Skip to main content

previous disabled Page of 458
and
  1. No Access

    Article

    A unifying approach for a class of problems in the computational geometry of polygons

    A generalized problem is defined in terms of functions on sets and illustrated in terms of the computational geometry of simple planar polygons. Although its apparent time complexity is O(n 2), th...

    Francis Chin, Jeffrey Sampson, Cao An Wang in The Visual Computer (1985)

  2. No Access

    Article

    ISOETRP clustering algorithm and its application to tree classifier design

    A new clustering algorithm ISOETRP has been developed. Several new objectives have been introduced to make ISOETRP particularly suitable to hierarchical pattern classification. These objectives are: a) minimiz...

    Qingren Wang in Journal of Computer Science and Technology (1986)

  3. No Access

    Article

    A high resolution Chinese character generator

    Font storage requirement is a crucial problem in develo** Chinese typesetting system. A unique data compression technique is adopted in the system. The representation of regular strokes and irregular strokes...

    Xuan Wang, Zhimin Lü, Yuhai Tang, Yang **ang in Journal of Computer Science and Technology (1986)

  4. No Access

    Article

    An effective test generation algorithm for combinational circuits

    In this paper, an analysis of backtrack behavior in PODEM (the test generation algorithm for combinational circuits presented by P. Goel) is given. It is pointed out that there are still many unnecessary backt...

    Jianchao Wang, Daozheng Wei in Journal of Computer Science and Technology (1986)

  5. No Access

    Article

    Some modifications of the parallel Halley iteration method and their convergence

    In this paper we derive five kinds of algorithms for simultaneously finding the zeros of a complex polynomial. The convergence and the convergence rate with higher order are obtained. The algorithms are numeri...

    Prof. De-ren Wang, Yu-jiang Wu in Computing (1987)

  6. No Access

    Article

    Hierarchical deduction

    This paper describes an hierarchical deduction proof procedure. This procedure proves a theorem by searching for a proof acceptable to an hierarchical deduction structire; those derivations which are irrelevan...

    Tie-Cheng Wang, W. W. Bledsoe in Journal of Automated Reasoning (1987)

  7. No Access

    Article

    Design of array processor systems

    A new type of high-performance array processor system is presented in this paper. Unlike the conventional host-peripheral array processor systems, this system is designed with a functionally distributed approa...

    Peisu **a, **nwo Fang, Yuxiang Wang in Journal of Computer Science and Technology (1987)

  8. No Access

    Article

    Automatic extraction of words from Chinese textual data

    In addition to Chinese character I/O, one of the most important issues for Chinese information processing is automatic extraction of words from textual data. Having discussed the characteristics of Chinese wor...

    Yongcheng Wang in Journal of Computer Science and Technology (1987)

  9. No Access

    Article

    Case studies of Z-module reasoning: Proving benchmark theorems from ring theory

    A new method, called Z-module reasoning, was formulated for proving and discovering theorems from ring theory. In a case study, the ZMR system designed to implement this method was used to prove the benchmark x 3

    Tie-Cheng Wang in Journal of Automated Reasoning (1987)

  10. No Access

    Article

    Reconvergent-fanout-oriented testability measure

    This paper describes the theory and implementation of a testability measure program called RFOTM. It is suggested that the real difficulty in test generation should be reflected in testability measure. We anal...

    Jianchao Wang, Daozheng Wei in Journal of Computer Science and Technology (1988)

  11. No Access

    Article

    Transaction management in distributed database system POREL

    This paper describes the architecture and implementation algorithm of a transaction management subsystem (TM) in the distributed database system POREL. The TM has been reimplemented on VAX 11/750.

    Hanhu Wang in Journal of Computer Science and Technology (1988)

  12. No Access

    Article

    A framework for object recognition in a visually complex environment and its application to locating address blocks on mail pieces

    A computational framework for recognizing an object of interest in a complex visual environment is described. Arising from the problem of finding the destination address block on a mail piece, a general framew...

    Ching-Huei Wang, Sargur N. Srihari in International Journal of Computer Vision (1988)

  13. No Access

    Article

    The human-computer dialogue management of FCAD system

    This paper describes the dialogue management of FCAD’s user interface through introducing FCAD’s data-driven user interface model which eases the creation, modification, analyzing, and testing of it.

    Fuyan Zhang, Shijie Cai, Shu Wang, Ruding Ge in Journal of Computer Science and Technology (1988)

  14. No Access

    Article

    A syntactic-semantic approach for pattern recognition and knowledge representation

    The attributed grammar is expanded by emphasizing semantic information. Various relations between variables of a production, and control strategies are introduced. As a result, two kinds of generalized attribu...

    Juwei Tai, Jue Wang, **n Chen in Journal of Computer Science and Technology (1988)

  15. No Access

    Article

    A software tool for constructing traditional Chinese medical expert systems

    It is an urgent task to implement a lot of expert systems to capture the valuable expertise of experienced doctors of traditional Chinese medicine. In order to meet the needs, a software tool is developed. It ...

    Nengbin Wang, **aoqing Liu, Guangfu Liu in Journal of Computer Science and Technology (1988)

  16. No Access

    Article

    CQAES, a Chinese question answer experimental system

    In this paper a Chinese sentence is regarded as a statement for an event and expressed with a table which has the nested structure. Seven kinds of sense coherent relationships among the events are introduced t...

    Yin Feng, Kaizhu Wang, Yadong Chang in Journal of Computer Science and Technology (1988)

  17. No Access

    Article

    On the communication structures of hyper-ring and hypercube multicomputers

    The well-known torus and its variants, which we call hyper-rings, as well as hypercube architectures are further studied and evaluated as interconnection networks for multicomputers. Comparisons are made among...

    **gwen Wang, Jichang Kang, Zhaoxuan Han in Journal of Computer Science and Technology (1989)

  18. No Access

    Article

    A new method for generating conic sections

    This paper presents a difference method for computing vertices of the polygon inscribed in a conic section. It can be applied to computer graphic package or to plotter to generate conic sections. This method i...

    Wen** Wang, Jiaye Wang in Journal of Computer Science and Technology (1989)

  19. No Access

    Article

    Monolingual: One way towards the integrated software development environment

    The software development is considered as stepwise abstract-implementation process in software like cycle. This paper presents a monolingual methodology and an embryo of MONOL which uses a uniform scheme to de...

    Zhenyu Wang in Journal of Computer Science and Technology (1989)

  20. No Access

    Article

    Complexity analysis of a process for simultaneously obtaining all zeros of polynomials

    In this paper, applying the major function method, we extend the convergence region of algorithm (2) and obtain a large computable radius estimate of safe initial disks. This result is an improvement of all re...

    Wang Deren, Zhao Fengguang in Computing (1989)

previous disabled Page of 458