主管/主办:重庆西南信息有限公司
CODEN JKIEBK
-
语义Web及其描述语言
李立宇 谭少华 唐世渭 杨冬青 王腾皎. 语义Web及其描述语言[J]. 计算机科学, 2003, 30(12): 1-5.
- 李立宇 谭少华 唐世渭 杨冬青 王腾皎
- 计算机科学. 2003, 30 (12): 1-5.
- 摘要 ( 138 ) PDF(261KB) ( 480 )
- 相关文章 | 多维度评价
-
The semantic Web is the direction of the Internet. This paper introdues the framework of the semantic Web and some language used to describle it,including RDF/RDFS and DAML +OIL etc. At the same time, this paper dicusses that how denote the knowledge of t
-
桥接局域网第2层拓扑结构的自动发现
李涛 石志强 吴志美. 桥接局域网第2层拓扑结构的自动发现[J]. 计算机科学, 2003, 30(12): 6-8.
- 李涛 石志强 吴志美
- 计算机科学. 2003, 30 (12): 6-8.
- 摘要 ( 84 ) PDF(204KB) ( 454 )
- 相关文章 | 多维度评价
-
With the rapid development and the wide use of Bridged Local Area Networks, the importance of below-OSI-Layer-3 topology comes to be realized. Recent research work has demonstrated that active layer-2 topology can be determined using Address Forwarding In
-
网格实例与关键技术分析
杜江 周念生 刘然 王小鸽 都志辉. 网格实例与关键技术分析[J]. 计算机科学, 2003, 30(12): 9-15.
- 杜江 周念生 刘然 王小鸽 都志辉
- 计算机科学. 2003, 30 (12): 9-15.
- 摘要 ( 85 ) PDF(374KB) ( 406 )
- 相关文章 | 多维度评价
-
Grid computing technology is developing in an impressing speed these years. This paper is going to do some detailed analysis on two of the major Grid projects, Globus and Legion, in order to find out the key technologies of Grid computing. In this paper,
-
探索计算系统异构性的描述
曾国荪 陈闳中. 探索计算系统异构性的描述[J]. 计算机科学, 2003, 30(12): 16-18.
- 曾国荪 陈闳中
- 计算机科学. 2003, 30 (12): 16-18.
- 摘要 ( 96 ) PDF(218KB) ( 447 )
- 相关文章 | 多维度评价
-
It is valuable work to construct computational system by means of network,so that its capacity and power can be enhanced and extended. But there is heterogeneity in common among computational systems. It is main obstacle for computational systems to coope
-
DNA计算与DNA计算机研究进展与展望
丁建立 陈增强 袁著祉. DNA计算与DNA计算机研究进展与展望[J]. 计算机科学, 2003, 30(12): 19-22.
- 丁建立 陈增强 袁著祉
- 计算机科学. 2003, 30 (12): 19-22.
- 摘要 ( 95 ) PDF(221KB) ( 948 )
- 相关文章 | 多维度评价
-
DNA computing is a new method based on biochemical reactions and molecular biology technology.The paper first introduces the basic principle and advantages of DNA computing, and then surveys DNA computing and DNA computer, finally, points out current exis
-
.NET环境下的移动代理迁移机制
王丹 于戈 王国仁. .NET环境下的移动代理迁移机制[J]. 计算机科学, 2003, 30(12): 23-26.
- 王丹 于戈 王国仁
- 计算机科学. 2003, 30 (12): 23-26.
- 摘要 ( 65 ) PDF(218KB) ( 362 )
- 相关文章 | 多维度评价
-
The migration mechanism is one of the most important techniques for the mobile agent techniques. In this paper, migration mechanism for the mobile agent based on Microsoft .NET developing environment is researched. First, the two serialized techniques pro
-
移动Ad Hoc网络路由协议综述
张顺亮 叶澄清 李方敏. 移动Ad Hoc网络路由协议综述[J]. 计算机科学, 2003, 30(12): 27-30.
- 张顺亮 叶澄清 李方敏
- 计算机科学. 2003, 30 (12): 27-30.
- 摘要 ( 93 ) PDF(244KB) ( 1009 )
- 相关文章 | 多维度评价
-
A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve
-
用户层通信接口VIA的研究(二)
孙伟平 周敬利 余胜生. 用户层通信接口VIA的研究(二)[J]. 计算机科学, 2003, 30(12): 31-33.
- 孙伟平 周敬利 余胜生
- 计算机科学. 2003, 30 (12): 31-33.
- 摘要 ( 76 ) PDF(203KB) ( 383 )
- 相关文章 | 多维度评价
-
Distributed applications require fast and reliable exchange of information across a network. Traditional network architectures do not provide the performance required by these applications, due to communication overhead incurred by messages to move throug
-
分组网上多媒体实时业务双时间尺度速率控制算法
张玉清 蔡安妮 孙景鳌. 分组网上多媒体实时业务双时间尺度速率控制算法[J]. 计算机科学, 2003, 30(12): 34-37.
- 张玉清 蔡安妮 孙景鳌
- 计算机科学. 2003, 30 (12): 34-37.
- 摘要 ( 79 ) PDF(200KB) ( 370 )
- 相关文章 | 多维度评价
-
By taking into account the self-similarity nature of video traffic, in this paper we propose a receiver-driven double time-scale rate control (DTSRC)algorithm for multimedia real-time applications based on direct bandwidth estimation, rather than on loss
-
基于NS-2仿真的接纳控制性能分析
王春峰 卢睿 陈秀忠. 基于NS-2仿真的接纳控制性能分析[J]. 计算机科学, 2003, 30(12): 38-40.
- 王春峰 卢睿 陈秀忠
- 计算机科学. 2003, 30 (12): 38-40.
- 摘要 ( 95 ) PDF(157KB) ( 361 )
- 相关文章 | 多维度评价
-
Performance analysis is an important aspect in the designing of admission control mecnamsm, in oraer to evaluate the admission control mechanism, we should get the critical data in the experiments, which is difficult in real network. Network simulation is
-
QoS组播路由:算法与协议
黄东军 蔡雪莲 王建新 陈松乔. QoS组播路由:算法与协议[J]. 计算机科学, 2003, 30(12): 41-45.
- 黄东军 蔡雪莲 王建新 陈松乔
- 计算机科学. 2003, 30 (12): 41-45.
- 摘要 ( 79 ) PDF(313KB) ( 891 )
- 相关文章 | 多维度评价
-
This article provides a survey of the QoS-aware muhicast routing algorithms and protocols . A modified group model and a description about QoS-aware multicast routing problem have been proposed. The main contribution to the designing of multicast architec
-
基于测量的QoS接纳控制算法的结构与性能分析
桂志波 周立超. 基于测量的QoS接纳控制算法的结构与性能分析[J]. 计算机科学, 2003, 30(12): 46-48.
- 桂志波 周立超
- 计算机科学. 2003, 30 (12): 46-48.
- 摘要 ( 93 ) PDF(130KB) ( 369 )
- 相关文章 | 多维度评价
-
The advantage of measurement-based QoS admission control(MBAC)algorithms is that they can improve network utilization. In this paper, the equations of MBAC algorithms are proved to be of the same structural form. Then, through simulations on the existing
-
一种基于分段共享的预测式错误恢复机制
徐洁 郭星廷 夏梦芹. 一种基于分段共享的预测式错误恢复机制[J]. 计算机科学, 2003, 30(12): 49-53.
- 徐洁 郭星廷 夏梦芹
- 计算机科学. 2003, 30 (12): 49-53.
- 摘要 ( 79 ) PDF(246KB) ( 365 )
- 相关文章 | 多维度评价
-
In MPLS/GMPLS networks, a range of restoration schemes will be required to support trade-offs between service interruption time and network resource utilization. Although, the tradition protectionbased and reservation-based recovery schemes exist some mer
-
一种新型的基于网络流量自相似性的DDoS入侵诊测方法
罗光春 林夏 卢显良 张骏. 一种新型的基于网络流量自相似性的DDoS入侵诊测方法[J]. 计算机科学, 2003, 30(12): 54-58.
- 罗光春 林夏 卢显良 张骏
- 计算机科学. 2003, 30 (12): 54-58.
- 摘要 ( 84 ) PDF(220KB) ( 386 )
- 相关文章 | 多维度评价
-
This paper presents a new method of DDoS Intrude Detection Based on Self-Similarity of Network Traffics based on analysis of parameter of self-similar, which includes Hurst parameter, Holder parameter (Time variable function H(t)), we do research on the a
-
高速网络环境下内容审计系统的研究与实现
万国根 秦志光 刘锦德. 高速网络环境下内容审计系统的研究与实现[J]. 计算机科学, 2003, 30(12): 59-61.
- 万国根 秦志光 刘锦德
- 计算机科学. 2003, 30 (12): 59-61.
- 摘要 ( 89 ) PDF(218KB) ( 352 )
- 相关文章 | 多维度评价
-
The paper presents a content audit system on high speed network. A new algorithm is provided for load balancing and data distribution which is based on application protocol and session states. A fast text searching approach is also introduced for string m
-
基于主从样式的移动代理安全模型的研究与实现
穆鸿 王汝传 张登银. 基于主从样式的移动代理安全模型的研究与实现[J]. 计算机科学, 2003, 30(12): 62-65.
- 穆鸿 王汝传 张登银
- 计算机科学. 2003, 30 (12): 62-65.
- 摘要 ( 97 ) PDF(231KB) ( 354 )
- 相关文章 | 多维度评价
-
In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic
-
分布式视频点播系统的接入控制研究
周竞扬 张阳 单炜 陈道蓄. 分布式视频点播系统的接入控制研究[J]. 计算机科学, 2003, 30(12): 66-68.
- 周竞扬 张阳 单炜 陈道蓄
- 计算机科学. 2003, 30 (12): 66-68.
- 摘要 ( 110 ) PDF(225KB) ( 359 )
- 相关文章 | 多维度评价
-
Video on Demand(VoD)systems are considered as one of the most valuable services for the next generation broad-bandwidth Internet. To provide high-quality service, the VoD system must employ an admission control module to guarantee QoS, but there are still
-
一种基于后项不定长关联规则的Web个性化推荐方法
丁增喜 王菊英 王大玲 鲍玉斌 于戈. 一种基于后项不定长关联规则的Web个性化推荐方法[J]. 计算机科学, 2003, 30(12): 69-72.
- 丁增喜 王菊英 王大玲 鲍玉斌 于戈
- 计算机科学. 2003, 30 (12): 69-72.
- 摘要 ( 109 ) PDF(274KB) ( 362 )
- 相关文章 | 多维度评价
-
Web usage mining plays an important part in supporting personalized recommendation on Web and association rule uncovers the interesting relations among items hidden in data. The paper gives an idea of association rule merging-deleting based on the analysi
-
基于贝叶斯网络模型的用户兴趣联合推送
欧洁. 基于贝叶斯网络模型的用户兴趣联合推送[J]. 计算机科学, 2003, 30(12): 73-77.
- 欧洁
- 计算机科学. 2003, 30 (12): 73-77.
- 摘要 ( 102 ) PDF(283KB) ( 478 )
- 相关文章 | 多维度评价
-
The association push of interesting information is implemented according to the information that other users with similar interests have read, the refore user can easily find high quality interesting information from the immense Web information. The assoc
-
一种基于全文检索系统的文档关联研究与实现
饶祎 郭辉 蔡庆生. 一种基于全文检索系统的文档关联研究与实现[J]. 计算机科学, 2003, 30(12): 78-79.
- 饶祎 郭辉 蔡庆生
- 计算机科学. 2003, 30 (12): 78-79.
- 摘要 ( 96 ) PDF(158KB) ( 436 )
- 相关文章 | 多维度评价
-
As a important application of the Full-Text retrieval system, document relevancy has powerful function. In this paper, a document relevancy method based on the Full-Text retrieval system is presented, which is deeply discussed from two aspects, content re
-
元计算环境下的目录服务机制研究
梅晓勇 王志刚 李师贤. 元计算环境下的目录服务机制研究[J]. 计算机科学, 2003, 30(12): 80-82.
- 梅晓勇 王志刚 李师贤
- 计算机科学. 2003, 30 (12): 80-82.
- 摘要 ( 75 ) PDF(254KB) ( 346 )
- 相关文章 | 多维度评价
-
In Grid Computing environments, in order to reasonablely avail the super-speed host, great capacity storage,network bindwidth etc grid resources, and coordination use of the protocols and applications algorithms, the directory service system mechanism mus
-
基于Multi—Agent的动态在线议价模型
张虹 邱玉辉. 基于Multi—Agent的动态在线议价模型[J]. 计算机科学, 2003, 30(12): 83-85.
- 张虹 邱玉辉
- 计算机科学. 2003, 30 (12): 83-85.
- 摘要 ( 93 ) PDF(206KB) ( 348 )
- 相关文章 | 多维度评价
-
The rapid development of E-commerce makes online bargaining becoming true. This paper puts forward a model for dynamic online bargaining based on the combine of the E-commerce technology and Multi-Agent technology. Also we discuss the algorithm which form
-
考虑更新频率等因素的物化视图有效更新算法
王新军 洪晓光 王海洋. 考虑更新频率等因素的物化视图有效更新算法[J]. 计算机科学, 2003, 30(12): 86-88.
- 王新军 洪晓光 王海洋
- 计算机科学. 2003, 30 (12): 86-88.
- 摘要 ( 104 ) PDF(184KB) ( 368 )
- 相关文章 | 多维度评价
-
For the materialized views in the fast LAN or computing grid environment, it is a very important problem that how to refresh them efficiently when data sources have changed. In this paper, we take the update frequencies and the size of source relations in
-
基于版本控制策略的WebGIS缓存实现机制研究
王映辉 冯德民. 基于版本控制策略的WebGIS缓存实现机制研究[J]. 计算机科学, 2003, 30(12): 89-91.
- 王映辉 冯德民
- 计算机科学. 2003, 30 (12): 89-91.
- 摘要 ( 87 ) PDF(158KB) ( 433 )
- 相关文章 | 多维度评价
-
Analyze the access efficiency key factor of WebGIS, according to the locality and site- correlation, and by different access of client-side and server-side, combing mechanism of edition-control, advanced cache strategy and implementation mechanism of base
-
基于SQL Server2000的企业数据仓库设计与应用
仲元昌 李刚 王越 杨武. 基于SQL Server2000的企业数据仓库设计与应用[J]. 计算机科学, 2003, 30(12): 92-94.
- 仲元昌 李刚 王越 杨武
- 计算机科学. 2003, 30 (12): 92-94.
- 摘要 ( 90 ) PDF(165KB) ( 371 )
- 相关文章 | 多维度评价
-
To make up the shortage of current database in information distilling, we need to integrate mass data indata warehouse so that it can offer better reference to business manage and decision-making for enterprise. By using relational database SQL Server 200
-
基于耦合Logistic映射的伪随机位发生器及其在混沌序列密码算法中的应用
邓绍江 李传东 廖晓峰. 基于耦合Logistic映射的伪随机位发生器及其在混沌序列密码算法中的应用[J]. 计算机科学, 2003, 30(12): 95-98.
- 邓绍江 李传东 廖晓峰
- 计算机科学. 2003, 30 (12): 95-98.
- 摘要 ( 87 ) PDF(200KB) ( 488 )
- 相关文章 | 多维度评价
-
In this paper, the recent progress on chaotic cryptography is summarized firstly. Then a novel pseudorandom bit generator based on coupled Logistic maps is proposed. Theoretical analysis and numerical experiments illustrate that it is superior to those in
-
面向移动计算的数字水印技术研究
黄向生 杨小帆 王阳生. 面向移动计算的数字水印技术研究[J]. 计算机科学, 2003, 30(12): 99-102.
- 黄向生 杨小帆 王阳生
- 计算机科学. 2003, 30 (12): 99-102.
- 摘要 ( 91 ) PDF(189KB) ( 358 )
- 相关文章 | 多维度评价
-
In the mobile computing environment, we propose a novel watermarking algorithm based on integer wavelet through pixel-wise masking with simple human visual system (HVS). Then the correlation between the watermarking sequence and the marked DWT coefficient
-
形式系统UL的弱完备性
张小红 何华灿 李伟华. 形式系统UL的弱完备性[J]. 计算机科学, 2003, 30(12): 103-107.
- 张小红 何华灿 李伟华
- 计算机科学. 2003, 30 (12): 103-107.
- 摘要 ( 96 ) PDF(224KB) ( 385 )
- 相关文章 | 多维度评价
-
Based on the basic formal deductive system UL of Universal Logic, UL-algebra and D-tdeal are proposect in this paper. After the discussion on their basic properties and the relation with BCK-algebra, the weak completeness theory of UL is proved through th
-
猜想发现中的模糊类比研究
宋坤 蔡庆生. 猜想发现中的模糊类比研究[J]. 计算机科学, 2003, 30(12): 108-110.
- 宋坤 蔡庆生
- 计算机科学. 2003, 30 (12): 108-110.
- 摘要 ( 79 ) PDF(128KB) ( 352 )
- 相关文章 | 多维度评价
-
This paper combines Guess-Discovery with Fuzzy-Maths on the base of the Guess-Discovery model, and introduces a model of Combined-Reasoning ,and shows the feasibility of the model with experiments. It breaks through the restriction of precious maths and c
-
模糊T-粗集的粗糙性测量
刘华文 史开泉. 模糊T-粗集的粗糙性测量[J]. 计算机科学, 2003, 30(12): 111-112.
- 刘华文 史开泉
- 计算机科学. 2003, 30 (12): 111-112.
- 摘要 ( 79 ) PDF(87KB) ( 419 )
- 相关文章 | 多维度评价
-
In this paper, we discuss roughness measure of the fuzzy T-rough sets, and introduce an axiom description of the degree of roughness and a characteristic theorem. Furthermore, we give several special expressions of the degree of roughness. The results of
-
离散时延双神经元网络的渐近稳定性
李绍文 李绍荣 廖晓峰. 离散时延双神经元网络的渐近稳定性[J]. 计算机科学, 2003, 30(12): 113-115.
- 李绍文 李绍荣 廖晓峰
- 计算机科学. 2003, 30 (12): 113-115.
- 摘要 ( 87 ) PDF(151KB) ( 382 )
- 相关文章 | 多维度评价
-
New sufficient conditions for the asymptotic stability of a two-neuron network with different time delays are derived. These conditions lead to delay-dependent and delay-independent asymptotic stability. Our results are shown to be less conservative and r
-
带有多个可转化约束的频繁项集挖掘算法
宋宝莉 张帮华 何炎祥 朱骁峰. 带有多个可转化约束的频繁项集挖掘算法[J]. 计算机科学, 2003, 30(12): 115-117.
- 宋宝莉 张帮华 何炎祥 朱骁峰
- 计算机科学. 2003, 30 (12): 115-117.
- 摘要 ( 82 ) PDF(181KB) ( 453 )
- 相关文章 | 多维度评价
-
Recent work has highlighted the importance of the constraint-based mining paradigm in the context of frequent item sets, associations, correlations. Some research has raised the notion "convertible constraints", and this method can push some constraints i
-
数据挖掘中的统计方法
魏玲 祁建军 张文修. 数据挖掘中的统计方法[J]. 计算机科学, 2003, 30(12): 118-119.
- 魏玲 祁建军 张文修
- 计算机科学. 2003, 30 (12): 118-119.
- 摘要 ( 74 ) PDF(123KB) ( 338 )
- 相关文章 | 多维度评价
-
Data mining is the process of secondary analysis of large databases aimed at finding unsuspected relationships which are of interest or value to the database owners. We analyze the statistical methods in the classification in data mining, include: preproc
-
基于粗糙集理论和覆盖算法的模式分类方法
王伦文 张铃. 基于粗糙集理论和覆盖算法的模式分类方法[J]. 计算机科学, 2003, 30(12): 120-122.
- 王伦文 张铃
- 计算机科学. 2003, 30 (12): 120-122.
- 摘要 ( 75 ) PDF(174KB) ( 337 )
- 相关文章 | 多维度评价
-
In this paper, the advantages and disadvantages of Rough Set and Neighborhood Covering Algorithm (NCA)are analyzed. A classification method which combines Rough Set and NCA is pointed out. And then, the reasonableness, feasibility and necessity of the met
-
基于邻接关系的空间趋势检测算法研究
文俊浩 李立新 吴中福 吴红艳. 基于邻接关系的空间趋势检测算法研究[J]. 计算机科学, 2003, 30(12): 123-125.
- 文俊浩 李立新 吴中福 吴红艳
- 计算机科学. 2003, 30 (12): 123-125.
- 摘要 ( 89 ) PDF(230KB) ( 430 )
- 相关文章 | 多维度评价
-
A regular change of one or more non-spatial attributes can be detected when moving away from a given start object. Moreover, spatial objects are often influenced by their neighbors. And the influence typically decreases or increases more or less continuou
-
一种网络环境中的本体演化和维护模型
王进 陈恩红 林乐. 一种网络环境中的本体演化和维护模型[J]. 计算机科学, 2003, 30(12): 126-128.
- 王进 陈恩红 林乐
- 计算机科学. 2003, 30 (12): 126-128.
- 摘要 ( 78 ) PDF(211KB) ( 348 )
- 相关文章 | 多维度评价
-
With the rapid development of Internet, Knowledge web will be one of development directions of the next generation of Internet. The applications of ontology will bring new opportunities and challenges to it. In this paper, we propose an ontology evolution
-
自适应网络学习用户界面设计和实现
李晓 王雪飞 邱玉辉. 自适应网络学习用户界面设计和实现[J]. 计算机科学, 2003, 30(12): 129-131.
- 李晓 王雪飞 邱玉辉
- 计算机科学. 2003, 30 (12): 129-131.
- 摘要 ( 88 ) PDF(174KB) ( 421 )
- 相关文章 | 多维度评价
-
An adaptive user interface helps to improve the quality of human-computer interaction. Most people at present join to Web-Based Learning by common browser. Due to the one-fits-all user interface, they have to face with the problem of lack of the support o
-
高精度图像测量与对准系统的算法研究
杨丹 杨亚威 张小洪 李东. 高精度图像测量与对准系统的算法研究[J]. 计算机科学, 2003, 30(12): 132-135.
- 杨丹 杨亚威 张小洪 李东
- 计算机科学. 2003, 30 (12): 132-135.
- 摘要 ( 84 ) PDF(250KB) ( 579 )
- 相关文章 | 多维度评价
-
In this paper a new high accuracy image measurement and registration system design is proposed, in which edges of image in pixel are detected by improved Canny operator, edge points are recorded by an auto-tracing algorithm, edges in sub-pixel are located
-
医学图像三维表面重建分叉曲面的数学形态学研究
鲍苏苏 林斌. 医学图像三维表面重建分叉曲面的数学形态学研究[J]. 计算机科学, 2003, 30(12): 136-138.
- 鲍苏苏 林斌
- 计算机科学. 2003, 30 (12): 136-138.
- 摘要 ( 70 ) PDF(152KB) ( 393 )
- 相关文章 | 多维度评价
-
In the medical 3D Reconstruction, 3D object surface is reconstructed, by making use of the traditional slice-based reconstruction method. Due to the still existing problems, such as contour pairing, diverging surface,contour pair patching, etc. In this pa
-
基于混沌序列的图像加密解密算法
陈永红 黄席樾. 基于混沌序列的图像加密解密算法[J]. 计算机科学, 2003, 30(12): 139-140.
- 陈永红 黄席樾
- 计算机科学. 2003, 30 (12): 139-140.
- 摘要 ( 92 ) PDF(147KB) ( 509 )
- 相关文章 | 多维度评价
-
In this paper, an image encryption and decryption algorithm based on chaos sequence is proposed. This algorithm provides low computational complexity, high security and no distortion. Finally, experimental results are satisfactory.
-
采用DNA进化算法优化设计TS模糊控制器
翁妙凤. 采用DNA进化算法优化设计TS模糊控制器[J]. 计算机科学, 2003, 30(12): 141-143.
- 翁妙凤
- 计算机科学. 2003, 30 (12): 141-143.
- 摘要 ( 71 ) PDF(167KB) ( 344 )
- 相关文章 | 多维度评价
-
The DNA evolutionary algorithm(DNA-EA)and the DNA genetic algorithm(DNA-GA)based on a new DNA encoding method are propsed based on the structure and the genetic mechanism of biological DNA. The DNA-EA and the DNA-GA are applied into the optimal design of
-
软件体系结构的形式化与面向状态的形式化风格
胡劲松 郭荷清 郑启伦. 软件体系结构的形式化与面向状态的形式化风格[J]. 计算机科学, 2003, 30(12): 144-146.
- 胡劲松 郭荷清 郑启伦
- 计算机科学. 2003, 30 (12): 144-146.
- 摘要 ( 73 ) PDF(223KB) ( 416 )
- 相关文章 | 多维度评价
-
The paper introduces the definition, the essential and the fundamentality of formalizing ,and discusses some aspects about formalizing in detail. After reviewing several formal styles and architecture description languages, we provide the state-oriented s
-
一种面向任务关键系统的RISC风格的协作构架
朱智林 郭敬林 李航 刘西洋 陈平. 一种面向任务关键系统的RISC风格的协作构架[J]. 计算机科学, 2003, 30(12): 147-149.
- 朱智林 郭敬林 李航 刘西洋 陈平
- 计算机科学. 2003, 30 (12): 147-149.
- 摘要 ( 76 ) PDF(181KB) ( 337 )
- 相关文章 | 多维度评价
-
The collaborative framework for the mission and safety critical system is required to support multiple quality of service properties. A RISC style collaborative framework is provided to meet this requirement. The collaborative characters of mission and sa
-
MIS项目的综合风险评估模型
张珞玲 李师贤. MIS项目的综合风险评估模型[J]. 计算机科学, 2003, 30(12): 150-153.
- 张珞玲 李师贤
- 计算机科学. 2003, 30 (12): 150-153.
- 摘要 ( 102 ) PDF(237KB) ( 548 )
- 相关文章 | 多维度评价
-
It appears that, until from the end of 80's have western researchers attached importance to software project risk management. In China, little attention is paid to risk management. However, project risk management is very essential for the accomplishment
-
安全操作系统中系统分权的实现
金雷 林志强 茅兵 谢立. 安全操作系统中系统分权的实现[J]. 计算机科学, 2003, 30(12): 154-157.
- 金雷 林志强 茅兵 谢立
- 计算机科学. 2003, 30 (12): 154-157.
- 摘要 ( 67 ) PDF(270KB) ( 349 )
- 相关文章 | 多维度评价
-
In Linux management is still based on some privilege system call,and this is a great underlying threat to system. Privilege-Divided Model (PDM)comes out to solve the problem. In the model, privilege is divided into some parts ,each part or several parts c
-
Linux2.5线程机制研究
丁成 孙玉芳. Linux2.5线程机制研究[J]. 计算机科学, 2003, 30(12): 158-160.
- 丁成 孙玉芳
- 计算机科学. 2003, 30 (12): 158-160.
- 摘要 ( 82 ) PDF(232KB) ( 670 )
- 相关文章 | 多维度评价
-
In this paper, we discuss the shortage of thread support in linux2.4 and analyze the recently progress in this area,introduce two pthreads libraries:NGPT, NPTL.
-
最长d维箱嵌套问题的贪心算法
宋传鸣 王相海. 最长d维箱嵌套问题的贪心算法[J]. 计算机科学, 2003, 30(12): 161-163.
- 宋传鸣 王相海
- 计算机科学. 2003, 30 (12): 161-163.
- 摘要 ( 179 ) PDF(153KB) ( 692 )
- 相关文章 | 多维度评价
-
The Greedy algorithm is a simple,direct and efficient method to many problems. In this paper,the longest nesting problem of d-dimension boxes is brought up firstly. And then a novel algorithm for this problem based on greedy strategy is proposed. Finally,
-
内存异常数据的检测与恢复
朱智林 李航 刘西洋 陈平 张其林. 内存异常数据的检测与恢复[J]. 计算机科学, 2003, 30(12): 163-165.
- 朱智林 李航 刘西洋 陈平 张其林
- 计算机科学. 2003, 30 (12): 163-165.
- 摘要 ( 91 ) PDF(156KB) ( 401 )
- 相关文章 | 多维度评价
-
For some certain applications, they require massive application data to be resident in main memory. We categorize the exceptional data resided in memory based on the analysis of corresponding reasons. Exploiting mature CRC technologies to build a redundan
-
嵌入式系统软件开发中的通信协议研究
袁帅 刘博勤 陈章龙. 嵌入式系统软件开发中的通信协议研究[J]. 计算机科学, 2003, 30(12): 166-168.
- 袁帅 刘博勤 陈章龙
- 计算机科学. 2003, 30 (12): 166-168.
- 摘要 ( 71 ) PDF(167KB) ( 328 )
- 相关文章 | 多维度评价
-
In the course of software developing of embedded system, we usually use the remote debugger, which needs connection and communication between the host and target through the serial port,parallel port or Ethernet. Thus some effective and reliable communica
-
基于对象的嵌入式实时软件需求模型
徐晓东 饶云华. 基于对象的嵌入式实时软件需求模型[J]. 计算机科学, 2003, 30(12): 169-171.
- 徐晓东 饶云华
- 计算机科学. 2003, 30 (12): 169-171.
- 摘要 ( 89 ) PDF(152KB) ( 372 )
- 相关文章 | 多维度评价
-
The embedded real-time software requirements are analyzed, and an object-oriented software requirements model is proposed. At the same time, an example, employing this requirements model is introduced in practice.
-
基于拟人策略的高校排课算法
陈卫东 李吉桂. 基于拟人策略的高校排课算法[J]. 计算机科学, 2003, 30(12): 172-175.
- 陈卫东 李吉桂
- 计算机科学. 2003, 30 (12): 172-175.
- 摘要 ( 110 ) PDF(210KB) ( 1341 )
- 相关文章 | 多维度评价
-
For the university timetabling problem that is NP-hard, some new strategies of tackling it are proposed,and two heuristic algorithms based on personification strategies are presented, which outperform the known straightforward heuristic algorithms in the
-
卷烟生产线柔性优化调度模型研究
刘永梅 陈庄 崔贯勋 何昭全. 卷烟生产线柔性优化调度模型研究[J]. 计算机科学, 2003, 30(12): 176-178.
- 刘永梅 陈庄 崔贯勋 何昭全
- 计算机科学. 2003, 30 (12): 176-178.
- 摘要 ( 100 ) PDF(144KB) ( 383 )
- 相关文章 | 多维度评价
-
Through analyzing technological process of cigarette producing line and utilizing the basic idea of modern graph theory, the connected network system based on continuous material flow is drawn from cigarette producing line. The thought of flexible optimiz