1974年1月创刊(月刊)
主管/主办:重庆西南信息有限公司
ISSN 1002-137X
CN 50-1075/TP
CODEN JKIEBK
编辑中心
当期目录
2003年第10期, 刊出日期:2003-10-15
  
基于J2EE平台的MDA模型转换技术
史耀馨 崔萌 李宣东 郑国梁
计算机科学. 2003, 30 (10): 1-6. 
摘要 ( 77 )   PDF(280KB) ( 297 )   
相关文章 | 多维度评价
The OMG's MDA defines an approach to IT system specification that separates the specification of system functionality from the specification of the implementation of that functionality on a specific technology platform. To this end, the MA defines two ki
递归维概念及其操作的研究
袁霖 李战怀 徐秋元
计算机科学. 2003, 30 (10): 7-10. 
摘要 ( 81 )   PDF(212KB) ( 280 )   
相关文章 | 多维度评价
Dimensions are an essential part in multi-dimensional data model (MDDM) for OLAP. Hierarchical structure of dimension allows the user to study measures in different levels of details. This paper focuses on a special kind of dimension with an unbalanced-hi
QoS保证的资源竞争与用户需求策略研究
罗军 袁满 胡建平 阚志刚 马健
计算机科学. 2003, 30 (10): 11-15. 
摘要 ( 78 )   PDF(214KB) ( 308 )   
相关文章 | 多维度评价
QoS issues are widely being studied for Internet. It is a key issue to how effectively control open resources of network in term of user's QoS need. In this paper, we formulize the resources of network and analyze its status.Further, we analyze competiti
基于规则的分层负载平衡调度模型
李冬梅 施海虎 顾毓清
计算机科学. 2003, 30 (10): 16-20. 
摘要 ( 72 )   PDF(225KB) ( 288 )   
相关文章 | 多维度评价
On a massively parallel and distributed system and a network of workstations system, it is a critical problem to increase the utilization efficiency of resources and the answer speed of tasks by using effective load balancing scheduling strategy. This pap
基于统计数据的Web站点测试
许蕾 徐宝文 陈振强
计算机科学. 2003, 30 (10): 21-24. 
摘要 ( 68 )   PDF(223KB) ( 265 )   
相关文章 | 多维度评价
It is not practical to test a website exhaustively because of too many pages and user groups. So we begin our work at the log files of the Website server, gathering the users' visits and the server's responses in a period of time. Then we analyze and disc
Horn逻辑程序和形式文法之间的对应关系
陈文彬 王驹
计算机科学. 2003, 30 (10): 25-27. 
摘要 ( 106 )   PDF(136KB) ( 336 )   
相关文章 | 多维度评价
The paper researches Horn logic programs with grammatical view. The correspondence between Horn logic programs and grammars is found. The method by which type-0 grammars generate the least Herbrand models of logic programs is found. The method by which Ho
软件工程与数据库技术
乘着信息的波涛——参加第五届信息融合国际学术会议总结报告
何佳洲 赵雁南
计算机科学. 2003, 30 (10): 28-30. 
摘要 ( 86 )   PDF(155KB) ( 321 )   
相关文章 | 多维度评价
移动Agent系统构建研究
贾志勇 谢立
计算机科学. 2003, 30 (10): 31-34. 
摘要 ( 57 )   PDF(207KB) ( 278 )   
相关文章 | 多维度评价
Mobile agent technology has strong adaptability to the status of network and executing environment, and provides a flexible and uniform framework for Web and distributed applications.Mobile agent system, as the foundation of agent computing, should provid
基于本体的医学知识获取
周肖彬 曹存根
计算机科学. 2003, 30 (10): 35-39. 
摘要 ( 93 )   PDF(368KB) ( 402 )   
相关文章 | 多维度评价
In this paper, we introduce an ontology-mediated method for medical knowledge acquisition and analysis.Using the method we establish an ontological structure and ontologies for the Medical Knowledge Base (or NKIMed ). To check the consistency of the acqui
自适应神经模糊推理系统建模研究
鲁斌 何华灿
计算机科学. 2003, 30 (10): 40-44. 
摘要 ( 79 )   PDF(192KB) ( 443 )   
相关文章 | 多维度评价
With rapid development of the fuzzy control application field, the existing system for fuzzy inferring modeling cannot more and more suit the requirements of fuzzy control. About how to apply the theories of fuzzy control to practice rapidly and convenien
基于主动学习的文档分类
覃刚力 黄科 杨家本
计算机科学. 2003, 30 (10): 45-48. 
摘要 ( 73 )   PDF(160KB) ( 310 )   
相关文章 | 多维度评价
In the field of text categorization,the number of unlabeled documents is generally much gretaer than that of labeled documents. Text categorization is the problem of categorization in high-dimension vector space, and more training samples will generally i
Web主题关联知识自学习算法
杨沛 郑启伦 彭宏
计算机科学. 2003, 30 (10): 49-51. 
摘要 ( 61 )   PDF(133KB) ( 247 )   
相关文章 | 多维度评价
There are hidden and rich information for data mining in the topology of topic-specific websites. A new topic-specific association rules mining algorithm is proposed to further the research on this area. The key idea is to analyze the frequent hyperlinked
辐射源识别的模糊联想分类器设计
方敏 王宝树
计算机科学. 2003, 30 (10): 52-54. 
摘要 ( 82 )   PDF(141KB) ( 276 )   
相关文章 | 多维度评价
The fuzzy associative classifier is investigated in this paper. The design methods of the fuzzy associative classifier with genetic algorithm for training are presented. This method trains the weight and back terms to obtain classification rules automati
Rough集之间的相似度量
徐久成 沈钧毅 王国胤
计算机科学. 2003, 30 (10): 55-57. 
摘要 ( 71 )   PDF(177KB) ( 279 )   
相关文章 | 多维度评价
Applications of rough set theory in incomplete information systems are a key of putting rough set into real applications. In this paper, after analyzing some basic concepts of classical rough set theory and extended rough set theory, the measure of simila
输出为可能性分布的模糊决策树
袁修久 张文修
计算机科学. 2003, 30 (10): 58-60. 
摘要 ( 67 )   PDF(138KB) ( 280 )   
相关文章 | 多维度评价
More than one possible classifications for a given instance is supposed. A possibility distribution is assigned at a terminal node of a fuzzy decision tree. The possibility distribution of given instance with known value of attributes is determined by usi
一种基于决策表的分类规则挖掘新算法
谢娟英 冯德民
计算机科学. 2003, 30 (10): 61-63. 
摘要 ( 83 )   PDF(157KB) ( 269 )   
相关文章 | 多维度评价
The mining of classification rules is an important field in Data Mining. Decision table of rough sets theory is an efficient tool for mining classification rules. The elementary concepts corresponding to decision table of Rough Sets Theory are introduced
一种基于扩展交替投影神经网络的弱信号分离方法研究
王金根 陈世福 龚沈光 陈兆乾
计算机科学. 2003, 30 (10): 64-66. 
摘要 ( 98 )   PDF(131KB) ( 299 )   
相关文章 | 多维度评价
Aiming at a kind of specific situation encountered in practice, the paper proposes a weak-signal separation algorithm based on Extended Alternating Projection Neural Networks (EAPNN) by combining the time-domain features of the signal with the frequency-d
语言熵理论与应用模型:英语语义辅助理解工具设计基础
朱平
计算机科学. 2003, 30 (10): 67-69. 
摘要 ( 77 )   PDF(152KB) ( 471 )   
相关文章 | 多维度评价
Adapting the needs for english education of China, by the concept of Shannon's information entropy, this paper proposes the theory of language entropy and its application model: fish-eye driver model. This work develops initial basis for computer-aided E
一种融合颜色和运动特征的镜头探测方法
陈剑赟 李云浩 老松扬 吴玲达
计算机科学. 2003, 30 (10): 70-73. 
摘要 ( 61 )   PDF(177KB) ( 284 )   
相关文章 | 多维度评价
Video Partitioning serves as the preliminary step to structure the content of videos and is the basis of Content-based Video Retrieval. This paper presents a shot detection scheme combining color and motion features of videos. It first extracts the color
基于笔画段分割和组合的汉字笔画提取模型
陈睿 唐雁 邱玉辉
计算机科学. 2003, 30 (10): 74-77. 
摘要 ( 135 )   PDF(178KB) ( 474 )   
相关文章 | 多维度评价
The offline recognition of Chinese Characters is a very important research field in OCR. In this paper, the authors propose an effective stroke extraction model for Chinese Character based on Stroke Segmentation and Combination. Comparing with the existed
软件工程与数据库技术
开放系统中实时中间件关键技术研究
彭舰 俞岭 董鹏 刘锦德
计算机科学. 2003, 30 (10): 78-80. 
摘要 ( 72 )   PDF(203KB) ( 291 )   
相关文章 | 多维度评价
The Real-Time Middleware is the best way to deal with open and real-time in the same time in open system. In this paper, the characteristic of open system, the policy of real-time implement in open system and the real-time CORBA specification and developm
FastQueue:一种高性能的磁盘队列存储管理机制
魏青松 卢显良 周旭
计算机科学. 2003, 30 (10): 81-83. 
摘要 ( 81 )   PDF(189KB) ( 386 )   
相关文章 | 多维度评价
High reliability is the primary requirement for messaging system. Messaging system always utilizes disk queue to temporarily store message to be delivered. Experiments show that Disk queue I/O is the primary performance bottleneck in the messaging system
Linux进程管理体系的研究与分析
赵慧斌 李小群 叶以民
计算机科学. 2003, 30 (10): 84-88. 
摘要 ( 81 )   PDF(233KB) ( 334 )   
相关文章 | 多维度评价
Using an opened source system, Linux, as the supported OS is more and more appealing to many developers. So it is attractive to many developers to understand the designing philosophy of Linux and more importantly, improve its performance to satisfy the s
安全操作系统授权撤销机制的研究
吴新勇 熊光泽
计算机科学. 2003, 30 (10): 89-92. 
摘要 ( 60 )   PDF(185KB) ( 270 )   
相关文章 | 多维度评价
Revoking operation is a very important component of access control. The lack of effective revoking operation impinges on supporting dynamic security policies in secure operation system. Analyzing authorization system,this paper presents a revoke policy w
安全操作系统中基于客体的保护机制
金雷 林志强 茅兵 谢立
计算机科学. 2003, 30 (10): 93-95. 
摘要 ( 61 )   PDF(138KB) ( 399 )   
相关文章 | 多维度评价
Security of operation system is the basis of protecting computer system against attack. To resolve more and more problem in security area ,we need an operation system of great security. That require we find an effective method to develop an security-enha
软件工程与数据库技术
一种分布式信息系统的构件模型及其应用研究
胡金柱 王锐 张昭理
计算机科学. 2003, 30 (10): 96-98. 
摘要 ( 58 )   PDF(150KB) ( 281 )   
相关文章 | 多维度评价
With the extension of enterprise business and the increasing requirement in distributed application, the implementation of information system becomes more difficult which may lead to larger failing possibility of project.How to develop an effective and st
应用设计模式设计可移植的、可扩充、简单灵活的嵌入式GUIToolkit
佟立峰
计算机科学. 2003, 30 (10): 99-102. 
摘要 ( 62 )   PDF(180KB) ( 290 )   
相关文章 | 多维度评价
The environments in which embedded software run are different in that they may run on different processors, have different input devices, and display graphics on a variety of video devices. In addition, it usually has limited computing and storing capabi
一个企业应用集成的设计模式:Hub
董云卫 李伟宏 郝克刚
计算机科学. 2003, 30 (10): 103-105. 
摘要 ( 74 )   PDF(197KB) ( 278 )   
相关文章 | 多维度评价
The Enterprise Application Integration (EAI) is a challenge of modern enterprise. How much effect of information system in enterprise business implement process that depends on the degree of inner function and information integration of formation system.
流网络可靠度的计算算法综述
孙伟平 周敬利 余胜生
计算机科学. 2003, 30 (10): 106-108. 
摘要 ( 72 )   PDF(137KB) ( 350 )   
相关文章 | 多维度评价
A flow network is usually used to describe real world systems such as telecommunication system,computer system and so on. Given the demand d ,the system reliability is defined as the maximum flow of the network is not less than d. The researchers in the f
基于ECN的单播流与多播流间带宽共享算法
杨明 张福炎
计算机科学. 2003, 30 (10): 109-112. 
摘要 ( 67 )   PDF(231KB) ( 268 )   
相关文章 | 多维度评价
An ECN-based implementing bandwidth-sharing algorithm for unicast and multicast flows is presented.The algorithm uses a bandwidth allocation strategy to give an incentive to multicast flows in bandwidth allocation according to algorithm of the number of r
Mesh网络容错广播路由算法的概率分析
王高才 陈建二 王国军 陈松乔
计算机科学. 2003, 30 (10): 113-116. 
摘要 ( 80 )   PDF(184KB) ( 271 )   
相关文章 | 多维度评价
One-to-all or broadcast communication is one of the most important communication patterns and occurs in many important applications in parallel computing. This paper proposes a fault tolerant, local-irdormation-based, and distributed broadcast routing alg
基于功能匹配分解的协议转换器构造技术研究
赵新有 古天龙 蔡国永 董荣胜
计算机科学. 2003, 30 (10): 117-119. 
摘要 ( 65 )   PDF(164KB) ( 269 )   
相关文章 | 多维度评价
A protocol converter can solve the problem of communication between heterogeneous networks. Based on function matching partition, this paper proposes a novel approach to construct the converter, which consists of two processes and can translate messages c
DCCP研究及其性能分析
郭晓峰 冯太明 周竞扬 陈贵海
计算机科学. 2003, 30 (10): 120-124. 
摘要 ( 83 )   PDF(245KB) ( 732 )   
相关文章 | 多维度评价
This paper explores simulation results of the Datagram Congestion Control Protocol(DCCP). The Internet community has seen the growth of real-time applications, which by the nature of their data flow do not desire the congestion control semantics of TCP an
基于Smith原则的ATM网络拥塞控制
关新平 刘志新 龙承念
计算机科学. 2003, 30 (10): 125-127. 
摘要 ( 55 )   PDF(133KB) ( 308 )   
相关文章 | 多维度评价
In this paper, the prediction of available bandwidth and Smith principle are applied into the congestion control based on the ATM model of single bottleneck node. The method can realize that the queue length in the switch traces the given desired value wi
软件工程与数据库技术
基于高速边缘路由器的IPSec处理部件的研究
荣霓 龚正虎 苏金树
计算机科学. 2003, 30 (10): 128-130. 
摘要 ( 68 )   PDF(137KB) ( 284 )   
相关文章 | 多维度评价
High Speed Boundary Routers(HSBRs) are emerging due to improvement of network technologies. The peculiarity of HSBR requires high efficient security packets processing unit. This paper analyzes the characters of HSBR and introduces a IPSec security engine
基于半主动复制技术的组通信系统
袁援 陈松乔 陈建二
计算机科学. 2003, 30 (10): 131-132. 
摘要 ( 69 )   PDF(146KB) ( 247 )   
相关文章 | 多维度评价
Both active replication and passive replication in group communication system are limited to implementing the false-tolerance distributed system. In this paper, we have presented a duplicate technique called Semi-Activere plication SAR, which takes in the
基于蜂窝无线网络的移动IP(IPv6)研究
张全新 宋瀚涛
计算机科学. 2003, 30 (10): 133-135. 
摘要 ( 63 )   PDF(113KB) ( 368 )   
相关文章 | 多维度评价
Introduce method and technology of combination of the TCP/IP protocol based on IPv6 and the cellular wireless communication network. Analyze the cut-in point and key technology of the combination from the view of frame, system structure and the realizatio
IP/DWDM光因特网路由选择机制的研究
王兴伟 崔建业 邸魁 郑露滴
计算机科学. 2003, 30 (10): 136-137. 
摘要 ( 72 )   PDF(149KB) ( 245 )   
相关文章 | 多维度评价
The requirements of IP/DWDM optical Internet routing are analyzed. Guaranteeing QoS, survivability and last routing, and supporting multicast and making lull use of the resources of network are the basic requirements for it. Point out that QoS and surviva
无线传感器网络及其应用
郑增威 吴朝晖 金水祥
计算机科学. 2003, 30 (10): 138-140. 
摘要 ( 48 )   PDF(161KB) ( 297 )   
相关文章 | 多维度评价
As a result of combination of microsensor technology, low power computing and wireless networking,wireless sensor networks are becoming an active branch of computer science. In this paper, we introduce the up-to-date research work of wireless sensor netw
局域网流媒体Caching代理服务器的实现
谭劲 余胜生 周敬利
计算机科学. 2003, 30 (10): 141-143. 
摘要 ( 64 )   PDF(145KB) ( 547 )   
相关文章 | 多维度评价
With the widespread use of streaming media application on the Internet, a significant change in Internet workload will be provoked.Caching is one kind of applied technique relatively for enhancing the scalability of streaming system and reducing the workl
VoIP服务质量管理机制及原型系统
陈秀忠 王春峰 黄晓潞
计算机科学. 2003, 30 (10): 144-148. 
摘要 ( 58 )   PDF(249KB) ( 278 )   
相关文章 | 多维度评价
In this paper, we briefly introduce the architecture of VoIP application at the beginning. Then we focus on discussing QoS management mechanisms in data plane and control plane in detail. We explore the implementation of QoS management system by describin
基于UMTS的QoS结构及管理策略的研究
马燕
计算机科学. 2003, 30 (10): 149-151. 
摘要 ( 42 )   PDF(183KB) ( 249 )   
相关文章 | 多维度评价
Along with the high speed development of mobile systems communications, the research of third generation of mobile systems are in progress rapidly, UMTS is one of the much representative schemes in the global.The paper discusses the architecture and serve
IP网络计费管理研究
赵慧 侯建荣
计算机科学. 2003, 30 (10): 152-154. 
摘要 ( 59 )   PDF(152KB) ( 384 )   
相关文章 | 多维度评价
Accounting Management is probably the least developed IP network management application. Now it is paid more attention than before. Accounting is relatively a unattached and typical application compare to other IP network management applications. First ,
网络入侵追踪研究综述
张静 龚俭
计算机科学. 2003, 30 (10): 155-159. 
摘要 ( 68 )   PDF(272KB) ( 316 )   
相关文章 | 多维度评价
Traceback system is a system for finding the hacker's real location on the network autonomously. It can be divided into two kinds: IP Packet Traceback system, and Connection Traceback system. The goal of IP Packet Traceback system is to traceback the Real
自动入侵响应系统的研究
丁勇 虞平 龚俭
计算机科学. 2003, 30 (10): 160-162. 
摘要 ( 57 )   PDF(202KB) ( 325 )   
相关文章 | 多维度评价
The emergence of automated and complex attacks imposes great threat on the network. The automated intrusion response system is able to take timely countermeasures to stop the attacks and decrease the loss of systems.This paper analyzes the several require
Web应用服务器可扩展名字服务的设计和实现
陈宁江 范国闯
计算机科学. 2003, 30 (10): 163-166. 
摘要 ( 52 )   PDF(209KB) ( 248 )   
相关文章 | 多维度评价
Web application server provides the environment for transactional applications with a series of services(e. g. transaction, message, component container, etc. ). Naming services provide a means for application to locate objects and act as essential suppor
MPEG-4验证模型中的位率控制策略
周兵 李晓强 李炜
计算机科学. 2003, 30 (10): 167-169. 
摘要 ( 49 )   PDF(150KB) ( 273 )   
相关文章 | 多维度评价
As a new generation of multimedia coding standard, MPEG-4 aims to satisfy all kinds of low bitrate applications. Accordingly some new coding ideas and technologies are introduced into MPEG-4. This paper discusses the new rate control strategy recommended
子包含模式在XML数据类型中的应用研究
洪晓光 王海洋 马绍汉
计算机科学. 2003, 30 (10): 170-171. 
摘要 ( 55 )   PDF(121KB) ( 244 )   
相关文章 | 多维度评价
Now research of XML's data has become a hot spot question. Understanding the relationship between these types can provide important information for manipulating this data. In this paper,we study partial sumption for XMLtypes,and according to subsumption,b
数据库系统的优化并行控制算法
赵若韵 黄国兴 肖晶
计算机科学. 2003, 30 (10): 172-174. 
摘要 ( 89 )   PDF(132KB) ( 264 )   
相关文章 | 多维度评价
The concurrency control problem in database systems has been examined by many people and several concurrency control algorithms have been proposed. The most popular algorithms are two-phase locking and timestamp ordering. Due to its inefficiency in some
一种基于SPKI的匿名支付方案
朱庆生 李唯唯 王茜 傅鹤岗
计算机科学. 2003, 30 (10): 175-177. 
摘要 ( 59 )   PDF(153KB) ( 423 )   
相关文章 | 多维度评价
SPKI is a proposed standard for public-key certificates. One important property of SPKI is that SPKI is key-oriented rather than name-oriented, and the public-key is globally unique. In this paper we propose an anonymous paymentscheme based on SPKI aimin
基于SPKI电子支付中的银行端访问控制
王茜 王富强 傅鹤岗 朱庆生
计算机科学. 2003, 30 (10): 178-180. 
摘要 ( 54 )   PDF(131KB) ( 237 )   
相关文章 | 多维度评价
In the system of electronic payment based on SPKI, access control of bank acts as the important function of identification, protecting customer's privacy and ensuring payment. The paper proposes the model of bank access control, and describes the frame an
基于椭圆曲线加密算法技术优势的探讨
夏先智 赵毅
计算机科学. 2003, 30 (10): 181-183. 
摘要 ( 51 )   PDF(142KB) ( 630 )   
相关文章 | 多维度评价
ECC is a safer and more practical public key system than the other cryptography algorithm since public key cryptogram debited. Advantages of ECC on technology are exploited in this paper, which ensures itself a popular cryptography algorithm for public ke