<RECORD 1>

Accession number:2002447167376

Title:Role-based authorization constraint with time character

Authors:Dong, Guang-Yu (1); Qing, Si-Han (1); Liu, Ke-Long (1)

Author affiliation:(1) Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China

Corresponding author:Dong, G.-Y.

()

Source title:Ruan Jian Xue Bao/Journal of Software

Abbreviated source title:Ruan Jian Xue Bao

Volume:13

Issue:8

Issue date:August 2002

Publication year:2002

Pages:1521-1527

Language:Chinese

ISSN:10009825

CODEN:RUXUEW

Document type:Journal article (JA)

Publisher:Chinese Academy of Sciences

Abstract:Authorization constraint is an important part in role-based access control models. There are some methods to specify constraint formally, but they mainly focus on the static characters. A formal model is proposed to describe time character of constraint in this paper. A founded constraint model, namely a constraint specification language, is studied in detail, and is extended. The language is called RCLT (role-based constraints language with time-character) after extending. At the same time, the problems of optimizing the efficiency of RCLT system and restoring to the safe state when rules are violated are discussed. RCLT is testified to be able to express the time character of constraint well. However, there are further works need to be done for finding practical, efficient and general algorithms for optimizing efficiency and the restoration of safe state, which is the main goal of future researches.

Number of references:5

Main heading:Security of data

Controlled terms:Algorithms - Computer networks - Constraint theory - Mathematical models

Uncontrolled terms:Access control - Authorization

Classification code:721 Computer Circuits and Logic Elements - 723.2 Data Processing and Image Processing - 921 Mathematics

Treatment:Theoretical (THR)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 2>

Accession number:2002487244369

Title:Predicate &mu;-calculus for value-passing processes and complete deductive system for FO(HML)

Authors:Xue, Rui (1); Lin, Hui-Min (1)

Author affiliation:(1) Lab. for Comp. Sci., Inst. of Software, Chinese Acad. of Sci., Beijing 100083, China

Corresponding author:Xue, R.

()

Source title:Jisuanji Xuebao/Chinese Journal of Computers

Abbreviated source title:Jisuanji Xuebao

Volume:25

Issue:6

Issue date:June 2002

Publication year:2002

Pages:561-569

Language:Chinese

ISSN:02544164

CODEN:JIXUDT

Document type:Journal article (JA)

Publisher:Science Press

Abstract:A predicate &mu;-calculus is proposed for describing properties of value passing processes. It is a first-order logic with fixpoints. Propositions and predicates are mutually recursively defined. Predicates are functions from values to propositions, which has three forms: predicate variables, abstractions, as well as greatest and least fixed points. Formulae are interpreted over transition systems induced by symbolic transition graphs with assignments. For the finite fragment of the logic, which is named FO(HML) and similar to the modal logic proposed by Hennessy and Liu, a Gentzen style deductive system is presented, and its completeness proved using tableau technique.

Number of references:9

Main heading:Formal logic

Controlled terms:Calculations

Uncontrolled terms:Abstractions - Deductive completeness - Deductive system - Fixpoint - Model checking - Predicate - Symbol transition graphs - Tableau - Transition systems - Value passing processes - Variables

Classification code:721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723 Computer Software, Data Handling and Applications

Treatment:Theoretical (THR)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 3>

Accession number:2002397110444

Title:Virtual assembly toolkit: A 3D interaction platform of virtual assembly

Authors:Tian, Feng (1); Cheng, Cheng (1); Chen, Youdi (1); Dai, Guozhong (1)

Author affiliation:(1) Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China

Corresponding author:Tian, F.

Source title:Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics

Abbreviated source title:Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao

Volume:14

Issue:3

Issue date:March 2002

Publication year:2002

Pages:193-198

Language:Chinese

ISSN:10039775

CODEN:JFTXFX

Document type:Journal article (JA)

Publisher:Institute of Computing Technology

Abstract:A 3D interactive platform-Virtual Assembly Toolkit aiming at realizing customized Virtual Assembly is presented. New 3D interactive metaphor is applied and 3D interactive primitives in the assembly field are defined and encapsulated in the toolkits. The toolkit supplies programmer with the parser and semantic callback functions about these primitives. It also provides the capabilities of constraint satisfaction and collision detection about workpieces. When a programmer uses it to develop an application study about virtual assembly, the complicated tasks about 3D graphics rendering and interactive primitive manipulation are done by VAT.

Number of references:6

Main heading:Computer aided design

Controlled terms:Assembly - Graphic methods - Semantics - Three dimensional - Virtual reality

Uncontrolled terms:Interactive metaphor - Three dimensional interaction platform - Virtual assembly toolkit

Classification code:723 Computer Software, Data Handling and Applications - 903.2 Information Dissemination - 913.1 Production Engineering

Treatment:Applications (APP)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 4>

Accession number:2002487245717

Title:Specification and construction of multi-agent system based on software architecture

Authors:Zhan, Jian-Feng (1); Cheng, Hu (1)

Author affiliation:(1) Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China

Corresponding author:Zhan, J.-F.

()

Source title:Ruan Jian Xue Bao/Journal of Software

Abbreviated source title:Ruan Jian Xue Bao

Volume:13

Issue:SUPPL.

Issue date:September 2002

Publication year:2002

Pages:134-137

Language:Chinese

ISSN:10009825

CODEN:RUXUEW

Document type:Journal article (JA)

Publisher:Chinese Academy of Sciences

Abstract:Based on the software architecture, a method of specifying and constructing the multi-agent system is proposed. On four different levels such as components, agents, organization and systems, the structure, behaviors and interaction patterns of the system are studied based on CSP formalism, and role models are used to describe the static profile of dynamic organization. With the entities in the field of an agent-oriented software engineering explicitly specified, such as an agent, a role and an organization, a software architect is provided with the power of the expression of inspiration and intuition. It is also possible to automatically analyze the system properties with commercial tool such as FDR, since CSP formalism is used.

Abstract type:(Edited Abstract)

Number of references:6

Main heading:Multi agent systems

Controlled terms:Computer architecture - Mathematical models - Software agents - Software engineering - Specifications

Uncontrolled terms:Abstract organization relationship - CSP formalism - Inspiration expression - Intuition expression - Role construction - Role specification - Software architecture

Classification code:723.1 Computer Programming - 723.5 Computer Applications - 902.2 Codes and Standards

Treatment:Applications (APP)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 5>

Accession number:2002487244464

Title:Threshold undeniable signature scheme without a trusted party

Authors:Wang, Gui-Lin (1); Qing, Si-Han (2)

Author affiliation:(1) Eng. Res. Cent., Chinese Acad. of Sci., Beijing 100080, China; (2) Lab. of Info. Security, Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China

Corresponding author:Wang, G.-L.

()

Source title:Ruan Jian Xue Bao/Journal of Software

Abbreviated source title:Ruan Jian Xue Bao

Volume:13

Issue:9

Issue date:September 2002

Publication year:2002

Pages:1757-1764

Language:English

ISSN:10009825

CODEN:RUXUEW

Document type:Journal article (JA)

Publisher:Chinese Academy of Sciences

Abstract:At Auscrypt'92, Harn and Yang first proposed the conception of (t, n) threshold undeniable signature, in which only subsets with at least t members can represent a group to generate, confirm or disavow a signature. Later, several schemes are proposed, but none of them is secure. So up to now, how to design a secure (t, n) threshold undeniable signature scheme is remained an open problem. Based on discrete logarithm cryptosystem, a secure and efficient (t, n) threshold undeniable signature scheme without a trusted party is presented. This scheme has an attractive property that member's honesty is verifiable, because a publicly verifiable secret sharing scheme is used to distribute secrets and two discrete logarithm equality protocols are used to provide necessary proofs of correctness, which are proposed by Schoenmakers at Crypto'99.

Abstract type:(Edited Abstract)

Number of references:19

Main heading:Electronic document identification systems

Controlled terms:Cryptography - Network protocols - Numerical analysis - Security of data - Theorem proving - Threshold logic

Uncontrolled terms:Digital signature - Discrete logarithm equality protocols - Threshold undeniable signature

Classification code:716 Telecommunication; Radar, Radio and Television - 721 Computer Circuits and Logic Elements - 723 Computer Software, Data Handling and Applications - 911.2 Industrial Economics - 921 Mathematics

Treatment:Applications (APP); Theoretical (THR)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 6>

Accession number:2002487245703

Title:Generating nodes in concept lattice directly

Authors:Hu, Ke-Yun (1); Sui, Yue-Fei (2); Lu, Yu-Chang (1); Wang, Ju (2); Shi, Chun-Yi (1)

Author affiliation:(1) Dept. of Comp. Sci. and Technol., Tsinghua Univ., Beijing 100084, China; (2) Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China

Corresponding author:Hu, K.-Y.

()

Source title:Ruan Jian Xue Bao/Journal of Software

Abbreviated source title:Ruan Jian Xue Bao

Volume:13

Issue:SUPPL.

Issue date:September 2002

Publication year:2002

Pages:36-41

Language:Chinese

ISSN:10009825

CODEN:RUXUEW

Document type:Journal article (JA)

Publisher:Chinese Academy of Sciences

Abstract:Building whole concept lattice from database is a computing intensive operation in most cases. Sometimes people need only to find certain node in concept lattices. A novel approach to compute lattice node from database without generating the whole concept lattice is presented. Given a set of objects or attributes, by exploiting unique properties of concept lattice, it is are able to find the matching node, its parent nodes and children nodes in concept lattice directly. This avoids computing and memory burden brought by lattice generation, and it is useful in concept lattice application in large data sets.

Number of references:9

Main heading:Artificial intelligence

Controlled terms:Calculations - Data mining - Database systems - Learning systems - Theorem proving

Uncontrolled terms:Concept lattices - Irreducible element - Large data sets - Matching nodes

Classification code:721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723.3 Database Systems - 723.4 Artificial Intelligence - 921 Mathematics

Treatment:Theoretical (THR)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 7>

Accession number:2002417138562

Title:Robot discrete adaptive control based on dynamic inversion using dynamical neural networks

Authors:Sun, Fu-Chun (1); Li, Han-Xiong (2); Li, Lei (3)

Author affiliation:(1) Department of Computer Science and Technology, State Key Lab of Intelligent Technology and Systems, Tsinghua University, Beijing 100084, China; (2) Department of Manufacturing Engineering and Engineering Management, City University of Hong Kong, Hong Kong, Hong Kong; (3) Institute of Software, Chinese Academy of Sciences, Beijing 100080, China

Corresponding author:Sun, F.-C.

()

Source title:Automatica

Abbreviated source title:Automatica

Volume:38

Issue:11

Issue date:November 2002

Publication year:2002

Pages:1977-1983

Language:English

ISSN:00051098

CODEN:ATCAA9

Document type:Journal article (JA)

Publisher:Elsevier Ltd

Abstract:A stable discrete time adaptive control approach using dynamic neural networks (DNNs) is developed in this paper for the trajectory tracking of a robotic manipulator with unknown nonlinear dynamics. By using dynamic inversion constructed by a DNN, the assumption under which the system state should be on a compact set can be removed. This assumption is usually required in neuro-adaptive control. The NN-based variable structure control is designed to guarantee the stability and improve the dynamic performance of the closed-loop system. The proposed control scheme ensures the global stability and desired tracking as well. &copy; 2002 Elsevier Science Ltd. All rights reserved.

Number of references:8

Main heading:Discrete time control systems

Controlled terms:Adaptive control systems - Closed loop control systems - Manipulators - Neural networks - Robotics

Uncontrolled terms:Dynamic inversions

Classification code:691.1 Materials Handling Equipment - 723.4 Artificial Intelligence - 731.1 Control Systems - 731.5 Robotics

Treatment:Theoretical (THR)

DOI:10.1016/S0005-1098(02)00116-4

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 8>

Accession number:2002096876047

Title:Interleaving radiosity

Authors:Wu, Enhua (1); Wang, Wenping (1)

Author affiliation:(1) Laboratory of Computer Science, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China

Corresponding author:Wu, E.

()

Source title:Journal of Computer Science and Technology

Abbreviated source title:J Comput Sci Technol

Volume:17

Issue:1

Issue date:January 2002

Publication year:2002

Pages:1-8

Language:English

ISSN:10009000

CODEN:JCTEEM

Document type:Journal article (JA)

Publisher:Allerton Press Inc.

Abstract:A system of linear equations is in general solved to approximate discretely the illumination function in radiosity computation. To improve the radiosity solution, a method that performs shooting and gathering in an interleaving manner is proposed in the paper. Besides, a criterion has been set up and tested for choosing object elements used in the gathering operation, and a criterion is established to quantify the solution errors by taking into account more reasonably of the human perception of the radiosity solution. Experimental results show that the method proposed has nice performance in improving the radiosity solution.

Number of references:14

Main heading:Three dimensional computer graphics

Controlled terms:Approximation theory - Computational methods - Function evaluation - Image quality - Integral equations - Linear equations

Uncontrolled terms:Global illumination - Illumination function - Progressive refinement - Radiosity computation

Classification code:721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723.5 Computer Applications - 921.2 Calculus - 921.6 Numerical Methods

Treatment:Theoretical (THR); Experimental (EXP)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 9>

Accession number:2003177450311

Title:Modeling and rendering snowy natural scenery

Authors:Chen, Yan-Yun (1); Sun, Han-Qiu (3); Guo, Bai-Ning (1); Wu, En-Hua (2)

Author affiliation:(1) Microsoft Res. Asia, Beijing 100080, China; (2) Lab. of Comp. Sci., Inst. of Software, Chinese Acad. of Sci., Beijing 100080, China; (3) Dept. of Comp. Sci. and Eng., Chinese Univ. of Hong Kong, Hong Kong, Hong Kong; (4) Faculty of Sci. and Technol., Univ. of Macao, Macao, China

Corresponding author:Chen, Y.-Y.

()

Source title:Jisuanji Xuebao/Chinese Journal of Computers

Abbreviated source title:Jisuanji Xuebao

Volume:25

Issue:9

Issue date:September 2002

Publication year:2002

Pages:916-922

Language:Chinese

ISSN:02544164

CODEN:JIXUDT

Document type:Journal article (JA)

Publisher:Science Press

Abstract:Realistic image synthesis of high complex natural scenes has been always a challenging topic in computer graphics. Generation of snow scenes could be even more difficult due to the inconvenience of using common modeling elements, such as polygons and curved surfaces, to express the snow shape. This paper introduces an approximate method to solve the problem. By the method, displacement map is used to model snow block on near objects, constructed from polygons, while volumetric texture map is introduced to handle the objects in distance like trees. Test result shows that the method is viable in producing realistic snow scenes with comprehensive object environments, in a favorable requirement of storage and rendering computation.

Number of references:21

Main heading:Computer graphics

Controlled terms:Image processing - Mapping - Models - Ray tracing - Storage allocation (computer) - Textures

Uncontrolled terms:Displacement mapping - Polygons - Realistic rendering - Volumetric texture

Classification code:722.1 Data Storage, Equipment and Techniques - 723.2 Data Processing and Image Processing - 723.5 Computer Applications - 902.1 Engineering Graphics - 933 Solid State Physics

Treatment:Applications (APP); Experimental (EXP)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

<RECORD 10>

Accession number:2004148097618