Skip to main content

previous disabled Page of 815
and
  1. No Access

    Article

    On the fill-in when sparse vectors are orthonormalized

    If the RevisedGram-Schmidt method is used for orthonormalizing a given set of sparse vectors, then it is shown that the local fill-in of non-zero elements at each stage can be easily determined. This makes it pos...

    Y. T. Chen, Prof. Dr. R. P. Tewarson in Computing (1972)

  2. No Access

    Article

    On the optimal choice of pivots for the Gaussian elimination

    In this note, a cost criterion function for choosing the optimal pivot at each stage of the Gaussian elimination method is described. It takes into consideration both the fill-in and the number of arithmetical...

    Dr. Y. T. Chen, Prof. Dr. R. P. Tewarson in Computing (1972)

  3. No Access

    Article

    Parallel Poisson and Biharmonic solvers

    In this paper we develop direct and iterative algorithms for the solution of finite difference approximations of the Poisson and Biharmonic equations on a square, using a number of arithmetic units in parallel...

    Prof. Dr. A. H. Sameh, Dr. S. C. Chen, Prof. Dr. D. J. Kuck in Computing (1976)

  4. No Access

    Article

    A quasi-Newton method with sparse triple factorization for unconstrained minimization

    A new quasi-Newton method for unconstrained minimization is presented. It uses sparse triple factorization of an approximation to the sparse Hessian matrix. At each step a new column and a corresponding row of...

    Dao-qi Chen, R. P. Tewarson in Computing (1984)

  5. No Access

    Chapter

    The Acquisition of Procedural Knowledge through Inductive Learning

    Most induction systems previously developed are concerned with the acquisition of generalized characteristic descriptions from training instances represented in either attribute tuples or first order predicate...

    Kaihu Chen in Machine Learning (1986)

  6. No Access

    Article

    Two varieties of finite automaton public key cryptosystem and digital signatures

    This paper gives two varieties of the public key cryptosystem in [1] which can also be used to implement digital signatures.

    Renji Tao, Shihua Chen in Journal of Computer Science and Technology (1986)

  7. No Access

    Article

    On the structure of finite automata of whichM′ is an (weak) inverse with delay τ

    In this paper, we first give a method that for any inverse finite automaton M′ with delay τ, all inver tible finite automata with delay τ, of whichM′ is an inverse with delay τ, can be constructed; and a universa...

    Shihua Chen in Journal of Computer Science and Technology (1986)

  8. No Access

    Article

    Maximal unifiable subsets and minimal nonunifiable subsets

    We address the problem of collecting information about failures and successes while unifying a set of equations. This is relevant to the study of efficient backtracking, for which Cox used the concept of maxim...

    T. Y. Chen, J -L Lassez, G. S. Port in New Generation Computing (1986)

  9. No Access

    Article

    Vector computer 757

    This paper describes briefly the first large-scale vector computer system designed and produced in China—vector computer 757. The design philosophy, architecture, hardware implementation, software and performa...

    Qingshi Gao, **ang Zhang, Shufan Yang in Journal of Computer Science and Technology (1986)

  10. No Access

    Article

    On the structure of (weak) inverses of an (weakly) invertible finite automaton

    In this paper, we first give a method by which, for any weakly invertible finite automatonM with delay τ, the set of all weak inverse finite automata ofM with delay τ can be constructed. We then give a method by ...

    Shihua Chen in Journal of Computer Science and Technology (1986)

  11. No Access

    Article

    A substitution based model for the implementation of PROLOG

    Since PROLOG has been chosen as the Fifth Generation Computer’s Kernal Language, it is presently one of the hottest topics among computer scientists all over the world. Recently, the implementation technique a...

    Zhaoxiong Chen, Qingshi Gao in Journal of Computer Science and Technology (1986)

  12. No Access

    Article

    On interrupt strategy from the point of view of system efficiency

    Interrupt strategy of an operating system can help computer to tackle with urgent or important events, and to run programs in a reasonable fashion in order to achieve a satisfactory performance. But a sophisti...

    Shicheng Chen, Zhongyi Zhou in Journal of Computer Science and Technology (1987)

  13. No Access

    Article

    A Tree-structured Database Machine for large relational database systems

    This paper proposes a Tree-structured Database Machine (TDM), which is designed for supporting large relational database systems. The TDM aims at totally improving three level performance bottlenecks in relati...

    Liming Meng, **aofei Xu, Huiyou Chang in Journal of Computer Science and Technology (1987)

  14. No Access

    Article

    Lens effect on synthetic image generation based on light particle theory

    The synthetic image generation with the lens effect consists of two consecutive processors: the hidden-surface processor, and the focus processor. The normal ray-tracing algorithms are used in the first proces...

    Yong C. Chen in The Visual Computer (1987)

  15. No Access

    Book and Conference Proceedings

  16. No Access

    Chapter

    Development of a Knowledge-Based System for Loop Diagnosis

    An accident diagnostic system is developed as an attempt to provide a useful aid for the operators of an experimental loop or a nuclear power plant in the case of emergency condition. Because the current pract...

    Lih-Yih Liao, Hsien-Chang Tang in Artificial Intelligence and Other Innovati… (1988)

  17. No Access

    Chapter and Conference Paper

    High Resolution Spectral Analysis NDE Techniques for Flaw Characterization, Prediction and Discrimination

    In this paper the feasibility of ultrasonic spectroscopy in nondestructive evaluation (NDE) is examined with the support of digital signal processing, modern spectral analysis and digital pattern recognition. ...

    C. H. Chen in Signal Processing and Pattern Recognition … (1988)

  18. No Access

    Chapter and Conference Paper

    Laplacian Pyramid Image Data Compression Using Vector Quantization

    With the increased use of digital images in nondestructive evaluation (NDE) of materials, effective image compression and coding techniques are now much needed in NDE.

    C. H. Chen, Robert C. Yen in Signal Processing and Pattern Recognition … (1988)

  19. No Access

    Article

    The design and implementation of an OA system ZGL1

    ZGL1, an office automation system for municipal administration, is presented. It is a distributed microcomputer system based on OMNINET. Each node of it is an IBM PC/XT microcomputer with Chinese character fac...

    Li **e, Peipei Chen, Peigen Yang in Journal of Computer Science and Technology (1988)

  20. No Access

    Chapter and Conference Paper

    Knowledge acquisition on neural networks

    A knowledge acquisition system is implemented on the IBM PAN (Parallel Associative Networks) system. This is an iterative process that reduces the uncertainty of a body of knowledge and information at each tim...

    Su-shing Chen in Uncertainty and Intelligent Systems (1988)

previous disabled Page of 815