1974年1月创刊(月刊)
主管/主办:重庆西南信息有限公司
ISSN 1002-137X
CN 50-1075/TP
CODEN JKIEBK
编辑中心
当期目录
2003年第8期, 刊出日期:2003-08-15
  
网格计算技术及应用综述
洪学海 许卓群 丁文魁
计算机科学. 2003, 30 (8): 1-5. 
摘要 ( 73 )   PDF(322KB) ( 627 )   
相关文章 | 多维度评价
Grid computing is a new kind of distributed computing technology and computing environment ,and also an attentive hot point of information technology in the world. It launches a space for new generation internal application,due to its supporting the co
XML数据库技术研究
秦杰 杨树强 窦文华
计算机科学. 2003, 30 (8): 6-9. 
摘要 ( 78 )   PDF(198KB) ( 362 )   
相关文章 | 多维度评价
XML database is a new database technology. This paper gives an overview about the last research about XML database and its related productions ,then comparing XML database with traditional RDBMS. We analyze and point out some weaknesses about XML databa
信息过滤技术研究
毛颖 周源远 王继成 张福炎
计算机科学. 2003, 30 (8): 10-12. 
摘要 ( 92 )   PDF(198KB) ( 346 )   
相关文章 | 多维度评价
As the rapidly growing information on Web, information filtering techniques have been more and more widely used. This paper introduces two main filtering methods ,named content-based and collaborative filtering; con-trastively describes the key techniq
信息检索的概率模型
邢永康 马少平
计算机科学. 2003, 30 (8): 13-17. 
摘要 ( 86 )   PDF(228KB) ( 738 )   
相关文章 | 多维度评价
The study of mathematical models on information retrieval is an important area in the Information Retrieval community. Because of the uncertainty characteristic of IR,the probability model based on statistical probability is apromising model from recen
自动文本分类中的智能处理技术
孙晋文 肖建国
计算机科学. 2003, 30 (8): 18-20. 
摘要 ( 71 )   PDF(158KB) ( 473 )   
相关文章 | 多维度评价
Text automatic classification has become an important technology along with development of Internet and the increment of information ,because of the complexity of text ,it is very difficult to achieve better effect only depend-ing on the different class
DNA分子计算模型
李燕 王秀峰
计算机科学. 2003, 30 (8): 21-23. 
摘要 ( 83 )   PDF(158KB) ( 420 )   
相关文章 | 多维度评价
The field of practical DNA computing opened in 1994 with Adleman's paper,in which a laboratory experi-ment involving DNA molecules was used to solve a small instance of the Hamiltonian Path problem. The characteris-tic of this computation is its powerfu
安全协议的形式化描述和分析
宋震 张艳 李舟军 陈火旺
计算机科学. 2003, 30 (8): 24-27. 
摘要 ( 65 )   PDF(274KB) ( 1444 )   
相关文章 | 多维度评价
Security protocols use cryptography system to complete the tasks of principal identity authentication and seccion key distribution. The correctness of security protocols is of vital importance to ensure the security of the Inter-net application. Formal me
预取技术研究进展
曹新平 刘美华 韩真 古志民 张建鑫
计算机科学. 2003, 30 (8): 28-30. 
摘要 ( 69 )   PDF(203KB) ( 316 )   
相关文章 | 多维度评价
World Wide Web(WWW) services have grown to levels where significant delays are expected to happen.Technology like prefetching are likely to help users to personalize their needs ,reducing their waiting times. This paperfirstly describes the architecture
基于Internet的路由策略研究综述
贺红 袁胜忠 马绍汉
计算机科学. 2003, 30 (8): 31-33. 
摘要 ( 75 )   PDF(153KB) ( 784 )   
相关文章 | 多维度评价
Routing protocol is one of the kernel technologies of the Internet. The swift and violent development of the Internet enables the study of routing protocols to be an important research direction of computer science. This papershows opening problems in
异构网络协议转换器构造技术研究
赵新有 古天龙 董荣胜 李凤英
计算机科学. 2003, 30 (8): 34-36. 
摘要 ( 73 )   PDF(151KB) ( 379 )   
相关文章 | 多维度评价
A protocol converter can solve the problem of communication between heterogeneous and distributed com-puter networks. This paper proposes a novel approach to construct a converter for these protocols. This approach in-cludes following steps:getting reduc
一个基于最小割集扩容的网络优化算法
刘玉华 毛经中 肖德宝
计算机科学. 2003, 30 (8): 37-39. 
摘要 ( 83 )   PDF(123KB) ( 537 )   
相关文章 | 多维度评价
When designing the topology architecture of a large network,or managing and controlling a run network,the battleneck is always changeable with the increase of the network flow,which must be considered. In this paper ,af-ter analyzing the Ford-Fulkerson
无线局域网技术在校园网中的应用与研究
胡新和 尹光辉 陈英
计算机科学. 2003, 30 (8): 40-42. 
摘要 ( 64 )   PDF(171KB) ( 538 )   
相关文章 | 多维度评价
This paper gives some introductions to the relevant techniques and characters of Wireless LAN(WLAN),and associates the techniques with the actual situations of current campus network construction. Meanwhile,this paper provides the solving plan to the re
基于蓝牙的无线校园网接入模式研究
金永贤 周家庆
计算机科学. 2003, 30 (8): 43-44. 
摘要 ( 78 )   PDF(107KB) ( 289 )   
相关文章 | 多维度评价
Bluetooth technique is a kind of close-distance wireless communication standard which has low wastage Using bluetooth technique in campus network can form bluetooth wireless campus network.This paper analyzes topologic structure of bluetooth technique a
入侵检测系统发展的研究综述
张相锋 孙玉芳
计算机科学. 2003, 30 (8): 45-49. 
摘要 ( 71 )   PDF(317KB) ( 886 )   
相关文章 | 多维度评价
With the fast development of Internet,more and more computer security affairs appear. Researchers have developed many security mechanisms to improve computer security ,including intrusion detection (ID). This paper re-views the history of intrusion det
一种基于贝叶斯判决的先进入侵检测模型
罗光春 卢显良 李炯 张骏
计算机科学. 2003, 30 (8): 50-51. 
摘要 ( 77 )   PDF(96KB) ( 334 )   
相关文章 | 多维度评价
One key problem for intrusion detection system is the correctness and efficiency of detection algorithm.This paper presents a revised detection algorithm through the use of Bayes decision. Bayes decision is a random pat-tern classified recognition method
安全多方计算协议的研究与应用
李强 颜浩 陈克非
计算机科学. 2003, 30 (8): 52-55. 
摘要 ( 82 )   PDF(183KB) ( 1452 )   
相关文章 | 多维度评价
This paper introduces the current research status of the muhi-party computation protocols,briefly shows the current four types of multi-party computation protocols and summarizes the research direction.
一种基于密钥矩阵的动态秘密分享方案
颜浩 陈克非
计算机科学. 2003, 30 (8): 56-58. 
摘要 ( 75 )   PDF(167KB) ( 389 )   
相关文章 | 多维度评价
In this paper we introduce a dynamic secret sharing scheme. This scheme not only can be used unrestricted times to share and resume different secret without regenerating the information in the users hands,satisfy the (k,n)threshold demand,but also can
数字水印的应用、性质及性能评测
张鸿宾 张帆
计算机科学. 2003, 30 (8): 59-63. 
摘要 ( 77 )   PDF(291KB) ( 792 )   
相关文章 | 多维度评价
The last ten years have seen rapidly growing in the field of digital watermarks. Meanwhile ,a large number of attacks appears as fast as new algorithms are proposed,which emphasizes the limits and weaknesses of those algo-rithms. The tools ,methodologie
基于关系数据库的XML数据管理
万常选 刘云生
计算机科学. 2003, 30 (8): 64-68. 
摘要 ( 66 )   PDF(299KB) ( 402 )   
相关文章 | 多维度评价
Currently,there are a great of research topics that focus on storing and querying XML data in an RDBMS,and publishing relational data as XML documents ,and querying XML views of relational data. An overview of XML data management based on RDBMS is given
基于Schema路径分析的XML数据库存储策略
朱震 左春
计算机科学. 2003, 30 (8): 69-72. 
摘要 ( 81 )   PDF(187KB) ( 327 )   
相关文章 | 多维度评价
With XML standards playing more and more important role at information exchanges in data management,the XML database storing strategy which supports huge amount XML data control from bottom layer of database has become the key part of fields such as con
对象关系数据库管理系统体系结构的研究
李明 叶晓俊
计算机科学. 2003, 30 (8): 73-75. 
摘要 ( 81 )   PDF(183KB) ( 434 )   
相关文章 | 多维度评价
In last years, with the Object-Oriented Programming popular and the field of database application extend-ed,many DBMS manufacturers integrate the object model into traditional Relational Database Management Systems (RDBMSs)one after another ,in order to m
多媒体存储系统的两级粒度方式的设计
刘晓光 王刚 吴英 刘璟
计算机科学. 2003, 30 (8): 76-77. 
摘要 ( 69 )   PDF(89KB) ( 302 )   
相关文章 | 多维度评价
Multimedia on demand, such as VOD and AOD, have popularized with the development of network tech-nology recently. The Storage systems of multimedia on demand have some special requirements. The two-level granu-larity is a new method to stripe unites in
基于Web的多形态新闻信息发布模型
马路 许斌 王克宏
计算机科学. 2003, 30 (8): 78-81. 
摘要 ( 80 )   PDF(217KB) ( 250 )   
相关文章 | 多维度评价
There are a lot of different terminals existed in internet. Each of them has different demand on format and language when it retrieves information. This paper introduces a Web news information publish model with multi-for-mat and multi-language capabilit
电子商务的一种参考模型
刘晖 彭勤科 沈钧毅
计算机科学. 2003, 30 (8): 82-84. 
摘要 ( 69 )   PDF(205KB) ( 339 )   
相关文章 | 多维度评价
This paper proposes a six-layers reference model for E-Commerce, including infrastructures, science tech-niques, elementary services ,business strategies ,business modes and society environment layer. Main classifications and some concrete entities in eac
构建数字城市的元数据服务体系
王浒 李琦 董宝青 李浩川
计算机科学. 2003, 30 (8): 85-87. 
摘要 ( 66 )   PDF(206KB) ( 299 )   
相关文章 | 多维度评价
Metadata is one of the six key technologies of Digital Earth,which is also an important aspect in buildingand implementing the Digital City. Based on the technologies and standards of Web Services ,the author came up witha metadata services architecture
数据仓库的质量管理问题和方法
毛国君
计算机科学. 2003, 30 (8): 88-91. 
摘要 ( 83 )   PDF(200KB) ( 342 )   
相关文章 | 多维度评价
A data warehouse is often a large-scale information system for an enterprise,so its quality management isimportant and difficult. Recently, some researchers have studied the problems of quality management in data ware-houses from different views ,and achi
数据集成中不一致性数据相似性比较的加权算法
张艳秋 徐六通 王柏
计算机科学. 2003, 30 (8): 92-92. 
摘要 ( 60 )   PDF(47KB) ( 255 )   
相关文章 | 多维度评价
Reducing inconsistency is the key problem to improve data quality during data integration. In this paper,we first present a weighted algorithm of similarity coefficient which is superior to traditional algorithms if the source data have multiple charact
基于XML技术的个性化主动信息服务系统关键技术的研究
陈俊杰 郭永明 宋翰涛 陆玉昌 余雪丽
计算机科学. 2003, 30 (8): 93-95. 
摘要 ( 64 )   PDF(148KB) ( 299 )   
相关文章 | 多维度评价
With the rapid development and spread of the Internet technology,there have been significant progresses in the Internet information retrieval and active services. However,with the traditional Internet search engines and activeservices ,which are all base
多播在数字监控系统中的应用
苏士美 李海芳
计算机科学. 2003, 30 (8): 96-99. 
摘要 ( 67 )   PDF(177KB) ( 327 )   
相关文章 | 多维度评价
This paper discusses problems of muhicasting and its application. Two ways are proposed to overcome theproblems of muhicasting according to the architectures of current networks and the functional requirements of asurveillance System. One is that Winsoc
多Agent合作求解
张新良 石纯一
计算机科学. 2003, 30 (8): 100-103. 
摘要 ( 83 )   PDF(192KB) ( 266 )   
相关文章 | 多维度评价
Multi-Agent Collaborative Problem Solving is one basic issue of the research of Multi-Agent System (MAS). In this paper we summarize some research work of Multi-Agent collaborative problem solving,expound the characteristic of Multi-Agnet collaborative
拍卖方法引入多Agent系统
金Xing 石纯一
计算机科学. 2003, 30 (8): 104-107. 
摘要 ( 71 )   PDF(205KB) ( 676 )   
相关文章 | 多维度评价
Auction, an operational and effective resource allocation method, generally results in economical efficiency allocation between buyers and sellers. As a negotiation method, auction can be used in Multi-Agent Systems. Withthe consideration of computation a
移动Agent系统通信失效问题研究
周竞扬 陈韬略 许平 陆桑璐 陈道蓄
计算机科学. 2003, 30 (8): 108-111. 
摘要 ( 74 )   PDF(212KB) ( 265 )   
相关文章 | 多维度评价
The Mobile Agent is thought to be the popular computing model for the next generation's distributed sys-tem. The mobile agent has the following key features: autonomy, collaboration, security and especially mobility. Agood communication model for mobile
基于JavaCard的移动代理系统安全性研究
陈志贤 王绍棣 王汝传 孙知信
计算机科学. 2003, 30 (8): 112-113. 
摘要 ( 61 )   PDF(157KB) ( 265 )   
相关文章 | 多维度评价
With wide and increasing range applications of mobile agent technology, the security problem has gotten more and more focus. This paper discusses the security problems that the mobile agent system faces with at presentand the existing protesting schemes
序列关联并行挖掘算法研究
李庆华 赵峰
计算机科学. 2003, 30 (8): 114-116. 
摘要 ( 65 )   PDF(137KB) ( 265 )   
相关文章 | 多维度评价
Ming sequential associations is becoming increasing essential in many scientific and commercial domains Developing parallel algorithm becomes quite challenging depending on enormous size of available dataset and possibly large number of mined associati
一种直接在Trans-树中挖掘频繁模式的新算法
范明 王秉政
计算机科学. 2003, 30 (8): 117-120. 
摘要 ( 62 )   PDF(213KB) ( 289 )   
相关文章 | 多维度评价
Frequent pattern mining plays an essential role in many important data mining tasks. FP-growth is a very efficient algorithm for frequent pattern mining. However, it still suffers from creating conditional FP-tree separately and recursively during the min
区间值属性决策表的数据挖掘
王珏 刘三阳 张杰
计算机科学. 2003, 30 (8): 121-123. 
摘要 ( 63 )   PDF(119KB) ( 292 )   
相关文章 | 多维度评价
Data mining in incomplete information systems is a hard problem but inevitable in uncertain decision. In thispaper ,an extended rough set model based on dominance relation is combined with fuzzy set theory for data mining ininterval valued decision tabl
新型SVM对时间序列预测研究
朱家元 段宝君 张恒喜
计算机科学. 2003, 30 (8): 124-125. 
摘要 ( 69 )   PDF(90KB) ( 244 )   
相关文章 | 多维度评价
In this paper, we present a new support vector machines-least squares support vector machines (LS-SVMs). While standard SVMs solutions involve solving quadratic or linear programming problems, the least squaresversion of SVMs corresponds to solving a set
支持向量回归中的预测信任度
孙德山 吴今培
计算机科学. 2003, 30 (8): 126-127. 
摘要 ( 62 )   PDF(91KB) ( 324 )   
相关文章 | 多维度评价
Support vector machine (SVM)has been widely applied to classification and regression problems, but it suf-fers from some important limitations, one of the most significant being that it makes point predictions rather thangenerating probability output. A
一种改进的SMO算法
张召 黄国兴 鲍钰
计算机科学. 2003, 30 (8): 128-129. 
摘要 ( 68 )   PDF(133KB) ( 417 )   
相关文章 | 多维度评价
In this paper we have pointed out an important source of inefficiency in SMO algorithm that is caused by the operation with a single threshod value. We have suggested modifications of SMO algorithm that overcome the problem by efficiently maintaining an
基于可拓集的决策模型研究
王洪伟 吴家春 蒋馥
计算机科学. 2003, 30 (8): 130-133. 
摘要 ( 55 )   PDF(177KB) ( 274 )   
相关文章 | 多维度评价
Decision model for incompatible problems is a difficult issue in knowledge-based systems, which is current-ly being focused by the artificial intelligence and management communities. Extension set is an emerging set theory for solving incompatible proble
贝叶斯学习中基于贝叶斯判别分析的先验分布选取
胡振宇 林士敏 陆玉昌
计算机科学. 2003, 30 (8): 134-135. 
摘要 ( 68 )   PDF(88KB) ( 642 )   
相关文章 | 多维度评价
In this paper we propose an experimental method to choose a prior distribution. Different from many re-searchers, who offered lots of principles that separated from sample information, we consider it a Bayesian discrimina-tion problem combining with the s
态势估计的目标编群问题研究
李伟生 王宝树
计算机科学. 2003, 30 (8): 136-138. 
摘要 ( 76 )   PDF(148KB) ( 368 )   
相关文章 | 多维度评价
Problems about target classification in situation assessment are analyzed. This paper presents a synthetic method for fulfilling target classification by using the nearest-neighbor method and field knowledge. The graphical structure formed by target clas
基于神经网络的预测模型中输入变量的选择
杨奎河 王宝树 赵玲玲
计算机科学. 2003, 30 (8): 139-140. 
摘要 ( 61 )   PDF(139KB) ( 336 )   
相关文章 | 多维度评价
It is important to select input variables when the neural network forecasting model is proposed. In this pa-per, by using the autocorrelation function on input variables sets selection for neural network forecasting model, a systemic and scienti[ic method
自适应多位变异遗传算法的实现
王基一 吴燕仙
计算机科学. 2003, 30 (8): 141-143. 
摘要 ( 59 )   PDF(143KB) ( 853 )   
相关文章 | 多维度评价
Genetic algorithm is a widely used optimization method. Crossover and mutation are two Basicl operatorsof the genetic algorithm. On the basis of analyzing the principles of simple genetic algorithm and discussing its exist-ing problems of crossover poin
基于粒子系统的建模方法研究
张芹 吴慧中 张健
计算机科学. 2003, 30 (8): 144-146. 
摘要 ( 77 )   PDF(151KB) ( 439 )   
相关文章 | 多维度评价
This paper describes the definition of particle system, also discusesses the key techniques and problems of realizing of particle system. It gives a basic frame for applying particle system to modelling irregular objects.
一种新颖的图像水印嵌入方法
胡玉平 余胜生 周敬利 石磊
计算机科学. 2003, 30 (8): 147-149. 
摘要 ( 62 )   PDF(115KB) ( 269 )   
相关文章 | 多维度评价
An novel embedding method for image watermark based on wavelet transform is proposed. With this method ,the value of each pels is modified directly,so that a bit of watermark information is embedded in every pel-s. Before emeded,the original image is dec
软件恢复技术研究
李正 万群丽 许满武
计算机科学. 2003, 30 (8): 150-155. 
摘要 ( 71 )   PDF(319KB) ( 280 )   
相关文章 | 多维度评价
Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reported. The aging phenomenon is ubiquitous in all ki
基于过程模式的软件过程框架
梁义芝 王延章 刘云飞 缪旭东
计算机科学. 2003, 30 (8): 156-161. 
摘要 ( 72 )   PDF(262KB) ( 305 )   
相关文章 | 多维度评价
Process pattern is an excellent method to express software process knowledge, it can express process knowledge in different granularity and realize the non-gap connection of process knowledge, it supports the reuse and persistent improvement of process k
软件脆弱性分析
李新明 李艺 徐晓梅 韩存兵
计算机科学. 2003, 30 (8): 162-165. 
摘要 ( 69 )   PDF(195KB) ( 798 )   
相关文章 | 多维度评价
Software vulnerability is the root reason that cause computer system security problem. It's a new researchtopic to analyze vulnerability based on the essence of software vulnerability. This paper analyzes the main definitions and taxonomies of vulnerabil
基于角色访问控制模型及其在操作系统中的实现
刘伟 孙玉芳
计算机科学. 2003, 30 (8): 166-168. 
摘要 ( 53 )   PDF(132KB) ( 329 )   
相关文章 | 多维度评价
Since Role-based access control shows great advantage in meeting the security need in large-scale, enter-prise-wide system, RBAC becomes the hot topic in access control research area. Researchers have proposed several RBAC models, which include the famou
Linux互斥锁机制的研究及改进
赵慧斌 李小群 孙玉芳 叶以民
计算机科学. 2003, 30 (8): 169-171. 
摘要 ( 123 )   PDF(130KB) ( 407 )   
相关文章 | 多维度评价
Applications with real-time constraints are not only growing in the field of embedded system, but gaining popularity in the desktop environment as well. At the same time, using an opened source system ,Linux, as the sup-ported OS is more and more appealin
FTDSS:高容错分布式共享存储机制
魏青松 卢显良 雷宇
计算机科学. 2003, 30 (8): 172-175. 
摘要 ( 78 )   PDF(183KB) ( 262 )   
相关文章 | 多维度评价
Computerized data has become critical to the survival of an enterprise. Company must have a strategy for recovering their data should data lose. RAID is a popular mechanism to offer good fault-tolerance. But RAID can notwork well when one more disks fail.
基于LogP简化模型的矩阵求逆并行算法研究
陈天麒 曾庆华 孙世新
计算机科学. 2003, 30 (8): 176-177. 
摘要 ( 57 )   PDF(141KB) ( 565 )   
相关文章 | 多维度评价
LogP is becoming a practical parallel computation model that meets the demanding of parallel computers and parallel algorithms. So it is important to re-design parallel algorithms on the LogP model. This paper studies the parallel algorithm of computing c
一种基于CPLD的I/O总线驱动液晶显示的方法
程晓东 郑为民 唐志敏
计算机科学. 2003, 30 (8): 178-179. 
摘要 ( 44 )   PDF(89KB) ( 269 )   
相关文章 | 多维度评价
The paper discusses a new kind of driving the LCD via I/O bus using CPLD and realizing the precise I/O control timing sequence by establishing the corresponding Verilog-HDL model. The results of application show that this solution can not only solve the m
嵌入式处理器的性能分析方法
盛永杰 刘博勤 陈章龙
计算机科学. 2003, 30 (8): 180-181. 
摘要 ( 49 )   PDF(104KB) ( 289 )   
相关文章 | 多维度评价
This paper introduces the architecture of current embedded processors firstly. It focuses on some important factors that affect performance of embedded processor,and proposes some performance analyzing methods. At the lastpart, a generic performance analy
基于VHDL的复杂电路的P—T算法模型
刘丹非 李曼义 郭金怀
计算机科学. 2003, 30 (8): 182-184. 
摘要 ( 46 )   PDF(123KB) ( 360 )   
相关文章 | 多维度评价
When we design electric circuit with the hardware describe language VHDL,if the control of the electriccircuit is more than to calculate ,we can design electric circuit as a controller which is based on multiplexer and is di-vided into the space part and