Skip to main content

Page of 368
and
  1. No Access

    Article

    Effective error estimates for the numerical solution of Fredholm integral equations

    This paper describes the theoretical basis of an effective a posteriori error analysis for Fredholm integral equations of the second kind. We present error bounds from which we then derive error estimators tha...

    Ch. Kenney, P. Linz, R. L. C. Wang in Computing (1989)

  2. No Access

    Article

    TAUS: A file-based software understanding tool

    A program called TAUS, a Tool for Analyzing and Understanding Software, was developed. It is designed to help the programmer analyze and understand the software interactively. Its aim is to reduce the dependen...

    **anglín Fei, Chengzao Wang, Hezhen Wang in Journal of Computer Science and Technology (1990)

  3. No Access

    Article

    A framework for command recovery in user interface

    In this paper, a framework is presented for adding a general command recovery facility to user interface. A simple model of interactive system is discussed and four meta commands, UNDO, REDO, SKIPBACK, and SKI...

    Haiying Wang in Journal of Computer Science and Technology (1990)

  4. No Access

    Article

    On the execution mechanisms of parallel graph reduction

    Parallel graph reduction is a promising model for new generation computer because of its amenability to both programming and parallel computing. In this paper, an initial design for a parallel graph reduction ...

    Dingxing Wang, Weimin Zheng, **aoli Du in Journal of Computer Science and Technology (1990)

  5. No Access

    Chapter and Conference Paper

    A proof-theoretic framework for nonmonotonic reasoning and logic programming

    This paper proposes a general proof-theoretic framework, where negative literals in a query are proved by a new mechanism of negation-as-failure. This new mechanism handles nonground negative literals and thus...

    Li Yan Yuan, Jia-Huai You in Advances in Computing and Information — ICCI '91 (1991)

  6. No Access

    Article

    TST — An algorithm for global microcode compaction with timing constraints

    Existing global microcode compaction approaches have all assumed a target architecture that has microoperation conflicts and data dependencies as the two fundamental compaction constraints. However, new practi...

    Bogong Su, Jian Wang, **shi **a in Journal of Computer Science and Technology (1991)

  7. No Access

    Chapter and Conference Paper

    An optimal parallel algorithm for the vertical segment visibility reporting problem

    In this paper, we present a parallel algorithm for solving the all-pairs vertical segment visibility reporting (SVR) problem. Given a set S={S 0, S 1,...,S n−1} of disjoint vertical segments in the plane, the SVR...

    Ip-Wang Chan, Donald K. Friesen in Advances in Computing and Information — ICCI '91 (1991)

  8. No Access

    Chapter and Conference Paper

    Unordered tree contraction

    The tree contraction problem is for reducing a rooted tree to its root by a sequence of independent vertex removals. All of the previous research works are concentrated on ordered rooted tree whereas in this p...

    Lih-Hsing Hsu, Jones J. J. Wang in Advances in Computing and Information — ICCI '91 (1991)

  9. No Access

    Chapter and Conference Paper

    Incremental database design revisited

    Three new classes of database schemes are defined. The class of weakly independent schemes is a generalization of independent schemes in a centralized environment. The classes of expansion-chased schemes and s...

    Ke Wang, Li Yan Yuan in Advances in Computing and Information — ICCI '91 (1991)

  10. No Access

    Article

    An intelligent tool to support requirements analysis and conceptual design of database design

    As an application of artificial intelligence and expert system technology to database design, this paper presents an intelligent design tool NITDT, which comprises a requirements specification language NITSL, ...

    Nengbin Wang, Haiqing Liu in Journal of Computer Science and Technology (1991)

  11. No Access

    Article

    A new approach to database auto-design by logic

    The database auto-design is an important problem in database research. In this paper we propose some new ideas and an approach called “logic approach” to implement the database auto-design. Given a relational ...

    Jiepan Xu, Lei Wang in Journal of Computer Science and Technology (1991)

  12. No Access

    Article

    A domain knowledge driven approach for user interface software development

    A domain knowledge driven user interface development approach is described. As a conceptual design of the user interface, the domain knowledge defines the user interface in terms of objects, actions and their ...

    Haiying Wang, Shenquan Liu in Journal of Computer Science and Technology (1991)

  13. No Access

    Article

    On parallel evaluation of ordered attribute grammars

    In this paper, a parallel algorithm is presented for the evaluation of ordered attribute grammars. The parallelism is achieved by constructing the so-called parallel visit sequences and accordingly augmenting ...

    Shunqian Wang, Daxing Ye in Journal of Computer Science and Technology (1991)

  14. No Access

    Article

    The researches in fault-tolerant dataflow architecture

    Fault-tolerant dataflow system is an entirely new field. This paper presents an overview of FTDF-TD, a fault-tolerant dataflow system. Various aspects of FTDF-TD, such as the architecture, the fault-tolerant s...

    Lei Wang, Ying Tan in Journal of Computer Science and Technology (1991)

  15. No Access

    Article

    AECAM: An extension matrix algorithm on a cellular automata machine

    A simplified version of the extension matrix algorithm has been proved to be useful for implementation on a cellular automata machine (CAM-6). The algorithm and its implementation are described.

    Yihe Wang, Jiarong Hong, Vincenzo D'Andrea in Journal of Computer Science and Technology (1992)

  16. No Access

    Article

    Polynomial tests of normal forms and some related results

    The following problem is called the everywhere-cover problem: “Given a set of dependencies over a database schemen, is the set of dependencies explicitly given for each relation scheme equivalent to the depend...

    Ke Wang in Journal of Computer Science and Technology (1992)

  17. No Access

    Article

    The location of singular and inflection points for planar cubicB-spline curve

    Using vectors between control points (ai=Pi+1-Pi), parameters λ and μ (such that \(a_i + 1 = \lambda a_i + \mu a_i + 2\) ...

    Zhenglin Ye, Jiaye Wang in Journal of Computer Science and Technology (1992)

  18. No Access

    Article

    A basic algorithm for computer-aided design of material arrangement

    An algorithm has been obtained for solving the packing problem of placing convex polygons with different shapes and sizes into a rectangular vessel by simulating the elastic mechanics process. It is pointed ou...

    Wenqi Huang, Gangqiang Wang in Journal of Computer Science and Technology (1992)

  19. No Access

    Article

    Improvements on certainty factor model and its application to conflict resolution in CDPS

    In this paper some improvements on certainty factor model are discussed aiming at: 1) including, in a rule “E→H”, not only theCF ofH whenE exists but alsoCF of

    Hui Wang, Dayou Liu in Journal of Computer Science and Technology (1992)

  20. No Access

    Article

    Structured development environment based on the object-oriented concepts

    The object-oriented software development is a kind of promising software methodology and leading to a wholly new way for solving problems. In the research on the rapid construction of Structured Development En...

    **anglin Fei, Lei Liao, Hezhen Wang in Journal of Computer Science and Technology (1992)

Page of 368