1994 Subject Index
  1. Access Control
  2. Algorithms
  3. Artificial Intelligence
  4. Computer Aided Design
  5. Computer Architecture
  6. Computer Graphics
  7. Computer Hardware
  8. Computer Networks
  9. Distributed Systems
  1. Fault Tolerant Computation
  2. Graph Algorithms
  3. Image Processing
  4. Information Security
  5. Neural Networks
  6. Parallel Computation
  7. Pattern Recognition
  8. Robotics
  9. Software Engineering

    Access Control
  1. A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy
    Narn-Yih Lee and Tzonelih Hwang......Vol. 10, No.4, pp.601-610


  2. A Branch-and-Bound Algorithm for Reliability-Oriented Task Assignmentin Bus Network Systems
    Rong-Hong Jan and Shiow-Ling Chen......Vol. 10, No.1, pp.81-97

    Artificial Intelligence

  3. A New Algorithm for Deterministic Parsing and Its Application to Grammar and Style Checking
    Rey-Long Liu and Von-Wun Soo......Vol.10, No.3, pp.369-385

  4. A Temporal Arithmetic Based Reasoning System for Systolic Array Designs
    Timothy K. Shih and Nam Ling......Vol.10, No.3, pp.317-338

  5. Design and Implementation of a Computer Go Program Archmage 1.1
    Shun-Chin Hsu, Jeng-Chi Yan and Hongsen Chang......Vol.10, No.2, pp.239-258

  6. Evidential Relaxation Labeling Scheme to Perform Non-Monotonic and Uncertain Reasoning
    Wei-Chang Lin and Von-Wun Soo......Vol.10, No.2, pp.159-176

  7. Generating Logical Forms of Chinese Sentences
    Hsin-His Chen and Hsin-Ming Yang......Vol.10, No.3, pp.295-316

  8. Knowledge Elicitation and Integration from Multiple Experts
    Gwo-Jen Hwang......Vol.10, No.1, pp.99-109

  9. Knowledge Validation in Eliciting Implicit Expertise under Uncertainty
    Gwo-Jen Hwang......Vol.10, No.4, pp.587-600

  10. SPEC: A Specification Processing Environment with Controls
    Timothy Kuo-Chen Shih and Ruth E. Davis......Vol.10, No.4, pp.495-526

    Computer Aided Design

  11. A Linear Time Algorithm for Planar Moat Routing
    Chia-Chun Tsai and Sao-Jie Chen......Vol.10, No.1, pp.111-127

    Computer Architecture

  12. An Optimal Matched and Parallel Mixed-Radix Converter
    Hao-Yung Lo......Vol.10, No.3, pp.411-421

    Computer Graphics

  13. An Object-Oriented Graphics System Adopting User Interface Management Techniques
    Yin-Hsong Hsu, Yue-Sun Kuo and Chyan-Goei Chung......Vol.10, NO.3, pp.339-367

  14. Botanical Tree Construction by Parameters
    Der-Baau Perng, Din-Hoo Tsai and Ahn-Ying Lee......Vol.10, No.2, pp.203-219

    Computer Hardware

  15. Hybrid ROM Strategy (H-ROM) for Conversion Between Binary Numbers and Logarithms
    Hao-Yung Lo, Hsiu-Feng Lin and Chiang-Shiang Wan......Vol.10, No.1, pp.51-69

    Computer Networks

  16. An Asymmetrical Polling System with Noncyclic Service Order and Nonexhaustive Service Discipline
    Chung-Ju Chang, I-Hui Chen and Lain-Chyr Hwang......Vol.10, No.2, pp.141-158

  17. Performance Analysis of p-persistent CSMA/CD and CSMA Protocols with Buffered Users
    Chung-Yung Tseng and Szu-Lin Su......Vol.10, No.2, pp.271-292

    Distributed Systems

  18. Design of Mutual Exclusion Algorithms for Real-Time Distributed Systems
    Ye-In Chang......Vol.10, No.4, pp.527-548

  19. Object Movements in a Heterogeneous Distributed Smalltalk
    Feng-Jian Wang, Yen-Sung Lee and Jin-Woei Hwang......Vol.10, No.4, pp.449-469

    Fault Tolerant Computation

  20. Fault Tolerant Distributed Simulation
    Yi-Bing Lin......Vol.10, No.2, pp.259-269

    Graph Algorithms

  21. Polynomial Algorithms for Weighted Perfect Domination Problems on Interval and Circular-Arc Graphs
    Maw-Shang Chang and Yi-Chang Liu......Vol.10, No.4, pp.549-568

    Image Processing

  22. A New Self_Adaptive Image Coder
    J. M. Quan and S. C. Tai......Vol.10, No.1, pp.129-137

  23. Finding Trajectories of Feature Points in an Image Sequence Via Multistage Bipartite Matching
    Shou-Hsin Lee and Jin-Jang Leou......Vol.10, No.4, pp.471-494

  24. Parallel Thinning by a Recurrent Neural Network
    Rei-Yao Wu and Wen-Hsiang Tsai......Vol.10, No.2, pp.221-237

    Information Security

  25. A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified E1Gamal Public Key Cryptosystem
    Chin-Chen Chang and Feng-Yi Liou......Vol.10, No.3, pp.423-432

    Neural Networks

  26. A Connectionist Fuzzy Classifier for Speech Recognition
    Yau-Hwang Kuo, Cheng-I Kao and Jiahn-Jung Chen......Vol.10, No.1, pp.1-20

    Parallel Computation

  27. Generalized Wormhole Routing Strategies in Hypercubes
    Hsing-Lung Chen and Han-Shing Yihng......Vol.10, No.3, pp.387-410

    Pattern Recognition

  28. Discriminant Analysis Based on Hyperellipsoid Distribution
    Jun S. Huang and Mark C. K. Yang......Vol.10, No.1, pp.71-79

  29. Optical Recognition of Handwritten Chinese Characters by Partial Matching
    An-Bang Wang, Kuo-Chin Fan and Jun Shon Huang......Vol.10, No.4, pp.569-585


  30. On Controlling and Manipulating Objects Using Coordinated Robots
    Maw-Kae Hor......Vol.10, No.3, pp.433-446

    Software Engineering

  31. A Survey of the Influence of Programming Constructs and Mechanisms on Software Quality
    Deng-Jyi Chen, Wu-Chi Chen, Shih-Kun Huang and David T. K. Chen......Vol.10, No.2, pp.177-201

  32. Some Complexity Metrics for Object-Oriented Programs Based on Information Flow: A Study of C++ Programs
    Yen-Sung Lee, Bin-Shiang Liang and Feng-Jian Wang......Vol.10, No.1, pp.21-50