We use cookies to improve your experience with our site.

Structure of Weakly Invertible Semi-Input-Memory Finite Automata with Delay 1
TAO Renji, CHEN Shihua
2002, 17(4)
Abstract
An Interlingua-Based Chinese-English MT System
QI Xuan, ZHOU Huiping, CHEN Huowang
2002, 17(4)
Abstract
Four-Point Wavelets and Their Applications
WEI Guofu, CHEN Falai
2002, 17(4)
Abstract
A New Algebraic Modelling Approach to Distributed Problem-Solving in MAS
SHUAI Dianxun, DENG Zhidong
2002, 17(4)
Abstract
Blending Parametric Patches with Subdivision Surfaces
LI Guiqing, LI Hua
2002, 17(4)
Abstract
The Contiguity in R/M
ZHANG Zaiyue, SUI Yuefei
2002, 17(4)
Abstract
A Hybrid Model for Smoke Simulation
TONG Ruofeng, DONG Jinxiang
2002, 17(4)
Abstract
The Existence Condition of r-Acyclic Database Schemes with MVDs Constraints
HAO Zhongxiao, YAO Chunlong
2002, 17(4)
Abstract
Data Extraction from the Web Based on Pre-Defined Schema
MENG Xiaofeng, LU Hongjun, WANG Haiyan, GU Mingzhe
2002, 17(4)
Abstract
A Transactional Asynchronous Replication Scheme for Mobile Database Systems
DING Zhiming, MENG Xiaofeng, WANG Shan
2002, 17(4)
Abstract
Hybrid Broadcast for the Video-on-Demand Service
MA Huadong, Kang G. Shin
2002, 17(4)
Abstract
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4
XU Yinlong, CHEN Guoliang, HUANG Liusheng, WAN Yingyu
2002, 17(4)
Abstract
An Effective Feedback Control Mechanism for DiffServ Architecture
WANG Chonggang, LONG Keping, YANG Jian, CHENG Shiduan
2002, 17(4)
Abstract
A Component-Based Software Configuration Management Model and Its Supporting System
MEI Hong, ZHANG Lu, YANG Fuqing
2002, 17(4)
Abstract
Run-Time Data-Flow Analysis
LI Jianhui, ZANG Binyu, WU Rong, ZHU Chuanqi
2002, 17(4)
Abstract
An Attack-Finding Algorithm for Security Protocols
LIU Dongxi, LI Xiaoyong, BAI Yingcai
2002, 17(4)
Abstract
Word Spotting Based on a posterior Measure of Keyword Confidence
HAO Jie, LI Xing
2002, 17(4)
Abstract