Volume 12,Issue 9,2001 Table of Contents
A Procedural Semantics for Disjunctive Closed World AssumptionWANG Ke wen,ZHOU Li zhu and FENG Jian hua2001,12(9):1265-1270 [Abstract(3811)] [View PDF(4353)352.12 K]Automatic Parsing of News Video Using Multimodal AnalysisWANG Wei qiang and GAO Wen2001,12(9):1271-1278 [Abstract(3466)] [View PDF(4632)719.32 K]Operational Semantics for Functional Logic LanguagesMOHAMED Hamada2001,12(9):1279-1286 [Abstract(3440)] [View PDF(4543)449.98 K]Embedded Image Coding Based on Hierarchical Discrete Cosine TransformZHAO De bin,ZHANG Da peng and GAO Wen2001,12(9):1287-1294 [Abstract(3663)] [View PDF(4650)1.13 M]Composition and Interactive Computation of Object SystemsQIAN Jun,HUANG Tao and FENG Yu lin2001,12(9):1295-1303 [Abstract(3262)] [View PDF(4447)1.17 M]A Novel Secret Key Watermarking SystemZHONG Hua,JIAO Li cheng and LIU Fang2001,12(9):1304-1311 [Abstract(3965)] [View PDF(4643)485.10 K]Liveness and Boundedness of Extended Strong Asymmetric Choice NetsJIAO Li and LU Wei ming2001,12(9):1312-1317 [Abstract(3744)] [View PDF(4270)395.14 K]A New Approach for the Analysis of Electronic Commerce ProtocolsZHOU Dian cui,QING Si han and ZHOU Zhan fei2001,12(9):1318-1328 [Abstract(3474)] [View PDF(4766)588.52 K]Research and Implementation of the Active Rules in ORDBMSLI Hong yan,LI Zhan huai and TANG Shi wei2001,12(9):1329-1335 [Abstract(3398)] [View PDF(4458)505.75 K]Content-Based Chinese Antique Books Retrieval Through Visual Similarity CriteriaSHI Bai le,ZHANG Liang,WANG Yong and CHEN Zhi feng2001,12(9):1336-1342 [Abstract(3876)] [View PDF(4768)495.07 K]Threaded Binary Sorted Hash Trees Solution Scheme for Certificate Revocation ProblemWANG Shang ping,ZHANG Ya ling and WANG Yu min2001,12(9):1343-1350 [Abstract(4124)] [View PDF(4802)560.00 K]Building and Assembling Reusable Components Based on Software ArchitectureZHANG Shi kun,ZHANG Wen juan,CHANG Xin,WANG Li fu and YANG Fu qing2001,12(9):1351-1359 [Abstract(7838)] [View PDF(6230)586.26 K]A Unified Spatio-Temporal Data Model Based on State and ChangeZHENG Kou gen,TAN Shi yu and PAN Yun he2001,12(9):1360-1365 [Abstract(4043)] [View PDF(5461)425.58 K]A Multi-Agent Belief Logic and Its Generalization with ProbabilityCAO Zi ning,DONG Hong bin and SHI Chun yi2001,12(9):1366-1374 [Abstract(3692)] [View PDF(4556)558.30 K]Design and Implementation of a Distributed Cooperative Intrusion Detection SystemDUAN Hai xin and WU Jian ping2001,12(9):1375-1379 [Abstract(3546)] [View PDF(5015)394.93 K]Research on Solution to Complex Container-Loading Problem Based on Genetic AlgorithmHE Da yong,ZHA Jian zhong and JIANG Yi dong2001,12(9):1380-1385 [Abstract(4998)] [View PDF(5869)851.29 K]Using Naive Bayes to Coordinate the Classification of Web PagesFAN Yan,ZHENG Cheng,WANG Qingyi,CAI Qing sheng and LIU Jie2001,12(9):1386-1392 [Abstract(3868)] [View PDF(4715)1.45 M]Optimization of Multiple User-Defined Functions in a Query Using Interval ConstraintsYANG Bo,HONG Xiao guang and WANG Hai yang2001,12(9):1393-1398 [Abstract(3428)] [View PDF(4349)377.27 K]Design and Implementation of Intelligent Environment for Computer Embroidery ProgrammingLIU Hai tao,GUO Lei and CHEN Shi fu2001,12(9):1399-1404 [Abstract(3899)] [View PDF(5184)368.18 K]Logarithm Model Based Word Sense DisambiguationZHU Jing bo,LI Heng,ZHANG Yue and YAO Tian shun2001,12(9):1405-1412 [Abstract(3403)] [View PDF(4616)474.33 K]A Multipoint Real-Time Speech Mixing and Scheduling Algorithm Based on Packet NetworksYANG Shu tang,YU Sheng sheng and ZHOU Jing li2001,12(9):1413-1419 [Abstract(3851)] [View PDF(5301)1.34 M]Maximum Entropy Thresholding AlgorithmZHOU De long,PAN Quan,ZHANG Hong cai and DAI Guan zhong2001,12(9):1420-1422 [Abstract(4345)] [View PDF(5300)596.70 K]