Volume 13,Issue 8,2002 Table of Contents
A Goal-Based Approach for Process Instance EvolutionCHEN Cheng and GU Yu-qing2002,13(8):1345-1351 [Abstract(3474)] [View PDF(4304)407.68 K]Design of Secure System Architecture Model for Active NetworkXIA Zheng-you and ZHANG Shi-yong2002,13(8):1352-1360 [Abstract(3339)] [View PDF(5021)493.17 K]Improved Stumps Combined by Boosting for Text CategorizationDIAO Li-li,HU Ke-yun,LU Yu-chang and SHI Chun-yi2002,13(8):1361-1367 [Abstract(3722)] [View PDF(5030)449.31 K]Distribution of the Linear Complexities of Generalized Legendre SequencesWANG Ping and DAI Zong-duo2002,13(8):1368-1373 [Abstract(3440)] [View PDF(4530)388.79 K]A Flexible and Formalized Process Modeling LanguageCHEN Cheng,SHEN Bei-jun and GU Yu-qing2002,13(8):1374-1381 [Abstract(3392)] [View PDF(4819)547.36 K]Analyzing Popular Clustering Algorithms from Different ViewpointsQIAN Wei-ning and ZHOU Ao-ying2002,13(8):1382-1394 [Abstract(4263)] [View PDF(7624)731.87 K]Distributed Real-Time Transaction Commit ProcessingQIN Biao and LIU Yun-sheng2002,13(8):1395-1401 [Abstract(3543)] [View PDF(4637)389.54 K]Analysis of Composite Events in Adaptive Mobile Computing System by Unidirectional Queue AutomataLI Guo-dong and ZHANG De-fu2002,13(8):1402-1411 [Abstract(3482)] [View PDF(4742)658.64 K]Robust Distributed Multiplication Schemes over IntegerWANG Hong,FENG Deng-guo and XIAO Guo-zhen2002,13(8):1412-1416 [Abstract(3490)] [View PDF(4630)351.58 K]An Intrusion Tolerant CA SchemeJING Ji-wu and FENG Deng-guo2002,13(8):1417-1422 [Abstract(4336)] [View PDF(6235)435.62 K]An Improved Multi-Dimensional Storage Structure for Data WarehousingFENG Jian-hua,JIANG Xu-dong and ZHOU Li-zhu2002,13(8):1423-1429 [Abstract(3302)] [View PDF(5115)397.33 K]Software Architecture of the Hall for Workshop of Metasynthetic EngineeringCAO Long-bing and DAI Ru-wei2002,13(8):1430-1435 [Abstract(3647)] [View PDF(5707)521.34 K]A Geospatial Information Layer Sharing Model for Digital EarthCHEN Ai-jun,LI Qi and XU Guang-you2002,13(8):1436-1440 [Abstract(3754)] [View PDF(4935)469.22 K]RBFN Structure Determination Strategy Based on PLS and GasZHAO Wei-xiang and WU Li-de2002,13(8):1450-1455 [Abstract(3307)] [View PDF(5147)388.93 K]Algorithms of Wavelength Assignment on All Optical Ring with Fixed Wavelength ConvertersWAN Ying-yu,CHEN Guo-liang,XU Yin-long and GU Jun2002,13(8):1456-1464 [Abstract(3028)] [View PDF(4842)550.15 K]An Algorithm of Mining Personal Moving Patterns in a Wireless Communication EnvironmentSONG Guo-jie,TANG Shi-wei,YANG Dong-qing,WANG Teng-jiao and YE Heng-qiang2002,13(8):1465-1471 [Abstract(3549)] [View PDF(4545)478.04 K]Performance Equivalent Analysis of Workflow SystemsLIN Chuang,TIAN Li-qin and WEI Ya-ya2002,13(8):1472-1480 [Abstract(3784)] [View PDF(5525)551.96 K]A Practical and Effective Virtual Remote Supercomputing EnvironmentXIE Fei,YANG Guang-wen,JU Da-peng,WANG Ding-xing and ZHENG Wei-ming2002,13(8):1481-1487 [Abstract(3836)] [View PDF(4935)332.75 K]The Normal Object Scheme Forest with Respect to Conflict-Free DependenciesWU Yong-hui and ZHOU Ao-ying2002,13(8):1488-1493 [Abstract(3275)] [View PDF(4674)431.16 K]Object-Oriented Design of Human-Machine Interface in the Visual Programming EnvironmentSHAO Wei-zhong and LIU Xin2002,13(8):1494-1499 [Abstract(3321)] [View PDF(5027)288.91 K]Incremental and Distributed Web Page Clustering Algorithms PG+ and PG++WANG Qi-xin,LI Yi,DONG Li,NIE Yu and WANG Ke-hong2002,13(8):1500-1507 [Abstract(3765)] [View PDF(5323)530.84 K]Semi-Supervised Web Mining Based on Bayes Latent Semantic ModelGONG Xiu-jun and SHI Zhong-zhi2002,13(8):1508-1514 [Abstract(3581)] [View PDF(6338)440.67 K]A Packet Scheduling Strategy for Multiple Performance ObjectsJIANG Yong and WU Jian-ping2002,13(8):1515-1520 [Abstract(3812)] [View PDF(4869)364.79 K]Role-Based Authorization Constraint with Time CharacterDONG Guang-yu,QING Si-han and LIU Ke-long2002,13(8):1521-1527 [Abstract(3880)] [View PDF(4985)389.70 K]A Files Checkpointing Approach Based on Virtual File OperationsLIU Shao-feng,WANG Dong-sheng and ZHU Jing2002,13(8):1528-1533 [Abstract(3545)] [View PDF(4878)244.28 K]Spatial Information Retrieval and Database GeneralizationLU Sang-lu,ZHOU Xiao-fang,CHEN Gui-hai and XIE Li2002,13(8):1534-1539 [Abstract(3220)] [View PDF(4754)305.11 K]A Data Mining System for Very Large DatabasesQIAN Wei-ning,WEI Li,WANG Yan,QIAN Hai-lei and ZHOU Ao-ying2002,13(8):1540-1545 [Abstract(4047)] [View PDF(6389)327.92 K]Retrieving Components Based on Faceted ClassificationWANG Yuan-feng,ZHANG Yong,REN Hong-min,ZHU San-yuan and QIAN Le-qiu12002,13(8):1546-1551 [Abstract(3554)] [View PDF(5291)389.02 K]A Method to Detect Anchorperson Shots for Digital TV NewsYANG Na,LUO Hang-zai and XUE Xiang-yang2002,13(8):1559-1567 [Abstract(3856)] [View PDF(4940)520.86 K]An Optimization Approach on Low Bite Rate Video CodingHE Yu-wen,WANG Qi,YUAN Yu,ZHONG Yu-zhuo and YANG Shi-qiang2002,13(8):1568-1576 [Abstract(3418)] [View PDF(5644)651.59 K]Shot Content Analysis for Video Retrieval ApplicationsLIN Tong,ZHANG Hong-jiang,FENG Ju-fu and SHI Qing-yun2002,13(8):1577-1585 [Abstract(3664)] [View PDF(6621)710.07 K]A Data Cover Method of Data Cube Reconstruction Based on Data SlicesCAO Ji-guang and WANG Shen-kang2002,13(8):1586-1592 [Abstract(3228)] [View PDF(5340)562.96 K]Automatic Audio Classification by Using Hidden Markov ModelLU Jian,CHEN Yi-song,SUN Zheng-xing and ZHANG Fu-yan2002,13(8):1593-1597 [Abstract(4674)] [View PDF(6872)368.09 K]A Documental Clustering Algorithm Based on Fuzzy Concept Graph and Its Application in WebCHEN Ning,CHEN An,ZHOU Long-xiang,JIA Wei-jia and LUO San-ding2002,13(8):1598-1605 [Abstract(3650)] [View PDF(4984)496.25 K]Preemptive Scheduling Problem with Interrupted Time Cost on Identical Parallel MachinesSUN Guang-zhong,CHEN Guo-liang,XU Yin-long and GU Jun2002,13(8):1606-1611 [Abstract(3516)] [View PDF(4586)455.22 K]Random I/O Scheduling Algorithms in Online Tape Library SystemsSHI Jing and ZHOU Li-zhu2002,13(8):1612-1620 [Abstract(3624)] [View PDF(5136)565.88 K]A Group-Prefetching Algorithm of Information for Multi-Managed Objects in WANZHANG Jin-xiang,WU Jian-ping,HAN Shu-ling,WU Quan-yuan and WANG Huai-min2002,13(8):1621-1627 [Abstract(3286)] [View PDF(5064)374.58 K]Module-Based Mobile Agent and Its Schedule MethodWU Cheng-gang and SHI Zhong-zhi2002,13(8):1628-1636 [Abstract(3286)] [View PDF(4591)566.61 K]A Multi-Agent Multi-Issue Negotiation ModelWANG Li-chun and CHEN Shi-fu2002,13(8):1637-1643 [Abstract(3470)] [View PDF(5454)379.12 K]Model Mapping Techniques for STEP and Its Application in Open EnvironmentYANG Zi-jiang,LI Shan-ping and DONG Jin-xiang2002,13(8):1644-1651 [Abstract(3368)] [View PDF(4909)488.38 K]Hardware Implementation of Petri NetsZHAO Bu-hui,JING Liang and YAN Yang-guang2002,13(8):1652-1657 [Abstract(3977)] [View PDF(5268)390.19 K]A Spatial-Temporal Data Model for Moving Area ObjectsYI Shan-zhen,ZHANG Yong and ZHOU Li-zhu2002,13(8):1658-1665 [Abstract(3898)] [View PDF(5154)593.34 K]A Workflow Model Based on Timed Petri NetLI Wei,ZENG Guang-zhou and WANG Xiao-lin2002,13(8):1666-1671 [Abstract(4362)] [View PDF(5242)332.85 K]A Global Web Workflow System Based on Active ObjectHU Hua and YU Hong-zhi2002,13(8):1672-1677 [Abstract(3306)] [View PDF(4780)338.90 K]A Multidimensional Index Structure for Fast Similarity RetrievalFENG Yu-cai,CAO Kui and CAO Zhong-sheng2002,13(8):1678-1685 [Abstract(3811)] [View PDF(5416)443.57 K]Analysis of Event Balance in the Verification of Workflow SoundnessLUO Hai-bin,FAN Yu-shun and WU Cheng2002,13(8):1686-1691 [Abstract(4101)] [View PDF(5106)324.68 K]Transactions Schedule of Embedded Database SystemsLIU Yun-sheng,XIA Jia-li and XU Gui-ping2002,13(8):1692-1697 [Abstract(3759)] [View PDF(5097)381.70 K]Description and Verification of an Online Stock Trading System by Using Temporal Petri NetsDU Yu-yue and JIANG Chang-jun2002,13(8):1698-1704 [Abstract(3582)] [View PDF(5282)565.20 K]Application of Tabu Search Algorithm in Telecommunication Network Intelligence ManagementSHAO Liang,LI Lei and CHEN Chang-juan2002,13(8):1705-1709 [Abstract(3861)] [View PDF(5353)295.66 K]A Delay Analysis of RMTPLIN Yu,WANG Chong-gang,WANG Wen-dong and CHENG Shi-duan2002,13(8):1710-1717 [Abstract(4961)] [View PDF(5006)492.89 K]A Run-Time Technique for Parallel Loop Identification Based on Distributed SystemYANG Xue-lin,YU Meng,CHEN Dao-xu and XIE Li2002,13(8):1718-1722 [Abstract(3003)] [View PDF(4569)346.67 K]Design and Implementation of Distributed Intrusion Detection System NetNumenLI Wang,WU Li-fa and HU Gu-yu2002,13(8):1723-1728 [Abstract(4124)] [View PDF(6086)317.13 K]A Signature Scheme Based on the Strong RSA AssumptionWANG Bao-you and HU Yun-fa2002,13(8):1729-1734 [Abstract(3519)] [View PDF(6354)510.92 K]Scheduling and Admission Control in Video Servers with Multi-Network I/OXIE Jian-guo,CHEN Jian-er and CHEN Song-qiao2002,13(8):1735-1740 [Abstract(3461)] [View PDF(4862)391.80 K]
A Survey on Multicast Congestion ControlSHI Feng and WU Jian-ping2002,13(8):1441-1449 [Abstract(6628)] [View PDF(7148)447.85 K]Overview on Managing Time in Workflow SystemsLI Hui-fang and FAN Yu-shun2002,13(8):1552-1558 [Abstract(6905)] [View PDF(7212)397.62 K]