Volume 11,Issue 6,2000 Table of Contents
Building Hybrid Real Time Systems in XYZ/E——Implemen-tation of the Steam-Boiler Control Specification ProblemYAN An and TANG Zhi song2000,11(6):711-719 [Abstract(3835)] [View PDF(5048)484.26 K]Flexible Cooperative Transaction ModelMO Qian,LI Zi mu,TAN Yu song and ZHOU Xing ming2000,11(6):720-726 [Abstract(3676)] [View PDF(4157)423.76 K]Abstract Test Methods for Network Relay SystemBI Jun and WU Jian ping2000,11(6):727-734 [Abstract(3466)] [View PDF(4972)496.65 K]FDBSCAN: A Fast DBSCAN AlgorithmZHOU Shui geng,ZHOU Ao ying,JIN Wen,FAN Ye and QIAN Wei ning2000,11(6):735-744 [Abstract(4721)] [View PDF(6359)1.26 M]Relation of in R/M and ≤T in RSUI Yue-fei2000,11(6):745-750 [Abstract(3108)] [View PDF(4260)1.67 M]Structural Operational Semantic Approach to Knowledge Base MaintenanceSU Kai-le2000,11(6):758-766 [Abstract(3214)] [View PDF(4326)612.08 K]Structural Operational Semantic Approach to Knowledge Base MaintenanceLI Wei,ZHANG Shi-kun,WANG Li-fu,FENG Hui and YANG Fu-qing2000,11(6):758-766 [Abstract(3188)] [View PDF(4059)322.02 K]Design and Analysis of String Matching Algorithm on Distributed Memory MachineCHEN Guo-liang,LIN Jie and GU Nai-jie2000,11(6):771-778 [Abstract(3796)] [View PDF(4748)455.89 K]A Role Hierarchy Model for Role-Based Access Control and Its ApplicationZHONG Hua,FENG Yu-lin and JIANG Hong-an2000,11(6):779-784 [Abstract(4543)] [View PDF(5020)403.49 K]A Real-Time Algorithm of 3-D Shadow Generation for Point Light SourcesLIU Lie-ming and WU En-hua2000,11(6):785-790 [Abstract(3913)] [View PDF(4587)811.32 K]A Scheme of Active Hierarchical Multicast RoutingHE Dan,CHEN Dao-xu and XIE Li2000,11(6):791-798 [Abstract(3391)] [View PDF(4280)533.91 K]An Adaptive Method for Text-Independent Speaker VerificationZHANG Yi-ying,ZHU Xiao-yan and ZHANG Bo2000,11(6):799-803 [Abstract(3277)] [View PDF(4302)369.24 K]Application of P-Fourier Transform to Handwritten Chinese Character RecognitionYAO Dan-lin,CHEN Huo-wang and YIN Jian-ping2000,11(6):804-808 [Abstract(3836)] [View PDF(4862)736.51 K]Commonsense Oriented Temporal ReasoningXU Jin-hui,MAO Xi-ping,LIU Gui-xia and SHI Chun-yi2000,11(6):809-815 [Abstract(3595)] [View PDF(4425)458.96 K]An Effective Resource Reservation Strategy for Guaranteed End-to-End Delay RequirementsZHAN Yong-zhao,ZENG Qing-kai,HE Dan and XIE Li2000,11(6):816-822 [Abstract(3435)] [View PDF(5212)501.64 K]Ecological Evolution Model Guided by Life PeriodCAO Xian-bin,XU Kai,ZHANG Jie and WANG Xu-fa2000,11(6):823-828 [Abstract(3781)] [View PDF(4354)359.99 K]Loading of a Real-Time Main Memory DatabaseLIU Yun-sheng and LI Guo-hui2000,11(6):829-835 [Abstract(3793)] [View PDF(4394)402.22 K]An Approach for Transforming Ada83 Serving Tasks to Ada95 Protected ObjectsLI Bang-qing,XU Bao-wen,LIU Chao,ZHANG Mao-lin,YAN Hai-hua,YANG Feng and HE Zhi-tao2000,11(6):836-840 [Abstract(3368)] [View PDF(4395)487.29 K]A Method for Disseminating and Integrating Relational Database across NetworksXI Jian-qing,XIA Zhi-zhong and LIU Fa-gui2000,11(6):848-852 [Abstract(3253)] [View PDF(4319)351.43 K]
Review on Active Contour Model (Snake Model)LI Pei-hua and ZHANG Tian-wen2000,11(6):751-757 [Abstract(7570)] [View PDF(10802)497.16 K]