Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Journal of Software
FQ: 月刊
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1000-9825
CN: 11-2560/TP
YP: 1990
Url: 中国科学院软件研究所
Recommended Journals
Journal of Software
2018 -09
Experimental Study on Prototype System of Central Bank Digital Currency YAO Qian;Institute of Digital Money
Research on Improvements of Feature Selection Using Forest Optimization Algorithm CHU Bei;LI Zhan-Shan;ZHANG Meng-Lin;YU Hai-Hong;College of Computer Science and Technology
Survey on Stability of Feature Selection LIU Yi;CAO Jian-Jun;DIAO Xing-Chun;ZHOU Xing;College of Command Information Systems
Design and Applications of Discrete Evolutionary Algorithm Based on Encoding Transformation HE Yi-Chao;WANG Xi-Zhao;ZHAO Shu-Liang;ZHANG Xin-Lu;College of Information and Engineering
Dynamic Multi-Swarm Particle Swarm Optimization with Cooperative Coevolution for Large Scale Global Optimization LIANG Jing;LIU Rui;YU Kun-Jie;QU Bo-Yang;School of Electrical Engineering
Evolutionary Algorithm for Single-Objective Optimization Based on Neighborhood Difference and Covariance Information LI Xue-Qiang;HUANG Han;HAO Zhi-Feng;School of Information Technology
Complex Software Reliability Allocation Based on Hybrid Intelligent Optimization Algorithm XU Yue;PI De-Chang;School of Computer Science and Technology
Objective Space Division Based Adaptive Multiobjective Optimization Algorithm CHEN Huang-Ke;WU Guo-Hua;HUO Li-Su;QI Yu-Tao;College of Systems Engineering
Software-Defined Wireless Sensor Networks: A Research Survey HUANG Mei-Gen;HUANG Yi-Cai;YU Bin;ZHOU Wei-Wei;Information Engineering University;
Study on Structure Evolution for Service Processes Base on Logic Petri Net HU Qiang;REN Zhi-Kao;ZHAO Zhen;DU Jun-Wei;DU Yu-Yue;School of Information Science and Technology
Survey on Attack Surface Dynamic Transfer Technology Based on Moving Target Defense ZHOU Yu-Yang;CHENG Guang;GUO Chun-Sheng;DAI Mian;School of Computer Science and Engineering
Trust-Based Security Routing Decision Method for Opportunistic Networks LI Feng;SI Ya-Li;CHEN Zhen;LU Ning;SHEN Li-Min;Computer and Communication Engineering College
Robust Salient Object Detection Model for Nighttime Images XU Xin;MU Nan;ZHANG Xiao-Long;School of Computer Science and Technology
Single Pass Bayesian Fuzzy Clustering LIU Jie-Fang;JIANG Yi-Zhang;WANG Jun;DENG Zhao-Hong;WANG Shi-Tong;School of Digital Media
Co-Regularized Matrix Factorization Recommendation Algorithm WU Bin;LOU Zheng-Zheng;YE Yang-Dong;School of Information Engineering
Survey of Oblivious RAM WU Peng-Fei;SHEN Qing-Ni;QIN Jia;QIAN Wen-Jun;LI Cong;WU Zhong-Hai;School of Software and Microelectronics
Analysis and Research on SGX Technology WANG Juan;FAN Cheng-Yang;CHENG Yue-Qiang;ZHAO Bo;WEI Tao;YAN Fei;ZHANG Huan-Guo;MA Jing;School of Cyber Science and Engineering
Improved Differential Attack on 23-Round SMS4 ZHAO Yan-Min;LIU Yu;WANG Mei-Qin;School of Mathematics
Research on Differential Diffusion Property of MORUS in Fault Model SHI Tai-Rong;GUAN Jie;LI Jun-Zhi;WANG Sen-Peng;Information Engineering University;
Research on Trusted Virtual Platform Remote Attestation Method in Cloud Computing HU Ling-Bi;TAN Liang;College of Computer Science
Channel Split and Allocation Method for Data Broadcast Scheduling HU Wen-Bin;QIU Zhen-Yu;NIE Cong;WANG Huan;YAN Li-Ping;DU Bo;Computer School
2018 Issues:  [01] [05]
More Issues:   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved