|
Journals in DBLP
- Giuseppe Lami, Robert W. Ferguson
An Empirical Study on the Impact of Automation on the Requirements Analysis Process. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:338-347 [Journal]
- Pierre Bourque, Serge Oligny, Alain Abran, Bertrand Fournier
Developing Project Duration Models in Software Engineering. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:348-357 [Journal]
- Nelly Condori-Fernández, Silvia Mara Abrahão, Oscar Pastor
On the Estimation of the Functional Size of Software from Requirements Specifications. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:358-370 [Journal]
- Juan Jose Cuadrado-Gallego, Daniel Rodríguez, Miguel-Ángel Sicilia, Miguel Garre, Ángel García-Crespo
Software Project Effort Estimation Based on Multiple Parametric Models Generated Through Data Clustering. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:371-378 [Journal]
- Liguo Yu, Srini Ramaswamy
Component Dependency in Object-Oriented Software. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:379-386 [Journal]
- Taghi M. Khoshgoftaar, Pierre Rebours
Improving Software Quality Prediction by Noise Filtering Techniques. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:387-396 [Journal]
- Piotr Tomaszewski, Lars Lundberg, Håkan Grahn
Improving Fault Detection in Modified Code - A Study from the Telecommunication Industry. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:397-409 [Journal]
- Chong-Yi Yuan, Wen Zhao, Shi-Kun Zhang, Yu Huang
A Three-Layer Model for Business Processes - Process Logic, Case Semantics and Workflow Management. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:410-425 [Journal]
- Chunxiao Lin, Yiyun Chen, Long Li, Bei Hua
Garbage Collector Verification for Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:426-437 [Journal]
- Xiaolan Zhang 0003, Brian King
An Anti-Counterfeiting RFID Privacy Protection Protocol. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:438-448 [Journal]
- Wen-Ling Wu, Wentao Zhang, Dengguo Feng
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:449-456 [Journal]
- Xinli Huang, Futai Zou, Fan-Yuan Ma
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:457-468 [Journal]
- Xiao-Li Huang, Chuan-Kun Wu
Cryptanalysis of Achterbahn-Version 1 and -Version 2. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:469-475 [Journal]
- Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:476-480 [Journal]
- Enjian Bai, Xiaojuan Liu
Some Notes on Prime-Square Sequences. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:481-486 [Journal]
- Chang-ji Wang, Yong Tang, Qing Li
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:487-493 [Journal]
- Wei Fu, Guang-Zhong Xing
Edge-Oriented Spatial Interpolation for Error Concealment of Consecutive Blocks. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:494-497 [Journal]
|