1995, 6(6):321-326.
Abstract:A technique for trapping the access to persistent objects is presented,which is a key for object-oriented database systems to realize the consistency of access to transient objects and persistent objects, and then to realize the seamless integration of databases and programming languages, in the condition of keeping the object-level concurrency control, version management and constraint checking.
1995, 6(6):327-332.
Abstract:This paper describes the design and application of a multi-protocol network monitor based on connection, and introduces some examples of using the monitor in a real multi-protocol network.
1995, 6(6):333-342.
Abstract:In this paper, the design idea and implementation method of a graphical user interface editor(GUIEditor) used to specify and generate the user interface which has the rehearsal function is introduced. The usage of dialogue control tree and input data arrays in the separation of the user interface from the application is described. Finally, the dialogue control word interpretation program based on the event-driven mechanism is discussed.
Pan Jingui , Chen Bin , Che Zhaoqian , Chen Shifu
1995, 6(6):343-352.
Abstract:In this paper, an inductive learning algorithm CAP2 is described, which is a binary tree classification method, with the division probability of state space as heuristic information, based on the provided example set. CAP2 can satisfy the requirement of precision of users to induce the rule set,of the proper precision,and it can deal with continuous data, noisy data. Background knowledge provided by users can be used by CAP2. CAP2 has been successfully applied in real world. Also its comparison with ID3 is given.
She Kun , Zhou Mingtian , Cai Bing
1995, 6(6):353-357.
Abstract:Public-keys in a public-key system are usually registered in a public directory. This paper describes the threats faced by the public-keys and necessity of establishing public-key management system. It also analyses and designs one instance-certification authority management system, whose simple and practical model has been implemented on UNIX machines.
1995, 6(6):358-365.
Abstract:Because of large vocabulary and high complexity, it is difficult and almost impossible to make use of LL, LR and Well Formed Substring Table techniques to speed up syntactic analysis in Natural Language Processing. Based on the traditional Top-Down analysis of rules and ATN network, a depth limited search and early pruning technique is proposed and discussed in this paper, which greatly improves the efficiency of natural language parser, by restricting the search scope and reducing backtracking.
1995, 6(6):366-371.
Abstract:Software testing will continue to be an important method for ensuring correctness of large scale software systems. Computer-aided software testing can greatly enhance testing power and reduce testing cost. In this paper, first presents a new powerful software test method based on structured functional specification, then depicts how to design and implement a test tool environment based on the test method.
Che Dunren , Zhou Lizhu , Mai Zhongfan
1995, 6(6):372-378.
Abstract:Storage management, especially second storage management is the physical implementation level for every database system. Persistence is nonsense without adequate support of second storage management. This paper discusses three approaches for integrating programming language and persistent objects firstly, then introduces the design of storage management subsystem (SMS) of MIDS/BUAA, i. e. (1 ) the architecture of SMS, (2) storage structure of MIDS Object, (3) object identity design, (4) objects clustering and indexing, (5) persistence implementation, (6) dynamic UID transformation to memory address.
1995, 6(6):379-384.
Abstract:This paper presents a method of parallel program design on task graph. At first, the authors can produce a dataflow chart by analyzing a given problem to get the task graph, i. e., a representation of the parallel algorithm for the problem, and then,choose the topologic structure according the task graph, at last parallel program is written in parallel programming languages. This method is lucid and most of the parallel programs designed by the method are of high quality.