Loading...




Bimonthly    Since 1986
ISSN 1000-9000(Print)
/1860-4749(Online)
CN 11-2296/TP
Indexed in:
SCIE, Ei, INSPEC, JST, AJ, MR, CA, DBLP, etc.
Publication Details
Edited by: Editorial Board of Journal Of Computer Science and Technology
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
Other Countries: Springer
 
ip访问总数:
ip当日访问总数:
当前在线人数:
  • Table of Content
      10 July 1996, Volume 11 Issue 4 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Articles
    Design and Implementation of a Concurrency Control Mechanism in an Object-Oriented Database System
    Qu Yunyao; Tian Zengping; Wang Yuun; Shi Baile;
    Journal of Computer Science and Technology, 1996, 11 (4): 337-246. 
    Abstract   PDF(191KB) ( 1313 )   Chinese Summary
    This paper presents a practical concurrency control mechanism - ObjectLockingin OODBMS. Object-Locking can schedule transactions, each of themcan be considered as a sequence of high level operations defined on classes. Bythe properties of parallelity and coatativity between high level operations,proper lock modes for each operation are desigued and the compatibility matrixis constructed. With these lock modes, phatoms are kept away from databasesand a high degree of concurrency is achieved.
    References | Related Articles | Metrics
    An Algorithm for Determining Minimal Reduced-Coverings of Acyclic Database Schemes
    Liu Tieying; Ye Xinming;
    Journal of Computer Science and Technology, 1996, 11 (4): 347-355. 
    Abstract   PDF(382KB) ( 1232 )   Chinese Summary
    This paper reports an algorithm (DTV) for deterdring the minimal reducedcovering of an acyclic database scheme over a specified subset of attributes. The output of this algorithm contains not only minimum number of attributes but also minimum number of partial relation schemes. The algorithm has complexity O(|N|·|E|2), where |N| is the number of attributes and |E| the number of relation schemes- It is also proved that for Berge, γ orβ acyclic database schemes, the output of algorithm DTV maintains the acyc…
    References | Related Articles | Metrics
    Normalization of Class Hierarchy in Databases
    Li Tianzhu; Xiao Jitian; Sun Zhaohao; Bian Xiaofan;
    Journal of Computer Science and Technology, 1996, 11 (4): 356-364. 
    Abstract   PDF(201KB) ( 1199 )   Chinese Summary
    In complex object oriented databases, the purpose of introducing class hierarchy is to express ISA sematics, to realize inheriting and to reuse schema definition codes. The schema definition and schema evolution, based on the partial order of lattice, often cause the loss of information inheriting and the redundance of schema dedrition. Based on the fullness of the inheritance shownby class hierarchy three normal forms of class hierarchy are given in this paper, and a general algorithm of normalization of c…
    References | Related Articles | Metrics
    The Temporal Mechanisms in Hbase
    Tang Changjie; Xiong Min;
    Journal of Computer Science and Technology, 1996, 11 (4): 365-371. 
    Abstract   PDF(275KB) ( 1374 )   Chinese Summary
    The research on Temporal Databases (TDB) has been a hot topic for quite along time, but few implementations have been reported. The authors have developeda prototroe of temporal DBMS in DOS/Windows envirorunent, calledHBase. This paper discusses its temporal structure, temporal syntax and semanics,as well as the special techniques used in the Anplementation of HBase.
    References | Related Articles | Metrics
    Diagnostic Problem Solving Using First Principles and Heuristics 1
    Shen Yidong; Rong Mei; Thng Fu;
    Journal of Computer Science and Technology, 1996, 11 (4): 372-384. 
    Abstract   PDF(556KB) ( 1125 )   Chinese Summary
    This paper proposes an approach to diagnostic reasoning with the followingdistinct features: ① A diagnostic system is formulated in FoL with equality,particularly in the form of program clauses; ② The abnormality of system components is determined in terms of either experiential knowledge of domain experts or behavioral description of components; ③ Heuristics is fully used not only to assist in judging the abnormality of system components, but also to guide the diagnosis; ④ A uaique diagnosis will be comput…
    References | Related Articles | Metrics
    Fuzzy Logic Based Behavior Fusion for Navigation of an Intelligent Mobile Robot
    Li Wei; Chen Zushun; Ma Chenyu; He Kezhong; Wang Tianmiao;
    Journal of Computer Science and Technology, 1996, 11 (4): 385-394. 
    Abstract   PDF(413KB) ( 1565 )   Chinese Summary
    This paper presents a new method for behavior fusion control of a mobile robot in uncertain environments. Using behavior fusion by fuzzy logic, a mobile robot is able to directly execute its motion according to range information about environments, acquired by ultrasonic sensorst without the need for trajectory planning. Based on low-level behavior control, an efficient strategy for integrating high-level global planning for robot motion can be formulated, since,in most applications, some information on env…
    References | Related Articles | Metrics
    A Kind of Multistage Interconnection Networks with Multiple Paths
    Zhou Yingquan; Min Yinghua;
    Journal of Computer Science and Technology, 1996, 11 (4): 395-404. 
    Abstract   PDF(426KB) ( 1470 )   Chinese Summary
    Multistage Interconnection Networks (MINs) are often used to provide interconnections in multiprocessor systems. A unique path MIN usually has lower hardware complekity and a simple control algorithm, but it lacks fault tolerance.This paper proposes a kind of multipath MINs, which are obtained by adding auxiliary links at the final stage in Quad nee (QT) networks so that they canprovide more paths between each source-destination pair, and presents theirrouting algorithm which is both destination tag based a…
    References | Related Articles | Metrics
    NONH:A New Cache-Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation
    Fang Zhiyi; Ju Jiubin;
    Journal of Computer Science and Technology, 1996, 11 (4): 405-415. 
    Abstract   PDF(464KB) ( 1256 )   Chinese Summary
    The management of memory coherence is an important problem in distributed shared memory (DSM) system. In a cache-based coherence DSM system using linked list structure, the key to maintaining the coherence and improving system performance is how to manage the owner in the linked list. This paper presents the design of a new management protocol-NONH (New-OwnerNew-Head) and its performance evaluation. The analysis results show that thisprotocol can improve the scalability and performence of a coherent DSM sys…
    References | Related Articles | Metrics
    A Redundant Binary Algorithm for RSA
    Shi Ronghua;
    Journal of Computer Science and Technology, 1996, 11 (4): 416-420. 
    Abstract   PDF(220KB) ( 1396 )   Chinese Summary
    The normal form and modilied normal form for binary redundant representation are defined. A redundant binary algorithm to compute modular exponentiation for very large integers is proposed. It is shown that the proposed algorithm requires the minimum number of basic operations (modular multiplications) among all possible binary redundant representations.
    References | Related Articles | Metrics
    Using Multivalued Logic in Relational Database Containing Null Value
    Ma Zongmin; Yan Li;
    Journal of Computer Science and Technology, 1996, 11 (4): 421-426. 
    Abstract   PDF(252KB) ( 1515 )   Chinese Summary
    In this paper, several kinds of multivalued logic for relational database and their developing process are presented on the basis of null value's semantics. A new 5 valued logic is led into relational database containing null talue. The feasibility and necessity of using 5 valued logic are expounded. Comparative calculation and logical calculation under 5 valued logic are defined at the end of the paper.
    References | Related Articles | Metrics
    Combining Gprof and Event-Driven Monitoring for Analyzing Distributed Programs:A Rough View of NCSA Mosaic
    Peng Chenglian;
    Journal of Computer Science and Technology, 1996, 11 (4): 427-432. 
    Abstract   PDF(258KB) ( 1402 )   Chinese Summary
    There are several purposes of analyzing a program: functional or performance analysis, debugging or, more recently, mapping a program to a new parallel or distributed architecture. In this paper, we introduce an effective method leading to the Execution Graph (EG) from a program. First,the Unix profiling tool Gprof is used to get the Execution Model (EM) of a C-program. Then the event-driven monitoring tool AICOS-SIMPLE is used to get the EG which includes not only the call graph but also the execution time…
    References | Related Articles | Metrics
    A Simplified Model for Generating 3D Realistic Sound in the Multimedia and Virtual Reality Systems
    Zhao Yu; Zhang Qiong; Xiang Hui; Shi Jiaosing; He Zhijun;
    Journal of Computer Science and Technology, 1996, 11 (4): 461-470. 
    Abstract   PDF(417KB) ( 1332 )   Chinese Summary
    It is a key feature to embed 3D realistic sound effect in the future multimedia and virtual reality systems. Recent research on acoustics and psychoacoustics reveals the important cues for sound localization and sound perception. One promising approach to generate 3D realistic sound effect uses two earphones by simulating the sound waveforms from sound source to eardrum. This paper summarizes two methods for generating 3D realistic sound and points out their inherent drawbacks. To overcome these drawbacks w…
    References | Related Articles | Metrics
  Journal Online
Just Accepted
Archive
Top Cited Papers
Top 30 Most Read
Paper Lists of Areas
Surveys
Special Issues
  Download
   ScholarOne Manuscripts
   Log In

User ID:

Password:

  Forgot your password?

Enter your e-mail address to receive your account information.

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved