SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Zhang Mingyi. On Relative Accessibility Depending on a set of Parameters[J]. Journal of Computer Science and Technology, 1989, 4(3): 286-288. |
[1] |
Ewa Orlowska, Logic of Nondeterministic Information, Studia Logica, Vol. XLIV, No. 1, 1985.
|
[2] |
Ewa Orlowska, Kripke Models with Relative Accessibility, ICS PAS Reports, 569, 19, 1985.
|
[3] |
S. Kripke, Semantical Analysis of Modal Logic I, Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik 9.
|
[1] | Kwangjin Park. Efficient Data Access for Location-Dependent Spatial Queries[J]. Journal of Computer Science and Technology, 2014, 29(3): 449-469. DOI: 10.1007/s11390-014-1442-9 |
[2] | NIE Xumin, GUO Qing. Renaming a Set of Non-Horn Clauses[J]. Journal of Computer Science and Technology, 2000, 15(5): 409-415. |
[3] | FU maxi. Relative Properties of Frame Language[J]. Journal of Computer Science and Technology, 1999, 14(4): 320-327. |
[4] | Wang Jue, Miao Duoqian. Analysis on Attribute Reduction Strategies of Rough Set[J]. Journal of Computer Science and Technology, 1998, 13(2): 189-193. |
[5] | Wang Yun, Gu Guanqun. Minimum QOS Parameter Set in Transport Layer[J]. Journal of Computer Science and Technology, 1997, 12(6): 571-573. |
[6] | Ye Shiwei, Shi Zhongzhi. A Necessary Condition about the Optimum Partition on a Finite Set of Samples and Its Application to Clustering Analysis[J]. Journal of Computer Science and Technology, 1995, 10(6): 545-556. |
[7] | Qin Kaihuai, Sun Jiaguang. A New Local Control Spline with Shape Parameters for CAD/CAM[J]. Journal of Computer Science and Technology, 1993, 8(3): 90-98. |
[8] | Liu Weiyi. The Determining Method about the Conflict between the Null Constraints and the Set of Functional Dependencies[J]. Journal of Computer Science and Technology, 1989, 4(2): 116-125. |
[9] | Lian Lin, Zhang Yili, Tang Changjie. A Non-Recursive Algorithm Computing Set Expressions[J]. Journal of Computer Science and Technology, 1988, 3(4): 310-316. |
[10] | Huang Guoxiang, Liu Jian. A Key-Lock Access Control[J]. Journal of Computer Science and Technology, 1987, 2(3): 236-243. |