Volume 11,Issue 6,2000 Table of Contents
Building Hybrid Real Time Systems in XYZ/E——Implemen-tation of the Steam-Boiler Control Specification ProblemYAN An and TANG Zhi song2000,11(6):711-719 [Abstract(3789)] [View PDF(4546)484.26 K]Flexible Cooperative Transaction ModelMO Qian,LI Zi mu,TAN Yu song and ZHOU Xing ming2000,11(6):720-726 [Abstract(3637)] [View PDF(3670)423.76 K]Abstract Test Methods for Network Relay SystemBI Jun and WU Jian ping2000,11(6):727-734 [Abstract(3410)] [View PDF(4432)496.65 K]FDBSCAN: A Fast DBSCAN AlgorithmZHOU Shui geng,ZHOU Ao ying,JIN Wen,FAN Ye and QIAN Wei ning2000,11(6):735-744 [Abstract(4628)] [View PDF(5789)1.26 M]Relation of in R/M and ≤T in RSUI Yue-fei2000,11(6):745-750 [Abstract(3032)] [View PDF(3806)1.67 M]Structural Operational Semantic Approach to Knowledge Base MaintenanceSU Kai-le2000,11(6):758-766 [Abstract(3176)] [View PDF(3870)612.08 K]Structural Operational Semantic Approach to Knowledge Base MaintenanceLI Wei,ZHANG Shi-kun,WANG Li-fu,FENG Hui and YANG Fu-qing2000,11(6):758-766 [Abstract(3159)] [View PDF(3624)322.02 K]Design and Analysis of String Matching Algorithm on Distributed Memory MachineCHEN Guo-liang,LIN Jie and GU Nai-jie2000,11(6):771-778 [Abstract(3724)] [View PDF(4244)455.89 K]A Role Hierarchy Model for Role-Based Access Control and Its ApplicationZHONG Hua,FENG Yu-lin and JIANG Hong-an2000,11(6):779-784 [Abstract(4469)] [View PDF(4549)403.49 K]A Real-Time Algorithm of 3-D Shadow Generation for Point Light SourcesLIU Lie-ming and WU En-hua2000,11(6):785-790 [Abstract(3852)] [View PDF(4145)811.32 K]A Scheme of Active Hierarchical Multicast RoutingHE Dan,CHEN Dao-xu and XIE Li2000,11(6):791-798 [Abstract(3318)] [View PDF(3824)533.91 K]An Adaptive Method for Text-Independent Speaker VerificationZHANG Yi-ying,ZHU Xiao-yan and ZHANG Bo2000,11(6):799-803 [Abstract(3231)] [View PDF(3845)369.24 K]Application of P-Fourier Transform to Handwritten Chinese Character RecognitionYAO Dan-lin,CHEN Huo-wang and YIN Jian-ping2000,11(6):804-808 [Abstract(3785)] [View PDF(4372)736.51 K]Commonsense Oriented Temporal ReasoningXU Jin-hui,MAO Xi-ping,LIU Gui-xia and SHI Chun-yi2000,11(6):809-815 [Abstract(3488)] [View PDF(3967)458.96 K]An Effective Resource Reservation Strategy for Guaranteed End-to-End Delay RequirementsZHAN Yong-zhao,ZENG Qing-kai,HE Dan and XIE Li2000,11(6):816-822 [Abstract(3384)] [View PDF(4598)501.64 K]Ecological Evolution Model Guided by Life PeriodCAO Xian-bin,XU Kai,ZHANG Jie and WANG Xu-fa2000,11(6):823-828 [Abstract(3722)] [View PDF(3886)359.99 K]Loading of a Real-Time Main Memory DatabaseLIU Yun-sheng and LI Guo-hui2000,11(6):829-835 [Abstract(3725)] [View PDF(3944)402.22 K]An Approach for Transforming Ada83 Serving Tasks to Ada95 Protected ObjectsLI Bang-qing,XU Bao-wen,LIU Chao,ZHANG Mao-lin,YAN Hai-hua,YANG Feng and HE Zhi-tao2000,11(6):836-840 [Abstract(3325)] [View PDF(3891)487.29 K]A Method for Disseminating and Integrating Relational Database across NetworksXI Jian-qing,XIA Zhi-zhong and LIU Fa-gui2000,11(6):848-852 [Abstract(3206)] [View PDF(3871)351.43 K]
Review on Active Contour Model (Snake Model)LI Pei-hua and ZHANG Tian-wen2000,11(6):751-757 [Abstract(7376)] [View PDF(9774)497.16 K]