1974年1月创刊(月刊)
主管/主办:重庆西南信息有限公司
ISSN 1002-137X
CN 50-1075/TP
CODEN JKIEBK
编辑中心
当期目录
2003年第12期, 刊出日期:2003-12-15
  
软件工程与数据库技术
语义Web及其描述语言
李立宇 谭少华 唐世渭 杨冬青 王腾皎
计算机科学. 2003, 30 (12): 1-5. 
摘要 ( 99 )   PDF(261KB) ( 376 )   
相关文章 | 多维度评价
The semantic Web is the direction of the Internet. This paper introdues the framework of the semantic Web and some language used to describle it,including RDF/RDFS and DAML +OIL etc. At the same time, this paper dicusses that how denote the knowledge of t
桥接局域网第2层拓扑结构的自动发现
李涛 石志强 吴志美
计算机科学. 2003, 30 (12): 6-8. 
摘要 ( 77 )   PDF(204KB) ( 382 )   
相关文章 | 多维度评价
With the rapid development and the wide use of Bridged Local Area Networks, the importance of below-OSI-Layer-3 topology comes to be realized. Recent research work has demonstrated that active layer-2 topology can be determined using Address Forwarding In
网格实例与关键技术分析
杜江 周念生 刘然 王小鸽 都志辉
计算机科学. 2003, 30 (12): 9-15. 
摘要 ( 76 )   PDF(374KB) ( 315 )   
相关文章 | 多维度评价
Grid computing technology is developing in an impressing speed these years. This paper is going to do some detailed analysis on two of the major Grid projects, Globus and Legion, in order to find out the key technologies of Grid computing. In this paper,
探索计算系统异构性的描述
曾国荪 陈闳中
计算机科学. 2003, 30 (12): 16-18. 
摘要 ( 85 )   PDF(218KB) ( 368 )   
相关文章 | 多维度评价
It is valuable work to construct computational system by means of network,so that its capacity and power can be enhanced and extended. But there is heterogeneity in common among computational systems. It is main obstacle for computational systems to coope
DNA计算与DNA计算机研究进展与展望
丁建立 陈增强 袁著祉
计算机科学. 2003, 30 (12): 19-22. 
摘要 ( 83 )   PDF(221KB) ( 791 )   
相关文章 | 多维度评价
DNA computing is a new method based on biochemical reactions and molecular biology technology.The paper first introduces the basic principle and advantages of DNA computing, and then surveys DNA computing and DNA computer, finally, points out current exis
.NET环境下的移动代理迁移机制
王丹 于戈 王国仁
计算机科学. 2003, 30 (12): 23-26. 
摘要 ( 58 )   PDF(218KB) ( 296 )   
相关文章 | 多维度评价
The migration mechanism is one of the most important techniques for the mobile agent techniques. In this paper, migration mechanism for the mobile agent based on Microsoft .NET developing environment is researched. First, the two serialized techniques pro
移动Ad Hoc网络路由协议综述
张顺亮 叶澄清 李方敏
计算机科学. 2003, 30 (12): 27-30. 
摘要 ( 85 )   PDF(244KB) ( 847 )   
相关文章 | 多维度评价
A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve
用户层通信接口VIA的研究(二)
孙伟平 周敬利 余胜生
计算机科学. 2003, 30 (12): 31-33. 
摘要 ( 64 )   PDF(203KB) ( 296 )   
相关文章 | 多维度评价
Distributed applications require fast and reliable exchange of information across a network. Traditional network architectures do not provide the performance required by these applications, due to communication overhead incurred by messages to move throug
分组网上多媒体实时业务双时间尺度速率控制算法
张玉清 蔡安妮 孙景鳌
计算机科学. 2003, 30 (12): 34-37. 
摘要 ( 69 )   PDF(200KB) ( 287 )   
相关文章 | 多维度评价
By taking into account the self-similarity nature of video traffic, in this paper we propose a receiver-driven double time-scale rate control (DTSRC)algorithm for multimedia real-time applications based on direct bandwidth estimation, rather than on loss
基于NS-2仿真的接纳控制性能分析
王春峰 卢睿 陈秀忠
计算机科学. 2003, 30 (12): 38-40. 
摘要 ( 86 )   PDF(157KB) ( 310 )   
相关文章 | 多维度评价
Performance analysis is an important aspect in the designing of admission control mecnamsm, in oraer to evaluate the admission control mechanism, we should get the critical data in the experiments, which is difficult in real network. Network simulation is
QoS组播路由:算法与协议
黄东军 蔡雪莲 王建新 陈松乔
计算机科学. 2003, 30 (12): 41-45. 
摘要 ( 72 )   PDF(313KB) ( 756 )   
相关文章 | 多维度评价
This article provides a survey of the QoS-aware muhicast routing algorithms and protocols . A modified group model and a description about QoS-aware multicast routing problem have been proposed. The main contribution to the designing of multicast architec
基于测量的QoS接纳控制算法的结构与性能分析
桂志波 周立超
计算机科学. 2003, 30 (12): 46-48. 
摘要 ( 79 )   PDF(130KB) ( 300 )   
相关文章 | 多维度评价
The advantage of measurement-based QoS admission control(MBAC)algorithms is that they can improve network utilization. In this paper, the equations of MBAC algorithms are proved to be of the same structural form. Then, through simulations on the existing
一种基于分段共享的预测式错误恢复机制
徐洁 郭星廷 夏梦芹
计算机科学. 2003, 30 (12): 49-53. 
摘要 ( 68 )   PDF(246KB) ( 300 )   
相关文章 | 多维度评价
In MPLS/GMPLS networks, a range of restoration schemes will be required to support trade-offs between service interruption time and network resource utilization. Although, the tradition protectionbased and reservation-based recovery schemes exist some mer
一种新型的基于网络流量自相似性的DDoS入侵诊测方法
罗光春 林夏 卢显良 张骏
计算机科学. 2003, 30 (12): 54-58. 
摘要 ( 77 )   PDF(220KB) ( 307 )   
相关文章 | 多维度评价
This paper presents a new method of DDoS Intrude Detection Based on Self-Similarity of Network Traffics based on analysis of parameter of self-similar, which includes Hurst parameter, Holder parameter (Time variable function H(t)), we do research on the a
高速网络环境下内容审计系统的研究与实现
万国根 秦志光 刘锦德
计算机科学. 2003, 30 (12): 59-61. 
摘要 ( 80 )   PDF(218KB) ( 278 )   
相关文章 | 多维度评价
The paper presents a content audit system on high speed network. A new algorithm is provided for load balancing and data distribution which is based on application protocol and session states. A fast text searching approach is also introduced for string m
基于主从样式的移动代理安全模型的研究与实现
穆鸿 王汝传 张登银
计算机科学. 2003, 30 (12): 62-65. 
摘要 ( 90 )   PDF(231KB) ( 291 )   
相关文章 | 多维度评价
In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic
分布式视频点播系统的接入控制研究
周竞扬 张阳 单炜 陈道蓄
计算机科学. 2003, 30 (12): 66-68. 
摘要 ( 96 )   PDF(225KB) ( 298 )   
相关文章 | 多维度评价
Video on Demand(VoD)systems are considered as one of the most valuable services for the next generation broad-bandwidth Internet. To provide high-quality service, the VoD system must employ an admission control module to guarantee QoS, but there are still
一种基于后项不定长关联规则的Web个性化推荐方法
丁增喜 王菊英 王大玲 鲍玉斌 于戈
计算机科学. 2003, 30 (12): 69-72. 
摘要 ( 99 )   PDF(274KB) ( 290 )   
相关文章 | 多维度评价
Web usage mining plays an important part in supporting personalized recommendation on Web and association rule uncovers the interesting relations among items hidden in data. The paper gives an idea of association rule merging-deleting based on the analysi
基于贝叶斯网络模型的用户兴趣联合推送
欧洁
计算机科学. 2003, 30 (12): 73-77. 
摘要 ( 90 )   PDF(283KB) ( 382 )   
相关文章 | 多维度评价
The association push of interesting information is implemented according to the information that other users with similar interests have read, the refore user can easily find high quality interesting information from the immense Web information. The assoc
一种基于全文检索系统的文档关联研究与实现
饶祎 郭辉 蔡庆生
计算机科学. 2003, 30 (12): 78-79. 
摘要 ( 78 )   PDF(158KB) ( 368 )   
相关文章 | 多维度评价
As a important application of the Full-Text retrieval system, document relevancy has powerful function. In this paper, a document relevancy method based on the Full-Text retrieval system is presented, which is deeply discussed from two aspects, content re
元计算环境下的目录服务机制研究
梅晓勇 王志刚 李师贤
计算机科学. 2003, 30 (12): 80-82. 
摘要 ( 66 )   PDF(254KB) ( 294 )   
相关文章 | 多维度评价
In Grid Computing environments, in order to reasonablely avail the super-speed host, great capacity storage,network bindwidth etc grid resources, and coordination use of the protocols and applications algorithms, the directory service system mechanism mus
基于Multi—Agent的动态在线议价模型
张虹 邱玉辉
计算机科学. 2003, 30 (12): 83-85. 
摘要 ( 82 )   PDF(206KB) ( 286 )   
相关文章 | 多维度评价
The rapid development of E-commerce makes online bargaining becoming true. This paper puts forward a model for dynamic online bargaining based on the combine of the E-commerce technology and Multi-Agent technology. Also we discuss the algorithm which form
考虑更新频率等因素的物化视图有效更新算法
王新军 洪晓光 王海洋
计算机科学. 2003, 30 (12): 86-88. 
摘要 ( 94 )   PDF(184KB) ( 280 )   
相关文章 | 多维度评价
For the materialized views in the fast LAN or computing grid environment, it is a very important problem that how to refresh them efficiently when data sources have changed. In this paper, we take the update frequencies and the size of source relations in
基于版本控制策略的WebGIS缓存实现机制研究
王映辉 冯德民
计算机科学. 2003, 30 (12): 89-91. 
摘要 ( 80 )   PDF(158KB) ( 360 )   
相关文章 | 多维度评价
Analyze the access efficiency key factor of WebGIS, according to the locality and site- correlation, and by different access of client-side and server-side, combing mechanism of edition-control, advanced cache strategy and implementation mechanism of base
基于SQL Server2000的企业数据仓库设计与应用
仲元昌 李刚 王越 杨武
计算机科学. 2003, 30 (12): 92-94. 
摘要 ( 83 )   PDF(165KB) ( 292 )   
相关文章 | 多维度评价
To make up the shortage of current database in information distilling, we need to integrate mass data indata warehouse so that it can offer better reference to business manage and decision-making for enterprise. By using relational database SQL Server 200
基于耦合Logistic映射的伪随机位发生器及其在混沌序列密码算法中的应用
邓绍江 李传东 廖晓峰
计算机科学. 2003, 30 (12): 95-98. 
摘要 ( 75 )   PDF(200KB) ( 412 )   
相关文章 | 多维度评价
In this paper, the recent progress on chaotic cryptography is summarized firstly. Then a novel pseudorandom bit generator based on coupled Logistic maps is proposed. Theoretical analysis and numerical experiments illustrate that it is superior to those in
面向移动计算的数字水印技术研究
黄向生 杨小帆 王阳生
计算机科学. 2003, 30 (12): 99-102. 
摘要 ( 85 )   PDF(189KB) ( 287 )   
相关文章 | 多维度评价
In the mobile computing environment, we propose a novel watermarking algorithm based on integer wavelet through pixel-wise masking with simple human visual system (HVS). Then the correlation between the watermarking sequence and the marked DWT coefficient
形式系统UL的弱完备性
张小红 何华灿 李伟华
计算机科学. 2003, 30 (12): 103-107. 
摘要 ( 86 )   PDF(224KB) ( 310 )   
相关文章 | 多维度评价
Based on the basic formal deductive system UL of Universal Logic, UL-algebra and D-tdeal are proposect in this paper. After the discussion on their basic properties and the relation with BCK-algebra, the weak completeness theory of UL is proved through th
猜想发现中的模糊类比研究
宋坤 蔡庆生
计算机科学. 2003, 30 (12): 108-110. 
摘要 ( 70 )   PDF(128KB) ( 281 )   
相关文章 | 多维度评价
This paper combines Guess-Discovery with Fuzzy-Maths on the base of the Guess-Discovery model, and introduces a model of Combined-Reasoning ,and shows the feasibility of the model with experiments. It breaks through the restriction of precious maths and c
模糊T-粗集的粗糙性测量
刘华文 史开泉
计算机科学. 2003, 30 (12): 111-112. 
摘要 ( 73 )   PDF(87KB) ( 353 )   
相关文章 | 多维度评价
In this paper, we discuss roughness measure of the fuzzy T-rough sets, and introduce an axiom description of the degree of roughness and a characteristic theorem. Furthermore, we give several special expressions of the degree of roughness. The results of
离散时延双神经元网络的渐近稳定性
李绍文 李绍荣 廖晓峰
计算机科学. 2003, 30 (12): 113-115. 
摘要 ( 77 )   PDF(151KB) ( 314 )   
相关文章 | 多维度评价
New sufficient conditions for the asymptotic stability of a two-neuron network with different time delays are derived. These conditions lead to delay-dependent and delay-independent asymptotic stability. Our results are shown to be less conservative and r
带有多个可转化约束的频繁项集挖掘算法
宋宝莉 张帮华 何炎祥 朱骁峰
计算机科学. 2003, 30 (12): 115-117. 
摘要 ( 74 )   PDF(181KB) ( 365 )   
相关文章 | 多维度评价
Recent work has highlighted the importance of the constraint-based mining paradigm in the context of frequent item sets, associations, correlations. Some research has raised the notion "convertible constraints", and this method can push some constraints i
数据挖掘中的统计方法
魏玲 祁建军 张文修
计算机科学. 2003, 30 (12): 118-119. 
摘要 ( 68 )   PDF(123KB) ( 274 )   
相关文章 | 多维度评价
Data mining is the process of secondary analysis of large databases aimed at finding unsuspected relationships which are of interest or value to the database owners. We analyze the statistical methods in the classification in data mining, include: preproc
基于粗糙集理论和覆盖算法的模式分类方法
王伦文 张铃
计算机科学. 2003, 30 (12): 120-122. 
摘要 ( 67 )   PDF(174KB) ( 274 )   
相关文章 | 多维度评价
In this paper, the advantages and disadvantages of Rough Set and Neighborhood Covering Algorithm (NCA)are analyzed. A classification method which combines Rough Set and NCA is pointed out. And then, the reasonableness, feasibility and necessity of the met
基于邻接关系的空间趋势检测算法研究
文俊浩 李立新 吴中福 吴红艳
计算机科学. 2003, 30 (12): 123-125. 
摘要 ( 75 )   PDF(230KB) ( 360 )   
相关文章 | 多维度评价
A regular change of one or more non-spatial attributes can be detected when moving away from a given start object. Moreover, spatial objects are often influenced by their neighbors. And the influence typically decreases or increases more or less continuou
一种网络环境中的本体演化和维护模型
王进 陈恩红 林乐
计算机科学. 2003, 30 (12): 126-128. 
摘要 ( 69 )   PDF(211KB) ( 263 )   
相关文章 | 多维度评价
With the rapid development of Internet, Knowledge web will be one of development directions of the next generation of Internet. The applications of ontology will bring new opportunities and challenges to it. In this paper, we propose an ontology evolution
自适应网络学习用户界面设计和实现
李晓 王雪飞 邱玉辉
计算机科学. 2003, 30 (12): 129-131. 
摘要 ( 74 )   PDF(174KB) ( 323 )   
相关文章 | 多维度评价
An adaptive user interface helps to improve the quality of human-computer interaction. Most people at present join to Web-Based Learning by common browser. Due to the one-fits-all user interface, they have to face with the problem of lack of the support o
高精度图像测量与对准系统的算法研究
杨丹 杨亚威 张小洪 李东
计算机科学. 2003, 30 (12): 132-135. 
摘要 ( 72 )   PDF(250KB) ( 465 )   
相关文章 | 多维度评价
In this paper a new high accuracy image measurement and registration system design is proposed, in which edges of image in pixel are detected by improved Canny operator, edge points are recorded by an auto-tracing algorithm, edges in sub-pixel are located
医学图像三维表面重建分叉曲面的数学形态学研究
鲍苏苏 林斌
计算机科学. 2003, 30 (12): 136-138. 
摘要 ( 61 )   PDF(152KB) ( 305 )   
相关文章 | 多维度评价
In the medical 3D Reconstruction, 3D object surface is reconstructed, by making use of the traditional slice-based reconstruction method. Due to the still existing problems, such as contour pairing, diverging surface,contour pair patching, etc. In this pa
基于混沌序列的图像加密解密算法
陈永红 黄席樾
计算机科学. 2003, 30 (12): 139-140. 
摘要 ( 81 )   PDF(147KB) ( 402 )   
相关文章 | 多维度评价
In this paper, an image encryption and decryption algorithm based on chaos sequence is proposed. This algorithm provides low computational complexity, high security and no distortion. Finally, experimental results are satisfactory.
采用DNA进化算法优化设计TS模糊控制器
翁妙凤
计算机科学. 2003, 30 (12): 141-143. 
摘要 ( 63 )   PDF(167KB) ( 271 )   
相关文章 | 多维度评价
The DNA evolutionary algorithm(DNA-EA)and the DNA genetic algorithm(DNA-GA)based on a new DNA encoding method are propsed based on the structure and the genetic mechanism of biological DNA. The DNA-EA and the DNA-GA are applied into the optimal design of
软件体系结构的形式化与面向状态的形式化风格
胡劲松 郭荷清 郑启伦
计算机科学. 2003, 30 (12): 144-146. 
摘要 ( 62 )   PDF(223KB) ( 335 )   
相关文章 | 多维度评价
The paper introduces the definition, the essential and the fundamentality of formalizing ,and discusses some aspects about formalizing in detail. After reviewing several formal styles and architecture description languages, we provide the state-oriented s
一种面向任务关键系统的RISC风格的协作构架
朱智林 郭敬林 李航 刘西洋 陈平
计算机科学. 2003, 30 (12): 147-149. 
摘要 ( 64 )   PDF(181KB) ( 264 )   
相关文章 | 多维度评价
The collaborative framework for the mission and safety critical system is required to support multiple quality of service properties. A RISC style collaborative framework is provided to meet this requirement. The collaborative characters of mission and sa
MIS项目的综合风险评估模型
张珞玲 李师贤
计算机科学. 2003, 30 (12): 150-153. 
摘要 ( 88 )   PDF(237KB) ( 449 )   
相关文章 | 多维度评价
It appears that, until from the end of 80's have western researchers attached importance to software project risk management. In China, little attention is paid to risk management. However, project risk management is very essential for the accomplishment
安全操作系统中系统分权的实现
金雷 林志强 茅兵 谢立
计算机科学. 2003, 30 (12): 154-157. 
摘要 ( 57 )   PDF(270KB) ( 283 )   
相关文章 | 多维度评价
In Linux management is still based on some privilege system call,and this is a great underlying threat to system. Privilege-Divided Model (PDM)comes out to solve the problem. In the model, privilege is divided into some parts ,each part or several parts c
Linux2.5线程机制研究
丁成 孙玉芳
计算机科学. 2003, 30 (12): 158-160. 
摘要 ( 76 )   PDF(232KB) ( 562 )   
相关文章 | 多维度评价
In this paper, we discuss the shortage of thread support in linux2.4 and analyze the recently progress in this area,introduce two pthreads libraries:NGPT, NPTL.
最长d维箱嵌套问题的贪心算法
宋传鸣 王相海
计算机科学. 2003, 30 (12): 161-163. 
摘要 ( 142 )   PDF(153KB) ( 577 )   
相关文章 | 多维度评价
The Greedy algorithm is a simple,direct and efficient method to many problems. In this paper,the longest nesting problem of d-dimension boxes is brought up firstly. And then a novel algorithm for this problem based on greedy strategy is proposed. Finally,
内存异常数据的检测与恢复
朱智林 李航 刘西洋 陈平 张其林
计算机科学. 2003, 30 (12): 163-165. 
摘要 ( 79 )   PDF(156KB) ( 320 )   
相关文章 | 多维度评价
For some certain applications, they require massive application data to be resident in main memory. We categorize the exceptional data resided in memory based on the analysis of corresponding reasons. Exploiting mature CRC technologies to build a redundan
嵌入式系统软件开发中的通信协议研究
袁帅 刘博勤 陈章龙
计算机科学. 2003, 30 (12): 166-168. 
摘要 ( 58 )   PDF(167KB) ( 266 )   
相关文章 | 多维度评价
In the course of software developing of embedded system, we usually use the remote debugger, which needs connection and communication between the host and target through the serial port,parallel port or Ethernet. Thus some effective and reliable communica
基于对象的嵌入式实时软件需求模型
徐晓东 饶云华
计算机科学. 2003, 30 (12): 169-171. 
摘要 ( 79 )   PDF(152KB) ( 302 )   
相关文章 | 多维度评价
The embedded real-time software requirements are analyzed, and an object-oriented software requirements model is proposed. At the same time, an example, employing this requirements model is introduced in practice.
基于拟人策略的高校排课算法
陈卫东 李吉桂
计算机科学. 2003, 30 (12): 172-175. 
摘要 ( 98 )   PDF(210KB) ( 1240 )   
相关文章 | 多维度评价
For the university timetabling problem that is NP-hard, some new strategies of tackling it are proposed,and two heuristic algorithms based on personification strategies are presented, which outperform the known straightforward heuristic algorithms in the
卷烟生产线柔性优化调度模型研究
刘永梅 陈庄 崔贯勋 何昭全
计算机科学. 2003, 30 (12): 176-178. 
摘要 ( 90 )   PDF(144KB) ( 297 )   
相关文章 | 多维度评价
Through analyzing technological process of cigarette producing line and utilizing the basic idea of modern graph theory, the connected network system based on continuous material flow is drawn from cigarette producing line. The thought of flexible optimiz