Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
CODEN JKIEBK
-
Key Technologies and Applications of Internet of Things
刘强,崔莉,陈海明. 物联网关键技术与应用[J]. 计算机科学, 2010, 37(6): 1-4.
LIU Qiang,CUI Li,CHEN Hai-ming. Key Technologies and Applications of Internet of Things[J]. Computer Science, 2010, 37(6): 1-4. - LIU Qiang,CUI Li,CHEN Hai-ming
- Computer Science. 2010, 37 (6): 1-4.
- Abstract PDF(492KB) ( 1177 )
- RelatedCitation | Metrics
-
The Internet of things (IoT) has been paid more and more attention by the government, academe and industry all over the world. This paper introduced the concept of IoT, the basic characteristics and attributes. It also described the system structure, development phases and the future trend. The key technologies of Io T were discussed taking the wireless sensor network as an example. The application of IoT was illustrated by its typical use in environment monitoring.
-
Analyzing Relationship of News Video Stories : An Overview
吴玲达,文军,陈丹雯,袁志民. 新闻视频故事单元关联分析技术研究综述[J]. 计算机科学, 2010, 37(6): 5-10.
WU Ling-da,WEN Jun,CHEN Dan-wen,YUAN Zhi-min. Analyzing Relationship of News Video Stories : An Overview[J]. Computer Science, 2010, 37(6): 5-10. - WU Ling-da,WEN Jun,CHEN Dan-wen,YUAN Zhi-min
- Computer Science. 2010, 37 (6): 5-10.
- Abstract PDF(585KB) ( 386 )
- RelatedCitation | Metrics
-
Analyzing relationship of news video stories is a special clustering of stories based on news events. "Story" is the unit which contains full semantic information in hierarchy units. It is the best semantic unit for video analyzing,searching and organizing. This paper gave an overview of existing method and classified them into three categories;the approach based on text similarity, the approach based on multi-modal similarity and the approach based on keyframe visual duplicate. Their advantages and limitation were discussed and compared in detail. At last, this paper presented some trends in this field.
-
Overview of Data Management in Wireless Sensor Networks
张少平,汪英华,李国徽. 无线传感器网络数据管理技术研究进展[J]. 计算机科学, 2010, 37(6): 11-16.
ZHANG Shao-ping,WANG Ying-hua,LI Guo-hui. Overview of Data Management in Wireless Sensor Networks[J]. Computer Science, 2010, 37(6): 11-16. - ZHANG Shao-ping,WANG Ying-hua,LI Guo-hui
- Computer Science. 2010, 37 (6): 11-16.
- Abstract PDF(699KB) ( 624 )
- RelatedCitation | Metrics
-
Wireless sensor networks are data-centric networks in nature,they deal with continuous data streams collected by sensor nodes. Therefore, existing data management technologies view wireless sensor network as a distributed database system composed of continuous data streams which come from the physical world. Due to the limitations of Sensor nodes' computing power, storage capacity, communication capabilities and battery energy, combined with the characteristics of flash memory and data streams,these lead to some challenges that the traditional distributed database systems have not encountered for data managements.This paper introduced the database system architecture, data storage and index technologies, data models, and query processing and optimization technologies for wireless sensor networks.
-
Review and Prospect of Tree Modeling Techniques
周骏,陈雷霆,刘启和,李艳梅,饶云波. 树的建模技术研究综述与展望[J]. 计算机科学, 2010, 37(6): 17-22.
ZHOU Jun,CHEN Lei-ting,LIU Qi-he,LI Yan-mei,RAO Yun-bo. Review and Prospect of Tree Modeling Techniques[J]. Computer Science, 2010, 37(6): 17-22. - ZHOU Jun,CHEN Lei-ting,LIU Qi-he,LI Yan-mei,RAO Yun-bo
- Computer Science. 2010, 37 (6): 17-22.
- Abstract PDF(730KB) ( 479 )
- RelatedCitation | Metrics
-
Tree modeling is an important issue that interests both computer graphics and computer vision communities.This paper surveyed the recent techniques for tree modeling from the point of view of graphics, which are based on rule-based modeling,sketch-based modeling and image-based modeling technictues,and tried to characterize these algorithms according to their base techniques, assumptions, limitations and range of utilization. Some typical methods were summarued and the state-of-the-art progress was presented. The fundamental principles behind each technictue were also analyzed and compared. Finally, some future research issues on tree modeling were highlighted.
-
Document Clustering Algorithm Based on Dynamic Interval Mapping
孙永林,刘仲. 基于动态区间映射的文档聚类算法[J]. 计算机科学, 2010, 37(6): 23-27.
SUN Yong-lin,LIU Zhong. Document Clustering Algorithm Based on Dynamic Interval Mapping[J]. Computer Science, 2010, 37(6): 23-27. - SUN Yong-lin,LIU Zhong
- Computer Science. 2010, 37 (6): 23-27.
- Abstract PDF(430KB) ( 445 )
- RelatedCitation | Metrics
-
Archival storage is becoming a research hotspot with information digitization accelerating,where space utihnation and scalability are very important Using content based chunking storage to achieve data deduplication is an effective way to improve storage space utilization, however, it is inefficiency to find shared chunks in all of the huge scale of archival data. We introduced the thought of dynamic interval mapping to information clustering, and presented the DC-DIM(Document Clustering algorithm based on Dynamic Interval Mapping).The algorithm uses chunking and feature extraction methods to generate the fcaturcset of document, and map it on interval links, then choose the document's storage container according to its feature-set's distribution on interval links.By this way, those documents with high similarity(shared a lot of contents) will be clustered, then, it will be very convenient to improve the space utilization and data management.
-
Topology Optimization Based on Small-world Model in Wireless Sensor Networks
景维鹏,刘亚秋,杨显辉. 基于小世界模型的WSN簇间拓扑优化方法[J]. 计算机科学, 2010, 37(6): 28-31.
JING Wei-peng,LIU Ya-qiu,YANU Xian-hui. Topology Optimization Based on Small-world Model in Wireless Sensor Networks[J]. Computer Science, 2010, 37(6): 28-31. - JING Wei-peng,LIU Ya-qiu,YANU Xian-hui
- Computer Science. 2010, 37 (6): 28-31.
- Abstract PDF(357KB) ( 453 )
- RelatedCitation | Metrics
-
According to wireless sensor network nodes energy consumption, hardware failure and communication factors lead to link failure,an evolving network method based on complex network theory of small-world Kleinberg model was proposed,which uses long chains and short chains in partial view information to build inter-cluster topology in wireless sensor network. Theoretical analysis and simulations show that the network lifetime is longer 25% than DECDC in the WSN topology which uses this method when the node failure probability is 0. 2 and it has a good balance of energy consumption and lower cost. Thus the topology which uses the method to build has fault tolerant and good robustness.
-
NpuESB:An BPM Environment Based on Enterprise Service Bus
符宁,周兴社,薛文,张栋毅. 基于ESB的BPM平台的研究与实现[J]. 计算机科学, 2010, 37(6): 32-35.
FU Ning,ZHOU Xing-she,XUE Wen,ZHANG Dong-yi. NpuESB:An BPM Environment Based on Enterprise Service Bus[J]. Computer Science, 2010, 37(6): 32-35. - FU Ning,ZHOU Xing-she,XUE Wen,ZHANG Dong-yi
- Computer Science. 2010, 37 (6): 32-35.
- Abstract PDF(364KB) ( 631 )
- RelatedCitation | Metrics
-
The hierarchical architecture of an Enterprise Service Bus (ESB) based BPM environment,NpuESB,was proposed in this paper. NpuESB is a rapid BPM application development platform grounded on the infrastructure of JBI specification-compliant distributed ESB. By introducing ultra server and process management module, NpuESB enables centralized management of the ESB environment and BPM application workflows. Workflows in ESB environment can be modeled with the formal method based on Pi calculus proposed in this paper. Some important design and implementation considerations for the distributed ESB and management tools were also discussed. Application tests of the prototype system demonstrate NpuESB's effectiveness. Compared with traditional techniques and tools, NpuESB delivers better flexibility and scalability meanwhile stays compatible with legacy systems, thus reduces EAI application development and maintenance costs to a greater extent.
-
Study on the Effect of Quantization Factors on Transmission of Video Streams through IEEE Simulation of Image Quality Performance in
802. 11 b/e Wireless Local Area Networks
廖勇,杨士中. 量化因子在IEEE 802. 11 b/e无线局域网视频流传输中的图像质量性能仿真研究[J]. 计算机科学, 2010, 37(6): 36-39.
LIAO Yong,YANG Shi-zhong. Study on the Effect of Quantization Factors on Transmission of Video Streams through IEEE Simulation of Image Quality Performance in 802. 11 b/e Wireless Local Area Networks[J]. Computer Science, 2010, 37(6): 36-39. - LIAO Yong,YANG Shi-zhong
- Computer Science. 2010, 37 (6): 36-39.
- Abstract PDF(434KB) ( 481 )
- RelatedCitation | Metrics
-
Based on NS2-MyEvalvid, an analysis was conducted on the effect of quantization factors upon the performance of image transmission in this paper. And by simulation, the successful transmission of the video streams grounded on Evalvid mechanism in Wireless Local Area Networks (WLAN) was achieved. A summary of the method to simulate the image transmission process of video streams in WLAN by encoding the related parameters was also provided. Furthermore, by means of changing the encoded quantization factors, the average data of the delay of image and PSNR during the transmission of video streams in multirate WLAN was got, together with a conclusion that 802.11e will guarantee a better transmission performance of video streams than 802. 11b.
-
Study on Performance of Information Security Risk Management
卢志刚,潘林,刘宝旭,许榕生,蒋文保. 信息安全风险管理绩效研究[J]. 计算机科学, 2010, 37(6): 40-42.
LU Zhi-gang,PAN Lin,LIU Bao-xu,XU Rong-sheng,JIANG Wen-bao. Study on Performance of Information Security Risk Management[J]. Computer Science, 2010, 37(6): 40-42. - LU Zhi-gang,PAN Lin,LIU Bao-xu,XU Rong-sheng,JIANG Wen-bao
- Computer Science. 2010, 37 (6): 40-42.
- Abstract PDF(370KB) ( 414 )
- RelatedCitation | Metrics
-
Analyzed the situation and likely problems of the current risk management through affirming the current risk, combined with analysis of financing final accounts, and then put forward a systematic and normative differentiating model for the efficiency of risk management to distinguish the risk management projects from which found out the optimal one. Then pointed out the link between the investment of risk management and the loss of security incidents through further analyzing base on business, and gave out the verification of its effectiveness. The result of verification shows that this model is effective.
-
Genetic Projection Pursuit Evaluation Method of Network Attack Resistance Ability
王会梅,李旭,鲜明,王国玉. 网络抗攻击性能的遗传投影寻踪评估模型[J]. 计算机科学, 2010, 37(6): 43-45.
WANG Hui-mei,LI Xu,XIAN Ming,WANG Guo-yu. Genetic Projection Pursuit Evaluation Method of Network Attack Resistance Ability[J]. Computer Science, 2010, 37(6): 43-45. - WANG Hui-mei,LI Xu,XIAN Ming,WANG Guo-yu
- Computer Science. 2010, 37 (6): 43-45.
- Abstract PDF(343KB) ( 406 )
- RelatedCitation | Metrics
-
Attack Resistance best (ART) is an important security evaluation method and evaluating the system's attack resistance ability becomes a new domain of ART. Based on the security properties of the network, the network's attack resistance evaluation indexes were established from views of the goal system' s attack effect and the hacker' s cost. A projection pursuit evaluation model based on real coding based accelerating genetic algorithm was presented, and it was used in attack resistance ability evaluation for the first time. A simulation example was given,which showed that the approach was brief and effective. The approach can be used to evaluate the attack resistance ability, as well as to compare like kind attack's effect.
-
Role-based Access Control Model for Privacy Protection
杨秋伟,刘玲,李肯立,唐卓. 一种支持隐私保护的角色访问控制模型[J]. 计算机科学, 2010, 37(6): 46-50.
YANG Qiu-wei,LIU Ling,LI Ken-li,TANG Zhuo. Role-based Access Control Model for Privacy Protection[J]. Computer Science, 2010, 37(6): 46-50. - YANG Qiu-wei,LIU Ling,LI Ken-li,TANG Zhuo
- Computer Science. 2010, 37 (6): 46-50.
- Abstract PDF(564KB) ( 335 )
- RelatedCitation | Metrics
-
Privacy preservation is a vital problem to share resource and collaboration among multi-domains. We analyzed the privacy leakage problems of current access control models, and then proposed a rolcbased access control model supporting privacy preservation. The model is based on identify-based encryption,avoiding a number of drawbacks in traditional role-based access model and making privacy preservation among multi-domains come true. Finally, we analyzed and certificated the security of the model in details by random oracle, and the model meets the IND-CCA2 mantic security. According to the simulation, the method is a practical model.
-
Optimization of ARQ Mechanism in Multi-hop UWB Network
王玲,朱光喜,吴伟民,王辰琛. 超宽带多跳无线网络中ARQ机制的优化[J]. 计算机科学, 2010, 37(6): 51-55.
WANG Ling,ZHU Guang-xi,WU Wei-min,WANG Cen-chen. Optimization of ARQ Mechanism in Multi-hop UWB Network[J]. Computer Science, 2010, 37(6): 51-55. - WANG Ling,ZHU Guang-xi,WU Wei-min,WANG Cen-chen
- Computer Science. 2010, 37 (6): 51-55.
- Abstract PDF(439KB) ( 373 )
- RelatedCitation | Metrics
-
This paper did some researches on the ARQ mechanisms which provides the probability of involving the relay nodes into the mechanisms for ultra-wideband multi-hop wireless network,and based on the researches designed a RLC sublayer combining PWMA and Relay ARQ, which can perform as both of the end node and the relay node. Follow this,this paper made a academic analysis of the ultra wideband wireless channel models and simulated the network model under ordinary circumstances and the network model which used ARQ mechanism designed in this paper for representative two-hop wireless network,Compared the simulation results,got the conclusion that using ARQ mechanism designed for ultra-wideband multi-hop network in this paper significantly enhances the throughput and time delay characteristic of the system.
-
Research on Traffic-prefer-based Multi-QoS Object Decision Layered Routing
郭攀红,杨扬,唐先明. 基于业务流偏好的多QoS目标决策分层路由研究[J]. 计算机科学, 2010, 37(6): 56-59.
GUO Pan-hong,YANG Yang,TANG Xian-ming. Research on Traffic-prefer-based Multi-QoS Object Decision Layered Routing[J]. Computer Science, 2010, 37(6): 56-59. - GUO Pan-hong,YANG Yang,TANG Xian-ming
- Computer Science. 2010, 37 (6): 56-59.
- Abstract PDF(449KB) ( 485 )
- RelatedCitation | Metrics
-
Based on the research background of multi-path choosing between gateways in hierarchy routing, this work exploited the guarantee method of traffic flow's specific QoS requirements and put forward some relevant policies and methods, including representation, transition and computation of traffic flows' QoS preference. On the basis of traffic flows' QoS preference, the strategy of optimal service selection was brought forward. Then, with the extension of GPSR algorithms,put forward a traffirprefer-based multi objective hierarchy routing TMQODR which is GPSR QoS Routing algorithms. The analysis on relevant performance for the algorithm has confirmed its feasibility and effectively.
-
Broadband Multimedia Satellite Communication System QoS Framework, Design, Simulation and Verification
冯少栋,边东明,张更新,李广侠. 宽带多媒体卫星通信系统QoS架构设计与仿真验证[J]. 计算机科学, 2010, 37(6): 60-63.
FENG Shao-dong,BIAN Dong-ming,ZHANG Geng-xin,LI Guang-xia. Broadband Multimedia Satellite Communication System QoS Framework, Design, Simulation and Verification[J]. Computer Science, 2010, 37(6): 60-63. - FENG Shao-dong,BIAN Dong-ming,ZHANG Geng-xin,LI Guang-xia
- Computer Science. 2010, 37 (6): 60-63.
- Abstract PDF(452KB) ( 449 )
- RelatedCitation | Metrics
-
In order to provide Quality-of-Service (QoS) guarantees for multimedia services in the broadband satellite communication system,the system QoS framework was designed based on Diffserv. An integrated system design was carried out both on the satellite and the user terminals. The onboard dynamic resources assignment scheme was proposed by improving Combined Frec/Demand Assignment Multiple Access (CFDAMA). A two-stage terminal queuing and scheduling strategy was presented. The broadband multimedia satellite communication hardware in-th}loop simulation system was developed, the measurements show that our system can bearer real-time multimedia services very well.The results are similar to the real system tests.
-
Adaptive Rate Adjustment Mechanism for Real-time Media Streaming over MANETs
魏姝杰,白光伟,曹磊,沈航,王华. 应用于MANET实时流媒体传输的自适应速率调节机制[J]. 计算机科学, 2010, 37(6): 64-69.
WEI Shu-jie,BAI Guang-wei,CAO Lei,SHEN Hang,WANG Hua. Adaptive Rate Adjustment Mechanism for Real-time Media Streaming over MANETs[J]. Computer Science, 2010, 37(6): 64-69. - WEI Shu-jie,BAI Guang-wei,CAO Lei,SHEN Hang,WANG Hua
- Computer Science. 2010, 37 (6): 64-69.
- Abstract PDF(554KB) ( 381 )
- RelatedCitation | Metrics
-
Real-time media streaming over wireless mobile ad hoc networks (MANETs) has been an active area of research in the last few years. However, real-time multimedia delivery in such wireless environments identifies significant challenges due to both the strict QoS requirement of multimedia applications and the dynamic characteristics of wireless mobile networks. This paper proposed an adaptive rate adjustment mechanism for real-time media streaming over MANETs, i. e. ARAM. This mechanism, based on the cross-layer design, predicts the network condition according to the GM (1,1) model. On the other hand, the transmission rate is adaptively adjusted according to the predicted bandwidth and queue length. In order to evaluate the ARAM performance, we generated a set of video streams using NS2 simulation for typical network scenarios. Our statistical and mathematical analysis demonstrated that the ARAM improves the reliability of real-time multimedia delivery significantly, and provides soft QoS guarantees as well.
-
Trustworthy Service Scheduling Framework Based on QoS Decomposition
隋玉磊,周兴社,符宁,詹涛. TSSF:基于QoS分解的可信服务调度框架[J]. 计算机科学, 2010, 37(6): 70-74.
SUI Yu-lei,ZHOU Xing-she,FU Ning,ZHAN Tao. Trustworthy Service Scheduling Framework Based on QoS Decomposition[J]. Computer Science, 2010, 37(6): 70-74. - SUI Yu-lei,ZHOU Xing-she,FU Ning,ZHAN Tao
- Computer Science. 2010, 37 (6): 70-74.
- Abstract PDF(569KB) ( 375 )
- RelatedCitation | Metrics
-
Interoperability-centric and loosely-coupled distributed computing environment brings forward a new challenge on trustworthiness of service computing. At the same time, user puts more and more pressure on system's non-functional rectuirements such as real-time, availability, cost and so on. Therefore service' s QoS should be guaranteed trustworthily. In this paper a Trustworthy Service Scheduling Framework(TSSF) was presented to guarantee composite service's QoS requirement Fuzzy sets based trustworthy QoS decomposition model was proposed to decompose the QoS requirement of the composite service into separate ones for the atoms; and then TSSF delivers expected QoS for each atomic service with adaptive trustworthy service scheduling mechanisms based on Dynamic Service Entity Group (DSEG) ;finally experimental results indicate good performance of the proposed framework.
-
Research of an Efficient Power Analysis Physical Experiment Platform
李浪,李静,李仁发,吴克寿. 一种高效功耗攻击物理实验平台研究[J]. 计算机科学, 2010, 37(6): 75-77.
LI Lang,LI Jing,LI Ren-fa,WU Ke-shou. Research of an Efficient Power Analysis Physical Experiment Platform[J]. Computer Science, 2010, 37(6): 75-77. - LI Lang,LI Jing,LI Ren-fa,WU Ke-shou
- Computer Science. 2010, 37 (6): 75-77.
- Abstract PDF(231KB) ( 398 )
- RelatedCitation | Metrics
-
Power analysis attack has become a great threat to encryption chips. Attacks and defense of power analysis have become the research hotspot. However, experimental platform of power analysis is more difficult to build for researchers. AES encryption algorithm was used to build a high-performance FPUA-based physical experiment platform for power analysis as an example. The process of establishing the physical experimental platform was described in detail. The platform is relatively simple, fast test speed, flexibility. It will be convenient to verified for the encryption algorithm of the power. I}he efficient power analysis model was proposed. It can improve the exprimental speed in the differential statistics.
-
Replication Mechanism Based on Unstructured Decentralized P2P Network
霍林,方艺,胡和平,黄保华. 非结构化离散型对等网络的枢纽副本复制机制[J]. 计算机科学, 2010, 37(6): 78-81.
HUO Lin,FANG Yi,HU He-ping,HUANG Bao-hua. Replication Mechanism Based on Unstructured Decentralized P2P Network[J]. Computer Science, 2010, 37(6): 78-81. - HUO Lin,FANG Yi,HU He-ping,HUANG Bao-hua
- Computer Science. 2010, 37 (6): 78-81.
- Abstract PDF(452KB) ( 421 )
- RelatedCitation | Metrics
-
P2P network makes computing and data transmission efficient and convenience. Nowadays, most of studies focus on routing algorithms and structured topology of the network. However they ignore the research in unstructured decentralized P2P network's replication mechanism. We focused on the area and proposed a new mechanism called Junction Replication Method (JRM) in unstructured decentralized P2P network. With the method, we can achieve better load-balancing by reducing information flow. At last, the paper gave the pseudo code of the algorithm and proven the advantage by deduction.
-
Research and Implementation of Key Generation Services Compatibility Based on TCM
蒋敏慧,黄宁玉,祝璐. 可信密码模块的密钥服务兼容性研究与实现[J]. 计算机科学, 2010, 37(6): 82-85.
JIANG Min-hui,HUANG Ning-yu,ZHU Lu. Research and Implementation of Key Generation Services Compatibility Based on TCM[J]. Computer Science, 2010, 37(6): 82-85. - JIANG Min-hui,HUANG Ning-yu,ZHU Lu
- Computer Science. 2010, 37 (6): 82-85.
- Abstract PDF(362KB) ( 1205 )
- RelatedCitation | Metrics
-
TPM (Trusted Platform Module) launched by TCG ( Trusted Computing Group) is the core module of trusted computing based on cryptographic technology. TPM provides asymmetric algorithm RSA to support key management scheme. Nowadays, China has raised Trusted Cryptography Module (TCM) , TCM provides asymmetric algorithm ECC and symmetric algorithm SMS4 to support key management scheme. The two chips can't be compatible, therefore the compatibility problem of key generation trusted application emerged. Through analyzing key management scheme in both TCM and TPM,as well as TCG software stack (TSS),provided the modification scheme on TSP (TCG Service Provider) and TCS(TCG Core Services) of TSS and the scheme based on key creation flow to solve the problem of key services application compatibility.
-
Usage Control Model with the Ability of Character Judging
石伟丞,谭良,周明天. 具有特征判断能力的使用控制模型研究[J]. 计算机科学, 2010, 37(6): 86-90.
SHI Wei-cheng,TAN Liang,ZHOU Ming-tian. Usage Control Model with the Ability of Character Judging[J]. Computer Science, 2010, 37(6): 86-90. - SHI Wei-cheng,TAN Liang,ZHOU Ming-tian
- Computer Science. 2010, 37 (6): 86-90.
- Abstract PDF(550KB) ( 367 )
- RelatedCitation | Metrics
-
The emphases of traditional access control studying is the policy of authorization, the studying is focus on how to distribute permissions to subject and how to restrict the using of these permissions. Based on the analysis of traditional access control, we introduced a new mode,QUCON,which is based on the UCON and has the ability to judge the character of accessing. By introducing assure obligations, unsure obligations, assure conditions, unsure conditions,characters and active rules,the QUCON has the ability to judge accessing subjectively,thereby reduce or exclude those threats from the illegal users who has permission.
-
IDM-ST Coding for MISO OFDM Link
林沛,王德胜,朱光喜,朱晓东. MISO OFDM链路中的IDM空时编码[J]. 计算机科学, 2010, 37(6): 91-93.
LIN Pei,WANG De-sheng,ZHU Guang-xi,ZHU Xiao-dong. IDM-ST Coding for MISO OFDM Link[J]. Computer Science, 2010, 37(6): 91-93. - LIN Pei,WANG De-sheng,ZHU Guang-xi,ZHU Xiao-dong
- Computer Science. 2010, 37 (6): 91-93.
- Abstract PDF(325KB) ( 383 )
- RelatedCitation | Metrics
-
An Orthogonal Frequency Division Multiplexing (OFDM) system with spacctimc coding Interleave Division Multiplexing (IDM) was investigated over a Multi-Input Single-Output(MISO) link.The performance of an iterative receiber structure for the proposed scheme over a quasi-static channel was evaluated via simulation.and its advantages were shown by comparison to other space-time schemes in similar settings.
-
Key-exchange Protocols of Cognitive Radio Based on Self-certified
周健,周贤伟,孙丽艳. 基于自认证的认知无线电密钥交换协议研究[J]. 计算机科学, 2010, 37(6): 94-96.
ZHOU Jian,ZHOU Xian-wei,SUN Li-yan. Key-exchange Protocols of Cognitive Radio Based on Self-certified[J]. Computer Science, 2010, 37(6): 94-96. - ZHOU Jian,ZHOU Xian-wei,SUN Li-yan
- Computer Science. 2010, 37 (6): 94-96.
- Abstract PDF(281KB) ( 339 )
- RelatedCitation | Metrics
-
There are more security threats in cognitive radio networks than traditional wireless networks due to the strategy of opening spectrum. Switching spectrum brings time delay and interferes with network efficiency. The question also adversely effects on key-exchange protocol which is an important part of key agreement, and gives malicious nodes the attack chance. So this paper put forward a new method, firstly cognitive radio network was divided into multiple clusters, secondly used protocol the time delay of switching channel to select the optimal path with traveling salesman problem in cluster and built the optimal multicast routing tree among clusters; at last different key-exchange protocols based on self-certified were used in cluster and among clusters, which can prevent active attack and passive attack, authentication and key agreement can also simultaneously carried out. The efficiency of protocol is O(2m),m is the number of cluster.
-
Transmission Distance Controlling Method of Wireless Sensor Networks
殷贞玲,王汝传,黄海平,孙力娟. 基于无线传感器网络的传输距离控制方法[J]. 计算机科学, 2010, 37(6): 97-101.
YIN Zhen-ling,WANG Ru-chuan,HUANG Hai-ping,SUN Li-juan. Transmission Distance Controlling Method of Wireless Sensor Networks[J]. Computer Science, 2010, 37(6): 97-101. - YIN Zhen-ling,WANG Ru-chuan,HUANG Hai-ping,SUN Li-juan
- Computer Science. 2010, 37 (6): 97-101.
- Abstract PDF(252KB) ( 365 )
- RelatedCitation | Metrics
-
In the case of the restrictions of energy on wireless sensor nodes,how to reasonable routing protocol of adaptive topology change and control research fields.Based on RSSI ranging technology,this novel introduced and compared three transmission distance control strategies,which utilizes time-delay and energy-comsumption as the reference index.Simulation results show that,choosing transmission radius dynamically can obviously improve the whole performance of the system,prolong the lifetime of the network and decrease the energy consumption and time delay of the sensor nodes.
-
Reliability Evaluation of the Network Storage System Based on Block Diagrams
张英,张益,王冀鲁. 基于框图法的网络存储系统可靠性分析[J]. 计算机科学, 2010, 37(6): 102-105.
ZHANG Ying,ZHANG Yi,WANG Ji-lu. Reliability Evaluation of the Network Storage System Based on Block Diagrams[J]. Computer Science, 2010, 37(6): 102-105. - ZHANG Ying,ZHANG Yi,WANG Ji-lu
- Computer Science. 2010, 37 (6): 102-105.
- Abstract PDF(418KB) ( 386 )
- RelatedCitation | Metrics
-
With the rapid growth of information and improving data security requirements, the reliability of network storage system directly affects the information system performances. This paper focused on network storage system's equipment failure. Based on the reliability analysis about the typical model of network storage system and the use of reliability block diagrams theory, the paper proposed a hybrid form of network storage system reliability analysis and evaluation methods, including system reliability block diagram analysis methods based on nodes attribute, M value methods with the business load. And the hybrid structure of FC-SAN systems experiment was established to verify the effectiveness of the method. As a result of this method compared to other methods of testing with a simple, time-saving, low cost,it is more conducive to application of network storage system to optimize the scheme and equipment.
-
Reliability Analysis of star Network with Link Failures
梁家荣,花仁杰. 具有失效链路的star网络可靠性分析[J]. 计算机科学, 2010, 37(6): 106-110.
LIANG Jia-rong,HUA Ren-jie. Reliability Analysis of star Network with Link Failures[J]. Computer Science, 2010, 37(6): 106-110. - LIANG Jia-rong,HUA Ren-jie
- Computer Science. 2010, 37 (6): 106-110.
- Abstract PDF(424KB) ( 379 )
- RelatedCitation | Metrics
-
Reliability problems on star interconnection network regarded as one of important candidates of network models in largcscale processor systems have been being concerned by people. Under probability model based on link reliability, reliability of star network was analyzed by different analysis methods, and reliability models that correspond to those different methods were set up. The constraint relation between link reliability and network reliability was indicated by above reliability models. The results of simulation experiments show that under existing massive integrated circuit technology, these analysis methods on reliability are all feasible and reliability of star network can be controlled within a ideal scale.
-
Study on Distribution Mechanism of Pervasive Computing Based on Wireless Sensor Networks
黄小桑,王汝传,叶宁. 基于无线传感器网络的普适计算中分发机制研究[J]. 计算机科学, 2010, 37(6): 111-113.
HUANG Xiao-sang,WANG Ru-chuan,YE Ning. Study on Distribution Mechanism of Pervasive Computing Based on Wireless Sensor Networks[J]. Computer Science, 2010, 37(6): 111-113. - HUANG Xiao-sang,WANG Ru-chuan,YE Ning
- Computer Science. 2010, 37 (6): 111-113.
- Abstract PDF(415KB) ( 726 )
- RelatedCitation | Metrics
-
In the pervasive computing environment based on wireless sensor networks,as a result of nodes moving,the message distribution mechanism is no longer applicable.After analyzing the distribution of message influencing factors,it was found that the virtual grid can be used as the shortest path for message distribution.In the article,the new problems were also discussed that this mechanism will face when the source node moves.Therefore with simulation analysis,the feasibility of the distribution mechanism proposed by this paper was verified.
-
Network Attack Model Based on Ontology and its Application
王前,冯亚军,杨兆民,姚磊. 基于本体的网络攻击模型及其应用[J]. 计算机科学, 2010, 37(6): 114-117.
WANG Qian,FENG Ya-jun,YANG Zhao-min,YAO Lei. Network Attack Model Based on Ontology and its Application[J]. Computer Science, 2010, 37(6): 114-117. - WANG Qian,FENG Ya-jun,YANG Zhao-min,YAO Lei
- Computer Science. 2010, 37 (6): 114-117.
- Abstract PDF(361KB) ( 734 )
- RelatedCitation | Metrics
-
The paper, which is based on attack theory, presented an architecture of multi-dimensional attack classificalion. According to attack classification, attack ontology model was built, and the logical relationship and hierarchy struclure between the ontology of attack concepts were described. Finally according to attack scenario based on atomic ontology of attack, the attack on the target was realized.
-
Strategy of UDDI Superpeer Configuration Based on Vertex Weight Priority
周明强,王冬,李双庆,胡军,朱庆生. 点强度优先的UDDI超级节点部署策略[J]. 计算机科学, 2010, 37(6): 118-121.
ZHOU Ming-qiang,WANG Dong,LI Shuang-qing,HU Jun,ZHU Qing-sheng. Strategy of UDDI Superpeer Configuration Based on Vertex Weight Priority[J]. Computer Science, 2010, 37(6): 118-121. - ZHOU Ming-qiang,WANG Dong,LI Shuang-qing,HU Jun,ZHU Qing-sheng
- Computer Science. 2010, 37 (6): 118-121.
- Abstract PDF(360KB) ( 355 )
- RelatedCitation | Metrics
-
Web server registration(UDDI) is an important part of the SOA. To solve the Single Point of Failure and its expansibility in UDDI, the researches proposed some solutions such as the Affiliate Registry and Peer-to-Peer, but their effects do not meet the need. By selecting a server-node at dense network area,the papar proposed a new model SPSR-UDDI (Super Peer and Semantic Routing UDDI). The connection between nodes will be dynamically adjusted by the principle of vertex weight priority, which makes that whole time of server response be the shortest. The paper built a model of network evolvement to achieve network's self-organized evolvcment process. The paper gave our experiment results that validate the validity of new strategy.
-
Intrusion Detection Algorithm Based on Simulated Annealing and K-mean Clustering
胡艳维,秦拯,张忠志. 基于模拟退火与K均值聚类的入侵检测算法[J]. 计算机科学, 2010, 37(6): 122-124.
HU Yan-wei,QIN Zheng,ZHANG Zhong-zhi. Intrusion Detection Algorithm Based on Simulated Annealing and K-mean Clustering[J]. Computer Science, 2010, 37(6): 122-124. - HU Yan-wei,QIN Zheng,ZHANG Zhong-zhi
- Computer Science. 2010, 37 (6): 122-124.
- Abstract PDF(285KB) ( 412 )
- RelatedCitation | Metrics
-
Intrusion detection algorithms based on K-mean clustering have sensitive dependence on initial value and are easy to fall into local extremum.To solve this issue,a new intrusion detection scheme was presented by combing Simulated Annealing and K-mean clustering.The proposed algorithm usesSA to optimize the clustering pattern in the clustering analysis.It can achieve global optimization and better accuracy of the intrusion detection system.Moremover,parallelism of SA greatly quickened the convergence rate.Experiments were completed on KDD Cup 1999,and the results show that presented scheme has lower time consume,false positive rate,and false negative rate cimpared with intrusion detedtion systems based on K-mean clustering.
-
Publicly Verifiable Secret Sharing Scheme with Proactive Ability
陈养奎,于佳,郝蓉,刘红艳,许曰滨. 具有前摄能力的可公开验证秘密共享[J]. 计算机科学, 2010, 37(6): 125-127.
CHEN Yang-kui,YU Jia,HAO Rong,LIU Hong-yan,XU Yue-bin. Publicly Verifiable Secret Sharing Scheme with Proactive Ability[J]. Computer Science, 2010, 37(6): 125-127. - CHEN Yang-kui,YU Jia,HAO Rong,LIU Hong-yan,XU Yue-bin
- Computer Science. 2010, 37 (6): 125-127.
- Abstract PDF(249KB) ( 443 )
- RelatedCitation | Metrics
-
A publicly verifiable secret sharing(PVSS) scheme is a special secret sharing scheme in which the shares distributed by the dealer can be verified not only by shareholders themselves but also by any other party. However, in a normal publicly verifiable secret sharing scheme, an adversary may get the secret by attacking threshold shareholder servers for a long time. In order to deal with this problem, a publicly verifiable secret sharing scheme with proactive ability was newly proposed, which not only can publicly verify the validity of shares, but also has the property of periodically renewing shares. This makes the proposed scheme more secure than other common publicly verifiable secret sharing schemes, and makes it better satisfy security demand of various applications.
-
Flexible and Practical Scheme to Preserve Confidentiality of Sensitive Attributes in Digital Certificate
廖俊国,凌乐真,朱彬. 一种灵活实用的数字证书中敏感属性保密方案[J]. 计算机科学, 2010, 37(6): 128-130.
LIAO Jun-guo,LING Le-zhen,ZHU Bin. Flexible and Practical Scheme to Preserve Confidentiality of Sensitive Attributes in Digital Certificate[J]. Computer Science, 2010, 37(6): 128-130. - LIAO Jun-guo,LING Le-zhen,ZHU Bin
- Computer Science. 2010, 37 (6): 128-130.
- Abstract PDF(365KB) ( 372 )
- RelatedCitation | Metrics
-
In open environment, digital certificate is used in identity authentication and authorisation rrmnagement. Digital certificate often includes sensitive attributes, so the research on preserving confidentiality of sensitive attributes in digital certificate becomes concerned. This paper presented a flexible and practical scheme to preserve confidentiality of sensitive attributes in digital certificate, and analysed its security and performance. In the scheme, the different sensitive attributes in digital certificate are encrypted with different sub-keys generated from a main key. The scheme has some characteristics as follows; selectively disclosing sensitive attributes in digital certificate, simple key management, and low time cost. Based on X. 509,the presented scheme was implemented.
-
Practical Interconnection Network RPC(k) and its Routing Algorithms
邢长明,刘方爱,杨林. 一种实用的互联网络拓扑结构RPC(k)及路由算法[J]. 计算机科学, 2010, 37(6): 131-135.
XING Chang-ming,LIU Fang-ai,YANG Lin. Practical Interconnection Network RPC(k) and its Routing Algorithms[J]. Computer Science, 2010, 37(6): 131-135. - XING Chang-ming,LIU Fang-ai,YANG Lin
- Computer Science. 2010, 37 (6): 131-135.
- Abstract PDF(523KB) ( 405 )
- RelatedCitation | Metrics
-
Peterson graph has good performance in parallel and distributed computation because of its characteristics such as short diameter and regularity. Based on ring structure, a new extension of Peterson graph was proposed, and a new interconnection network, the RPC(k) network was developed. Additionally, the properties of the RPC(k) network were investigated. It was proved that RPC(k) has lower-degree connectivity, smaller network diameter, simple topology and good extensibility. On the basis of these analysis, the conditions satisfying that the network diameter and grouping ability of RPC(k) are better than the diameter and grouping ability of 2-D Torus and RP(k) interconnection networks were presented. Finally, based on the RPC(k) network we designed a set of routing algorithms which are point to-point routing, permutation routing,one-to-all routing and all-to-all routing. Their communication efficiencies are「k/2」+5,k+9,「k/2」+5 and k+9 respectively. Especially as the k increasing, the efficiencies of these routing algorithms based on RPC(k) approximate to 1/3 of which based on RP(k) network.
-
Design of Embedded Wireless Sensor Netowrk Platform Based on uC/OS-II
王峰,王健,郭忠文. 基于uC/OS-II的嵌入式无线传感器网络平台的设计[J]. 计算机科学, 2010, 37(6): 136-141.
WANG Feng,WANG Jian,GUO Zhong-wen. Design of Embedded Wireless Sensor Netowrk Platform Based on uC/OS-II[J]. Computer Science, 2010, 37(6): 136-141. - WANG Feng,WANG Jian,GUO Zhong-wen
- Computer Science. 2010, 37 (6): 136-141.
- Abstract PDF(581KB) ( 400 )
- RelatedCitation | Metrics
-
Design and realization scheme of sensor-node and sink-node in soft and hard were proposed based on the introduction of its system structure,characteirstics and function.This papers deeply researched characteirstice and kernel of the embedded RTOS uC/OS-II,and transproted the uC/OS-II successfully to the controller Nios.The mini type-TCP/IP protocol stack LwIP Realization of LwIP on uC/OS-II was introduced.
-
Research on an Adaptive Service Discovery System for MANETs
翁海斌,温元丰,金蓓弘,张彪. MANET下自适应的服务发现系统研究[J]. 计算机科学, 2010, 37(6): 142-146.
WENG Hai-bin,WEN Yuan-feng,JIN Bei-hong,ZHANG Biao. Research on an Adaptive Service Discovery System for MANETs[J]. Computer Science, 2010, 37(6): 142-146. - WENG Hai-bin,WEN Yuan-feng,JIN Bei-hong,ZHANG Biao
- Computer Science. 2010, 37 (6): 142-146.
- Abstract PDF(474KB) ( 316 )
- RelatedCitation | Metrics
-
Service discovery systems over MANETs have to face node's frequently movement, random joining or leaving, and services revoked by their owners, therefore it is a big challenge to find available services at a reasonable cost.In order to meet above challenges and improve the adaptability of the system, we proposed a system SCN4M-DL, which adopts directory-less architecture. Coupling with underlying geographical routing algorithm,we designed and implemented a ring-based service register and discovery mechanism, which leads to high success rates of discovery rectuest and also can efficiently control memory costs and network traffic. The experimental results show that SCN4M-DL can adapt well to MANETs' characteristics and the changes of service states.
-
Research on Isolation Semantics Description Based on Noninterference Theory and Automated Isolation Strategy Verification Scheme
崔隽,黄皓,陈志贤. 基于不干扰理论的隔离语义描述及隔离策略的自动化验证方法研究[J]. 计算机科学, 2010, 37(6): 147-154.
CUI Jun,HUANG Hao,CHEN Zhi-xian. Research on Isolation Semantics Description Based on Noninterference Theory and Automated Isolation Strategy Verification Scheme[J]. Computer Science, 2010, 37(6): 147-154. - CUI Jun,HUANG Hao,CHEN Zhi-xian
- Computer Science. 2010, 37 (6): 147-154.
- Abstract PDF(719KB) ( 409 )
- RelatedCitation | Metrics
-
Processes or modules isolation helps protect information from being revealed or modified and prevent processes or modules from passing error or failure to others. We proposed the semantics of isolation by noninterference theory,for the purpose of analyzing and designing isolation strategies in software systems;we also specified the semantics of isolation and its determine conditions by Communicating Sequential Process(CSP) in order for automated formal verificanon of isolation strategics in systems in formal verification tool FDR2. And in this paper, with an example of file system monitor in a virtual machine, we illustrated how to specify a system or a isolation strategy by CSP formulation and how to verify given isolation strategics in a system automatically in FDR2.
-
Full-automatic Detection of Memory Safety Violations for C Programs
杨飏,张焕国,王后珍. 一种C程序内存访问缺陷自动化检测方法研究[J]. 计算机科学, 2010, 37(6): 155-158.
YANG Yang,ZHANG Huan-guo,WANG Hou-zhen. Full-automatic Detection of Memory Safety Violations for C Programs[J]. Computer Science, 2010, 37(6): 155-158. - YANG Yang,ZHANG Huan-guo,WANG Hou-zhen
- Computer Science. 2010, 37 (6): 155-158.
- Abstract PDF(391KB) ( 390 )
- RelatedCitation | Metrics
-
Symbolic execution is an effective and automatic bug-finding method. But symbolic execution is limited in practice by the computation cost and path explosion. We presented a tool for full-automatic detection and generating inputs that lead to memory safety violations in C programs, including buffer overflow, buffer overrun and pointer dereference error. In order to reduce the amount of symbol variable, we used the symbol variable to track the length of buffer and C string. The use of symbolic buffer length makes it possible to compactly summarize the behavior of standard buffer manipulation functions. While resolving the problem of path explosion, we introduced the dynamic slicing methods to prune the redundant paths. It's shown by the experiments that our method presented in this paper not only is feasible but also has little cost.
-
Study of Test Case Generation for Web Applications
彭树深,顾庆,陈道蓄. Web应用测试用例生成研究[J]. 计算机科学, 2010, 37(6): 159-163.
PENG Shu-shen,GU Qing,CHEN Dao-xu. Study of Test Case Generation for Web Applications[J]. Computer Science, 2010, 37(6): 159-163. - PENG Shu-shen,GU Qing,CHEN Dao-xu
- Computer Science. 2010, 37 (6): 159-163.
- Abstract PDF(383KB) ( 413 )
- RelatedCitation | Metrics
-
Along with the fast evolution of Internet, Web application development has become one of the main categories of software application development,and Web application programs have become more and more complicated. Improving the duality of Web applications from different aspects is inevitable task of Web application developers. An important way of ensuring the quality of Web applications is software testing, the core work of which is test case generation. In this paper, we classified the methods for Web test case generation into four categories; Capture/Replay, HTML analysis, Source code analysis, and User-Session analysis. We discussed these four methods in detail, and concluded general steps of generating test cases in these methods. Finally, we listed the advantages and disadvantages of the four method categories,and compared their performance from various perspectives, including the effort needed to implement the method, maximum attainable code coverage, and so on.
-
Research on Thin-client Oriented Web Operating Systems
任怡,管剑波,尹虎哲,吴庆波,戴华东. 面向瘦客户端的WebOS研究[J]. 计算机科学, 2010, 37(6): 164-167.
REN Yi,GUAN Jian-bo,YIN Hu-zhe,WU Qing-bo,DAI Hua-long. Research on Thin-client Oriented Web Operating Systems[J]. Computer Science, 2010, 37(6): 164-167. - REN Yi,GUAN Jian-bo,YIN Hu-zhe,WU Qing-bo,DAI Hua-long
- Computer Science. 2010, 37 (6): 164-167.
- Abstract PDF(361KB) ( 409 )
- RelatedCitation | Metrics
-
With the development of distributed computing technologies, browser-based Web operating system (WebOS) came into being. It provides mechanisms for integrating services and resources on the Internet. And it makes services and resources available for online users regardless of where they are and when it is. WebOS represents a trend towards future use of thin client based Web applications. It has become one of the most important patterns of utilization in the coming cloud computing era. We first introduced the concepts and structure of WebOS. Then we analyzed related work and the trends of WebOS. And we also discussed the technical factors which cumber the development of WebOS. Finally,we made comprehensive research on EycOS, which is a typical open source WebOS. We analyzed EycOS's structure and APIs. hhen we extended its functions by implement a SOAP-based hravel service.
-
Dynamic Integration of Disparate Services and Distributed Data
彭树青,陈德运. 异构服务和分布式数据的动态集成[J]. 计算机科学, 2010, 37(6): 168-170.
PENG Shu-qing,CHEN De-yun. Dynamic Integration of Disparate Services and Distributed Data[J]. Computer Science, 2010, 37(6): 168-170. - PENG Shu-qing,CHEN De-yun
- Computer Science. 2010, 37 (6): 168-170.
- Abstract PDF(332KB) ( 344 )
- RelatedCitation | Metrics
-
It is very important for enterprises to utilize resources efficiently inside and outside in order to improve the efficiency. A new framework that services and data are composed dynamically based on enterprise service bus(ESB) was proposed, in which business process was analyzed into service-data flows and the weight computation method was used for evaluating the separating rationality. Dynamic routing mechanism was applied to map abstract service to service proeiders and map abstract data to datasources. Abstract service description table (ASDT),abstract service mapping table (ASMT),abstract data description table (ADDT),and abstract data mapping table (ADMT) were modified by service data muter for solving the conflicts. Finally, the method has also been applied in Yunzheng System of Hcilongjiang Province,in order to prove it's feasibility.
-
Static Analysis of Memory Leak Fault
叶俊民,魏鹏,金聪,王敬华,张清国,张维. 内存泄漏故障静态分析研究[J]. 计算机科学, 2010, 37(6): 171-175.
YE Jun-min,WEI Peng,JIN Cong,WANG Jing-hua,ZHANG Qing-guo,ZHANG Wei. Static Analysis of Memory Leak Fault[J]. Computer Science, 2010, 37(6): 171-175. - YE Jun-min,WEI Peng,JIN Cong,WANG Jing-hua,ZHANG Qing-guo,ZHANG Wei
- Computer Science. 2010, 37 (6): 171-175.
- Abstract PDF(375KB) ( 459 )
- RelatedCitation | Metrics
-
Recent researches detect memory leaks mainly through static test methods. The basic idea is to detect memory leaks by designing specific algorithm based on the control flow graph of program to be tested, but the limitations of these methods are that control flow graph doesn't contain useful information for further use, so that designed algorithms can't detect memory leaks efficiently. We defined a control flow graph for detecting memory leaks and proposed control flow graph reachable paths generating algorithm to detect and analyze memory leaks for generated paths. This method was proved by experiments to be very effective.
-
Research Based on a Method of CFCM Clustering Intrusion Detection
赵越,张为群. 一种基于CFCM的集群入侵检测方法的研究[J]. 计算机科学, 2010, 37(6): 176-178.
ZHAO Yue,ZHANG Wei-qun. Research Based on a Method of CFCM Clustering Intrusion Detection[J]. Computer Science, 2010, 37(6): 176-178. - ZHAO Yue,ZHANG Wei-qun
- Computer Science. 2010, 37 (6): 176-178.
- Abstract PDF(294KB) ( 353 )
- RelatedCitation | Metrics
-
Clustering Web flows to attain Load Balancing is widely used in Clustering Intrusion Dtection approach.Correlated ideas were improted in the traditional fuzzy C-means clustering algorithm (FCM),defined logical distance formula,and presented a Correlated fuzzy C-means clustering algorithm(CFCM).At last we applied this approach in Clustering Intrusion Detection approach,and used KDD Cup 1999 data set to do experiment.The results demonstrated the viability and effectiveness of our approach.
-
Novel Approach for Extracting XML Schema Definition Based on Content Model Graph
宁静,刘杰,叶丹. 一种基于内容模型图的XML Schema Definition的提取方法[J]. 计算机科学, 2010, 37(6): 179-185.
NING Jing,LIU Jie,YE Dan. Novel Approach for Extracting XML Schema Definition Based on Content Model Graph[J]. Computer Science, 2010, 37(6): 179-185. - NING Jing,LIU Jie,YE Dan
- Computer Science. 2010, 37 (6): 179-185.
- Abstract PDF(558KB) ( 442 )
- RelatedCitation | Metrics
-
Although XML Schema can be used to perform validation,querying and transformation on XML documents,a lot of XML documents in real applications have no XML Schema defined. This paper presented an approach, XSDInfer, to extract XMLSchema Definition (XSD) from XML documents automatically. Firstly, schema information harvesled from XML parsing was merged into the Content Model Graphs by applying rules. Then the graphs were transformed to content model expressions to generate the XSD. XSDInfer can scale to very large and deep recursive XML documents. It supports the context sensitive content model, and the generated XSD is more human-readable. Experiments show that XSDInfer achieves better performance both in scalability and expressiveness in contrast to the previous techniqucs.
-
Mining Closed Composite Sequential Patterns Efficiently
闫雷鸣,孙志挥,张柏礼,杨明,姚蓓. 有效挖掘闭合组合序列模式[J]. 计算机科学, 2010, 37(6): 186-190.
YAN Lei-ming,SUN Zhi-hui,ZHANG Bai-li,YANG Ming,YAO Pei. Mining Closed Composite Sequential Patterns Efficiently[J]. Computer Science, 2010, 37(6): 186-190. - YAN Lei-ming,SUN Zhi-hui,ZHANG Bai-li,YANG Ming,YAO Pei
- Computer Science. 2010, 37 (6): 186-190.
- Abstract PDF(466KB) ( 461 )
- RelatedCitation | Metrics
-
Sequential pattern mining has been an essential mining task and an active research area in recent years. However, existing sequential pattern mining algorithms are designed for closed itemsets or simple closed sectuential patterns,and can hardly extract composite sequential patterns, an important class of patterns consisting of several short segments separated by gaps. An efficient algorithm for mining frequent closed composite sequences with any number of segments of different lengths, CloCSP, was proposed. It adopts a novel composite strategy called Mixed Composite, which not only can produce all of closed composite sequential patterns, but also can efficiently prune the composite space and simultaneously check the sequential patterns closure, accordingly reduces the cost in both runtime and space usage. Experiments on both synthetic and real data have demonstrated that CloCSP can significantly discover all of closed composite sectuential patterns.
-
Storage Optimization for Continuous Query over Sliding Window Based on Ladder Queue
唐向红,李国徽. 滑动窗口连续查询结果存储优化[J]. 计算机科学, 2010, 37(6): 191-195.
TANG Xiang-hong,LI Guo-hui. Storage Optimization for Continuous Query over Sliding Window Based on Ladder Queue[J]. Computer Science, 2010, 37(6): 191-195. - TANG Xiang-hong,LI Guo-hui
- Computer Science. 2010, 37 (6): 191-195.
- Abstract PDF(478KB) ( 381 )
- RelatedCitation | Metrics
-
Query processing optimisation based on update pattern awareness is a new hot topic in the research field of continuous queries over sliding window. Efficiency of continuous query processing highly depends on overhead of result state maintenance. This investigation proposed a ladder ctueue with branch lists to maintain result state of continuous query. The trunk list and the branch list were designed into the ladder queue. The ladder queue used the branch lists to gather the result tuples with the identical expiration time,and employed "spawning" mechanism to achieve O(1) amortined access time complexity for result data under the different distributions. Our experiments showed that the new ladder queue can improve the performance of query processing greatly and outperforms other data structures.
-
Evaluating Model of Cache Miss in the Filtering of XML Data
沈洁,印桂生,王向辉. XML过滤中缓存失效策略的性能分析数学模型[J]. 计算机科学, 2010, 37(6): 195-199.
SHEN Jie,YIN Gui-sheng,WANG Xiang-hui. Evaluating Model of Cache Miss in the Filtering of XML Data[J]. Computer Science, 2010, 37(6): 195-199. - SHEN Jie,YIN Gui-sheng,WANG Xiang-hui
- Computer Science. 2010, 37 (6): 195-199.
- Abstract PDF(327KB) ( 387 )
- RelatedCitation | Metrics
-
One of the most important factor in the data-intensive system(ig. XML filtering engine) with memory resident is hardware cache behavior. Now, the popular researches in XML filtering are based on the automata to express the XML query. In this paper, we studied the cache performance of XML filtering based on the automata by the analytical modeling and system measurement, and estimated the cache miss in the infra-round model and inter-round model instead of the general estimation in the cache. Our results show that our estimation engine has more accuracy.
-
Ontology-based Natural Language Interface to Relational Databases
李虎,田金文,王缓缓,石勇. 基于Ontology的数据库自然语言查询接口的研究[J]. 计算机科学, 2010, 37(6): 200-205.
LI Hu,TIAN Jin-wen,WANG Huan-huan,SHI Yong. Ontology-based Natural Language Interface to Relational Databases[J]. Computer Science, 2010, 37(6): 200-205. - LI Hu,TIAN Jin-wen,WANG Huan-huan,SHI Yong
- Computer Science. 2010, 37 (6): 200-205.
- Abstract PDF(464KB) ( 620 )
- RelatedCitation | Metrics
-
This paper proposed an approach to creating an ontology-based natural language interface to relational databases which allows end-users to access and query information in database with a natural language. In order to strengthen the reliability and the user-friendliness of the system, our approach integrates WordNet as the base lexicon and ontology as the knowledge base of the semantic interpreter. The user inputs will be first translated into a syntax tree by syntax analysis and parsing, then it will be translated into an intermediate expression language DRS by the ontology-based semantic interpreter. The SQL generator transfers DRS expressions into SQL sentences by a template technictue. The DBMS executes SQL sentences and returns the final result.This paper presented the framework based on ontology technictues to implement portable NLIDBs that makes it easier to migrate from one domain to another. The prototype system and our experiments show that our approach has generated good results with excellent performance on common queries.
-
New Spatial Query Language Based on GIS
徐承志,许承瑜,钱铁云. 基于GIS系统的空间查询语言[J]. 计算机科学, 2010, 37(6): 206-210.
XU Cheng-zhi,Phillip SHEU Chen-yu,QIAN Tie-yun. New Spatial Query Language Based on GIS[J]. Computer Science, 2010, 37(6): 206-210. - XU Cheng-zhi,Phillip SHEU Chen-yu,QIAN Tie-yun
- Computer Science. 2010, 37 (6): 206-210.
- Abstract PDF(481KB) ( 484 )
- RelatedCitation | Metrics
-
At present, the mainstream of spatial query languages are extended from SFA SQL or SQL/MM Spatial,two international standards. All these two standards for spatial query and spatial analysis are function style. When search conditions increase,function style language will become too complex to be used by normal user, and too inefficent to execute. In this paper, a new spatial query language, Semantic Query Description Language for Geography (SQDL-G),based on GIS was proposed. The language converts spatial predicates into spatial operators and introduces sulrquery structure. An execute engine of this language was built up based on ArcGIS platform. Experiments showed that this language has an expression of a flexible, clear structure, and easy to user acceptance.
-
Research of Personalized Methods of Information Retrieval
王俊义,叶新铭. 个性化信息检索方法研究[J]. 计算机科学, 2010, 37(6): 211-213.
WANG Jun-yi,YE Xin-ming. Research of Personalized Methods of Information Retrieval[J]. Computer Science, 2010, 37(6): 211-213. - WANG Jun-yi,YE Xin-ming
- Computer Science. 2010, 37 (6): 211-213.
- Abstract PDF(236KB) ( 358 )
- RelatedCitation | Metrics
-
Personalization to information retrieval is very useful in information retrieval, the user profile can be used to represent the favorites or interests of an user. Many approaches to personali}ation have been studied in expanding query with user profile. We proposed a navel method which use the context of long-term user profile with multiple-domain to expand query model under the unigram language modeling framework, uses the new query model to retrieve and get more interesting results for users. Then combined with psudo-elevance feedback model, the method get better performance. Experimental results show that the proposed method is effective.
-
Research on Null Values in Probabilistic XML Database
周智增,王新军. XML概率数据库中空值处理方法研究[J]. 计算机科学, 2010, 37(6): 214-216.
ZHOU Zhi-zeng,WANG Xin-jun. Research on Null Values in Probabilistic XML Database[J]. Computer Science, 2010, 37(6): 214-216. - ZHOU Zhi-zeng,WANG Xin-jun
- Computer Science. 2010, 37 (6): 214-216.
- Abstract PDF(227KB) ( 414 )
- RelatedCitation | Metrics
-
Uncertainty and Incompleteness are a real-world challenges of the database. The combination of NULL value and probabilistic XML database can better deal with data, but also increase the complexity of the database. We proposed two interpretation what means the null value in the XML probabilistic database, one of them can generate probabilistic interval,so we presented a compromise solution to the probabilistic interval problem in probabilistic XML database with NULL value. Finally, we proposed an Nth moment method for anglicizing probabilistic database comprehensively.
-
Study on Delegation Revocation in Attribute Supported Delegation Model
叶春晓,符云清. 支持属性委托模型中委托撤销研究[J]. 计算机科学, 2010, 37(6): 217-219.
YE Chun-xiao,FU Yun-qing. Study on Delegation Revocation in Attribute Supported Delegation Model[J]. Computer Science, 2010, 37(6): 217-219. - YE Chun-xiao,FU Yun-qing
- Computer Science. 2010, 37 (6): 217-219.
- Abstract PDF(246KB) ( 319 )
- RelatedCitation | Metrics
-
In Attribute Supported Delegation Model (ABDM) , dclegatee must satisfy both delegation prerequisite condilion (CR) and delegation attribute expression (DAE) when assigned to a delegation role. In AI3DM, revocation focuses on how to revoke those delegated roles or permissions from delegatee. This paper first introduced two new sorts of revocations,which bring about priority between multi step delegation and revocation. hhen analyzed the relation between delegation and revocation and proposed two solutions; "first rectuest first response" and "revocation first then delegalion". We also discussed different situations fitting these two solutions.
-
Application of Hypergraph in Data Mining
崔阳,杨炳儒. 超图在数据挖掘领域中的几个应用[J]. 计算机科学, 2010, 37(6): 220-222.
CUI Yang,YANG Bing-ru. Application of Hypergraph in Data Mining[J]. Computer Science, 2010, 37(6): 220-222. - CUI Yang,YANG Bing-ru
- Computer Science. 2010, 37 (6): 220-222.
- Abstract PDF(253KB) ( 1269 )
- RelatedCitation | Metrics
-
The development of data mining is tightly related to the application of new theories and methods. Definition of hypergraph is based on Graph Theory and Set Theory, and has been used in data mining recent years. Some important concepts of hypergraph were given at first. Then the application on Maradbcm algorithm, clustering and spatial data mining was introduced.
-
Evaluation of the Scoring Policies in National Admission and Examination of Colleges and Universities Using Data Warehouse and OLAP
蔡海敏,张自力,曾铮,殷员分. 基于数据仓库与联机分析技术的高考加分政策评估[J]. 计算机科学, 2010, 37(6): 223-225236.
CAI Hai-min,ZHANG Zi-li,ZENG Zheng,YIN Yuan-fen. Evaluation of the Scoring Policies in National Admission and Examination of Colleges and Universities Using Data Warehouse and OLAP[J]. Computer Science, 2010, 37(6): 223-225236. - CAI Hai-min,ZHANG Zi-li,ZENG Zheng,YIN Yuan-fen
- Computer Science. 2010, 37 (6): 223-225236.
- Abstract PDF(364KB) ( 365 )
- RelatedCitation | Metrics
-
National Admission and Examination of Colleges and Universities (NAECU) gets in closer and closer touch with the national economy and the people's livelihood. hhe Scoring Politics in NAECU arc becoming one of key issues of the Provinces and Cities Admission Offices (PCAO) , and attract the attention of every examinee as well as the whole society. Currently there is no systematic and scientific way to evaluate the Scoring Policies. ho this end, data warehouse and OLAP technology were employed to analyze the data accumulated in the past years in a province. I3y multi dimensional analysis of the data, some interesting results were found and presented in the paper. Based on these findings, the evaluation scheme for Scoring Policies in NAECU was then given. hhis scheme can provide decision making support when introducing new scoring policies.
-
Improved Collaborative Filtering Recommendation Algorithm
王茜,王均波. 一种改进的协同过滤推荐算法[J]. 计算机科学, 2010, 37(6): 226-228243.
WANG Qian,WANG Jun-bo. Improved Collaborative Filtering Recommendation Algorithm[J]. Computer Science, 2010, 37(6): 226-228243. - WANG Qian,WANG Jun-bo
- Computer Science. 2010, 37 (6): 226-228243.
- Abstract PDF(367KB) ( 586 )
- RelatedCitation | Metrics
-
When searching the nearest neighbor set, the traditional collaborative filtering algorithm ignores the impact of the time factor, only from the user or item takes into account the similarity of the user or item unilaterally, and ignores the impact of user characteristics on recommendation. Aiming to the above problems, we introduced the time forgotten function, resources viscosity function and the user feature vector, and improved the process of finding the user's nearest neighbor set, reflected the time effect, degree of user preferences and user characteristics, and tested this new methodology on data set got from MovicLens. I}hc results of experiment show that proposed method can improve the accuracy of the prediction.
-
MPI Runtime Parameters Tuning Based on Neural Network on Multi-core Clusters
王洁,曾宇,张建林. 多核机群下基于神经网络的MPI运行时参数优化[J]. 计算机科学, 2010, 37(6): 229-232.
WANG Jie,ZENG Yu,ZHANG Jian-lin. MPI Runtime Parameters Tuning Based on Neural Network on Multi-core Clusters[J]. Computer Science, 2010, 37(6): 229-232. - WANG Jie,ZENG Yu,ZHANG Jian-lin
- Computer Science. 2010, 37 (6): 229-232.
- Abstract PDF(361KB) ( 479 )
- RelatedCitation | Metrics
-
The new features of multi core add the optimization space for MPI applications, and besides tuning MPI runtime parameters is a common practice perceived to optimize the MPI application performance. However, the best configuration of the runtime parameters not only depends on the underlying architecture of a specific multi-core cluster but also on the features of MPI application. We constructed and analyzed an effective tuning model bases on artificial neural network to automatically predict the near-optimal configuration of runtime parameters for any unseen input programs under the current multi-core cluster. Experimental results from two different benchmarks were presented to show effectiveness of our approach. We observed that the speedup gained by the predicted runtime parameters can averagely achieve 95% of the speedup gained by the best parameters configuration.
-
Novel Approach of Ontology Mapping Extraction SME
夏红科,郑雪峰,胡祥. 一种新的本体映射发现方法SME[J]. 计算机科学, 2010, 37(6): 233-236.
XIA Hong-ke,ZHENG Xue-feng,HU Xiang. Novel Approach of Ontology Mapping Extraction SME[J]. Computer Science, 2010, 37(6): 233-236. - XIA Hong-ke,ZHENG Xue-feng,HU Xiang
- Computer Science. 2010, 37 (6): 233-236.
- Abstract PDF(321KB) ( 321 )
- RelatedCitation | Metrics
-
Ontology mapping is the foundation of semantic query and semantic integration based on ontology. As the crucial point of ontology mapping, the task of mapping extraction is to find whether there exists the ontology mapping among the similarities between source ontology and target ontology. In this paper the problem of mapping extraction was regarded as the problem of set covering, and a novel ontology mapping extraction algorithm based on set covering SME (SCM-based Mapping Extraction) was proposed, by which the property set that covers the training data set in maximum degree was searched during training stage, and the mapping extraction was carried out by means of the conjunction of the properties of property set in testing data set during testing stage. Experimental evaluations show that this method has better comprehensive performances compared with other algorithms.
-
Story Link Detection Research Based on the Dynamic Extraction of Correlative Word
赵华,邓攀,张建伟. 基于关联词对动态抽取的报道关系检测技术研究[J]. 计算机科学, 2010, 37(6): 237-239270.
ZHAO Hua,DENG Pan,ZHANG Jian-wei. Story Link Detection Research Based on the Dynamic Extraction of Correlative Word[J]. Computer Science, 2010, 37(6): 237-239270. - ZHAO Hua,DENG Pan,ZHANG Jian-wei
- Computer Science. 2010, 37 (6): 237-239270.
- Abstract PDF(337KB) ( 333 )
- RelatedCitation | Metrics
-
Story link detection is a task of topic detection and tracking, which is to detect whether two stories arc "linked",or discuss the same event This paper proposed a story link detection method based on the dynamic extraction of correlative word. Correlative word is defined to be a pair of words that satisfy certain Relation Restriction. In this paper, relation restriction refers to a set of features. hhis paper explored three features, which include the initial letter, locanon and window. The more two stories had the same correlative words, the larger similarity they had. Experimental results showed that the story link detection method based on the dynamic extraction of correlative word performs very well, which testifies the great capabilities of this method. We also find that relation restriction is critical to the performance of this method.
-
Improved Virus-evolutionary Genetic Algorithm Based on Fauna Structure
顾民,杨峰. 基于动物群落结构的改进病毒进化遗传算法[J]. 计算机科学, 2010, 37(6): 240-243.
GU Min,YANG Feng. Improved Virus-evolutionary Genetic Algorithm Based on Fauna Structure[J]. Computer Science, 2010, 37(6): 240-243. - GU Min,YANG Feng
- Computer Science. 2010, 37 (6): 240-243.
- Abstract PDF(360KB) ( 342 )
- RelatedCitation | Metrics
-
An improved virus evolutionary genetic algorithm based on fauna structure was proposed in this paper. The host population is consisted of a father and several mothers and several bachelors. Crossover is occurred between the father and the mothers to produce offspring. Mutation is occurred among the bachelors to produce offspring. Virus is divided into big virus and small virus. In the previous iteration, big virus works and in the latter iteration, small virus works. The instances verified that the improved virus-evolutionary genetic algorithm outperforms the tradition virus-evolutionary genetic algorithm.
-
Analysis of Profit for Internet Service Provider Based on Multipath Inter-domain Routing
李丹,汪斌强,尹婷,马海龙. 域间多径路由条件下的运营商收益问题分析[J]. 计算机科学, 2010, 37(6): 244-247.
LI Dan,WANG Bin-qiang,YIN Ting,MA Hai-long. Analysis of Profit for Internet Service Provider Based on Multipath Inter-domain Routing[J]. Computer Science, 2010, 37(6): 244-247. - LI Dan,WANG Bin-qiang,YIN Ting,MA Hai-long
- Computer Science. 2010, 37 (6): 244-247.
- Abstract PDF(347KB) ( 373 )
- RelatedCitation | Metrics
-
The multipath inter-domain routing is a complex topic, but profits of Internet Service Provider(ISP) are one of the most important factors for the prospect. We established an optimization model for profit of ISP based on the user's utilities. Then, the incensement of profit from singl}path routing to multipath routing and the impact of relevant factors were analyzed. Through theoretical analysis and simulation experiments,we found that ISP can acquire more profit when multipath routing was deployed. Moreover, it can offer better service for more users and delay sensitive traffics.
-
Approaches for Incrementally Updating Approximations under Characteristic Relation-based Rough Sets While Attribute Values Coarsening and Refining
刘伟斌,李天瑞,邹维丽,胡成祥. 特性关系粗糙集下属性值粗化细化时近似集增量更新方法研究[J]. 计算机科学, 2010, 37(6): 248-251.
LIU Wei-bin,LI Tian-rui,ZOU Wei-li,HU Cheng-xiang. Approaches for Incrementally Updating Approximations under Characteristic Relation-based Rough Sets While Attribute Values Coarsening and Refining[J]. Computer Science, 2010, 37(6): 248-251. - LIU Wei-bin,LI Tian-rui,ZOU Wei-li,HU Cheng-xiang
- Computer Science. 2010, 37 (6): 248-251.
- Abstract PDF(287KB) ( 359 )
- RelatedCitation | Metrics
-
An incomplete information system is a generalization of an information system, which has wide applications in many domains. The approximations of concepts may vary when the information system is dynamically changing. It is meaningful to study how to update the approximations by using the original information. `hhe dynamic changes of information systems can be considered in the three aspects:the coarsening and refining of attribute valucs,the attribute set and the object set, This paper only focused on the approaches for updating approximations when coarsening and refining attribute values. The definitions of attribute values coarsening and refining in the incomplete information system were given. I}hen approaches for updating the approximations were discussed when coarsening and refining attribute values under the characteristic relation. Finally, several examples were given to illustrate the validity of the proposed approaches.
-
Multi-robot Mission Planning Algorithm and its System Implementation
余伶俐,焦继乐,蔡自兴. 一种多机器人任务规划算法及其系统实现[J]. 计算机科学, 2010, 37(6): 252-255.
YU Ling-li,JIAO Ji-le,CAI Zi-xing. Multi-robot Mission Planning Algorithm and its System Implementation[J]. Computer Science, 2010, 37(6): 252-255. - YU Ling-li,JIAO Ji-le,CAI Zi-xing
- Computer Science. 2010, 37 (6): 252-255.
- Abstract PDF(338KB) ( 512 )
- RelatedCitation | Metrics
-
We proposed a centralized ant colony planning approach for multirobot mission planning problem. The task allocation model and route planning model of ant colony algorithm description were built, meanwhile, local search strategy was utilized to improve ant colony algorithm assignment effect. At last, we achieved a centralized multi-robot mission planning system for experiments analysis. The results show that ant colony algorithm can solve the multi-robot mission planning problem effectively,and provide a new idea for multi-robot coordination mechanisms.
-
Novel Hierarchical Immune Algorithm for TSP Solution
吴建辉,章兢,张小刚,刘朝华. 一种求解TSP问题的分层免疫算法[J]. 计算机科学, 2010, 37(6): 256-260.
WU Jian-hui,ZHANG Jing,ZHANG Xiao-gang,LIU Zhao-hua. Novel Hierarchical Immune Algorithm for TSP Solution[J]. Computer Science, 2010, 37(6): 256-260. - WU Jian-hui,ZHANG Jing,ZHANG Xiao-gang,LIU Zhao-hua
- Computer Science. 2010, 37 (6): 256-260.
- Abstract PDF(479KB) ( 391 )
- RelatedCitation | Metrics
-
In order to solve traveling salesman problem more efficiently using artificial immune algorithm, a two-floor model based on multiple sub-populations immune evolution as well as hierarchical local optimization immunodominance clonal selection algorithm(HLOICSA) was put forward. I}o quickly obtain the global optimum,multiple sulrpopulations were operated by bottom floor immune operators:local optimization immunodominance, clonal selection, antibody diversity amelioration based on locus information entropy, multiple sub-populations were also operated by top floor genetic operators; selection, crossover, mutation. I}hrough those operators, diversity of antibody sulrpopulation distribution and excellent antibody affinity maturation was enhanced, the balance between in the depth and breadth of the search-optimizing was acquired. Experimental results indicate that the algorithm has a remarkable quality of the global convergence reliability and convergence velocity.
-
Text Sentiment Classification Research Based on Semantic Comprehension
闻彬,何婷婷,罗乐,宋乐,王倩. 基于语义理解的文本情感分类方法研究[J]. 计算机科学, 2010, 37(6): 261-264.
WEN Bin,HE Ting-tingL,LUO Le,SONG Le,WANG Qian. Text Sentiment Classification Research Based on Semantic Comprehension[J]. Computer Science, 2010, 37(6): 261-264. - WEN Bin,HE Ting-tingL,LUO Le,SONG Le,WANG Qian
- Computer Science. 2010, 37 (6): 261-264.
- Abstract PDF(316KB) ( 467 )
- RelatedCitation | Metrics
-
Text sentiment classification is used widely, such as information filtering, information security and information recommendation. This paper proposed an improved method based on semantic comprehension. In this paper, sentiment primitive was introduced into sentiment terms identification, and then semantic values of phrases were obtained.Furthermore, this paper further analysed adverbs and its influence on identification of text orientation in the semantic level and achieved the text sentiment classification. I}he experimental results show that the proposed approach is suitable for judging sentiment orientation.
-
Rules Reduction for Decision Table Based on Cloud Model
代劲,何中市. 基于云模型的决策表规则约简[J]. 计算机科学, 2010, 37(6): 265-267.
DAI Jin,HE Zhong-shi. Rules Reduction for Decision Table Based on Cloud Model[J]. Computer Science, 2010, 37(6): 265-267. - DAI Jin,HE Zhong-shi
- Computer Science. 2010, 37 (6): 265-267.
- Abstract PDF(335KB) ( 338 )
- RelatedCitation | Metrics
-
Through decision table transformation, the rules were mapped to cloud vectors. The equivalence relations betwecn the rules were reckoned using the similarity between the cloud vectors' digital characteristics. On this basis, a rules reduction algorithm for decision table based on cloud model was proposed. It not only resolves the problem that the ectuivalence relation based on rough set theory doesn't distinguish the similar relationship because it requires matcking strictly each attribute, but also overcomes the shortcomings that the equivalence relation based on fuzzy set relics on the priori knowledge and considers inadequate to the random distribution of attributes. Experiments show the algorithm has high performance.
-
Improved Particle Swarm Algorithm Based on Arnold Map
王峻慧. 基于Arnold映射的改进粒子群算法[J]. 计算机科学, 2010, 37(6): 268-270.
WANG Jun-hui. Improved Particle Swarm Algorithm Based on Arnold Map[J]. Computer Science, 2010, 37(6): 268-270. - WANG Jun-hui
- Computer Science. 2010, 37 (6): 268-270.
- Abstract PDF(243KB) ( 339 )
- RelatedCitation | Metrics
-
Particle swarm optimization is one of the heuristic global optimization algorithms, which has attracted vast attendons of researchers. Based on the analysis of the current improved algorithm, one improved algorithm was proposed in this paper, which employs Arnold chaotic map and one dimension disturbance term to improve the particle swarm algorithm. In the proposed algorithm, the researching ability of global optimization of particle swarm is enhanced through the improving of single particle. The simulation results show that the algorithm can keep the populations diversity better, and the performance of the particle swarm is increased notably.
-
Communicating in Resource-constrained Multi-Agent Systems
赵杰,杨柳,李树平. 资源受限的多Agent系统通信研究[J]. 计算机科学, 2010, 37(6): 271-272.
ZHAO Jie,YANG Liu,LI Shu-ping. Communicating in Resource-constrained Multi-Agent Systems[J]. Computer Science, 2010, 37(6): 271-272. - ZHAO Jie,YANG Liu,LI Shu-ping
- Computer Science. 2010, 37 (6): 271-272.
- Abstract PDF(164KB) ( 329 )
- RelatedCitation | Metrics
-
Agents with partial obscrvability need to share information to achieve decentralized coordination. However, in resource-constrained systems,indiscriminate communication can create performance bottlenecks by consuming valuable bandwidth. Therefore, there is a tradeoff between the utility attained by communication and its cost. Here we addressed this tradeoff by developing a novel strategy to make communication selective based on information redundancy, ensuring communication only occurs when necessary, while maintaining acceptable coordination.
-
Psychological Analysis of Trends Intelligent Network Model
靳宇倡,秦启文,安俊秀. 网络群体心理趋势智能分析模型研究[J]. 计算机科学, 2010, 37(6): 273-277.
JIN Yu-chang,QIN Qi-wen,AN Jun-xiu. Psychological Analysis of Trends Intelligent Network Model[J]. Computer Science, 2010, 37(6): 273-277. - JIN Yu-chang,QIN Qi-wen,AN Jun-xiu
- Computer Science. 2010, 37 (6): 273-277.
- Abstract PDF(456KB) ( 495 )
- RelatedCitation | Metrics
-
Network groups arc a virtual gathering but real group phenomenon with the rapid expansion of Internet users. Because of the Internet privacy and freedom, the Internet community can more really represent their own point of view aiming at a thing phenomenon. Psychological hrcnds Network is a comprehensive psychology, cloud computing, information retrieval,natural language processing,statistical theory and methods such as multi-disciplinary design of the intelligent model. Constructed the program flow at the core of the network group model of intelligent analysis of psychological trend in architecture, breaking the data stream programs to address the cloud computing model software hottleneck. Further researched the design and realization of the core module in intelligent analysis model structure. And the college students Internet Group's 30000 texts were used to test the model, the test showed that the model can efficiently realize the psychological trend of population characteristics of the network, give the user a real feelings through the cloud and the structural equation model.
-
QPSO-based Multi-instance Learning for Image Annotation
李大湘,彭进业,卜起荣. 基于QPSO-MIL算法的图像标注[J]. 计算机科学, 2010, 37(6): 278-282.
LI Da-xiang,PENG Jin-ye,BU Qi-rong. QPSO-based Multi-instance Learning for Image Annotation[J]. Computer Science, 2010, 37(6): 278-282. - LI Da-xiang,PENG Jin-ye,BU Qi-rong
- Computer Science. 2010, 37 (6): 278-282.
- Abstract PDF(528KB) ( 320 )
- RelatedCitation | Metrics
-
In most existing training data set for image annotation, keywords are usually associated with images instead of individual regions, so it is difficult to use supervised learning methods for image annotation. In this paper, based on quantum-behaved particle swarm optimization algorithm(QPSO) , a novel multi instance learning (MIL) algorithm was presented( QPSO-MIL),we formulated image annotation as a supervised learning problem under Multiple-Instance Learning framework. This algorithm regards every image as a bag, and the feature vectors of the segmented regions in this image as instances. We defined a fitness vector for each particle based on the diversity density(Dl)) function. In the instance feature space we used QPSO to search the global maxima of DD function in each dimension simultaneously, and took the result as a concept point of the keyword,finally assigned corresponding key words to a test image according to the Bayesian maximum a posteriori probability criteria. Experimental results on ECCV 2002 data set indicated that the QPSO-MIL method is effective.
-
Fast Algorithm for Multi-frame Selection with Jointly Optimization of Fractional Pixel Motion Estimation
陆寄远,孙少晖,朝红阳. 联合分数运动估计优化的多参考帧快速选择算法[J]. 计算机科学, 2010, 37(6): 283-285.
LU Ji-yuan,SUN Shao-hui,CHAO Hong-yang. Fast Algorithm for Multi-frame Selection with Jointly Optimization of Fractional Pixel Motion Estimation[J]. Computer Science, 2010, 37(6): 283-285. - LU Ji-yuan,SUN Shao-hui,CHAO Hong-yang
- Computer Science. 2010, 37 (6): 283-285.
- Abstract PDF(358KB) ( 363 )
- RelatedCitation | Metrics
-
Multi-frame and fractional pixel motion compensation technology improve the video coding performance at expense of the high memory consumption and computational complexity. We proposed a jointly optimized algorithm for these two technologies by analyzing the connection between them. Firstly, the composed MVs were used to select the candidate reference frame set. Secondly, fractional pixel motion estimation was only applied on the reference frame which has the optimal predicted residual based on a two-dimension polynomial model. According to our experiments, a reduction of 60% execution time is attained while still maintaining the same R-D performance with H. 264 Joint Model(JM).
-
Face Recognition Using Kernel Maximum Scatter Difference Discriminant Analysis
杜海顺,李玉玲,汪凤泉,张帆. 一种核最大散度差判别分析人脸识别方法[J]. 计算机科学, 2010, 37(6): 286-288.
DU Hai-shun,LI Yu-ling,WANG Feng-quan,ZHANG Fan. Face Recognition Using Kernel Maximum Scatter Difference Discriminant Analysis[J]. Computer Science, 2010, 37(6): 286-288. - DU Hai-shun,LI Yu-ling,WANG Feng-quan,ZHANG Fan
- Computer Science. 2010, 37 (6): 286-288.
- Abstract PDF(313KB) ( 377 )
- RelatedCitation | Metrics
-
An efficient nonlinear subspace learning method, kernel maximum scatter difference discriminant analysis (KMSI),was proposed for face recognition in this paper. The main idea of KMSI)is to map the input sample data into feature space by nonlinear function, and then adopt maximum scatter difference discriminant analysis(MSD) to find the solution in feature space by kernel trick. The experimental results on the Yale and ORL face image database show that the proposed KMSI)method for face recognition has higher recognition rate and more effective.
-
Anomaly Detection Method Based on Random Field for Hyperspectral Imagery
杜博,张良培,李平湘,钟燕飞,陈涛. 一种基于随机场模型的高光谱影像目标探测算法[J]. 计算机科学, 2010, 37(6): 289-292.
DU Bo,ZHANG Liang-pei,LI Ping-xiang,ZHONG Yan-fei,CHEN Tao. Anomaly Detection Method Based on Random Field for Hyperspectral Imagery[J]. Computer Science, 2010, 37(6): 289-292. - DU Bo,ZHANG Liang-pei,LI Ping-xiang,ZHONG Yan-fei,CHEN Tao
- Computer Science. 2010, 37 (6): 289-292.
- Abstract PDF(341KB) ( 462 )
- RelatedCitation | Metrics
-
This paper presented an anomaly detection method based on random field model in order to introduce the spatial information between the neighborhood pixels in the hyperspectral imagery into the anomaly detection procedure and reduce the area for detection. In our method, the pixels' neighborhood relationship in the hyperspectral imagery was described by the Random Field model. I}hen this neighborhood relationship information between pixels was introduced into the local-region anomaly detector which uses a nested dual window to detect probable anomaly pixels. Experiments show that this method performs better than the traditional RX-algorithm, especially for the larger anomaly targets which usually contains several neighborhood pixels and with better efficiency.
-
RapidIO User-level Communication Interface Realization Based on RDMA
冀映辉,张建东,蔡炜,蔡惠智. 基于RDMA的Rapidl0用户态通信接口实现[J]. 计算机科学, 2010, 37(6): 293-296.
JI Ying-hui,ZHANG Jian-dong,CAI Wei,CAI Hui-zhi. RapidIO User-level Communication Interface Realization Based on RDMA[J]. Computer Science, 2010, 37(6): 293-296. - JI Ying-hui,ZHANG Jian-dong,CAI Wei,CAI Hui-zhi
- Computer Science. 2010, 37 (6): 293-296.
- Abstract PDF(346KB) ( 518 )
- RelatedCitation | Metrics
-
As a high performance interconnect protocol in embedded system,RapidIO promises a better performance by taking advantage of Remote Direct Memory Access operations. At present, the only accessible RapidIO communication interface is Ethernet simulator, which limits the communication performance of RapidIO. In accordance with the characte-ristics of RapidIO protocols,this paper put forward a RapidIO user-level communication interface based on RDMA by making reference to the various methods of communication protocols based on RDMA at home and broad. After that,the author validated the performance of this communication interface, and made its implementation to achieve optimizalion through various ways. I3y comparison, this RapidIO user-level communication interface is known to gain the highest throughput in all the present Rapidl0 communication interface.
-
Research on Row Buffer Hit Prediction for Memory Access
王得利,高德远,王党辉,孙华锦. 存储器行缓冲区命中预测研究[J]. 计算机科学, 2010, 37(6): 297-302.
WANG De-li,GAO De-yuan,WAND Dang-hui,SUN Hua-jin. Research on Row Buffer Hit Prediction for Memory Access[J]. Computer Science, 2010, 37(6): 297-302. - WANG De-li,GAO De-yuan,WAND Dang-hui,SUN Hua-jin
- Computer Science. 2010, 37 (6): 297-302.
- Abstract PDF(525KB) ( 438 )
- RelatedCitation | Metrics
-
Memory system becomes a bottleneck for the overall computer system performance. This paper reduced the average memory access latency using the characteristics of DRAM. Firstly, the control strategy for memory row buffer was studied. Secondly,a Read and Write Separated Predictor (RWS) for page mode prediction was proposed,a two saturated counter and a two level predictor to realize RWS were also proposed. Finally, a simulation platform based on SimpleScalar was constructed to evaluate the proposed predictors. The result shows that compared with CLOSE strategy, the average memory access latency is reduced about 26%, the average IPC speedup is about 4. 3 %. It is also shown that the average memory access latency is reduced about 19. 6%,the average IPC speedup is about 2. 5% Compared with OPEN strategy.