Volume 11,Issue 2,2000 Table of Contents
Mining Association Rules with Linguistic Cloud ModelsLI De-yi,DI Kai-chang,LI De-ren and SHI Xue-mei2000,11(2):143-158 [Abstract(4844)] [View PDF(5449)2.53 M]Effect of Adaptive Interval Configuration on Parallel Mining Association RulesHU Kan,XIA Shao-wei and XIA Shao-wei2000,11(2):159-172 [Abstract(3759)] [View PDF(4874)845.36 K]Java Compiler Technology and Java PerformanceJI Zhen-yan and CHENG Hu2000,11(2):173-178 [Abstract(3711)] [View PDF(6869)377.85 K]Enhancing Dataflow Analysis with Computation Function ModelHU Shi-liang,ZANG Bin-yu and ZHU Chuan-qi2000,11(2):187-194 [Abstract(3160)] [View PDF(4244)544.47 K]Automatic Identification of Chinese Maximal Noun PhrasesZHOU Qiang,SUN Mao-song and HUANG Chang-ning2000,11(2):195-201 [Abstract(4454)] [View PDF(5184)483.80 K]Linear Cryptanalysis of LOKI97WU Wen-ling,LI Bao,FENG Deng-guo and QING Si-han2000,11(2):202-206 [Abstract(3298)] [View PDF(4374)319.85 K]Conformance Testing on Internet IP v4 Based on Protocol Integrated Test SystemWANG Jian-guo,WU Jian-ping,CHEN Xiu-huan and FENG Xiao-dong2000,11(2):207-212 [Abstract(3326)] [View PDF(4537)781.05 K]The Verification Logic for Secure ProtocolsBAI Shuo,SUI Li-ying,CHEN Qing-feng,FU Yan and ZHUANG Chao2000,11(2):213-221 [Abstract(3590)] [View PDF(4620)531.05 K]Query Decomposition and Optimization in Heterogeneous Data Integration SystemWANG Ning and WANG Neng-bin2000,11(2):222-228 [Abstract(3850)] [View PDF(5100)538.86 K]Automatic Verification of a Class of Concurrent Real-Time SystemsZHAO Jian-hua,ZHENG Guo-liang and Dan Van Hung2000,11(2):229-234 [Abstract(3389)] [View PDF(4193)404.04 K]Rollback Algorithm and Crash Recovery Based on Fault-Sensitive GraphsLIU Ying,CHEN Dao-xu,XIE Li and CAO Jian-nong2000,11(2):235-239 [Abstract(3482)] [View PDF(4323)348.33 K]The Secure Electronic Transactions Protocol and Its Logical Verification with Non-Monotomic Dynamic LogicCHEN Qing-feng,BAI Shuo,WANG Ju,ZHANG Shi-chao and Sui Li-ying2000,11(2):240-250 [Abstract(3782)] [View PDF(4054)675.61 K]A Performance Analysis Model and Its Implementation for Network ManagementLI Mu-jin and WANG Guang-xing2000,11(2):251-255 [Abstract(3706)] [View PDF(4375)324.46 K]A Mean Field Annealing-Based Algorithm for k-Colorable ProblemHU Wei-ming,XU Jun-hua and HE Zhi-jun2000,11(2):256-259 [Abstract(3466)] [View PDF(4161)288.67 K]A Near-Optimal Approximation Algorithm for Manhattan Steiner TreeMA Jun,YANG Bo and MA Shao-han2000,11(2):260-264 [Abstract(4279)] [View PDF(4534)339.65 K]Integrated Processing Strategies for Spatial Query and Path SearchWU Jing,JING Ning and CHEN Luo2000,11(2):265-270 [Abstract(4014)] [View PDF(4653)388.31 K]Automatic Corpus Selecting Algorithm Based on Triphone ModelsWU Hua,XU Bo and HUANG Tai-yi2000,11(2):271-276 [Abstract(3818)] [View PDF(5123)433.20 K]Research on the Shift Controlling Algorithm of Global and Immediate Focuses in Text PlanningYAO Tian-fang and TANG Xue-yan2000,11(2):277-284 [Abstract(3499)] [View PDF(4454)567.11 K]
Analysis of Broadband IP Router ArchitectureXU Ke,XIONG Yong-qiang and WU Jian-ping2000,11(2):179-186 [Abstract(6391)] [View PDF(7334)610.62 K]