Skip to main content

previous disabled Page of 367
and
  1. No Access

    Article

    An effective test generation algorithm for combinational circuits

    In this paper, an analysis of backtrack behavior in PODEM (the test generation algorithm for combinational circuits presented by P. Goel) is given. It is pointed out that there are still many unnecessary backt...

    Jianchao Wang, Daozheng Wei in Journal of Computer Science and Technology (1986)

  2. No Access

    Article

    A computer system for Chinese character speech input

    In this paper, we introduce a speaker-dependent isolated word recognizer which is dedicated for Chinese character input. The method presented here offers an effective solution to the large-vocabulary recogniti...

    Xuedong Huang, Lianhong Cai, Ditang Fang in Journal of Computer Science and Technology (1986)

  3. No Access

    Article

    A key-lock access control

    Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear c...

    Guoxiang Huang, Jian Liu in Journal of Computer Science and Technology (1987)

  4. No Access

    Article

    Reconvergent-fanout-oriented testability measure

    This paper describes the theory and implementation of a testability measure program called RFOTM. It is suggested that the real difficulty in test generation should be reflected in testability measure. We anal...

    Jianchao Wang, Daozheng Wei in Journal of Computer Science and Technology (1988)

  5. No Access

    Article

    On a finite element method for the equations of one-dimensional nonlinear thermoviscoelasticity

    A computationally uncoupled numerical scheme for the equations of one-dimensional nonlinear thermoviscoelasticity is proposed. The scheme makes use of the finite element method for the space variable and the d...

    S. Jiang in Computing (1988)

  6. No Access

    Chapter and Conference Paper

    Making the Partial Transitive Closure an Elementary Database Operation

    A framework for processing recursive queries is briefly described. In this framework, computation of partial transitive closures (PTC’s) is considered as an elementary and essentially new database operation wh...

    Bin Jiang in Datenbanksysteme in Büro, Technik und Wissenschaft (1989)

  7. No Access

    Article

    A proof rule for while loop in VDM

    A proof rule for while loop which can be used in justification of program w.r.t. specifications using two-state post-conditions is presented in this paper, accompanied with a soundness proof and a comparison w...

    **njie Jiang, Yongsen Xu in Journal of Computer Science and Technology (1989)

  8. No Access

    Article

    A message-based distributed kernel for a full heterogeneous environment

    This paper presents the design and implementation of a message-based distributed operating system kernel NDOS. The main purpose of the kernel is to support a distributed data processing system and a distribute...

    **ng Xue, Zhongxiu Sun, Jianqiang Zhou in Journal of Computer Science and Technology (1990)

  9. No Access

    Article

    Motion planning for robots with topological dimension reduction method

    This paper explores the realization of robotic motion planning, especially Findpath problem, which is a basic motion planning problem that arises in the development of robotics. Findpath means: Give the initia...

    Bo Zhang, Tian Zhang, Jianwei Zhang in Journal of Computer Science and Technology (1990)

  10. No Access

    Article

    DFTSNA: A distributed fault-tolerant shipboard system

    This paper describes the architecture, fundamental principle and implementation of a distributed fault-tolerant system—DFTSNA. Its objective is to combine extreme reliability with high availability in a shipbo...

    Jie Xu, Qingnan Li, Shize Huang, Jiangfeng Xu in Journal of Computer Science and Technology (1990)

  11. No Access

    Article

    Numerical solution for the Cauchy problem in nonlinear 1-D-thermoelasticity

    We approximate the Cauchy problem by a problem in a bounded domain Ω R =(−R,R) withR>0 sufficiently large, and the boundary conditions on ∂Ω R ...

    S. Jiang in Computing (1990)

  12. No Access

    Article

    Formalizing default reasoning

    Fuzzy set systems can be used to solve the problem with uncertain knowledge, and default logic can be used to solve the problem with incomplete knowledge, in some sense. In this paper, based on interval-valued...

    Jianchao Han, Zhongzhi Shi in Journal of Computer Science and Technology (1990)

  13. No Access

    Article

    Design and implementation of a heterogeneous distributed database system

    This paper introduces a heterogeneous distributed database system called LSZ system, where LSZ is an abbreviation of Li Shizhen, an ancient Chinese medical scientist. LSZ system adopts cluster as distributed d...

    Zhiquan **, Chengfei Liu, Zhongxiu Sun in Journal of Computer Science and Technology (1990)

  14. No Access

    Chapter and Conference Paper

    PRACTITIONER: Pragmatic Support for the Re-use of Concepts in Existing Software

    Software re-use has become recognised as a vitally important method for reducing software costs and enhancing software quality. Practitioner has its own particular approach to software re-use: the re-use of co...

    Pat Hall, Cornelia Boldyreff, Jian Zhang in Software Re-use, Utrecht 1989 (1991)

  15. No Access

    Article

    TST — An algorithm for global microcode compaction with timing constraints

    Existing global microcode compaction approaches have all assumed a target architecture that has microoperation conflicts and data dependencies as the two fundamental compaction constraints. However, new practi...

    Bogong Su, Jian Wang, **shi **a in Journal of Computer Science and Technology (1991)

  16. Chapter and Conference Paper

    An object-oriented approach to model management

    The goal of this research is to propose an object-oriented framework for the specification, storage and manipulation of decision models in conceptual analysis of model management. The framework consists of two...

    Vilas Wuwongse, Jian MA in Advanced Information Systems Engineering (1991)

  17. No Access

    Chapter and Conference Paper

    Algebraic analysis of fuzzy indiscernibility

    First, this paper investigates a model of the database with fuzzy information and generalizes a class of fuzzy indiscernibility relations from the model. Next, this paper is focused on algebraic analysis of th...

    Jian-Ming Gao, Akira Nakamura in Uncertainty in Knowledge Bases (1991)

  18. No Access

    Article

    Source-to-source conversion based on formal definition

    This paper proposes the idea of source-to-source conversion between two heterogeneous high-level programming languages. The conversion is based on formal definition and oriented to multi-pairs of languages. Th...

    **ng’er Zhang, **aojun Zhu, Jianxin Li in Journal of Computer Science and Technology (1991)

  19. No Access

    Article

    The ECSP language and its implementation

    The ECSP language is a concurrent programming language following Hoare’s proposals of Communicating Sequential Processes[2]. To study the language, an implementation tool is designed. Based mainly on replacement,...

    Jian** Zheng, Guoxing Song in Journal of Computer Science and Technology (1991)

  20. No Access

    Article

    HEPAPS: A PCB automatic placement system

    HEPAPS is composed of constructive placement, improving placement, equivalence pins reassignment and same function elements reassignment. Based on practical demands, this paper implements the constructive proc...

    Jianguo Xu, Yuchai Gou, Zongkai Lin in Journal of Computer Science and Technology (1992)

previous disabled Page of 367