Loading...




Bimonthly    Since 1986
ISSN 1000-9000(Print)
/1860-4749(Online)
CN 11-2296/TP
Indexed in:
SCIE, Ei, INSPEC, JST, AJ, MR, CA, DBLP, etc.
Publication Details
Edited by: Editorial Board of Journal Of Computer Science and Technology
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
Other Countries: Springer
 
ip访问总数:
ip当日访问总数:
当前在线人数:
  • Table of Content
      10 October 1992, Volume 7 Issue 4 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Articles
    An Algorithm for Determining Database Consistency Under the Closed World Assumption
    Shen Yidong;
    Journal of Computer Science and Technology, 1992, 7 (4): 289-294. 
    Abstract   PDF(270KB) ( 1062 )   Chinese Summary
    It is well-known that there are circumstances where applying Reiter s closed world assump- tion (CWA) will lead to logical inconsistencies . In this paper, a new characterization of the CWA consistency is pesented and an algorithm is proposed for determining whether a datalase with- out function symbols is consistent with the CWA. The algorithm is shown to be efficient.
    References | Related Articles | Metrics
    Form alizing Incomplete Knowledge in Incomplete Databases
    Shen Yidong;
    Journal of Computer Science and Technology, 1992, 7 (4): 295-304. 
    Abstract   PDF(279KB) ( 1072 )   Chinese Summary
    Up to now, no satisfactory theory has been established for formalizing incomplete knowledge in incomplete databases. In this paper, we clarify why existing closed world approaches, such as the CWA, the GCWA, the ECWA, circumscription, predicate completion and the PWA, fail to do so, and propose a new method. The method is an augmentation of both the ECWA and circumscrip- tion with the mechanism to discriminate implicitly expressed positive knowledge, negative knowledge and truly unknown knowledge.
    References | Related Articles | Metrics
    Concurrency Control Mechanism of Complex Objects
    Xu Qingyun; Wang Nengbin;
    Journal of Computer Science and Technology, 1992, 7 (4): 305-310. 
    Abstract   PDF(158KB) ( 1142 )   Chinese Summary
    A complex object is an abstraction and description of a complex entity of the real world. Many applications in such domains as CIMS, CAD and OA define and manipulate a complex object as a single unit. In this paper, a definition of the model of complex objects is given, and the concurrency control mechanism of complex objects in WHYMX object-oriented database system is described.
    References | Related Articles | Metrics
    Concurrency Control of Single-Level Transaction in WHYMX Object-Oriented Database System
    Xu Qingyun; Wang Nengbin;
    Journal of Computer Science and Technology, 1992, 7 (4): 311-315. 
    Abstract   PDF(134KB) ( 1070 )   Chinese Summary
    The data model of WHYMX complicates transaction management. Traditional locking method is not powerful enough to solve the new problem of concurrency control of WHYMX s transaction. This paper presents a number of concurrency control algorithms based on the extended locking method.
    References | Related Articles | Metrics
    Range Query Processing in Multidisk Systems
    Li Jianzhong;
    Journal of Computer Science and Technology, 1992, 7 (4): 316-327. 
    Abstract   PDF(339KB) ( 1155 )   Chinese Summary
    In order to reduce the disk access time, a database can be stored on several simultaneously accessi- ble disks. In this paper, we are concerned with the dynamic d-attribute database allocation problem for range queries. An allocation method, called coordinate modulo allocation method, is proposed to al- locate data in a d-attribute database among disks so that the maximum disk accessing concurrency can be achieved for range queries. Our analysis and experiments show that the method achieves the optimum or n…
    References | Related Articles | Metrics
    A Frame Based Architecture for Information Integration in CIMS
    Wu Xindong;
    Journal of Computer Science and Technology, 1992, 7 (4): 328-332. 
    Abstract   PDF(133KB) ( 1079 )   Chinese Summary
    This paper formulates an architecture for information integration in computer integrated manufacturing systems (CIMS). The architecture takes the frame structure as single link among applica- tions and between applications and physical storage. All the advantages in form features based inte- grated systems can be found in the frame-based architecture as the frame structure here takes form fea- tures as its primitives. But other advantages, e.g., default knowledge and dynamic domain knowledge can be attached…
    References | Related Articles | Metrics
    Net Operations
    Jiang Changjun; Wu Zhehui;
    Journal of Computer Science and Technology, 1992, 7 (4): 333-344. 
    Abstract   PDF(291KB) ( 1253 )   Chinese Summary
    Two kinds of net operations, addition and Cartesian production of P/T nets, are introduced. They are defined on the set of underlying net of P/T systems. The conditions for preserving structural proper- ties of Petri net after these operations are discussed. It is shown that the set of P/T nets forms an Abelian group for net addition operation and the inverse net of a P/T net in usual meaning of net theo- ry is exactly the inverse of this P/T net as an element of the P/T net group; and that the set of P/T n…
    References | Related Articles | Metrics
    R-Technology of Programming: Basic Notions and Implementation
    I.V.Vel bitsky; A.L.Kovalev; I.V.Kasatkina; Wang Lei;
    Journal of Computer Science and Technology, 1992, 7 (4): 345-355. 
    Abstract   PDF(470KB) ( 1145 )   Chinese Summary
    This paper presents a kind of visual programming, which is called R-technology of programming. The R-technology is independent of any programming language or operating system and the R-chart is in accord with international standard (ISO 8631H). The package of R-technology has been applied to the high level languages such as PASCAL, C, ASSEMBLER, FORTRAN, PL/1, MODULA-2 and RTRAN. This package is applied to computers ranging from mainframes (IBM 370) and minis (VAX) to micros (IBM/PC).
    References | Related Articles | Metrics
    A Study of Optimization and Rule/Goal Graph for a Logical Query
    Li Tianzhu;
    Journal of Computer Science and Technology, 1992, 7 (4): 356-362. 
    Abstract   PDF(348KB) ( 1207 )   Chinese Summary
    Static optimization of logical queries is, in substance, to move selections down as far as possible in evaluating logical queries. This paper extends Ullman s RGG (Rule/Goal Graph) and introduces P- graph, with which a wide range of recursive logical queries can be statically optimized top-down and evaluated bottom-up, some of which are usually optimized by dynamic approaches. The paper also shows that for some logical queries the complexity of pushing selections down and computing bottom-up is related to t…
    References | Related Articles | Metrics
    Extending Hoare Logic with an Infinite While-Rule
    Shao Zhiqing;
    Journal of Computer Science and Technology, 1992, 7 (4): 363-368. 
    Abstract   PDF(299KB) ( 1088 )   Chinese Summary
    In this paper we generalize the while-rule in Hoare calculus to an infinite one and then present a sufficient condition much weaker than the expressiveness for Cook s relative completeness theorem with respect to our new axiomatic system. Using the extended Hoare calculus we can derive true Hoare formulas which contain while- statements free of loop invariants. It is also pointed out that the weak condition is a first order property and therefore provides a possible approach to the characterization of relat…
    References | Related Articles | Metrics
    Conflict-Resolution in Multi-ES Cooperation System
    Liu Dayou; Zheng Fangqing; Ma Zhifang; Shi Qiaolin;
    Journal of Computer Science and Technology, 1992, 7 (4): 369-378. 
    Abstract   PDF(490KB) ( 1198 )   Chinese Summary
    In the so called “Group Problem” (we would like to term it “Group-Consulting Type Cooperation”), ESs of the same cooperating group may have different views towards the same problem, and the differences may sometimes be very great. For the circumstance of those ESs with relatively closer views, we present in this paper three methods of consistency treatment and a method for calcula- ting the maximal deviation of the confidence value about the cooperating group s common view based on the consistency degree of…
    References | Related Articles | Metrics
    Identification of Nonstationary Cellular Automata
    Andrew I. Adamatzky;
    Journal of Computer Science and Technology, 1992, 7 (4): 379-382. 
    Abstract   PDF(191KB) ( 1143 )   Chinese Summary
    The principal feature of nonstationary cellular automata (NCA) is that a local transition rule of each cell is changed at each time step depending on neighborhood configuration at previous time- step The identification problem for NCA is extraction of local transition rules and the establishment of mecha- nism for changing these rules using sequence of NCA configurations. We present serial and parallel algorithms for identification of NCA.
    References | Related Articles | Metrics
  Journal Online
Just Accepted
Archive
Top Cited Papers
Top 30 Most Read
Paper Lists of Areas
Surveys
Special Issues
  Download
   ScholarOne Manuscripts
   Log In

User ID:

Password:

  Forgot your password?

Enter your e-mail address to receive your account information.

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved