Restructuring Distributed Object-Oriented Software. 127-135
Volume 2, Number 3, 2009

Graylin Jay, Joanne E. Hale, Randy K. Smith, David P. Hale, Nicholas A. Kraft, Charles Ward:
Cyclomatic Complexity and Lines of Code: Empirical Evidence of a Stable Linear Relationship. 137-143

Omid Bushehrian:
Applying Heuristic Search for Distributed Software Performance Enhancement. 144-149

Jacky S. L. Ting, C. C. Shum, S. K. Kwok, Albert H. C. Tsang, Wing Bun Lee:
Data Mining in Biomedicine: Current Applications and Further Directions for Research. 150-159

Guohua Wu, Dongwu Cheng, Zhen Zhang:
A Solution Based on Modeling and Code Generation for Embedded Control System. 160-164

Yufeng Ding:
Product Maintainability Design Method and Support Tool Based on Feature Model. 165-172

Jiangping Wan:
Research on Software Production Support Structure. 173-194

Lingyu Sun, Yatian Sun:
Formal Derivation of the Combinatorics Problems with PAR Method. 195-199

Shixi Tang:
Sharing and Implementation of Heterogeneous Database for Education Resource Based on XML. 200-205

Feng Liu, Lu Li, Chi Zhang, Lingbing Wang, Pei Li:
MicrobIdentifier: A Microbial Identification Software Based on Mass-Spectrometry. 206-208

Manjari Gupta, Ratneshwer Gupta, Anil Kumar Tripathi:
An Exploratory Case Study in Designing and Implementing Tight Versus Loose Frameworks. 209-220
Volume 2, Number 4, November 2009

Tim Menzies, Osamu Mizuno, Yasunari Takagi, Tohru Kikuno:
Explanation vs Performance in Data Mining: A Case Study with Predicting Runaway Projects. 221-236

Mahmood Rezaei Sadrabadi, Seyed Jafar Sadjadi:
A New Interactive Method to Solve Multiobjective Linear Programming Problems. 237-247

Stéphane S. Somé, Pauline Anthonysamy:
An Aspect-Oriented Approach for Use Case Based Modeling of Software Product Lines. 248-258

Bin Zhang, Zhongsheng Hua:
Nonparametric Demand Forecasting with Right Censored Observations. 259-266

Zoe Lin Jiang, Siu-Ming Yiu, Y. Dong, Lucas Chi Kwong Hui, Starsky H. Y. Wong:
Secure Chained Threshold Proxy Signature without and with Supervision. 267-275

Guohua Wu, Xiaojun Li, Qiuhua Zheng, Zhen Zhang:
A CORBA Replication Voting Mechanism for Maintaining the Replica Consistent. 276-282

Hu Lin, Rongli Gai:
Adaptive Fuzzy Sliding Controller with Dynamic Compensation for Multi-Axis Machining. 288-294

Huilian Fan, Guangpu Zen, Xianli Li:
Research of Publish and Subscribe Model Based on WS-Notification. 295-300

Tian-Shyr Dai, Li-min Liu:
A Hybrid Importance Sampling Algorithm for Estimating VaR under the Jump Diffusion Model. 301-307
Volume 2, Number 5, December 2009

Yang Zhang, Nobuo Kurihara, Hiroyuki Yamaguchi:
Responsiveness Improvement of Idling Speed Control for Automotive Using SMC. 309-315

Mingyou Liu, Chengsen Duan, Youguo Pi:
Basic Elements Knowledge Acquisition Study in the Chinese Character Intelligent Formation System. 316-322

Wei-Shung Chang, Chiuh-Cheng Chyu:
A Multi-Criteria Decision Making for the Unrelated Parallel Machines Scheduling Problem. 323-329

Muhammad A. Hasan, Muhammad I. Ibrahimy, Mamun Bin Ibne Reaz:
Fetal ECG Extraction from Maternal Abdominal ECG Using Neural Network. 330-334

Xiuhong Wang:
An Integrated Use of Advanced T2 Statistics and Neural Network and Genetic Algorithm in Monitoring Process Disturbance. 335-343

Lianyu Wei, Jianfu Du:
Research on OD Matrix Calculation Based on Quantum Behaved Particle Swarm Optimization Algorithm. 344-349

Qiang Zhang, Shouju Li, Ying Tian:
Multi-Objective Incomplete Probability Information Optimization Reliability Design Based on Ant Colony Algorithm. 350-353

Yongqiang Zhang, Huifang Cheng, Ruilan Yuan:
Improved Genetic Programming Algorithm Applied to Symbolic Regression and Software Reliability Modeling. 354-360

Jie Chen, Liangwei Zhang
, Jianqiang Luo:
Reconfiguration Cost Analysis Based on PetriNet for Manufacturing System. 361-369

Yancang Li:
A Novel ACO with Average Entropy. 370-374

Byeong-Sam Kim, Kyoungwoo Park, Young-Woo Kim:
Endurance Analysis of Automotive Vehicle's Door W/H System Using Finite Element Analysis. 375-382

Qiudong Sun, Wenxin Ma, Wenying Yan, Hong Dai:
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding. 383-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







