Volume 10,Issue 3,1999 Table of Contents
Brief Commentary on the 15 AES Candidate Algorithms Issued by NIST of USAWU Wen-ling,FENG Deng-guo and QING Si-han1999,10(3):225-230 [Abstract(3020)] [View PDF(2809)443.06 K]A Visual Model for Distributed ProgrammingFANG Lin and XIE Li1999,10(3):231-234 [Abstract(2350)] [View PDF(2406)309.72 K]Region Feature-based Interactive Segmentation Method and Its Application in Medical Image AnalyzingLIU Ning-ning and TIAN Jie1999,10(3):235-240 [Abstract(2356)] [View PDF(3160)1.99 M]Segmentation and Recognition Methods of Adhesion and Intersection Character String with the LineZOU Rong-jin,CAI Shi-jie,ZHANG Fu-yan,SU Feng and CHEN Ji-bing1999,10(3):241-247 [Abstract(3323)] [View PDF(3155)469.58 K]Network Protocol Performance Testing Based on Stochastic Petri NetsXU Ming-wei,LIN Chuang and WU Jian-ping1999,10(3):248-252 [Abstract(2916)] [View PDF(2691)352.18 K]Assignments for Pure Functional LanguagesSHI Yue-xiang,YUAN Hua-qiang,SUN Yong-qiang and CHEN Jing1999,10(3):253-256 [Abstract(2806)] [View PDF(2191)242.79 K]An Improved Maximum Entropy Language Model and Its ApplicationLI Juan-zi and HUANG Chang-ning1999,10(3):257-263 [Abstract(2410)] [View PDF(2575)434.60 K]Sort-Merge-Join Algorithm RevisitedSUN Wen-jun and LI Jian-zhong1999,10(3):264-269 [Abstract(2748)] [View PDF(2653)453.96 K]Researches on Object-oriented Frameworks Supporting Multiple Parallel Computing ModelsL Jian,LU Pei,YU Da-chuan and David L. Shang1999,10(3):270-276 [Abstract(2279)] [View PDF(2723)515.13 K]Evidence Theory and Rough Set TheorySU Yun-lin,GUAN Ji-wen and David A.Bell1999,10(3):277-282 [Abstract(2869)] [View PDF(2513)291.24 K]Supporting Project-centered Object-oriented ReuseCHEN Xiao-qun,SHAO Wei-zhong,MEI Hong and YANG Fu-qing1999,10(3):283-287 [Abstract(2281)] [View PDF(2417)400.76 K]An Algorithm Computing the Maximum Clique in a GraphZHONG Sheng and XIE Li1999,10(3):288-292 [Abstract(2952)] [View PDF(2824)345.29 K]Application of Image Coding Using Complex-valued WaveletsXU Gang1999,10(3):293-298 [Abstract(1938)] [View PDF(2544)390.47 K]A Reduced User-level Communication Protocol for MyrinetDONG Chun-lei and ZHENG Wei-min1999,10(3):299-303 [Abstract(2407)] [View PDF(2400)375.62 K]Precedent Interpretation Based Incomplete Information Reasoning and Its ApplicationYE Feng,XU Xiao-fei and WANG Ya-dong1999,10(3):304-309 [Abstract(2348)] [View PDF(2726)441.71 K]A Distributed Object Based Framework for Parallel ProgrammingWANG Chen,ZHOU Ying and ZHANG De-fu1999,10(3):310-316 [Abstract(2008)] [View PDF(2510)481.03 K]Application of B Wavelet and Step Spectrum Analysis in Truncated Data ImagingLUO Jian-hua and YAO Min1999,10(3):317-323 [Abstract(2268)] [View PDF(2689)1.44 M]A Polynomial Time Algorithm for Computing Reliability of Two Classes of NetworksKONG Fan-jia,WANG Guang-xing and ZHANG Xiang-de1999,10(3):324-326 [Abstract(2479)] [View PDF(2578)231.92 K]Three Kinds of Node-reduce Operator on 3rd Order Bzier CurveCAO Feng and ZHANG Ke-jun1999,10(3):327-331 [Abstract(2026)] [View PDF(2169)306.89 K]An Extension Theorem on Finitely Axiomatizable Algebraic Equation SystemsWANG Ju and ZHAO Xi-shun1999,10(3):332-335 [Abstract(2448)] [View PDF(2405)299.47 K]