Volume 13,Issue 1,2002 Table of Contents
An Incremental Grid Density-Based Clustering AlgorithmCHEN Ning,ZHOU Long-xiang and CHEN An2002,13(1):1-7 [Abstract(4744)] [View PDF(6345)292.83 K]Managing Method of Spatial Data in Relational Database Management SystemsZHU Tie-wen,ZHONG Zhi-nong and JING Ning2002,13(1):8-14 [Abstract(3442)] [View PDF(4688)339.21 K]Interactive Shape Deformation of n-Sided SurfacesZHENG Jin-jin and ZHANG Jian-jun2002,13(1):15-23 [Abstract(3742)] [View PDF(4310)391.04 K]Criteria-Based Software Process Transaction ModelSHEN Bei-jun,JU De-hua and CHEN Cheng2002,13(1):24-32 [Abstract(3173)] [View PDF(3961)370.16 K]A Linear Temporal Logic with Clocks for Verification of Real-Time SystemsLI Guang-yuan; and TANG Zhi-song2002,13(1):33-41 [Abstract(3838)] [View PDF(3939)444.48 K]Developing a New Dynamic Scheduling Algorithm for Real-Time Multiprocessor SystemsQIAO Ying,WANG Hong-an and DAI Guo-zhong2002,13(1):51-58 [Abstract(3811)] [View PDF(5015)331.68 K]A Complete and Operational Approach to Belief RevisionLI Wei1 and LUAN Shang-min2002,13(1):59-64 [Abstract(3854)] [View PDF(4297)304.67 K]A Novel Aggregation Algorithm for Online Analytical Processing Query EvaluationJIANG Xu-dong,FENG Jian-hua and ZHOU Li-zhu2002,13(1):65-70 [Abstract(3672)] [View PDF(4269)252.95 K]Research on a Concurrent Object-Oriented Synchronization ModelLüJian,YANG Da-jun,LIAO Yu and TANG Bao2002,13(1):71-79 [Abstract(3233)] [View PDF(4149)340.34 K]An Extension to Security Auditing Mechanism of Linux ShellWANG Li-dong and WANG Li-dong2002,13(1):80-84 [Abstract(4323)] [View PDF(5705)184.98 K]A Character Recognition Approach Based on Feature Line Necessary-Sufficient Condition DetectionLI Zuo,WANG Shu-hua and CAI Shi-jie2002,13(1):85-91 [Abstract(3663)] [View PDF(4941)301.68 K]Access Control in Jade Bird Web Component Library SystemZOU Wei,SUN Jia-su and SUN Yan-chun2002,13(1):92-98 [Abstract(3758)] [View PDF(4107)241.38 K]Document Clustering Based on Web-Log MiningSU Zhong,MA Shao-ping,YANG Qiang and ZHANG Hong-jiang2002,13(1):99-104 [Abstract(3731)] [View PDF(4965)259.20 K]Design and Implementation of Mapping Address Algorithm in Chinese Text-to-Speech SystemZHANG Da-jun,CHEN Zhao-xiong and HUANG He-yan2002,13(1):105-110 [Abstract(3720)] [View PDF(4303)232.40 K]An Improved Active Rule System Executing ModelLI Qing-zhong,WANG Hai-yang,JIANG Yue-ping,MA Shao-han and DONG Ji-run2002,13(1):111-117 [Abstract(3231)] [View PDF(4419)289.42 K]Parallel Programming Models and LanguagesAN Hong and CHEN Guo-liang2002,13(1):118-124 [Abstract(3813)] [View PDF(7354)232.27 K]Inference Method and Applications of Continuous Cognitive StructuresLIU Jie,LIU Gui-quan,CHEN Xiao-ping and CAI Qing-sheng2002,13(1):125-129 [Abstract(3638)] [View PDF(4443)274.86 K]A Template Architecture for Mobile Agent System of High SecurityYANG Kun,LIU Da-you and GUO Xin2002,13(1):130-135 [Abstract(3974)] [View PDF(4734)263.99 K]An N-Gram Prediction Model Based on Web-Log MiningSU Zhong,MA Shao-ping,YANG Qiang and ZHANG Hong-jiang2002,13(1):136-141 [Abstract(4147)] [View PDF(4745)223.31 K]An XML-Based Web Page Definition LanguageLI Xiao-dong2002,13(1):142-149 [Abstract(3561)] [View PDF(4553)284.29 K]A New Full-Text Index Model-Subsequence Array ModelLIU Xue-wen,TAO Xiao-peng,YU Yu and HU Yun-fa2002,13(1):150-158 [Abstract(4914)] [View PDF(4137)450.61 K]
Survey on Routing Lookup AlgorithmsXU Ke,XU Ming-wei,WU Jian-ping and WU Jian2002,13(1):42-50 [Abstract(7289)] [View PDF(7948)341.57 K]