Volume 17,
Number 1,
January 2002
Regular Papers
Correspondence
- Xuandong Li, Wenkai Tan, Guoliang Zheng:
Checking MSC Specifications for Timing Inconsistency.
47-55
- Guoqing Wu, Fengdi Shu, Min Wang, Weiqing Chen:
Requirements Specifications Checking of Embedded Real-Time Software.
56-63
- Jin Ying, Chengzhi Jin:
Constraint-Based Partial Evaluation for Imperative Languages.
64-72
- Yuxi Fu:
Testing Congruence for Mobile Processes.
73-82
- Wang Fan, Zheng Fang, Wu Wenhu:
Speech Detection in Non-Stationary Noise Based on the 1/f Process.
83-89
- Zhang Feng, Guoliang Chen, Zhaoqing Zhang:
OpenMP on Networks of Workstations for Software DSMs.
90-100
Notes
Volume 17,
Number 2,
March 2002
Regular Papers
Correspondence
- Hongyan Liu, Hongjun Lu, Jian Chen:
A Fast Scalable Classifier Tightly Integrated with RDBMS.
152-159
- Bo Yang, Fengzhou Zheng, Dingxing Wang, Weimin Zheng:
Interactive and Symbolic Data Dependence Analysis Based on Ranges of Expressions.
160-171
- Zhenchun Huang, Sanli Li:
IPULOC - Exploring Dynamic Program Locality with the Instruction Processing Unit for Filling Memory Gap.
172-180
- Mohammed Al-Rawi, Jie Yang:
Practical Fast Computation of Zernike Moments.
181-188
- Wangqiang Wei, Wen Gao:
Automatic Segmentation of News Items Based on Video and Audio Features.
189-195
- Zhong Lin, Liu Jia, Liu Runsheng:
A Rejection Model Based on Multi-Layer Perceptrons for Mandarin Digit Recognition.
196-202
- Huaguo Liang, Sybille Hellebrand, Hans-Joachim Wunderlich:
A Mixed-Mode BIST Scheme Based on Folding Compression.
203-212
Notes
- Xiaodong Gu, Guoliang Chen, Yinlong Xu:
Deep Performance Analysis of Refined Harmonic Bin Packing Algorithm.
213-218
- Ke Xu, Jianping Wu, Zhongchao Yu, Mingwei Xu:
A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm.
219-226
- Xiaolin Zhang, Yuhong Wang, Jieyi Wu:
A Rate-Based Flow Control Mechanism for Avoiding Congestion.
227-235
- Yisong Chen, Jian Lu, Zhengxing Sun, Fuyan Zhang:
Greylevel Difference Classification Algorithm in Fractal Image Compression.
236-
Volume 17,
Number 3,
May 2002
Regular Papers
- Qingshi Gao, Yue Hu, Lei Li, Xu Chen, Honglan Liu:
A Novel Computer Architecture to Prevent Destruction by Viruses.
241-248
- Zheng Fang, Zhanjiang Song, Pascale Fung, William J. Byrne:
Mandarin Pronunciation Modeling Based on CASS Corpus.
249-263
- Yixin Zhao, Jianping Wu, Xia Yin:
From Active to Passive - Progress in Testing Internet Routing Protocols.
264-283
- Shengchao Qin, Jifeng He, Zongyan Qiu, Naixiao Zhang:
An Algebraic Hardware/Software Partitioning Algorithm.
284-294
- Cungen Cao:
Extracting and Sharing Knowledge from Medical Texts.
295-303
- Aoying Zhou, Wei Li, Yu Fang:
Effective Discovery of Exception Class Association Rules.
304-313
Correspondence
- Xiaobo Peng, Liping Chen, Fanli Zhou, Ji Zhou:
Singularity Analysis of Geometric Constraint Systems.
314-323
- Xiaojun Wu, Jing-Yu Yang, Shitong Wang, Yue-Fei Guo, Qiying Gao:
A New Algorithm for Generalized Optimal Discriminant Vectors.
324-330
- Ji Gao, Donghao Lin:
Agent Cooperation Based Control Integration by Activity-Sharing and Joint Intention.
331-339
- Wenqi Huang, Defu Zhang, Wang Houxiang:
An Algorithm Based on Tabu Search for Satisfiability Problem.
340-346
- Jin Wang, Hujun Bao, Weihua Zhou, Qunsheng Peng, Yingqing Xu:
Automatic Image-Based Pencil Sketch Rendering.
347-355
Notes
Volume 17,
Number 4,
July 2002
Regular Papers
- Ren-ji Tao, Shihua Chen:
Structure of Weakly Invertible Semi-Input-Memory Finite Automata with Delay 1.
369-376
- Xiaofeng Meng, Hongjun Lu, Haiyan Wang, Mingzhe Gu:
Data Extraction from the Web Based on Pre-Defined Schema.
377-388
- Zhiming Ding, Xiaofeng Meng, Shan Wang:
A Transactional Asynchronous Replication Scheme for Mobile Database Systems.
389-396
- Huadong Ma, Kang G. Shin:
Hybrid Broadcast for the Video-on-Demand Service.
397-410
- Yinlong Xu, Guoliang Chen, Liusheng Huang, Yingyu Wan:
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4.
411-419
- Chonggang Wang, Keping Long, Jian Yang, Shiduan Cheng:
An Effective Feedback Control Mechanism for DiffServ Architecture.
420-431
- Hong Mei, Lu Zhang, Fuqing Yang:
A Component-Based Software Configuration Management Model and Its Supporting System.
432-441
- Jianhui Li, Binyu Zang, Rong Wu, Chuanqi Zhu:
Run-Time Data-Flow Analysis.
442-449
- Dongxi Liu, Xiaoyong Li, Yingcai Bai:
An Attack-Finding Algorithm for Security Protocols.
450-463
Correspondence
Notes
Volume 17,
Number 5,
September 2002
- Cungen Cao, Qiangze Feng, Ying Gao, Fang Gu, Jinxin Si, Yuefei Sui, Wen Tian, Haitao Wang, Lili Wang, Qingtian Zeng, Chunxia Zhang, Yufei Zheng, Xiaobin Zhou:
Progress in the Development of National Knowledge Infrastructure.
523-534
- Ruqian Lu, Zhi Jin:
Formal Ontology: Foundation of Domain Knowledge Sharing and Reusing.
535-548
- Ling Zhang, Bo Zhang:
Relationship Between Support Vector Set and Kernel Functions in SVM.
549-555
- Jiaqi Wang, Qing Tao, Jue Wang:
Kernel Projection Algorithm for Large-Scale SVM Problems.
556-564
- Xiaolong Zhang, Masayuki Numao:
Toward Effective Knowledge Acquisition with First-Order Logic Induction.
565-577
- Kai Zhao, Jue Wang:
A Reduction Algorithm Meeting Users' Requirements.
578-593
- Haofeng Zhao, Jianqiu Zhu, Yangyong Zhu, Baile Shi:
ARMiner: A Data Mining Tool Based on Association Rules.
594-602
- Jianwu Yang, Xiaoou Chen:
A Semi-Structured Document Model for Text Mining.
603-610
- Zengyou He, Xiaofei Xu, Shengchun Deng:
Squeezer: An Efficient Algorithm for Clustering Categorical Data.
611-624
- Feng Yu, Shan Wang:
Compressed Data Cube for Approximate OLAP Query Processing.
625-635
- Wen Tian, Fang Gu, Cungen Cao:
Designing a Top-Level Ontology of Human Beings: A Multi-Perspective Approach.
636-656
- Hong Zheng, Ruqian Lu, Zhi Jin, Sikang Hu:
Ontology-Based Semantic Cache in AOKB.
657-
Volume 17,
Number 6,
November 2002
- Huimin Lin:
A Graphical mu-Calculus and Local Model Checking.
665-671
- Tom Head, Xia Chen, Masayuki Yamamura, Susannah Gal:
Aqueous Computing: A Survey with an Invitation to Participate.
672-681
- Ren-ji Tao, Shihua Chen:
Structure of Weakly Invertible Semi-Input-Memory Finite Automata with Delay 2.
682-688
- Yong Li, Dang Van Hung:
Checking Temporal Duration Properties of Timed Automata.
689-698
- Sheqin Dong, Shuo Zhou, Xianlong Hong, Chung-Kuan Cheng, Jun Gu, Yici Cai:
An Optimum Placement Search Algorithm Based on Extended Corner Block List.
699-707
- Ruiqi Lian, Zhaoqing Zhang, Ruliang Qiao:
Automatic Generation of Interprocedural Data-Flow Analyzers and Optimizers.
708-717
- Zhaoxuan Shen, Jong Ching Chuen:
Lower Bound Estimation of Hardware Resources for Scheduling in High-Level Synthesis.
718-730
- Hafizur Rahaman, Debesh K. Das, Bhargab B. Bhattacharya:
BIST Design for Detecting Multiple Stuck-Open Faults in CMOS Circuits Using Transition Count.
731-737
- Zhou Chong, Yongqiang Sun:
SPMH: A Solution to the Problem of Malicious Hosts.
738-748
- Dong Zheng, Kefei Chen, Jinyuan You:
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
749-756
- Hong Mei, Tao Xie, Fuqing Yang:
A Model-Based Approach to Object-Oriented Software Metrics.
757-769
- Changjun Jiang, Huaiqing Wang, Shaoyi Liao:
Behavior Relativity of Petri Nets.
770-780
- Yong He, Shengyi Cai:
Semi-Online Scheduling with Machine Cost.
781-787
- Guodong Li, Defu Zhang:
Distributing and Scheduling Divisible Task on Parallel Communicating Processors.
788-796
- Zongwei Lu, Zhenghui Lin, Houpeng Chen:
Variables Bounding Based Retiming Algorithm.
797-806
- Aoying Zhou, Weining Qian, Hailei Qian:
Clustering DTDs: An Interactive Two-Level Approach.
807-819
- Xianxian Li, Jinpeng Huai:
Efficient Non-Repudiation Multicast Source Authentication Schemes.
820-829
- Xiaofeng Chen, Changjie Wang, Yumin Wang:
Fair Electronic Cash Based on Double Signatur.
830-835
- Fangguo Zhang, Futai Zhang, Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
836-842
- Kyu-Yeul Lee, Doo-Yeoun Cho, Tae Wan Kim:
A Tracing Algorithm for Surface-Surface Intersections on Surface Boundaries.
843-850
- Kaihuai Qin, Zhengyi Chang, Huawei Wang, Denggao Li:
Physics-Based Loop Surface Modeling.
851-858
- Qingshan Liu, Songde Ma, Hanqing Lu:
Head Tracking Using Shapes and Adaptive Color Histograms.
859-864
- Fan Yun, Runsheng Wang:
An Image Retrieval Method Using DCT Features.
865-873
- Huaizhong Lin, Chun Chen:
Optimistic Voting for Managing Replicated Data.
874-881
- S. H. Lo, Liu Jianfei:
Automatic Mesh Generation on a Regular Background Grid.
882-887
- Zhengding Lu, Li Chunlin, Li Layuan:
Coordinating Mobile Agents by the XML-Based Tuple Space.
888-900
- Zhang Lei, Xiaoyong Du, Shan Wang:
A Personalized Information Dissemination System Based on How-Net.
901-907
- Chuanfeng Chen, Li Zengzhi, Yazhe Tang, Kangping Liu:
Internet Network Resource Information Model.
908-914
- Jianhua Li, Xiaolong Wang:
Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction.
915-923
- Yan Pengju, Zheng Fang, Sun Hui:
Spontaneous Speech Parsing in Travel Information Inquiring and Booking Systems.
924-932
- Sujian Li, Jian Zhang, Huang Xiong, Shuo Bai, Qun Liu:
Semantic Computation in a Chinese Question-Answering System.
933-
Copyright © Fri Mar 12 17:29:57 2010
by Michael Ley (ley@uni-trier.de)