Volume 13,Issue 8,2002 Table of Contents
A Goal-Based Approach for Process Instance EvolutionCHEN Cheng and GU Yu-qing2002,13(8):1345-1351 [Abstract(2313)] [View PDF(2244)407.68 K]Design of Secure System Architecture Model for Active NetworkXIA Zheng-you and ZHANG Shi-yong2002,13(8):1352-1360 [Abstract(2241)] [View PDF(2932)493.17 K]Improved Stumps Combined by Boosting for Text CategorizationDIAO Li-li,HU Ke-yun,LU Yu-chang and SHI Chun-yi2002,13(8):1361-1367 [Abstract(2492)] [View PDF(2758)449.31 K]Distribution of the Linear Complexities of Generalized Legendre SequencesWANG Ping and DAI Zong-duo2002,13(8):1368-1373 [Abstract(2278)] [View PDF(2381)388.79 K]A Flexible and Formalized Process Modeling LanguageCHEN Cheng,SHEN Bei-jun and GU Yu-qing2002,13(8):1374-1381 [Abstract(2259)] [View PDF(2582)547.36 K]Analyzing Popular Clustering Algorithms from Different ViewpointsQIAN Wei-ning and ZHOU Ao-ying2002,13(8):1382-1394 [Abstract(2902)] [View PDF(4937)731.87 K]Distributed Real-Time Transaction Commit ProcessingQIN Biao and LIU Yun-sheng2002,13(8):1395-1401 [Abstract(2380)] [View PDF(2539)389.54 K]Analysis of Composite Events in Adaptive Mobile Computing System by Unidirectional Queue AutomataLI Guo-dong and ZHANG De-fu2002,13(8):1402-1411 [Abstract(2375)] [View PDF(2611)658.64 K]Robust Distributed Multiplication Schemes over IntegerWANG Hong,FENG Deng-guo and XIAO Guo-zhen2002,13(8):1412-1416 [Abstract(2342)] [View PDF(2635)351.58 K]An Intrusion Tolerant CA SchemeJING Ji-wu and FENG Deng-guo2002,13(8):1417-1422 [Abstract(2997)] [View PDF(3523)435.62 K]An Improved Multi-Dimensional Storage Structure for Data WarehousingFENG Jian-hua,JIANG Xu-dong and ZHOU Li-zhu2002,13(8):1423-1429 [Abstract(2187)] [View PDF(2756)397.33 K]Software Architecture of the Hall for Workshop of Metasynthetic EngineeringCAO Long-bing and DAI Ru-wei2002,13(8):1430-1435 [Abstract(2462)] [View PDF(3072)521.34 K]A Geospatial Information Layer Sharing Model for Digital EarthCHEN Ai-jun,LI Qi and XU Guang-you2002,13(8):1436-1440 [Abstract(2516)] [View PDF(2744)469.22 K]RBFN Structure Determination Strategy Based on PLS and GasZHAO Wei-xiang and WU Li-de2002,13(8):1450-1455 [Abstract(2163)] [View PDF(2832)388.93 K]Algorithms of Wavelength Assignment on All Optical Ring with Fixed Wavelength ConvertersWAN Ying-yu,CHEN Guo-liang,XU Yin-long and GU Jun2002,13(8):1456-1464 [Abstract(1916)] [View PDF(2526)550.15 K]An Algorithm of Mining Personal Moving Patterns in a Wireless Communication EnvironmentSONG Guo-jie,TANG Shi-wei,YANG Dong-qing,WANG Teng-jiao and YE Heng-qiang2002,13(8):1465-1471 [Abstract(2348)] [View PDF(2520)478.04 K]Performance Equivalent Analysis of Workflow SystemsLIN Chuang,TIAN Li-qin and WEI Ya-ya2002,13(8):1472-1480 [Abstract(2614)] [View PDF(3188)551.96 K]A Practical and Effective Virtual Remote Supercomputing EnvironmentXIE Fei,YANG Guang-wen,JU Da-peng,WANG Ding-xing and ZHENG Wei-ming2002,13(8):1481-1487 [Abstract(2648)] [View PDF(2644)332.75 K]The Normal Object Scheme Forest with Respect to Conflict-Free DependenciesWU Yong-hui and ZHOU Ao-ying2002,13(8):1488-1493 [Abstract(2141)] [View PDF(2385)431.16 K]Object-Oriented Design of Human-Machine Interface in the Visual Programming EnvironmentSHAO Wei-zhong and LIU Xin2002,13(8):1494-1499 [Abstract(2134)] [View PDF(2691)288.91 K]Incremental and Distributed Web Page Clustering Algorithms PG+ and PG++WANG Qi-xin,LI Yi,DONG Li,NIE Yu and WANG Ke-hong2002,13(8):1500-1507 [Abstract(2554)] [View PDF(2623)530.84 K]Semi-Supervised Web Mining Based on Bayes Latent Semantic ModelGONG Xiu-jun and SHI Zhong-zhi2002,13(8):1508-1514 [Abstract(2448)] [View PDF(3853)440.67 K]A Packet Scheduling Strategy for Multiple Performance ObjectsJIANG Yong and WU Jian-ping2002,13(8):1515-1520 [Abstract(2677)] [View PDF(2593)364.79 K]Role-Based Authorization Constraint with Time CharacterDONG Guang-yu,QING Si-han and LIU Ke-long2002,13(8):1521-1527 [Abstract(2622)] [View PDF(2742)389.70 K]A Files Checkpointing Approach Based on Virtual File OperationsLIU Shao-feng,WANG Dong-sheng and ZHU Jing2002,13(8):1528-1533 [Abstract(2455)] [View PDF(2647)244.28 K]Spatial Information Retrieval and Database GeneralizationLU Sang-lu,ZHOU Xiao-fang,CHEN Gui-hai and XIE Li2002,13(8):1534-1539 [Abstract(2124)] [View PDF(2414)305.11 K]A Data Mining System for Very Large DatabasesQIAN Wei-ning,WEI Li,WANG Yan,QIAN Hai-lei and ZHOU Ao-ying2002,13(8):1540-1545 [Abstract(2757)] [View PDF(3798)327.92 K]Retrieving Components Based on Faceted ClassificationWANG Yuan-feng,ZHANG Yong,REN Hong-min,ZHU San-yuan and QIAN Le-qiu12002,13(8):1546-1551 [Abstract(2246)] [View PDF(2715)389.02 K]A Method to Detect Anchorperson Shots for Digital TV NewsYANG Na,LUO Hang-zai and XUE Xiang-yang2002,13(8):1559-1567 [Abstract(2625)] [View PDF(2734)520.86 K]An Optimization Approach on Low Bite Rate Video CodingHE Yu-wen,WANG Qi,YUAN Yu,ZHONG Yu-zhuo and YANG Shi-qiang2002,13(8):1568-1576 [Abstract(2118)] [View PDF(2964)651.59 K]Shot Content Analysis for Video Retrieval ApplicationsLIN Tong,ZHANG Hong-jiang,FENG Ju-fu and SHI Qing-yun2002,13(8):1577-1585 [Abstract(2232)] [View PDF(3015)710.07 K]A Data Cover Method of Data Cube Reconstruction Based on Data SlicesCAO Ji-guang and WANG Shen-kang2002,13(8):1586-1592 [Abstract(2050)] [View PDF(2830)562.96 K]Automatic Audio Classification by Using Hidden Markov ModelLU Jian,CHEN Yi-song,SUN Zheng-xing and ZHANG Fu-yan2002,13(8):1593-1597 [Abstract(3037)] [View PDF(3918)368.09 K]A Documental Clustering Algorithm Based on Fuzzy Concept Graph and Its Application in WebCHEN Ning,CHEN An,ZHOU Long-xiang,JIA Wei-jia and LUO San-ding2002,13(8):1598-1605 [Abstract(2300)] [View PDF(2749)496.25 K]Preemptive Scheduling Problem with Interrupted Time Cost on Identical Parallel MachinesSUN Guang-zhong,CHEN Guo-liang,XU Yin-long and GU Jun2002,13(8):1606-1611 [Abstract(2410)] [View PDF(2420)455.22 K]Random I/O Scheduling Algorithms in Online Tape Library SystemsSHI Jing and ZHOU Li-zhu2002,13(8):1612-1620 [Abstract(2417)] [View PDF(2734)565.88 K]A Group-Prefetching Algorithm of Information for Multi-Managed Objects in WANZHANG Jin-xiang,WU Jian-ping,HAN Shu-ling,WU Quan-yuan and WANG Huai-min2002,13(8):1621-1627 [Abstract(2228)] [View PDF(2801)374.58 K]Module-Based Mobile Agent and Its Schedule MethodWU Cheng-gang and SHI Zhong-zhi2002,13(8):1628-1636 [Abstract(2251)] [View PDF(2371)566.61 K]A Multi-Agent Multi-Issue Negotiation ModelWANG Li-chun and CHEN Shi-fu2002,13(8):1637-1643 [Abstract(1993)] [View PDF(2911)379.12 K]Model Mapping Techniques for STEP and Its Application in Open EnvironmentYANG Zi-jiang,LI Shan-ping and DONG Jin-xiang2002,13(8):1644-1651 [Abstract(2161)] [View PDF(2578)488.38 K]Hardware Implementation of Petri NetsZHAO Bu-hui,JING Liang and YAN Yang-guang2002,13(8):1652-1657 [Abstract(2772)] [View PDF(2941)390.19 K]A Spatial-Temporal Data Model for Moving Area ObjectsYI Shan-zhen,ZHANG Yong and ZHOU Li-zhu2002,13(8):1658-1665 [Abstract(2630)] [View PDF(2804)593.34 K]A Workflow Model Based on Timed Petri NetLI Wei,ZENG Guang-zhou and WANG Xiao-lin2002,13(8):1666-1671 [Abstract(3042)] [View PDF(3021)332.85 K]A Global Web Workflow System Based on Active ObjectHU Hua and YU Hong-zhi2002,13(8):1672-1677 [Abstract(2191)] [View PDF(2687)338.90 K]A Multidimensional Index Structure for Fast Similarity RetrievalFENG Yu-cai,CAO Kui and CAO Zhong-sheng2002,13(8):1678-1685 [Abstract(2508)] [View PDF(2937)443.57 K]Analysis of Event Balance in the Verification of Workflow SoundnessLUO Hai-bin,FAN Yu-shun and WU Cheng2002,13(8):1686-1691 [Abstract(2734)] [View PDF(2811)324.68 K]Transactions Schedule of Embedded Database SystemsLIU Yun-sheng,XIA Jia-li and XU Gui-ping2002,13(8):1692-1697 [Abstract(2450)] [View PDF(2726)381.70 K]Description and Verification of an Online Stock Trading System by Using Temporal Petri NetsDU Yu-yue and JIANG Chang-jun2002,13(8):1698-1704 [Abstract(2441)] [View PDF(2917)565.20 K]Application of Tabu Search Algorithm in Telecommunication Network Intelligence ManagementSHAO Liang,LI Lei and CHEN Chang-juan2002,13(8):1705-1709 [Abstract(2704)] [View PDF(2849)295.66 K]A Delay Analysis of RMTPLIN Yu,WANG Chong-gang,WANG Wen-dong and CHENG Shi-duan2002,13(8):1710-1717 [Abstract(3502)] [View PDF(2714)492.89 K]A Run-Time Technique for Parallel Loop Identification Based on Distributed SystemYANG Xue-lin,YU Meng,CHEN Dao-xu and XIE Li2002,13(8):1718-1722 [Abstract(1806)] [View PDF(2382)346.67 K]Design and Implementation of Distributed Intrusion Detection System NetNumenLI Wang,WU Li-fa and HU Gu-yu2002,13(8):1723-1728 [Abstract(2900)] [View PDF(3012)317.13 K]A Signature Scheme Based on the Strong RSA AssumptionWANG Bao-you and HU Yun-fa2002,13(8):1729-1734 [Abstract(2252)] [View PDF(3289)510.92 K]Scheduling and Admission Control in Video Servers with Multi-Network I/OXIE Jian-guo,CHEN Jian-er and CHEN Song-qiao2002,13(8):1735-1740 [Abstract(2385)] [View PDF(2528)391.80 K]
A Survey on Multicast Congestion ControlSHI Feng and WU Jian-ping2002,13(8):1441-1449 [Abstract(4536)] [View PDF(3475)447.85 K]Overview on Managing Time in Workflow SystemsLI Hui-fang and FAN Yu-shun2002,13(8):1552-1558 [Abstract(4802)] [View PDF(3297)397.62 K]