Volume 12,Issue 9,2001 Table of Contents
A Procedural Semantics for Disjunctive Closed World AssumptionWANG Ke wen,ZHOU Li zhu and FENG Jian hua2001,12(9):1265-1270 [Abstract(3699)] [View PDF(3802)352.12 K]Automatic Parsing of News Video Using Multimodal AnalysisWANG Wei qiang and GAO Wen2001,12(9):1271-1278 [Abstract(3380)] [View PDF(4030)719.32 K]Operational Semantics for Functional Logic LanguagesMOHAMED Hamada2001,12(9):1279-1286 [Abstract(3378)] [View PDF(3969)449.98 K]Embedded Image Coding Based on Hierarchical Discrete Cosine TransformZHAO De bin,ZHANG Da peng and GAO Wen2001,12(9):1287-1294 [Abstract(3543)] [View PDF(4056)1.13 M]Composition and Interactive Computation of Object SystemsQIAN Jun,HUANG Tao and FENG Yu lin2001,12(9):1295-1303 [Abstract(3200)] [View PDF(3904)1.17 M]A Novel Secret Key Watermarking SystemZHONG Hua,JIAO Li cheng and LIU Fang2001,12(9):1304-1311 [Abstract(3907)] [View PDF(4078)485.10 K]Liveness and Boundedness of Extended Strong Asymmetric Choice NetsJIAO Li and LU Wei ming2001,12(9):1312-1317 [Abstract(3670)] [View PDF(3690)395.14 K]A New Approach for the Analysis of Electronic Commerce ProtocolsZHOU Dian cui,QING Si han and ZHOU Zhan fei2001,12(9):1318-1328 [Abstract(3411)] [View PDF(4138)588.52 K]Research and Implementation of the Active Rules in ORDBMSLI Hong yan,LI Zhan huai and TANG Shi wei2001,12(9):1329-1335 [Abstract(3328)] [View PDF(3932)505.75 K]Content-Based Chinese Antique Books Retrieval Through Visual Similarity CriteriaSHI Bai le,ZHANG Liang,WANG Yong and CHEN Zhi feng2001,12(9):1336-1342 [Abstract(3797)] [View PDF(4186)495.07 K]Threaded Binary Sorted Hash Trees Solution Scheme for Certificate Revocation ProblemWANG Shang ping,ZHANG Ya ling and WANG Yu min2001,12(9):1343-1350 [Abstract(4046)] [View PDF(4173)560.00 K]Building and Assembling Reusable Components Based on Software ArchitectureZHANG Shi kun,ZHANG Wen juan,CHANG Xin,WANG Li fu and YANG Fu qing2001,12(9):1351-1359 [Abstract(7711)] [View PDF(5543)586.26 K]A Unified Spatio-Temporal Data Model Based on State and ChangeZHENG Kou gen,TAN Shi yu and PAN Yun he2001,12(9):1360-1365 [Abstract(3968)] [View PDF(4847)425.58 K]A Multi-Agent Belief Logic and Its Generalization with ProbabilityCAO Zi ning,DONG Hong bin and SHI Chun yi2001,12(9):1366-1374 [Abstract(3617)] [View PDF(3987)558.30 K]Design and Implementation of a Distributed Cooperative Intrusion Detection SystemDUAN Hai xin and WU Jian ping2001,12(9):1375-1379 [Abstract(3474)] [View PDF(4444)394.93 K]Research on Solution to Complex Container-Loading Problem Based on Genetic AlgorithmHE Da yong,ZHA Jian zhong and JIANG Yi dong2001,12(9):1380-1385 [Abstract(4859)] [View PDF(5241)851.29 K]Using Naive Bayes to Coordinate the Classification of Web PagesFAN Yan,ZHENG Cheng,WANG Qingyi,CAI Qing sheng and LIU Jie2001,12(9):1386-1392 [Abstract(3780)] [View PDF(4140)1.45 M]Optimization of Multiple User-Defined Functions in a Query Using Interval ConstraintsYANG Bo,HONG Xiao guang and WANG Hai yang2001,12(9):1393-1398 [Abstract(3356)] [View PDF(3791)377.27 K]Design and Implementation of Intelligent Environment for Computer Embroidery ProgrammingLIU Hai tao,GUO Lei and CHEN Shi fu2001,12(9):1399-1404 [Abstract(3744)] [View PDF(4547)368.18 K]Logarithm Model Based Word Sense DisambiguationZHU Jing bo,LI Heng,ZHANG Yue and YAO Tian shun2001,12(9):1405-1412 [Abstract(3310)] [View PDF(4014)474.33 K]A Multipoint Real-Time Speech Mixing and Scheduling Algorithm Based on Packet NetworksYANG Shu tang,YU Sheng sheng and ZHOU Jing li2001,12(9):1413-1419 [Abstract(3774)] [View PDF(4700)1.34 M]Maximum Entropy Thresholding AlgorithmZHOU De long,PAN Quan,ZHANG Hong cai and DAI Guan zhong2001,12(9):1420-1422 [Abstract(4179)] [View PDF(4707)596.70 K]