Volume 11,Issue 6,2000 Table of Contents
Building Hybrid Real Time Systems in XYZ/E——Implemen-tation of the Steam-Boiler Control Specification ProblemYAN An and TANG Zhi song2000,11(6):711-719 [Abstract(3853)] [View PDF(5202)484.26 K]Flexible Cooperative Transaction ModelMO Qian,LI Zi mu,TAN Yu song and ZHOU Xing ming2000,11(6):720-726 [Abstract(3701)] [View PDF(4321)423.76 K]Abstract Test Methods for Network Relay SystemBI Jun and WU Jian ping2000,11(6):727-734 [Abstract(3500)] [View PDF(5106)496.65 K]FDBSCAN: A Fast DBSCAN AlgorithmZHOU Shui geng,ZHOU Ao ying,JIN Wen,FAN Ye and QIAN Wei ning2000,11(6):735-744 [Abstract(4792)] [View PDF(6547)1.26 M]Relation of in R/M and ≤T in RSUI Yue-fei2000,11(6):745-750 [Abstract(3154)] [View PDF(4393)1.67 M]Structural Operational Semantic Approach to Knowledge Base MaintenanceSU Kai-le2000,11(6):758-766 [Abstract(3233)] [View PDF(4457)612.08 K]Structural Operational Semantic Approach to Knowledge Base MaintenanceLI Wei,ZHANG Shi-kun,WANG Li-fu,FENG Hui and YANG Fu-qing2000,11(6):758-766 [Abstract(3212)] [View PDF(4179)322.02 K]Design and Analysis of String Matching Algorithm on Distributed Memory MachineCHEN Guo-liang,LIN Jie and GU Nai-jie2000,11(6):771-778 [Abstract(3826)] [View PDF(4871)455.89 K]A Role Hierarchy Model for Role-Based Access Control and Its ApplicationZHONG Hua,FENG Yu-lin and JIANG Hong-an2000,11(6):779-784 [Abstract(4591)] [View PDF(5167)403.49 K]A Real-Time Algorithm of 3-D Shadow Generation for Point Light SourcesLIU Lie-ming and WU En-hua2000,11(6):785-790 [Abstract(3952)] [View PDF(4712)811.32 K]A Scheme of Active Hierarchical Multicast RoutingHE Dan,CHEN Dao-xu and XIE Li2000,11(6):791-798 [Abstract(3423)] [View PDF(4391)533.91 K]An Adaptive Method for Text-Independent Speaker VerificationZHANG Yi-ying,ZHU Xiao-yan and ZHANG Bo2000,11(6):799-803 [Abstract(3321)] [View PDF(4438)369.24 K]Application of P-Fourier Transform to Handwritten Chinese Character RecognitionYAO Dan-lin,CHEN Huo-wang and YIN Jian-ping2000,11(6):804-808 [Abstract(3876)] [View PDF(5005)736.51 K]Commonsense Oriented Temporal ReasoningXU Jin-hui,MAO Xi-ping,LIU Gui-xia and SHI Chun-yi2000,11(6):809-815 [Abstract(3645)] [View PDF(4579)458.96 K]An Effective Resource Reservation Strategy for Guaranteed End-to-End Delay RequirementsZHAN Yong-zhao,ZENG Qing-kai,HE Dan and XIE Li2000,11(6):816-822 [Abstract(3460)] [View PDF(5406)501.64 K]Ecological Evolution Model Guided by Life PeriodCAO Xian-bin,XU Kai,ZHANG Jie and WANG Xu-fa2000,11(6):823-828 [Abstract(3809)] [View PDF(4483)359.99 K]Loading of a Real-Time Main Memory DatabaseLIU Yun-sheng and LI Guo-hui2000,11(6):829-835 [Abstract(3853)] [View PDF(4520)402.22 K]An Approach for Transforming Ada83 Serving Tasks to Ada95 Protected ObjectsLI Bang-qing,XU Bao-wen,LIU Chao,ZHANG Mao-lin,YAN Hai-hua,YANG Feng and HE Zhi-tao2000,11(6):836-840 [Abstract(3414)] [View PDF(4551)487.29 K]A Method for Disseminating and Integrating Relational Database across NetworksXI Jian-qing,XIA Zhi-zhong and LIU Fa-gui2000,11(6):848-852 [Abstract(3297)] [View PDF(4450)351.43 K]
Review on Active Contour Model (Snake Model)LI Pei-hua and ZHANG Tian-wen2000,11(6):751-757 [Abstract(7628)] [View PDF(11190)497.16 K]