Volume 12,Issue 9,2001 Table of Contents
A Procedural Semantics for Disjunctive Closed World AssumptionWANG Ke wen,ZHOU Li zhu and FENG Jian hua2001,12(9):1265-1270 [Abstract(3728)] [View PDF(4052)352.12 K]Automatic Parsing of News Video Using Multimodal AnalysisWANG Wei qiang and GAO Wen2001,12(9):1271-1278 [Abstract(3425)] [View PDF(4308)719.32 K]Operational Semantics for Functional Logic LanguagesMOHAMED Hamada2001,12(9):1279-1286 [Abstract(3401)] [View PDF(4251)449.98 K]Embedded Image Coding Based on Hierarchical Discrete Cosine TransformZHAO De bin,ZHANG Da peng and GAO Wen2001,12(9):1287-1294 [Abstract(3603)] [View PDF(4339)1.13 M]Composition and Interactive Computation of Object SystemsQIAN Jun,HUANG Tao and FENG Yu lin2001,12(9):1295-1303 [Abstract(3225)] [View PDF(4185)1.17 M]A Novel Secret Key Watermarking SystemZHONG Hua,JIAO Li cheng and LIU Fang2001,12(9):1304-1311 [Abstract(3934)] [View PDF(4360)485.10 K]Liveness and Boundedness of Extended Strong Asymmetric Choice NetsJIAO Li and LU Wei ming2001,12(9):1312-1317 [Abstract(3702)] [View PDF(3971)395.14 K]A New Approach for the Analysis of Electronic Commerce ProtocolsZHOU Dian cui,QING Si han and ZHOU Zhan fei2001,12(9):1318-1328 [Abstract(3438)] [View PDF(4411)588.52 K]Research and Implementation of the Active Rules in ORDBMSLI Hong yan,LI Zhan huai and TANG Shi wei2001,12(9):1329-1335 [Abstract(3350)] [View PDF(4191)505.75 K]Content-Based Chinese Antique Books Retrieval Through Visual Similarity CriteriaSHI Bai le,ZHANG Liang,WANG Yong and CHEN Zhi feng2001,12(9):1336-1342 [Abstract(3822)] [View PDF(4462)495.07 K]Threaded Binary Sorted Hash Trees Solution Scheme for Certificate Revocation ProblemWANG Shang ping,ZHANG Ya ling and WANG Yu min2001,12(9):1343-1350 [Abstract(4082)] [View PDF(4483)560.00 K]Building and Assembling Reusable Components Based on Software ArchitectureZHANG Shi kun,ZHANG Wen juan,CHANG Xin,WANG Li fu and YANG Fu qing2001,12(9):1351-1359 [Abstract(7782)] [View PDF(5896)586.26 K]A Unified Spatio-Temporal Data Model Based on State and ChangeZHENG Kou gen,TAN Shi yu and PAN Yun he2001,12(9):1360-1365 [Abstract(4002)] [View PDF(5148)425.58 K]A Multi-Agent Belief Logic and Its Generalization with ProbabilityCAO Zi ning,DONG Hong bin and SHI Chun yi2001,12(9):1366-1374 [Abstract(3649)] [View PDF(4261)558.30 K]Design and Implementation of a Distributed Cooperative Intrusion Detection SystemDUAN Hai xin and WU Jian ping2001,12(9):1375-1379 [Abstract(3501)] [View PDF(4722)394.93 K]Research on Solution to Complex Container-Loading Problem Based on Genetic AlgorithmHE Da yong,ZHA Jian zhong and JIANG Yi dong2001,12(9):1380-1385 [Abstract(4944)] [View PDF(5543)851.29 K]Using Naive Bayes to Coordinate the Classification of Web PagesFAN Yan,ZHENG Cheng,WANG Qingyi,CAI Qing sheng and LIU Jie2001,12(9):1386-1392 [Abstract(3832)] [View PDF(4390)1.45 M]Optimization of Multiple User-Defined Functions in a Query Using Interval ConstraintsYANG Bo,HONG Xiao guang and WANG Hai yang2001,12(9):1393-1398 [Abstract(3386)] [View PDF(4052)377.27 K]Design and Implementation of Intelligent Environment for Computer Embroidery ProgrammingLIU Hai tao,GUO Lei and CHEN Shi fu2001,12(9):1399-1404 [Abstract(3804)] [View PDF(4869)368.18 K]Logarithm Model Based Word Sense DisambiguationZHU Jing bo,LI Heng,ZHANG Yue and YAO Tian shun2001,12(9):1405-1412 [Abstract(3354)] [View PDF(4290)474.33 K]A Multipoint Real-Time Speech Mixing and Scheduling Algorithm Based on Packet NetworksYANG Shu tang,YU Sheng sheng and ZHOU Jing li2001,12(9):1413-1419 [Abstract(3803)] [View PDF(4995)1.34 M]Maximum Entropy Thresholding AlgorithmZHOU De long,PAN Quan,ZHANG Hong cai and DAI Guan zhong2001,12(9):1420-1422 [Abstract(4261)] [View PDF(5014)596.70 K]