• Volume 12,Issue 12,2001 Table of Contents
    Select All
    Display Type: |
    • Policy-Based Access Control Framework for Large Networks

      2001, 12(12):1739-1747. CSTR:

      Abstract (3639) HTML (0) PDF 513.73 K (4686) Comment (0) Favorites

      Abstract:Efforts of this paper focus on the issues about the management and throughput of firewalls (or screening routers) applied in transit networks. On the one hand, manual configuration of large amount of firewalls distributed in many access points cannot meet the requirements of security management in the open and dynamic environment. On the other hand, the ordinal lookup of filtering rules in firewall results in decrease of throughput. Aimed at a typical transit network and its security policy requirements, a policy-based access control framework (PACF) is proposed in this paper. This framework is based on three levels of abstract access control policy: organizational access control policy (OACP), global access control policy (GACP) and local access control policy (LACP). The GACP, which comes from the results of IDS and search engines according to OACP, is automatically and dynamically distributed to firewalls as LACPs. Each LACP is then enforced by an individual firewall. Some algorithms for distribution of GACP and enforcement of LACP are described. A hashbased algorithm is proposed for lookup of filtering rules in LACP. PACF largely reduces the management labor of the security administrator for large transit networks. Under the environment with policy requirements described in this paper, the new algorithm reduces the time complexity of lookup from O(N) of traditional sequential algorithm to O(1), which increases largely the throughput of firewalls.

    • Some Results on Optimal Search in Discrete Spaces

      2001, 12(12):1748-1751. CSTR:

      Abstract (3994) HTML (0) PDF 245.34 K (4527) Comment (0) Favorites

      Abstract:In this paper the searching problem for an object in a set of N locations is considered. The goal is to allocate the resources so as to maximize the probability of locating the object. By using Lagrangian operator method the problem of optimal search with the unknown target distribution is studied. Some selection criteria and error estimate results are derived.

    • A Hierarchical Mixed Mode Placement Algorithm

      2001, 12(12):1752-1759. CSTR:

      Abstract (3488) HTML (0) PDF 469.65 K (4531) Comment (0) Favorites

      Abstract:A hierarchical automatic placement algorithm for mixed mode placement problem is presented. The so-called mixed mode is a combination of standard cell and macro block. The presented algorithm completes the placement in both block level and cell level. In block level, the random cells are firstly partitioned into soft blocks, then SP (sequence pair) based method is used to do block placement. In cell level, firstly, quadratic placement method is used to do inner placement within each soft block, then a placement improvement routine is done to the whole chip, and at last, a combined min-cut and enumeration based detailed placement procedure completes the final placement. The algorithm is tested on a set of circuits with different number of standard cells and macro blocks, and obtains satisfactory results.

    • Segmentation of Ultrasound Images with Interactive B-SplineSnakes and Its Application

      2001, 12(12):1760-1768. CSTR:

      Abstract (3647) HTML (0) PDF 1.28 M (4610) Comment (0) Favorites

      Abstract:Due to the poor quality of ultrasound images, fully automatic segmentation methods are not feasible. This article describes a novel approach to the semiautomatic segmentation of ultrasound images.Although user interaction is not required much, it is used as an important factor and incorporated into the traditional B-spline snake models. The modified model is called an interactive B-snake model because the movement of the active contour is constrained through user interaction. By introducing a set of moving rules, B spline segments are moved to the desired boundary directly. The statistical models are trained on-the-fly by observing boundaries accepted by the user. The resulting algorithm is especially useful when dealing with successive slices and provides fast, reliable and verifiable segmentation in ultrasound images. The algorithm has been used successfully on the Liver Tumor Surgical Simulation System.

    • An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate

      2001, 12(12):1769-1774. CSTR:

      Abstract (3809) HTML (0) PDF 319.48 K (4231) Comment (0) Favorites

      Abstract:Security protocols play more and more important role with the bursting development of Internet. Formal authentication is an effective way to detect flaws in those protocols. There are many automatic checkers for verifying protocols, but few can deal with digital signature protocols. This paper proposes a new tool for formal automatic verifying. It can have an effective check for digital signature protocols. It is based on intruder's role impersonate and backward deduction. It was implemented by using JAVA.

    • Drift Conditions for Time Complexity of Evolutionary Algorithms

      2001, 12(12):1775-1783. CSTR:

      Abstract (3770) HTML (0) PDF 486.11 K (4473) Comment (0) Favorites

      Abstract:The computational time complexity is an important topic in the theory of evolutionary algorithms. This paper introduces drift analysis into analysing the average time complexity of evolutionary algorithms, which are applicable to a wide range of evolutionary algorithms and many problems. Based on the drift analysis, some useful drift conditions to determine the time complexity of evolutionary algorithms are studied. These conditions are applied into the fully deceptive problem to verify their efficiency.

    • Face Detection Based on Skin Color and Template

      2001, 12(12):1784-1792. CSTR:

      Abstract (4986) HTML (0) PDF 3.68 M (5425) Comment (0) Favorites

      Abstract:In this paper, a face detection algorithm for color images based on skin color and template, which is composed of skin color segmentation, template matching, and neural network verifying is presented. First, a skin color model in HSI chrominance space is used for segmenting regions in which may have faces, and then the average-face based template matching and neural network verifying methods are used for searching faces in those regions. This algorithm integrates skin color information in color images with template matching and neural network classification model in gray level images, which results in not only faster speed, but also higher robustness of the algorithm. Experimental results demonstrate the efficiency and feasibility of this algorithm.

    • Uniformity of Bisimulation Equivalences of Chi Processes

      2001, 12(12):1793-1800. CSTR:

      Abstract (3428) HTML (0) PDF 460.32 K (4746) Comment (0) Favorites

      Abstract:The Chi calculus is obtained from the π calculus by unifying two classes of restricted names. The polyadic Chi calculus extends Chi calculus in that more than one pieces of information can be passed around in a communication. And the atomic Chi calculus is the subcalculus of the polyadic Chi calculus by removing the prefix combinatory. In this paper, the bisimulation equivalences for the atomic Chi calculus are investigated. The main result of this paper is that, in a certain sense, there is only one bisimulation equivalence on the atomic Chi processes.

    • A Fast IP Classification Algorithm Applying to Multiple Fields

      2001, 12(12):1801-1809. CSTR:

      Abstract (3835) HTML (0) PDF 1.07 M (4463) Comment (0) Favorites

      Abstract:As the network applications develop, routers must support those functions such as firewalls, provision of QoS and traffic billing etc. All these functions need classification of IP packets, according to which it is determined how different packets are processed subsequently. In this paper, a new IP classification algorithm is proposed based on the Grid of Tries algorithm. The new algorithm not only eliminates original limitations in the case of multiple fields but also shows better performance in regard to both time and space. It has better overall performance than many other algorithms.

    • An Approach for Hierarchy Slicing Object-Oriented Program

      2001, 12(12):1810-1817. CSTR:

      Abstract (3744) HTML (0) PDF 516.82 K (4581) Comment (0) Favorites

      Abstract:Program slicing is an important method for debugging, testing, analyzing, understanding and maintaining object-oriented software. In this paper, a new hierarchy slicing approach is presented so as to replace old slicing methods based on SDG (system dependence graph). The main idea of hierarchy slice and algorithm are discussed in this paper, and the application of hierarchy slicing algorithm is also presented at the end of this paper.

    • An Incremental SVM Learning Algorithm α-ISVM

      2001, 12(12):1818-1824. CSTR:

      Abstract (5865) HTML (0) PDF 465.15 K (5889) Comment (0) Favorites

      Abstract:The classification algorithm based on SVM (support vector machine) attracts more attention from researchers due to its perfect theoretical properties and good empirical results. In this paper, the properties of SV set are analyzed thoroughly, and a new learning method is introdnced to extend the SVM Classification algorithm to incremental learning area. After that, a new improved incremental SVM learning algorithm is proposed, which is based on a sifting factor. This algorithm accumulates distribution knowledge of the training sample while the incremental training is proceeded, and thus makes it possible to discard samples optimally. The theoretical analysis and experimental results show that this algorithm could not only improve the training speed, but also reduce storage cost.

    • Research on the Socially Rationality of Agent

      2001, 12(12):1825-1829. CSTR:

      Abstract (3704) HTML (0) PDF 334.06 K (4901) Comment (0) Favorites

      Abstract:MAS (multi-agent system) is a sociality which is composed of many autonomy agents. Under the social background, realizing the goal of MAS depend on social rationality of agent. Although Jennings has presented a mode of social rationality, he doesn't obtain the method of computing socially rationality. In this paper, a new computed framework of social rationality is constructed based on the principle of synergetic and point the physical significance of parameters. The authors shell parameter's computing divide into four steps; approximate liner, define order parameter; built differential questions and solve to it.

    • A Cooperative Design Approach Supporting Dynamic Task Assignation

      2001, 12(12):1830-1836. CSTR:

      Abstract (4153) HTML (0) PDF 457.97 K (4092) Comment (0) Favorites

      Abstract:Cooperative design is a complex group activity that involves participants with heterogeneous skill. In this paper, a cooperative design approach in a multi-agent design system is introduced and a form of Bulletin Board that supports dynamic task assignation and a kind of conciliatory approach when conflict occurs in design are presented. According to autonomous and cooperative features, the form of Bulletin Board combines the advantage of black board and contract-net and introduces a style of distributed and centralized combination, weakens some failings of black board and contract-net during dynamic assignation in distributed environment. Then, it puts forward a conflict pre-checking and conflict processing approach. This approach aims at finding and solving conflict during the early design phase and decreasing resource waste.

    • SQA Model Based on ISO9000

      2001, 12(12):1837-1842. CSTR:

      Abstract (4074) HTML (0) PDF 435.19 K (5270) Comment (0) Favorites

      Abstract:The software crisis hasn't been handled completely after its appearing 40 years ago. Many scientists and enterpriseries consider that the lack of the formal, effective technology and method for software quality management is the primary reason. The total quality management has become an integrated theory with the developing of the socialization production. Many international standard and industry standard has been made. In this paper, the state of Chinese software industry is analyzed and the modeling of software quality management and its realize framework matched national requirment are built.

    • On Liveness and Boundedness of Weighted Asymmetric Choice Nets

      2001, 12(12):1843-1850. CSTR:

      Abstract (3343) HTML (0) PDF 856.37 K (4462) Comment (0) Favorites

      Abstract:In this paper, a sufficient condition and a necessary condition on liveness for Weighted Asymmetric Choice (WAC) net system which is an important subclass of Petri net system are presented. Moreover, a judgement condition for live and bound WAC net system is given, and the sufficient and necessary condition for WAC net liveness monotonicity is shown.

    • Measuring JAVA Cohesion Based on Data Slice

      2001, 12(12):1851-1858. CSTR:

      Abstract (3755) HTML (0) PDF 854.47 K (4450) Comment (0) Favorites

      Abstract:Object-Oriented program slicing technique is widely used in program analysis, program comprehension, software testing, and software maintenance etc. In this paper, the basic concepts of abstract data slice and intra-class slice are created at first. Then, the cohesion existing in JAVA language is discussed based on these slices. Finally, the data cohesion, method cohesion and class cohesion are presented and solved by analyzing the relationship between these slice and data, method or class.

    • Reasoning of Topology Spatial Objects in GIS

      2001, 12(12):1859-1863. CSTR:

      Abstract (3437) HTML (0) PDF 782.99 K (4865) Comment (0) Favorites

      Abstract:In this paper, the spatial data models and data structures in geographic information system (GIS) are first discussed. Then the topological relations about point-point, point-line and point-area of spatial objects are qualitatively analyzed. The reasoning algorithms of topological relations of spatial objects are also given. Finally, the fuzzy techniques are applied in reasoning algorithms of topological relations of spatial objects in order to solve fuzziness and uncertainty in the GIS easily.

    • An Operational Semantics for UML Statechart Diagrams

      2001, 12(12):1864-1873. CSTR:

      Abstract (3717) HTML (0) PDF 614.07 K (4542) Comment (0) Favorites

      Abstract:As a standard object-oriented modeling language, UKL (unified modeling language) is lack of formal dynamic semantics. In this paper, an operational semantics for UML statechart diagrams is proposed according to UML1.1 specification documents. The formalization is able to deal with most of the features of UML statechart diagrams, which sets the basis for code generation, simulation and test cases generation. It has been used to generate test cases and to simulate the test process on platform of Rose98.

    • Detection and Amend of Collision Between Cloth and Rigid Body in Realistic Cloth Simulation

      2001, 12(12):1874-1880. CSTR:

      Abstract (3902) HTML (0) PDF 961.31 K (4274) Comment (0) Favorites

      Abstract:In this paper, a quickly collision detection and amend arithmetic is proposed. In detection phase, bounding box and hierarchical structure model are combined to cull out the majority of detection. And many collision types are reduced to vertex/plane collision, so solving linear equation can be simplified to algebra operation. In amend phase, amend are combined into numerical integration by using preconditioned gradient method. This speeds up the whole calculation.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063