Volume 13,Issue 1,2002 Table of Contents
An Incremental Grid Density-Based Clustering AlgorithmCHEN Ning,ZHOU Long-xiang and CHEN An2002,13(1):1-7 [Abstract(4841)] [View PDF(7082)292.83 K]Managing Method of Spatial Data in Relational Database Management SystemsZHU Tie-wen,ZHONG Zhi-nong and JING Ning2002,13(1):8-14 [Abstract(3566)] [View PDF(5317)339.21 K]Interactive Shape Deformation of n-Sided SurfacesZHENG Jin-jin and ZHANG Jian-jun2002,13(1):15-23 [Abstract(3808)] [View PDF(4925)391.04 K]Criteria-Based Software Process Transaction ModelSHEN Bei-jun,JU De-hua and CHEN Cheng2002,13(1):24-32 [Abstract(3285)] [View PDF(4665)370.16 K]A Linear Temporal Logic with Clocks for Verification of Real-Time SystemsLI Guang-yuan; and TANG Zhi-song2002,13(1):33-41 [Abstract(3949)] [View PDF(4728)444.48 K]Developing a New Dynamic Scheduling Algorithm for Real-Time Multiprocessor SystemsQIAO Ying,WANG Hong-an and DAI Guo-zhong2002,13(1):51-58 [Abstract(3904)] [View PDF(5706)331.68 K]A Complete and Operational Approach to Belief RevisionLI Wei1 and LUAN Shang-min2002,13(1):59-64 [Abstract(3940)] [View PDF(4891)304.67 K]A Novel Aggregation Algorithm for Online Analytical Processing Query EvaluationJIANG Xu-dong,FENG Jian-hua and ZHOU Li-zhu2002,13(1):65-70 [Abstract(3771)] [View PDF(4998)252.95 K]Research on a Concurrent Object-Oriented Synchronization ModelLüJian,YANG Da-jun,LIAO Yu and TANG Bao2002,13(1):71-79 [Abstract(3322)] [View PDF(4775)340.34 K]An Extension to Security Auditing Mechanism of Linux ShellWANG Li-dong and WANG Li-dong2002,13(1):80-84 [Abstract(4413)] [View PDF(6693)184.98 K]A Character Recognition Approach Based on Feature Line Necessary-Sufficient Condition DetectionLI Zuo,WANG Shu-hua and CAI Shi-jie2002,13(1):85-91 [Abstract(3761)] [View PDF(5695)301.68 K]Access Control in Jade Bird Web Component Library SystemZOU Wei,SUN Jia-su and SUN Yan-chun2002,13(1):92-98 [Abstract(3818)] [View PDF(4841)241.38 K]Document Clustering Based on Web-Log MiningSU Zhong,MA Shao-ping,YANG Qiang and ZHANG Hong-jiang2002,13(1):99-104 [Abstract(3821)] [View PDF(5630)259.20 K]Design and Implementation of Mapping Address Algorithm in Chinese Text-to-Speech SystemZHANG Da-jun,CHEN Zhao-xiong and HUANG He-yan2002,13(1):105-110 [Abstract(3811)] [View PDF(5022)232.40 K]An Improved Active Rule System Executing ModelLI Qing-zhong,WANG Hai-yang,JIANG Yue-ping,MA Shao-han and DONG Ji-run2002,13(1):111-117 [Abstract(3313)] [View PDF(5095)289.42 K]Parallel Programming Models and LanguagesAN Hong and CHEN Guo-liang2002,13(1):118-124 [Abstract(3951)] [View PDF(8323)232.27 K]Inference Method and Applications of Continuous Cognitive StructuresLIU Jie,LIU Gui-quan,CHEN Xiao-ping and CAI Qing-sheng2002,13(1):125-129 [Abstract(3720)] [View PDF(5249)274.86 K]A Template Architecture for Mobile Agent System of High SecurityYANG Kun,LIU Da-you and GUO Xin2002,13(1):130-135 [Abstract(4108)] [View PDF(5459)263.99 K]An N-Gram Prediction Model Based on Web-Log MiningSU Zhong,MA Shao-ping,YANG Qiang and ZHANG Hong-jiang2002,13(1):136-141 [Abstract(4218)] [View PDF(5401)223.31 K]An XML-Based Web Page Definition LanguageLI Xiao-dong2002,13(1):142-149 [Abstract(3624)] [View PDF(5287)284.29 K]A New Full-Text Index Model-Subsequence Array ModelLIU Xue-wen,TAO Xiao-peng,YU Yu and HU Yun-fa2002,13(1):150-158 [Abstract(4989)] [View PDF(4792)450.61 K]
Survey on Routing Lookup AlgorithmsXU Ke,XU Ming-wei,WU Jian-ping and WU Jian2002,13(1):42-50 [Abstract(7532)] [View PDF(9478)341.57 K]