Volume 11,Issue 11,2000 Table of Contents
There Is No Minimal r.e. Degree in Every Nonzero [a]∈ R/MZHANG Zai yue and SUI Yue fei2000,11(11):1425-1429 [Abstract(3217)] [View PDF(3801)304.43 K]A Hierarchical DGMM Recognizer for Chinese Sign Language RecognitionWU Jiang-qin,GAO Wen,CHEN Xi-lin and MA Ji-yong2000,11(11):1430-1439 [Abstract(3951)] [View PDF(3819)1.06 M]Theoretical Results on Learning Convergence of Generali zed Fuzzy CMACWANG Shi-tong,Baldwin,J.F., and Martin, T.P.2000,11(11):1440-1450 [Abstract(3765)] [View PDF(3953)515.93 K]Research of Field Theory Based Adaptive Resonance Neural NetworkZHOU Zhi hua,CHEN Zhao qian and CHEN Shi fu2000,11(11):1451-1459 [Abstract(3532)] [View PDF(4654)516.65 K]An Average Time Analysis of Backtracking on Random Constraint Satisfa ction ProblemsXU Ke and LI Wei2000,11(11):1467-1471 [Abstract(3850)] [View PDF(4495)313.97 K]An Application Level QoS Negotiation Protocol in Distributed Mul timedia ApplicationsZHANG Yi and CHEN Fu-jie2000,11(11):1472-1477 [Abstract(3582)] [View PDF(3885)401.03 K]An Integrated Mining Approach for Classification and Association Rule Based on Concept LatticeHU Ke-yun,LU Yu-chang and SHI Chun-yi2000,11(11):1478-1484 [Abstract(3854)] [View PDF(4812)420.90 K]An Evaluation Model for Predicting the Efficiency of Parallel Progra msCHEN Chang-sheng,SUN Yong-qiang and HE Ji-feng2000,11(11):1485-1491 [Abstract(3843)] [View PDF(4251)380.81 K]A Social Norm for Multi-Agent SystemMA Guang-wei and SHI Chun-yi2000,11(11):1492-1498 [Abstract(3147)] [View PDF(3817)457.05 K]A Trainable and Fast Partial Parsing Method for ChineseZHANG Yi-min,CHEN Yu-quan and LU Ru-zhan2000,11(11):1499-1504 [Abstract(3514)] [View PDF(4195)430.03 K]An Evolutionary Development Model Supporting Executable SpecificationWU Ming-hui,YING Jing and HE Zhi-jun2000,11(11):1505-1509 [Abstract(3570)] [View PDF(4081)368.83 K]Implementation of Online Analytical Processing System for Insurance B usinessZHAN Min and SUN Yu-fang2000,11(11):1510-1515 [Abstract(3869)] [View PDF(3709)418.16 K]Design and Implementation of Border Gateway Protocol BGP-4 Based on Event-Driven ProgrammingXU Ke,WU Jian-ping and FAN Xiao-bo2000,11(11):1516-1521 [Abstract(3906)] [View PDF(4264)401.15 K]A Model of Mental States Combined with Utility for AgentsXU Jin-hui and SHI Chun-yi2000,11(11):1522-1526 [Abstract(3397)] [View PDF(4013)345.55 K]A Hybrid Method for Automatic Chinese Discourse Structure AnalysisZHANG Yi-min,LU Ru-zhan and SHEN Li-bin2000,11(11):1527-1533 [Abstract(3774)] [View PDF(4582)480.85 K]Design and Implementation of a Simplified-Unsimplified Chinese Chara cter Conversion SystemXIN Chun-sheng and SUN Yu-fang2000,11(11):1534-1540 [Abstract(3816)] [View PDF(4507)459.71 K]Design and Implementation of Java's InternationalizationJI Zhen-yan,CHENG Hu and MEI Jia2000,11(11):1541-1546 [Abstract(4832)] [View PDF(4505)398.83 K]Automatic Chinese-English Paragraph Segmentation and AlignmentWANG Bin,LIU Qun and ZHANG Xiang2000,11(11):1547-1553 [Abstract(3875)] [View PDF(4434)1.57 M]Segmentation of Handwritten Chinese Character String Based on Merging of ElementsLü Yue,SHI Peng-fei and ZHANG Ke-hua2000,11(11):1554-1559 [Abstract(3639)] [View PDF(3961)358.75 K]On the Extension of Structured GammaWEI Zi-chu2000,11(11):1560-1566 [Abstract(3577)] [View PDF(4224)437.60 K]
A Survey of Intrusion Detection Research on Network SecurityJIANG Jian-chun,MA Heng-tai,REN Dang-en and QING Si-han2000,11(11):1460-1466 [Abstract(14143)] [View PDF(11369)520.69 K]