• Volume 10,Issue 11,1999 Table of Contents
    Select All
    Display Type: |
    • Nesting Predicate Equation Systems and Weak Bisimulations

      1999, 10(11):1121-1126. CSTR:

      Abstract (3532) HTML (0) PDF 355.31 K (4102) Comment (0) Favorites

      Abstract:Symbolic transition graphs with assignment is a general semantical model for value-passing processes. Strong bisimulation equivalences between such graphs can be reduced to the greatest solutions to simple predicate equation systems. The aim of this paper is to generalise this result to weak bisimulation equivalences. For this purpose, the notion of nesting predicate equation systems is introduced, and algorithms are presented to reduce weak bisimulation equivalences to the greatest solutions to nesting predicate equation systems of the form E2μE1.

    • The Priority List Based Algorithm for Solving Engineering Constraints in CAD System

      1999, 10(11):1127-1131. CSTR:

      Abstract (3227) HTML (0) PDF 404.09 K (4413) Comment (0) Favorites

      Abstract:The authors review current research situation of engineering CAD, including engineering con-straints and geometry constraints, and analyze the denotation and characteristics of engineering design. Somerules and peculiarities of constraints in engineering design are analyzed. Engineering constraints representationmodel named as “Multilateral Elements Constraints Graph”, and the method based on the model constructs theone-way dependence relations between constraints variable are analyzed. In this way, some problems of constraints consistency and search space are solved well.To bridge the gap between the constraints solver and special engineering domain,an improving algorithm based on priority list is developed.Many heuristic rules and engineering experiences could be added to the list for the efficiency.These algorithms have been used in the CAD system of plant steed structure design.

    • Research on Inheritance of Software Agent

      1999, 10(11):1132-1137. CSTR:

      Abstract (3627) HTML (0) PDF 493.88 K (3878) Comment (0) Favorites

      Abstract:Being a kind of restricted intelligent objects, agent is a natural way to research the inheritance feature of software agent and integrate inheritance mechanisms into AOP (agent-oriented programming). Based on BDI model of agents, the semantics of inheritance and cloning behavior of agents are addressed in this paper. The semantics of inheritance are discussed from two aspects: single inheritance and multiple inheritance. For cloning behavior, the authors identify and formally classify the dynamic cloning mechanisms of agent instances into four types: function split, logic split, preference split and retrogress split. The principle of each cloning mechanism is presented and the examples are provided based on the electrical commerce systems.

    • A Three-stage Model of Incremental Maintenance of Multi-materialized Views

      1999, 10(11):1138-1141. CSTR:

      Abstract (3471) HTML (0) PDF 242.52 K (4005) Comment (0) Favorites

      Abstract:A new method is presented in this paper, which is about incremental maintenance of multi-materialized views based on parallel pipeline process. In this process, the authors classify all the materialized views first by using choosing methods, then by classified topological sorting, so that no nested definitions of relations exist among these views. Finally, in order to maintain the incremental multi-materialized views, they process in parallel all the views by utilizing pipeline model of semaphore process mechanism.

    • Web Document Presending Based on User Behavior Patterns

      1999, 10(11):1142-1147. CSTR:

      Abstract (3538) HTML (0) PDF 437.16 K (4718) Comment (0) Favorites

      Abstract:Presending is an active service which extends caching mechanism from temporal locality to spatial locality. Two modes of extracting user behavior patterns are proposed to predict future requests from clients for efficient presending. URL-based mode exploits the Markov-chain features of request series, and can be used for hierarchical presending. Session-based mode captures more semantics, and the authors' work emphasizes the clustering algorithm, feasible document weight definition, and attribute-vector-distance computation representing order of accesses. Their performance is evaluated using appropriate metrics such as request hit rate, session hit rate, presending efficiency and presending cost. Numerous experiments are carried out to compare the two modes. These methods are used for web presending, while they are helpful to web server design and ISP (internet service provider) service planning.

    • A Web-based Workflow Management System

      1999, 10(11):1148-1155. CSTR:

      Abstract (4071) HTML (0) PDF 597.42 K (4347) Comment (0) Favorites

      Abstract:As the Internet/Intranet/WWW technologies become more and more mature and web-based applications become richer and richer, the application developers are provided with an ideal computing environment to construct WfMSs (workflow management systems). Web-based WfMSs can help business goals to be achieved effectively by means of integrating various distributed resources in an easy to access environment. A web-based general purpose workflow management system named Wowww! is described in this paper, detailing its architecture, the workflow model and the algorithms used for workflow instance execution, the self-learning algorithm for automatic process definition generation, and the strategies to support synchronous cooperation.

    • Static Task Scheduling for Incompletely Interconnected Homogeneous Systems

      1999, 10(11):1156-1162. CSTR:

      Abstract (3285) HTML (0) PDF 515.76 K (4280) Comment (0) Favorites

      Abstract:In the distributed memory multiprocessor (DMM) systems, communication overhead, involved among tasks run on different processors, is still large which even offsets the advantages brought by multiprocessor parallelism. In order to execute a parallel application efficiently, it is necessary to choose an appropriate scheduling technology to allocate processors to tasks. In this paper, formal description of general scheduling system including task model, processor model and schedule problem is presented. Three most important problems, concerning schedule in incompletely interconnected homogeneous systems, are studied, which are: (1) How to choose scheduling tasks in sequence, (2) How to choose a route, (3) How to allocate processors to tasks. In addition, the problem on how to choose a route is studied according to store-and-forward and wormhole routing respectively. In the end, a static scheduling algorithm for incompletely interconnected homogeneous systems is constructed according to the solutions to the above three problems.

    • The Formal Specification and Property Verification of Interactive User Interface

      1999, 10(11):1163-1168. CSTR:

      Abstract (4106) HTML (0) PDF 433.30 K (4567) Comment (0) Favorites

      Abstract:With the development of human-computer interactive technology, the interface between computers and users is more and more natural, the management of user interface is becoming more and more complex. Now, the available models of next generation user interface are almost conceptual. The formal specification and property verification to them are necessary. Based on the results of the research on natural interactive user interface, the authors give out a general model of interactive user interface. In order to guarantee the correction of the design of system, it needs to specify and verify it rigidly. The formal description and verification by use of LOTOS (language of temporal ordering specification) and ACTL (action based temporal logic) are given out in this paper. These allow people to study, evaluate and define the dynamic behavior of current user interfaces.

    • Abstraction Events' Complete Logical-time

      1999, 10(11):1169-1173. CSTR:

      Abstract (3462) HTML (0) PDF 347.22 K (4277) Comment (0) Favorites

      Abstract:Debugging the distributed applications is very difficult. One of the reasons why this problem is made is that the distributed applications are inherently more complex than sequential ones. To solve this problem, the method of abstracting events is proposed, which lets the users grasp the various aspects of behaviors of a distributed application. Abstract event timestamp is used to decide the “happened before” relation among abstract events, which plays a very important role in abstracting and debugging the distributed applications. In this paper, a new complete algorithm of timestamping abstract event is proposed, which needs less storage and costs less time than others. Proofs of the correctness of the algorithms are also given in this paper.

    • A Tree-like Knowledge Base Revision Algorithm

      1999, 10(11):1174-1179. CSTR:

      Abstract (3610) HTML (0) PDF 403.70 K (4196) Comment (0) Favorites

      Abstract:Knowledge base revision is to add new knowledge into the knowledge base, and to delete old knowledge if it is necessary for preserving consistency. The recently proposed knowledge base revision methods are all intractable in general case. By restricting the structure of the knowledge base, a polynomial revision algorithm is given in this paper when the corresponding constraint graph of the knowledge base is a tree. In the constraint tree, the authors use a bottom-up process to get the revision knowledge base.

    • Design Multilayer Feed-forward Networks Based on Immune Evolutionary Programming

      1999, 10(11):1180-1184. CSTR:

      Abstract (3716) HTML (0) PDF 338.60 K (4560) Comment (0) Favorites

      Abstract:The authors use an immune evolutionary programming to design multilayer feed-forward networks in this paper. The immune evolutionary programming retains the ability of stochastic global searching of traditional evolutionary programming, and draws into the interaction mechanism based on density and the diversity maintaining mechanism which exists in living beings' immune procedure. The immune evolutionary programming has better global convergence and very strong self-adaptive ability with enviornment. The experimental results prove the high efficiency of the immune evolutionary programming in designing neural networks.

    • A Parallel Test Generation Algorithm Based on Fault Partitioning

      1999, 10(11):1185-1190. CSTR:

      Abstract (3721) HTML (0) PDF 415.56 K (4240) Comment (0) Favorites

      Abstract:In this paper, the authors analyze in theory how to increase the speed-up ratio of parallel test generation algorithm based on fault partitioning. The approach of backward fault partitioning of output fan-in cones (BFPOC) which combines the relevant fault recognition and shortest path sensitization, is presented. And BFPOC is compared via experiment with the approach of toward fault partitioning of input fan-out cones (TFPIC) proposed by Banejee and the general one, equal distance partitioning of fault sequence (EDPFS). The experimental results show that in large-scale parallel processing environment, BFPOC can reach higher speed-up ratio, obvious super to the other two approaches.

    • A Web-based Network Intelligent Management Model and Its Implemen

      1999, 10(11):1191-1193. CSTR:

      Abstract (3366) HTML (0) PDF 220.16 K (4201) Comment (0) Favorites

      Abstract:As the networks becoming more complex and heterogeneous, there has been a growing demand for the network management tools. In this paper, the authors propose a model for web-based network intelligent management. It adopts a temporal data model as the underlying information model, and a rule based network intelligent control and management strategy as an automatic and adaptive management method to the networks. Moreover, the functions provided by this model as well as the hierarchical architecture of its related software supporting them and a prototype are presented in this paper.

    • Processor Selection Policy in Heuristic Task Scheduling

      1999, 10(11):1194-1198. CSTR:

      Abstract (3669) HTML (0) PDF 376.80 K (4073) Comment (0) Favorites

      Abstract:As one of the most fundmental, critical and challengable problems in PDC (parallel distributed computing), task scheduling has great influence on the execution efficiency of PDC. The existing heuristic task schedulings based on static task priorities always use it as processor selection policy to make the current task have earliest start execution time. On the basis of analysis of the mechanism in priority-based heuristic task scheduling, the authors illustrate the drawbacks of the processor selection policy mentioned above, and propose a new processor selection policy, i.e, to make the successor of the current task have the earliest start time, and give the corresponding restraint.

    • Procedure of Intersection and Trimming for Composite Triangular Bézier Surface

      1999, 10(11):1199-1205. CSTR:

      Abstract (3728) HTML (0) PDF 452.60 K (4376) Comment (0) Favorites

      Abstract:Using the splitting property of tringular Bézier patch, the problems of iterating and initial intersection point calculating can be solved. By the procedures of near surface point iterating and border points traversing, the whole intersection curve traversing many patches can be traced from one initial intersection point. Inserting intersection points as measure points into surface, retriangulating grids, splitting triangular grids and measure points along intersection curve, the original surface can be trimmed into two composite triangular Bézier surfaces. The experimental results show that this method is simple, robust and applicable for surface modeling.

    • An Approach for Attribute Reduction and Rule Generation Based on Rough Set Theory

      1999, 10(11):1206-1211. CSTR:

      Abstract (12026) HTML (0) PDF 392.66 K (6967) Comment (0) Favorites

      Abstract:In this paper, the authors discuss two important issues in rough set research which are attribute reduction and value reduction. A new attribute reduction approach which can reach the best attribute reduction is presented based on discernibility matrix and logic computation. And a multivariate decision tree can be got with this method. Some improvements for a widely used value reduction method are also achieved in this paper. The complexity of acquired rule knowledge can be reduced effectively in this way.

    • Merging-based Syllable Detection Automaton in Continuous Chinese Speech Recognition

      1999, 10(11):1212-1215. CSTR:

      Abstract (4093) HTML (0) PDF 306.73 K (4346) Comment (0) Favorites

      Abstract:In this paper, an automatic syllable detection method namely merging-based syllable detection automaton (MBSDA) is studied and implemented. The MBSDA uses a variety of features including the frame energy, the zero crossing rate and the fundamental frequency to merge similar consecutive frames (one or several frames) into one merged similar segment (MSS). The frames in the same MSS are treated as frames of the same state of a phonetic. These MSSs are passed into a syllable detection automaton (SDA) to give the syllable detection results. In addition, the MBSDA gives the range of syllable number (RNS) of each definite detection segment.

    • A Robust Method for Unknown Structure Form Analysis

      1999, 10(11):1216-1224. CSTR:

      Abstract (3432) HTML (0) PDF 617.12 K (4363) Comment (0) Favorites

      Abstract:The analysis of unknown forms is a challenging and important problem in document processing. Current methods can only tolerate small breaks in form lines. In this paper, a strategy is proposed for analyzing unknown structure and filled forms based on extracted lines. Individual edges are validated using knowledge of features of the extracted lines and their local proximity. In a process of scanning the horizontal and vertical lines, candidate edges are validated and rectangles are generated if their surrounding edges and their combination are all valid. To preserve the constraints and make full use of global information, the process is recursively applied. The rectangle extraction can tolerate large breaks in form lines, ignore irrelevant segments and deal with complex configurations such as embedded rectangles. After rectangle extraction, other form components are extracted by searching the remaining segments. Experiments on a collection of forms with handwritten fields and documents with tables show that the proposed approach works well even on poor quality images.

    • A Rule Learning Algorithm on Continuous Attributes Space

      1999, 10(11):1225-1232. CSTR:

      Abstract (3565) HTML (0) PDF 510.04 K (4544) Comment (0) Favorites

      Abstract:The rule learning algorithm on continuous attributes space is studied in this paper. First, thepurpose and the importance of studying rule learning algorithm on continuous attributes space are briefly introduced, and then some basic concepts in the theory of rule learning are extended to the continuous attributes space. On this basis, the authors study the problem to divide continuous attributes space, and prove that the problem of min dividing continuous attributes space is a NP hard problem. The concepts of information entropy and infinite normed apply to the problem of dividing continuous attribute space and a new algorithm of dividing continuous attribute space based on the function of information entropy are presented. At last, a rule learning algorithm on continuous attributes space is presented and the data results of the experiments are given.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063