JOURNAL OF SOFTWARE (JSW)
ISSN : 1796-217X
Volume : 4    Issue : 1    Date : February 2009

Special Issue: Recent Advances in Information Technology and Security - Track on Software
Guest Editors: Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, and Guangxue Yue

Article Information


Editorial
Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, and Guangxue Yue
Page(s): 1-2
Abstract  |  Full Text: PDF (90 KB)


A Context Analytical Method Basing on Text Structure
Yi Huang, Jianbin Tan, and Lei Zhang
Page(s): 3-10
Abstract  |  Full Text: PDF (343 KB)


A Method for Analyzing and Predicting Reliability of BPEL Process
Liqiong Chen, Zhiqing Shao, Guisheng Fan, and Hanhua Ma
Page(s): 11-18
Abstract  |  Full Text: PDF (203 KB)


Categorical Description of Dynamic Fuzzy Logic Programming Language
Xiaofen Han and Fanzhang Li
Page(s): 19-25
Abstract  |  Full Text: PDF (195 KB)


Image Rectification Using Affine Epipolar Geometric Constraint
Liansheng Sui, Jiulong Zhang, and Duwu Cui
Page(s): 26-33
Abstract  |  Full Text: PDF (341 KB)


Real Time Process Algebra with Urgency Executing Policy
Wenbo Chen, Guang Zheng, Lian Li, and Jinzhao Wu
Page(s): 34-41
Abstract  |  Full Text: PDF (146 KB)


Tracking Unsatisfiable Subformulas from Reduced Refutation Proof
Jianmin Zhang, Shengyu Shen, and Sikun Li
Page(s): 42-49
Abstract  |  Full Text: PDF (184 KB)


An Information Fusion-Enabled Third Party E-Commerce Platform Based on SOA
Hua Zheng, Lin Liu, and Ying Li
Page(s): 50-57
Abstract  |  Full Text: PDF (166 KB)


Fuzzy Clustering Algorithm based on Factor Analysis and its Application to Mail Filtering
Jingtao Sun, Qiuyu Zhang, and Zhanting Yuan
Page(s): 58-64
Abstract  |  Full Text: PDF (165 KB)


An Agent-based Multi-attribute Sealed-bid Design for Bilateral Contract
Linlan Zhang and Xueguang Chen
Page(s): 65-72
Abstract  |  Full Text: PDF (426 KB)


A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree
Jia Yu, Fanyu Kong, Xiangguo Cheng, and Rong Hao
Page(s): 73-80
Abstract  |  Full Text: PDF (197 KB)


Loop Kernel Pipelining Mapping onto Coarse-Grained Reconfigurable Architecture for
Data-Intensive Applications
Dawei Wang, Sikun Li, and Yong Dou
Page(s): 81-89
Abstract  |  Full Text: PDF (267 KB)


Analysis for Real-time Intransitive Information Flow Security Properties
Yong Huang, Lingdi Ping, Shanping Li, and Xuezeng Pan
Page(s): 90-97
Abstract  |  Full Text: PDF (196 KB)