Volume 12,Issue 6,2001 Table of Contents
A Geographical Information System Based on A gent ArchitectureTANG Chao,FENG Shan and XU Li-da2001,12(6):791-801 [Abstract(3444)] [View PDF(4543)614.29 K]A Denotational Semantics of Timed RSL Using Duration CalculusLI Li and HE Ji-feng2001,12(6):802-815 [Abstract(3728)] [View PDF(4090)1009.16 K]New Mass-Assignment-Based Fuzzy CMAC and I ts Learning ConvergenceWANG Shi tong,J.F. Baldwin and T.P. Martin2001,12(6):816-821 [Abstract(3583)] [View PDF(4109)322.25 K]Cube Algorithms for Very Large Compressed Data WarehousesGAO Hong and LI Jian zhong2001,12(6):830-839 [Abstract(3636)] [View PDF(4498)1.24 M]A Script Language Integrating COM and CORBAFU Yan,BAI Shuo and LI Guo jie2001,12(6):840-845 [Abstract(2974)] [View PDF(4267)423.77 K]Optimization of WWW Navigation Path Based on User Access PatternsYANG Xiao hua and ZHOU Long xiang2001,12(6):846-850 [Abstract(3880)] [View PDF(4484)727.50 K]A Neural Network Algorithm for Large Scale Pattern Recognition ProblemsWU Ming rui and ZHANG Bo2001,12(6):851-855 [Abstract(4172)] [View PDF(5432)705.21 K]Controllable 3D MorphingFANG Xiang,BAO Hu jun and PENG Qun sheng2001,12(6):856-863 [Abstract(3731)] [View PDF(4391)3.19 M]A Role-Based Group Awareness ModelGE Sheng,MA Dian fu and HUAI Jin peng2001,12(6):864-871 [Abstract(3752)] [View PDF(5210)1.48 M]An Improved Way on Kerberos Protocol Based on Public-Key AlgorithmsLIU Ke long,QING Si han and MENG Yang2001,12(6):872-877 [Abstract(3511)] [View PDF(4664)639.25 K]Improving Performance in Implementing Encryption AlgorithmsZHANG Meng,YANG Ke xin and JU Jiu bin2001,12(6):878-883 [Abstract(3574)] [View PDF(5735)1001.08 K]The Existence of Relativization One-Way FunctionsCAO Zi ning,Lu Yi zhong and SHI Chun yi2001,12(6):884-888 [Abstract(3477)] [View PDF(4332)645.89 K]On the Computation of End-to-End Delay Bound in Guaranteed Service by Network CalculusZHANG Xin ming,CHEN Guo liang and GU Jun2001,12(6):889-893 [Abstract(3599)] [View PDF(4733)323.84 K]Flexible Data Dependence and Software PipeliningRONG Hong bo and TANG Zhi zhong2001,12(6):894-906 [Abstract(3991)] [View PDF(3975)1.08 M]认证协议的一些新攻击方法WANG Gui lin,QING Si han and ZHOU Zhan fei2001,12(6):907-913 [Abstract(3780)] [View PDF(4306)411.56 K]Realization of Compressing and Replaying Speech on H/PCLI Jin yu and WANG Ren hua2001,12(6):914-921 [Abstract(3936)] [View PDF(4471)479.18 K]Measures of Similarity between Vague SetsLI Fan and XU Zhang yan2001,12(6):922-927 [Abstract(3978)] [View PDF(5050)339.13 K]A Dynamic Fault Tolerant Algorithm for Improving Performance of Redundant ServicesQIAN Fang,JIA Yan,HUANG Jie,GU Xiao bo and ZOU Peng2001,12(6):928-935 [Abstract(3824)] [View PDF(4677)526.48 K]Textured Streamline: an Efficient Visualization Method for 2-Dimension Vector Fields周璐 and 李晓梅2001,12(6):936-942 [Abstract(4002)] [View PDF(4209)2.23 M]An Algorithm for Extracting Road Network from Multi-Band Remote Sensing ImagesCAI Tao and WANG Run sheng2001,12(6):943-948 [Abstract(4425)] [View PDF(5505)872.22 K]
A Survey of Parallel Object-Oriented LanguageYU Meng,ZANG Wan yu,XIE Li and GUO Min yi2001,12(6):822-829 [Abstract(6136)] [View PDF(6529)537.88 K]