• Volume 14,Issue 11,2003 Table of Contents
    Select All
    Display Type: |
    • Research on Architecture-Based Reflective Middleware

      2003, 14(11):1819-1826. CSTR:

      Abstract (4582) HTML (0) PDF 897.10 K (6297) Comment (0) Favorites

      Abstract:As Internet provides an open and dynamic runtime environment for distributed applications, one of the most important challenges to the next generation of middleware is how to allow the observation and manipulation of the runtime states and behaviors internal of middleware platform. Reflective middleware is able to open up the platform implementation to meet such requirements. There are three limitations in current research and experiments on reflective middleware: they focus on parts or individual entity of a system, lacking a global view; they only address the reflection of the underlying platform, ignoring the reflection of the application; they mostly experiment on CORBA with less work on J2EE. The design and implementation of a reflective component operating platform, called PKUAS, is presented. Based on its componentized structure, PKUAS introduces software architecture as the global view of the whole reflective system. As a J2EE-compliant application server, PKUAS can reflect both the underlying platform and EJB components. Moreover, this paper demonstrates the usage of reflection with the PKUAS management tool and evaluates PKUAS through comparison with other reflective middlewares. The work presented in this paper addresses the aforementioned limitations and improves the applicability of reflective middleware.

    • A Parallel Debugger with Fast Conditional Breakpoint

      2003, 14(11):1827-1833. CSTR:

      Abstract (4045) HTML (0) PDF 601.06 K (5975) Comment (0) Favorites

      Abstract:A fast conditional breakpoint is considered to be an essential process control capability of advanced high-performance parallel debuggers. In this paper, the fundamental principles for finding and implementing fast conditional breakpoints are introduced and the design problems associated with their implementations such as code generation, code instrumentation and source program mapping are discussed. Dynamic code instrumentation, combined with hybrid code generation and source breakpoint identification, provides a well-suited solution to those problems. Using an enhanced version of the Dyninst run-time code patching library, a fast conditional breakpoint in a parallel debugger, XBUSTER, is implemented. Compared with GDB experimental results show that XBUSTER can debug a program with a higher efficiency. Compared with other fast conditional breakpoint implementations based on dynamic instrumentation technique, XBUSTER is more portable and functional.

    • Multi-Granularity Time Constraints Modeling and Analysis of Workflow Model

      2003, 14(11):1834-1840. CSTR:

      Abstract (3864) HTML (0) PDF 674.62 K (5013) Comment (0) Favorites

      Abstract:It is desired that time constraints of a workflow model can be measured by more than one granularities for distributed processes. Aiming at the multi-granularity time constraints problems, a workflow model, MG-TWF, is proposed. By the definition of multi-granularity relative time constraints, multi-granularity absolute time constraints and multi-granularity time constraints workflow networks, multi-granularity time constraints of MG-TWF are described from MG-TWFs static building stage, dynamic running stage and workflow networks structure. In addition, consistency analysis methods of multi-granularity relative time constraints, multi-granularity absolute time constraints and multi-granularity time constraints workflow networks are developed. Finally presented a case study is presented using the consistency analysis methods of MG-TWF.

    • A Weighted Role and Periodic Time Access Control Model of WorkFlow System

      2003, 14(11):1841-1848. CSTR:

      Abstract (4181) HTML (0) PDF 785.70 K (8439) Comment (0) Favorites

      Abstract:A weighted role for activating task and periodic time authorization is an unsolved major problem for the access control of a workflow management system (WfMS). In this paper, a novel weighted role and periodic time access control (WRPTAC) model for WfMS is proposed on the basis of a role-based access control model. The periodic time expression method is discussed and then the new authorization concepts and the temporal authorization derivation rules for WfMS are defined respectively. An algorithm based on the graph theory for verifying the consistency of all the authorization derivation rules is presented, which has the time complexity of O(n2). The constraint rule for activating task is defined, which can express complex access control constraints for WfMS.

    • Integrating Multi-Aspect Information for Qualitative Spatial Reasoning and Application

      2003, 14(11):1857-1862. CSTR:

      Abstract (4002) HTML (0) PDF 605.18 K (5319) Comment (0) Favorites

      Abstract:Most previous qualitative spatial or spatio-temporal reasoning researches focused only on one single aspect and therefore were inadequate for realistic applications. A representation and reasoning technology integrating topology, size and time information are proposed and applied to a spatio-temporal geographical information system. The representations of topology, size and time are defined and their interdependence is studied. Then an algorithm TriRSAT which can solve the CSP of these three aspects of information is put forward. The representations are used in the constraint base and the TriRSAT is applied to the consistence check of the spatial-temporal data and query. The methods and theories integrating spatio-temporal information effectively can be potentially applied to spatio-temporal database and robot navigation.

    • A Genetic Algorithm Based on Evolutionarily Stable Strategy

      2003, 14(11):1863-1868. CSTR:

      Abstract (4642) HTML (0) PDF 585.90 K (7886) Comment (0) Favorites

      Abstract:An improved genetic algorithm based on the evolutionarily stable strategy is proposed to avoid the problem of local optimum. The key to this algorithm lies in the construction of a new mutation operator controlled by a stable factor,, which maintains the polymorphism in the colony by setting a stable factor and changing certain best seeds to mutant. Therefore, the operator can keep the number of the best individuals at a stable level when it enlarges the search space. The simulation experiments show that this algorithm can effectively avoid the premature convergence problem caused by the high selective pressure. Moreover, this algorithm improves the ability of searching an optimum solution and increases the convergent speed. This algorithm has extensive application prospects in many practical optimization problems.

    • Lp Simultaneous Approximation by Neural Networks with One Hidden Layer

      2003, 14(11):1869-1874. CSTR:

      Abstract (4007) HTML (0) PDF 585.75 K (4804) Comment (0) Favorites

      Abstract:It is shown in this paper by a constructive method that for any Lebesgue integrable functions defined on a compact set in a multidimensional Euclidian space, the function and its derivatives can be simultaneously approximated by a neural network with one hidden layer. This approach naturally yields the design of the hidden layer and the convergence rate. The obtained results describe the relationship between the rate of convergence of networks and the numbers of units of the hidden layer, and generalize some known density results in uniform measure.

    • Genetic Drift Analysis of Recombination

      2003, 14(11):1875-1881. CSTR:

      Abstract (3931) HTML (0) PDF 641.95 K (5086) Comment (0) Favorites

      Abstract:Genetic drift in evolutionary computation, which results from the selection pressure, sampling error and recombination, drives the population to converge to a single individual uniformly, thus causing premature stagnation or losing alternative global or local optima. For multi-parent diagonal crossover and scanning crossover are generalizations of the various conventional crossover and recombination operators, genetic drift from which is analyzed theoretically in this paper. By analyzing the frequency of the dominant allele, it is strictly proved that multi-parent diagonal crossover and uniform scanning crossover do not cause a genetic drift, but multi-parent occurrence-based scanning crossover induces a strong genetic drift that augments with the increasing of the number of parents. The simulant genetic optimization shows that the genetic drift induced by multi-parent occurrence-based scanning crossover reduces both the population diversity and the convergence rate, thus deteriorating the performance of an evolutionary search.

    • A 3-Stage Voting Algorithm for Mining Optimal Ingredient Pattern of Traditional Chinese Medicine

      2003, 14(11):1882-1890. CSTR:

      Abstract (3977) HTML (0) PDF 1.18 M (4821) Comment (0) Favorites

      Abstract:In this paper a voting algorithm is presented to mine the optimal ingredient pattern of Chinese medicine. First this paper visualizes the data about the curative effect of different prescriptions of Chinese medicine ingredients on several cardio-indexes. Then the features about the curative effect from the curves generated by visualizing the data are extracted. Finally, a voting algorithm is adopted in which votes are held in three stages: the preliminary vote generates the features of each test group and cardio-index by each sample; the metaphase vote obtains the value of the curative effect by each feature of the given group and index; the final vote mines the optimal ingredient pattern. Experimental results show that the method is effective for the kind of problems and instructive to clinic medicine experiment. Its potential applications include the development of new medicine, optimal combination investment of venture capital and gene series analysis etc.

    • Image Semantic Classification by Using SVM

      2003, 14(11):1891-1899. CSTR:

      Abstract (5155) HTML (0) PDF 716.72 K (5956) Comment (0) Favorites

      Abstract:There exists an enormous gap between low-level visual feature and high-level semantic information, and the accuracy of content-based image classification and retrieval depends greatly on the description of low-level visual features. Taking this into consideration, a novel texture and edge descriptor is proposed in this paper, which can be represented with a histogram. Furthermore, with the incorporation of the color, texture and edge histograms seamlessly, the images are grouped into semantic classes using a support vector machine (SVM). Experiment results show that the combination descriptor is more discriminative than other feature descriptors such as Gabor texture.

    • A Method for Automatic Detection and Correction of Highlighted Area in Color Face Image

      2003, 14(11):1900-1906. CSTR:

      Abstract (4719) HTML (0) PDF 748.57 K (6765) Comment (0) Favorites

      Abstract:Different environment illumination has a great impact on face detection and recognition. The automatic detection and radiation correction of a highlighted face area is helpful to analyze and identify human faces correctly in a color image. In this paper, a novel approach is presented based on a dichromatic reflection model to detect and correct highlighted skin pixels in the TSL(tint-saturation-luminance) color space. After inspecting the distribution configuration of skin pixels in various color spaces and the spectrum reflection features of human skin, the authors carry out the highlighted are a analysis on a critical two-dimensional plane instead of in a three-dimensional color space, which brings forth certain advantages: computation complexity is deduced, rates between eigenvalues are produced in stepwise PCA to detect automatically the existence of highlighted skin and estimate robustly the skin dichromatic reflection vectors. The highlighted skin regions are compensated based on the dichromatic reflection model.

    • Fast Multiplication on a Family of Koblitz Elliptic Curves

      2003, 14(11):1907-1910. CSTR:

      Abstract (4986) HTML (0) PDF 450.30 K (5240) Comment (0) Favorites

      Abstract:Fast point multiplication on a family of Koblitz elliptic curves in characteristic 3 is considered. Such curves are suitable for establishing provable secure cryptographic schemes with low bandwidth. By utilizing the complex multiplication property of the curves and using a modulo reduction and Frobenius expansion technique, it is shown that there is a fast point multiplication method without precomputation on the curves, which is 6 times faster than the ordinary repeated-double-add method. The idea of the fast method is independent of the optimization of finite field arithmetic and the choice of coordinate expression for points of the elliptic curves.

    • A New Solution Scheme for the Member Deletion Problem in Group Signature by Use of Renew Operator

      2003, 14(11):1911-1917. CSTR:

      Abstract (4253) HTML (0) PDF 655.44 K (4833) Comment (0) Favorites

      Abstract:A new solution scheme for the member deletion problem in Camenisch-Stadler抯 group signature schemes is proposed by use of the group member抯 secret property key renew operator. In the new scheme whenever a member joins or leaves the group, its manager computes a new group public property key and a group member抯 secret property key renew operator and then publishes them. Each group member modifies the secret property key by using the renew operator without the need to re-issue membership certificates. Hence the new scheme is an acceptable solution for a large group where its membership changes frequently. The group public key, member抯 secret key, and signature are all of constant size. The new scheme is better than Bresson-Stern抯 member deletion scheme because in Bresson-Stern抯 scheme the signature is dependent on the witness and the number of the witness is linear with respect to the number of the deletion members. The idea of the key renew operator is first used in the member deletion problem in Camenisch-Stadler抯 group signature schemes by Kim-Lim-Lee, but the scheme in this paper is more concise. The security of the scheme relies on the RSA assumption. The scheme is resistant to forging attack and forging a valid signature is equivalent to solving the RSA problem.

    • A Comparative Study: Offering Multi-Service of the Generic Broadband Residential Access Techniques

      2003, 14(11):1918-1930. CSTR:

      Abstract (4068) HTML (0) PDF 887.17 K (5327) Comment (0) Favorites

      Abstract:Nowadays, the broadband residential access infrastructure remains one of the major research areas for NGN (next generation network). Apart from popular ADSL (asymmetrical digital subscriber loop), HFC (hybrid fiber-coax) and APON (ATM passive optical network), academic communities and industry are increasingly showing great concern about Ethernet technique in the subscriber access network. This paper investigates the substantial differences among the generic broadband residential access techniques and allows a comprehensive understanding of them. The authors survey the generic broadband residential access techniques and present a comparative study on the emerging residential Ethernet-based access solutions with the ADSL, HFC, and APON techniques based on multiplex methods and transport technologies in terms of network architecture, service and traffic models, and QoS (quality of service) provisioning. The comparative study is of benefit to research and implementation of the future broadband residential access infrastructure.

    • A Proxy Blind Signature Scheme Based on DLP

      2003, 14(11):1931-1935. CSTR:

      Abstract (4789) HTML (0) PDF 454.55 K (5594) Comment (0) Favorites

      Abstract:Proxy signatures are very useful tools with which a potential signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. A blind signature is the concept with a salient feature that the signer cannot make a linkage between the blind signature and the identity of the requester. Therefore, it is very suitable for electronic commerce. On the basis of the blind Schnorr signature, this paper presents a digital proxy blind signature scheme, which satisfies the security properties of both the blind signature scheme and the proxy signature scheme.

    • TTP Roles in Electronic Commerce Protocols

      2003, 14(11):1936-1943. CSTR:

      Abstract (5549) HTML (0) PDF 630.50 K (6145) Comment (0) Favorites

      Abstract:TTP (trusted third party) plays an important role in electronic commerce protocols. Different roles of TTP in inline TTP protocols, online TTP protocols and offline TTP protocols are pointed out through three protocols of different types, i.e., Coffey-Saidha protocol, CMP1 protocol and Asoken-Shoup-Waidner protocol. The above protocols are analyzed thoroughly, and their characteristics, defects and approaches to further improvement are discussed respectively in this paper.

    • Timed Role-Based Access Control

      2003, 14(11):1944-1954. CSTR:

      Abstract (4618) HTML (0) PDF 830.83 K (6055) Comment (0) Favorites

      Abstract:The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have nothing to do with the time character. A RBAC model with time character called TRBAC is described and the former constraint is extended so that it can describe the time character. Some algorithms are developed to solve the state change problem of the time-constraint and the sessions. The consistent state of the model is analyzed and the problem for maintaining the consistent state is discussed.

    • Recognition and Retrieval of 3D Terrain Based on Level of Detail and Minimum Spanning Tree

      2003, 14(11):1955-1963. CSTR:

      Abstract (3970) HTML (0) PDF 1.04 M (4963) Comment (0) Favorites

      Abstract:Image, video, audio and graphics are information media in multimedia. In order to use and manage them effectively, the contents implied by them are needed to analyze. Currently, content-based image (video) and audio retrieval make some progress. However, there is no a very efficient method to perform a similar graphics retrieval, especially a similar 3D graphics retrieval. In this paper, an algorithm is presented to implement the similar 3D object recognition and retrieval. In this algorithm, 3D features are first obtained after the meshes of a 3D object are reduced through level of detail. Since the dimension of the extracted 3D features is very huge, minimum spanning tree (MST) are used to reduce the features, then the recognition of similar 3D objects are realized by Support Vector Machine (SVM). The proposed algorithm works well when it is used to recognize and retrieve a 3D terrain.

    • A Fast Image Coding Algorithm Based on Human Visual System

      2003, 14(11):1964-1970. CSTR:

      Abstract (4379) HTML (0) PDF 821.24 K (6669) Comment (0) Favorites

      Abstract:An image coding algorithm ESPIHT (extended set partitioning in hierarchical trees) based on fast lifted wavelet transform and human visual system is proposed in this paper. It can be regarded as an improved version of the SPIHT algorithm. However, unlike SPIHT, the fast lifted wavelet transform (FLWT) is used, the extended zerotree structure is redefined, and the human visual system (HVS) is taken into account sufficiently in the compression algorithm. The experimental results show that the new image compression scheme performs better than that of SPIHT in the aspects of recovery image quality and coding/decoding time.

    • New Algorithms for Object Segmentation and Stereo Correspondence in Stereo Video Coding

      2003, 14(11):1971-1976. CSTR:

      Abstract (4014) HTML (0) PDF 537.63 K (5776) Comment (0) Favorites

      Abstract:Video object segmentation and stereo correspondence is a key technology in object-based stereo video coding. In this paper, based on an algorithm for extracting video object in one view-channel, a new contour tracking and correspondence algorithm is first proposed for extracting stereo video object pairs. Then, a disparity estimation algorithm based on video objects is proposed. It takes a characteristic pixel as a correspondence primitive and the disparity estimation is implemented with disparity constraints. The disadvantages of discontinuous and imprecise disparities with the traditional block-based algorithms can be improved and a precise and smooth disparity field can be finally acquired.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063