Volume 11,Issue 11,2000 Table of Contents
There Is No Minimal r.e. Degree in Every Nonzero [a]∈ R/MZHANG Zai yue and SUI Yue fei2000,11(11):1425-1429 [Abstract(3287)] [View PDF(4358)304.43 K]A Hierarchical DGMM Recognizer for Chinese Sign Language RecognitionWU Jiang-qin,GAO Wen,CHEN Xi-lin and MA Ji-yong2000,11(11):1430-1439 [Abstract(4042)] [View PDF(4435)1.06 M]Theoretical Results on Learning Convergence of Generali zed Fuzzy CMACWANG Shi-tong,Baldwin,J.F., and Martin, T.P.2000,11(11):1440-1450 [Abstract(3821)] [View PDF(4532)515.93 K]Research of Field Theory Based Adaptive Resonance Neural NetworkZHOU Zhi hua,CHEN Zhao qian and CHEN Shi fu2000,11(11):1451-1459 [Abstract(3608)] [View PDF(5214)516.65 K]An Average Time Analysis of Backtracking on Random Constraint Satisfa ction ProblemsXU Ke and LI Wei2000,11(11):1467-1471 [Abstract(3911)] [View PDF(5084)313.97 K]An Application Level QoS Negotiation Protocol in Distributed Mul timedia ApplicationsZHANG Yi and CHEN Fu-jie2000,11(11):1472-1477 [Abstract(3663)] [View PDF(4435)401.03 K]An Integrated Mining Approach for Classification and Association Rule Based on Concept LatticeHU Ke-yun,LU Yu-chang and SHI Chun-yi2000,11(11):1478-1484 [Abstract(3921)] [View PDF(5396)420.90 K]An Evaluation Model for Predicting the Efficiency of Parallel Progra msCHEN Chang-sheng,SUN Yong-qiang and HE Ji-feng2000,11(11):1485-1491 [Abstract(3899)] [View PDF(4827)380.81 K]A Social Norm for Multi-Agent SystemMA Guang-wei and SHI Chun-yi2000,11(11):1492-1498 [Abstract(3216)] [View PDF(4371)457.05 K]A Trainable and Fast Partial Parsing Method for ChineseZHANG Yi-min,CHEN Yu-quan and LU Ru-zhan2000,11(11):1499-1504 [Abstract(3572)] [View PDF(4760)430.03 K]An Evolutionary Development Model Supporting Executable SpecificationWU Ming-hui,YING Jing and HE Zhi-jun2000,11(11):1505-1509 [Abstract(3628)] [View PDF(4636)368.83 K]Implementation of Online Analytical Processing System for Insurance B usinessZHAN Min and SUN Yu-fang2000,11(11):1510-1515 [Abstract(3957)] [View PDF(4252)418.16 K]Design and Implementation of Border Gateway Protocol BGP-4 Based on Event-Driven ProgrammingXU Ke,WU Jian-ping and FAN Xiao-bo2000,11(11):1516-1521 [Abstract(3986)] [View PDF(4821)401.15 K]A Model of Mental States Combined with Utility for AgentsXU Jin-hui and SHI Chun-yi2000,11(11):1522-1526 [Abstract(3481)] [View PDF(4572)345.55 K]A Hybrid Method for Automatic Chinese Discourse Structure AnalysisZHANG Yi-min,LU Ru-zhan and SHEN Li-bin2000,11(11):1527-1533 [Abstract(3834)] [View PDF(5178)480.85 K]Design and Implementation of a Simplified-Unsimplified Chinese Chara cter Conversion SystemXIN Chun-sheng and SUN Yu-fang2000,11(11):1534-1540 [Abstract(3904)] [View PDF(5104)459.71 K]Design and Implementation of Java's InternationalizationJI Zhen-yan,CHENG Hu and MEI Jia2000,11(11):1541-1546 [Abstract(4912)] [View PDF(5074)398.83 K]Automatic Chinese-English Paragraph Segmentation and AlignmentWANG Bin,LIU Qun and ZHANG Xiang2000,11(11):1547-1553 [Abstract(3940)] [View PDF(5027)1.57 M]Segmentation of Handwritten Chinese Character String Based on Merging of ElementsLü Yue,SHI Peng-fei and ZHANG Ke-hua2000,11(11):1554-1559 [Abstract(3717)] [View PDF(4509)358.75 K]On the Extension of Structured GammaWEI Zi-chu2000,11(11):1560-1566 [Abstract(3633)] [View PDF(4744)437.60 K]
A Survey of Intrusion Detection Research on Network SecurityJIANG Jian-chun,MA Heng-tai,REN Dang-en and QING Si-han2000,11(11):1460-1466 [Abstract(14461)] [View PDF(12834)520.69 K]