Skip to main content

previous disabled Page of 40
and
  1. No Access

    Article

    A structural operational semantics for an Edison-like language (1)

    A structural operational semantics for Edison. 1—an Edison-like language—is given. The static and dynamic (operational) semantics for various declarations and statements contained in this type of languages hav...

    Wei Li in Journal of Computer Science and Technology (1986)

  2. No Access

    Article

    The complexity of the 0/1 multi-knapsack problem

    In this paper complexity of the 0/1 multi-knapsack problem is discussed. First we prove that the corresponding decision problem is NP-complete in the strong sense. For any fixed numberk of knapsacks, the problem ...

    Li’ang Zhang, Suyun Geng in Journal of Computer Science and Technology (1986)

  3. No Access

    Article

    A structural operational semantics for an Edison like language (2)

    Wei Li in Journal of Computer Science and Technology (1986)

  4. No Access

    Article

    Almost Optimal Dynamic 2–3 trees

    This paper presents a principle to create Almost Optimal Dynamical 2–3 trees based on the theory of Milleret al.,[4] and gives a searching algorithm, an insertion algorithm and a deletion algorithm for these 2–3 ...

    Wanxue Li in Journal of Computer Science and Technology (1986)

  5. No Access

    Article

    A computer system for Chinese character speech input

    In this paper, we introduce a speaker-dependent isolated word recognizer which is dedicated for Chinese character input. The method presented here offers an effective solution to the large-vocabulary recogniti...

    Xuedong Huang, Lianhong Cai, Ditang Fang in Journal of Computer Science and Technology (1986)

  6. No Access

    Article

    Generalized parallel signature analyzers with external exclusive-OR gates

    A new géneralized parallel signature analyzer with external Exclusive-OR gates (GPSA-EE) is presented. It allows the signature analyzer to have twice the number of inputs compared with an original parallel sig...

    Li Shen, Stephen Y. H. Su in Journal of Computer Science and Technology (1986)

  7. No Access

    Article

    The design and implementation of the syntax-directed editor generator (SEG)

    SEG is a syntax-directed editor generator consisting of three parts: Meta, a meta language which describes BNF-like syntax; a parser, which parses the syntax descriptions written in Meta and generates their dr...

    Guoliang Zheng, Hui Li in Journal of Computer Science and Technology (1986)

  8. No Access

    Article

    A routing algorithm for distributed optimal double loop computer networks

    A routing algorithm for distributed optimal double loop computer networks is proposed and analyzed. In this paper, the routing algorithm and the procedures realizing the algorithm are given. The proposed algor...

    Layuan Li in Journal of Computer Science and Technology (1987)

  9. No Access

    Article

    CAD system of microprogrammed digital systems

    This paper describes the Computer Aided Design System of Microprogrammed Digital Systems (CADSMDS). CADSMDS consists of three subsystems: Register Transfer Level Description Language (RTLDL), General Micro Cod...

    Minghui Li in Journal of Computer Science and Technology (1987)

  10. No Access

    Article

    A Tree-structured Database Machine for large relational database systems

    This paper proposes a Tree-structured Database Machine (TDM), which is designed for supporting large relational database systems. The TDM aims at totally improving three level performance bottlenecks in relati...

    Liming Meng, **aofei Xu, Huiyou Chang in Journal of Computer Science and Technology (1987)

  11. No Access

    Article

    Soundness and completeness of Kung’s reasoning procedure

    Kung’s reasoning procedure is characterized by high parallelism in the sense that an unlimited number of CPUs can be used to carry out the computation in parallel. This paper presents a proof of the soundness ...

    Renwei Li in Journal of Computer Science and Technology (1988)

  12. No Access

    Article

    The design and implementation of an OA system ZGL1

    ZGL1, an office automation system for municipal administration, is presented. It is a distributed microcomputer system based on OMNINET. Each node of it is an IBM PC/XT microcomputer with Chinese character fac...

    Li **e, Peipei Chen, Peigen Yang in Journal of Computer Science and Technology (1988)

  13. No Access

    Article

    A new kind of combinations between the Ritz-Galerkin and finite element methods for singularity problems

    The coupling techniques of simplified hybrid plus penalty functions are first presented for matching the Ritz-Galerkin method and thek(k>-1)-order Lagrange finite element methods to solve complicated problems of ...

    Z. C. Li, T. D. Bui in Computing (1988)

  14. No Access

    Article

    A natural deduction system of temporal logic

    This paper will present a natural deduction system of temporal logic, which includes two collections of inference rules called “horizontal inference rules” and “vertical inference rules” respectively. It is al...

    Renwei Li in Journal of Computer Science and Technology (1988)

  15. No Access

    Article

    CQAES, a Chinese question answer experimental system

    In this paper a Chinese sentence is regarded as a statement for an event and expressed with a table which has the nested structure. Seven kinds of sense coherent relationships among the events are introduced t...

    Yin Feng, Kaizhu Wang, Yadong Chang in Journal of Computer Science and Technology (1988)

  16. No Access

    Article

    A problem of tree graph

    Because of the widespread applications of tree and tree graph in computer science, we are interested in studying the tree graph. M. Farber, B. Richter and H. Shank in [1] showed that the graph τ2 (G) is connected...

    Hao Li, Qun Liu in Journal of Computer Science and Technology (1989)

  17. No Access

    Article

    A new formal method for communication protocol specification

    A new formal method for communication protocol specification is presented. FSM, CSP and ADT are mixed and the best features of these approaches can be offered in the fomal method. First, we briefly describe th...

    Layuan Li in Journal of Computer Science and Technology (1989)

  18. No Access

    Article

    Transformations between rectangular and triangular patches in Bezier form

    This paper proves that anyN degree Bezier triangular patch can be turned into a part ofN×N degree Bezier rectangular one; anyN×M degree Bezier rectangular patch can be converted into twoN+M degree Bezier triangul...

    Hua Li, Shenquan Liu in Journal of Computer Science and Technology (1989)

  19. No Access

    Article

    Numerical aspects of the generalized CG-method applied to least squares problems

    The Generalized Conjugate Gradient (GCG) method of Concus and Golub [1] and Widlund [2] and its adjusted form (AGCG) are considered for the numerical solution of the least squares problems. Some numerical comp...

    D. J. Evans, C. Li in Computing (1989)

  20. No Access

    Article

    A fuzzy proof theory

    Based on the first order predicate logic, in this paper, we present a new approach to generalizing the syntax of ordinary Horn clause rules to establish a fuzzy proof theory. First of all, each Horn clause rul...

    Dongbo Liu, Deyi Li in Journal of Computer Science and Technology (1990)

previous disabled Page of 40