• Volume 8,Issue 2,1997 Table of Contents
    Select All
    Display Type: |
    • A SOFTWARE CONTROLLED DATA PREFETCHING SCHEME BASED ON WEAK ORDER CONSISTENCY MODEL

      1997, 8(2):81-86.

      Abstract (3761) HTML (0) PDF 435.20 K (4756) Comment (0) Favorites

      Abstract:This paper presents a software controlled data prefetching scheme to overcome the delay of remote memory accesses in the physically distributed and logically shared memory system. With the information provided by the parallel programs respecting weak order consistency model, prefetch operations can be arranged at synchronization points to get the data before they are used. This scheme can effectively hide the large latency of non uniform memory access architechtrol model through block operations.

    • RELATION GRAPH GRAMMAR AND ITS APPLICATION

      1997, 8(2):87-92.

      Abstract (4244) HTML (0) PDF 374.49 K (4839) Comment (0) Favorites

      Abstract:It's difficult to describe 2 _D objects and more complicated ones with string grammar, for it can't be used to define the complex relations among them. This paper presents the concept of relation graph and its properties. As a new type of grammar, relation graph grammar is able to abstract the attributes of complicated objects conveniently and provide tools to analyze and recognize them. Relation graph grammar can be used in many fields such as pattern recognition, high dimensional text analysis and visual languages. To make the grammar applicable, the recognition and the matching algorithms of it are also introduced respectively.

    • MATHEMATICAL FORMULA OF EVALUATING THE RATIONALITY OF SUBJECT DATABASES

      1997, 8(2):93-98.

      Abstract (3955) HTML (0) PDF 373.65 K (4742) Comment (0) Favorites

      Abstract:In this paper, the authors state the concept about subject database, then give an abstract, description of enterprise model and present entity affinity, entity set affinity and the formula evaluating the rationality of enterprise subject databases. Some examples to verify the formula are shown. Finally, the purposes of the formula are pointed out.

    • SECURITY RESEARCH FOR MICRO KERNEL BASED NATIONALIZED OPERATING SYSTEM

      1997, 8(2):99-106.

      Abstract (3885) HTML (0) PDF 550.97 K (4895) Comment (0) Favorites

      Abstract:This paper discusses the security design for nationalized COSIX V2.0 operating system. Through the discussion of micro kernel based multi server architecture of COSIX V2.0, the security design scheme of COSIX is formed. Finally, some issues are proposed with regard to security design in such an architecture.

    • A UNIFIED FRAMEWORK FOR PROGRAM VERIFICATION

      1997, 8(2):107-114.

      Abstract (3282) HTML (0) PDF 520.95 K (4984) Comment (0) Favorites

      Abstract:This paper presents a simpler approach in which both a program and its properties are specified by formulas in the same logic: the temporal logic. A transition module of a program is defined and the notion of temporal run semantics, which is a temporal formula precisely characterizing the program is presented. Taken temporal logic as specification language, the correctness of a program means that the formula specifying the program implies the formula specifying the property, where implies is ordinary logical implication. Therefore this approach gives a unified framework for specifying and verifying concurrent programs and allows a full utilization of the existing comprehensive proof systems developed for proving temporal properties of systems. A simple example of a buffer system is presented to illustrate this method and show that the approach is very promising.

    • A GRAPH LAYOUT AND EDIT SYSTEM

      1997, 8(2):115-121.

      Abstract (3581) HTML (0) PDF 933.96 K (4883) Comment (0) Favorites

      Abstract:This paper describes GLEAM a graph layout and edit system. The authors present an algorithm for drawing general graphs. It needs fewer time than other algorithms for drawing graphs, and can lay graph nicely out. The system is extendible. User can add some special knowledge into the system easily, and make the system for special application.

    • SOLVING FILE ALLOCATION PROBLEM BASED ON GENETIC ALGORITHMS

      1997, 8(2):122-127.

      Abstract (3394) HTML (0) PDF 374.28 K (4559) Comment (0) Favorites

      Abstract:FAP(file allocation problem) is a very important problem in computer network and distributed system. This paper presented a new method to solve FAP based on genetic algorithms. The method can well solve optimal file allocation problem in engineering. The method can be also applied in other situations besides the FAP, in those situations resources need to be allocated.

    • THE IMPROVEMENT OF A SIMPLE THRESHOLD SCHEME

      1997, 8(2):128-136.

      Abstract (4012) HTML (0) PDF 557.67 K (4248) Comment (0) Favorites

      Abstract:Secret sharing is an effective technique for key management,and has been widely used in many aspects of data security.The existing(k,n)threshold schemes for the secret sharing are relatively complex and the data expansion they cause is remarkable. In this paper,a label assignment method is suggested for reducing the data expansion of a simple threshold scheme.The effect of the improved scheme is obvious and its security is ensured too.Such scheme can be used in the secret sharing of the data on a large scale such as images.

    • A NEW EVOLUTIONARY ALGORITHM BASED ON FAMILY EUGENICS

      1997, 8(2):137-144.

      Abstract (3751) HTML (0) PDF 534.89 K (4890) Comment (0) Favorites

      Abstract:Several popular approaches of simulated evolution have been developed separately.These approaches emphasize different facets of the natural evolutionary processes,respectively.One has recognized that the simulated evolution will benefit from the adequate combination between the approaches.This paper characterizes the primary difference among existing approaches as the difference between genetic link and behavioral link.A new model of simulated evolution,called FEEE(family eugenics based evolution),is proposed,which combines the genetic link with the behavioral link in light of the idea of family eugenics.In the FEBE model the orthogonal design technique is introduced into offspring’S breeding inside a family SO as to enhance the behavioral improvement of individuals.The FEBE model is applied to solve Goldberg’S deceptive problem that is challenging to most evolutionary algorithms.The exciting experimental results are achieved.

    • ITERATORS AND ITS APPLICATION IN REUSABLE SOFTWARE STUDY

      1997, 8(2):145-152.

      Abstract (3912) HTML (0) PDF 453.44 K (4683) Comment (0) Favorites

      Abstract:Iterators act on a very important role in the abstraction of loop control mechanism and research on reusable software.Its research history is over ten years.However until nOW there iS no precise and unified definition about it yet.which affects one to understand its meaning heavily and hinder its widespread application.Based on analyzing and studying the limitations of fl variety of concepts of iterators in this paper,the authors define iterator as a abstract data type inside a combined data type and obtain a universal iterator pattern,then present the concepts and patterns of separate iterators and integrated iterators.Finally they illustrate its roles and usage by examples.

    • QUERY OPTIMIZATION IN OBJECT ORIENTED DATABASE SYSTEMS

      1997, 8(2):153-160.

      Abstract (3846) HTML (0) PDF 530.92 K (4961) Comment (0) Favorites

      Abstract:Query optimization traditionally involves two deeply connected levels that are qualified as logical and physical. In the implementation of a concrete system, dividing it in two completely is not a good way. Considering the problem comprehensively is much better , the authors discuss this in the paper based on association algebra, and give query optimization algorithms in object oriented database system which taking into account both logical and physical aspects.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063