• Volume 14,Issue 2,2003 Table of Contents
    Select All
    Display Type: |
    • THSORT: A Single-Processor Parallel Sorting Algorithm

      2003, 14(2):159-165. CSTR:

      Abstract (4402) HTML (0) PDF 686.49 K (5508) Comment (0) Favorites

      Abstract:Sorting is an important operation of transaction processing. It is a relatively mature field, as many algorithms for memory sorting, disk sorting and parallel sorting have come forth in the past decades. In this paper, the sorting algorithm is studied from a thoroughly different standpoint, and the THSORT (Tsinghua SORT), a parallel sorting algorithm on a single computer, is brought forward. THSORT uses several processes to control different components of a computer, which enables the data input, sorting and output to be run concurrently, and thus greatly enhances the parallelism and efficiency of the hardware. Experimental results based on a computer with two RAIDs (redundant array of inexpensive disks) indicate that THSORT has almost doubled the performance of NTSORT (new technology SORT), a famous sorting program. Moreover, THSORT has won the 2002 PennySort competition and is still holding the world record in the Daytona category.

    • Finding Obstacle-Avoiding Shortest Path Using Generalized Connection Graph with Θ(t) Edges

      2003, 14(2):166-174. CSTR:

      Abstract (3754) HTML (0) PDF 943.84 K (5358) Comment (0) Favorites

      Abstract:Finding obstacle-avoiding shortest path is an important problem in VLSI design, and connection graph is a fundamental tool to resolve the problem. The known best graph grounded on knowledge of free area, and it has O(t) vertices and O(tlogt) edges, in which t is the number of extreme edges of the obstacles. In this paper, a generalized connection graph GG is introduced, which is derived from some new conception such as generalized free area. GG is made up with vertex that represents the generalized free area and edges for their adjacency. It has only Θ(t) vertices and Θ(t) edges, and it is planar graph. An O(tlogt) time algorithm using plane scanning is designed to construct GG, and the do not change direction heuristic together with A* algorithm is used for getting the shortest obstacle-avoiding path using GG through the conception of formal path. This algorithm shorten the time complexity from O(tlogt)to Θ(t).

    • A Communication Optimization Algorithm Based on Data-Flow Analysis of Region Graph

      2003, 14(2):175-182. CSTR:

      Abstract (4237) HTML (0) PDF 742.94 K (5274) Comment (0) Favorites

      Abstract:Reducing communication overhead is extremely important for parallelizing compiler to generate efficient codes for distributed-memory systems. In this paper, a redundant parallel execution model (RPEM) is proposed as an execution model for target programs optimized by the new algorithm. The region graph is introduced, and an effective algorithm is proposed to maximize the regions in the region graph. A region-based data-flow analysis algorithm is proposed to perform communication optimization. The overhead of data-flow analysis can be reduced by performing analysis on the maximized region graph. The coarse grain analysis also helps to communication lift up and aggregation. This communication optimization algorithm is able to perform inter-loop and inter-procedure analysis. Experimental results show that this algorithm is effective in reducing both communication volume and number of messages in programs with a large communication amount.

    • A Problem of Reversal Distance on Star-Tree with Object Partially Fixed

      2003, 14(2):183-189. CSTR:

      Abstract (3758) HTML (0) PDF 839.27 K (4489) Comment (0) Favorites

      Abstract:A problem of reversal distance on star-tree is discussed. The problem of 3SAT is induced to the problem of the reversal distance on star-tree with object partially fixed. The fact desribed below is proved, it is still NP-hard to solve the problem of reversal distance on star-tree in which only need to decide the signs of the other symbols to minimizing the sum of distance between object and the given sequences. A polynomial approximation algorithm for the problem is given.

    • Feature Subspaces Extraction for Content-Based Image Retrieval

      2003, 14(2):190-193. CSTR:

      Abstract (4658) HTML (0) PDF 451.87 K (5104) Comment (0) Favorites

      Abstract:Relevance feedback (RF) is used as an effective solution for content-based image retrieval (CBIR). Although it is effective, the RF-CBIR framework does not address the issue of feature extraction for dimension reduction and noise reduction. In this paper, a novel method is proposed for extracting features for the class of images represented by the positive images provided by subjective RF. Principal component analysis (PCA) is used to reduce both noise contained in the original image features and dimensionality of feature spaces. The method increases the retrieval speed and reduces the memory significantly without sacrificing the retrieval accuracy.

    • An Incremental BiCovering Learning Algorithm for Constructive Neural Network

      2003, 14(2):194-201. CSTR:

      Abstract (4267) HTML (0) PDF 685.78 K (11254) Comment (0) Favorites

      Abstract:The algorithm of incremental learning in cover based constructive neural networks (CBCNN) is investigated by using BiCovering algorithm (BiCA) in this paper. This incremental learning algorithm based on the idea of CBCNN can set up many postive-covers and negative-covers, and can modify and optimize the parameters and structure of the neural networks continuously, and can add the nodes according to the need and prune the redundant nodes. BiCA algorithm not only keep the advantages of CBCNN but also fit for incremental learning and could enhance the generalization capability of the neural networks. The simulational results show that the BiCA algorithm is not sensitive to the order of the sample and could learn quickly and steady even if the performance of initial CBCNN is not very good.

    • An Example-Based Facial Sketch Generation System

      2003, 14(2):202-208. CSTR:

      Abstract (4935) HTML (0) PDF 1.27 M (6476) Comment (0) Favorites

      Abstract:In this paper, an example-based facial sketch system is presented, which automatically generates a sketch from an input image. All the example sketches are drawn with a particular style. There are two key elements in this system, a non-parametric sampling method and a flexible sketch model. Given an input image pixel and its neighborhood, the conditional distribution of a sketch point is computed by querying the examples and finding all similar neighborhoods. An expected sketch image is then drawn from the distribution to reflect the drawing style. Finally, good quality facial sketches are obtained.

    • Unsupervised Clustering Analysis of Human Motion

      2003, 14(2):209-214. CSTR:

      Abstract (4509) HTML (0) PDF 845.50 K (5419) Comment (0) Favorites

      Abstract:An unsupervised learning approach for analysis of human motion is proposed. In this approach, by learning a set of hidden Markov models under constrains of minimal descript length criterion, a continuous gestures sequence could be segmented and clustered, and thus the segments and labels of the original sequence are automatically extracted. The approach contains two steps. First continuous gestures are discretized and an original solution is found in discrete domain based on MDL criterion. Then coming back to continuous domain, a set of HMMs is learnt under constrains of MDL criterion, The HMMs exploit richer dynamics and thus generate better results. Experimental results by using real human gesture data demonstrate the effectiveness of the approach.

    • A Speech Driven Face Animation System Based on Machine Learning

      2003, 14(2):215-221. CSTR:

      Abstract (4421) HTML (0) PDF 1.17 M (6584) Comment (0) Favorites

      Abstract:Lip synchronization is the key issue in speech driven face animation system. In this paper, some clustering and machine learning methods are combined together to estimate face animation parameters from audio sequences and then apply the learning results to MPEG-4 based speech driven face animation system. Based on a large recorded audio-visual database, an unsupervised cluster algorithm is proposed to obtain basic face animation parameter patterns that can describe face motion characteristic. An Artificial Neural Network (ANN) is trained to map the cepstral coefficients of an individual's natural speech to face animation parameter patterns directly. It avoids the potential limitation of speech recognition. And the output can be used to drive the articulation of the synthetic face straightforward. Two approaches for evaluation test are also proposed: quantitative evaluation and qualitative evaluation. The performance of this system shows that the proposed learning algorithm is suitable, which greatly improves the realism of face animation during speech. And this MPEG-4 based learning are suitable for driving many different kinds of animation ranging from video-realistic image wraps to 3D Cartoon characters.

    • An Aggregation Algorithm Based on Group Numbers

      2003, 14(2):222-229. CSTR:

      Abstract (4315) HTML (0) PDF 683.85 K (5001) Comment (0) Favorites

      Abstract:OLAP (online analytical processing) queries are complex. When implemented in SQL (structured query language), they usually involve multi-table join and aggregate operations. As a result, how to improve the performance of the multi-table join and aggregate operations becomes a key issue for ROLAP (relational OLAP) query evaluation. To solve this problem, an aggregation algorithm based on group numbers named MuGA (group number based aggregation with multi-table join) is proposed in this paper. By taking the characteristics of star schema into consideration, the algorithm combines the aggregation operation with the novel multi-table join algorithm, Mjoin (multi-table join), and replaces the sorting and hashing method by computed group numbers in aggregation computing. As a result, the algorithm can not only reduce the CPU time, but also reduce the disk I/Os for OLAP queries. As illustrated by the experiments, the performance of the algorithm MuGA is superior to original aggregation methods and the new sorting based method for aggregation.

    • Optimized Propagation Algorithms for Multi-Replication Definition

      2003, 14(2):230-236. CSTR:

      Abstract (3727) HTML (0) PDF 685.31 K (4907) Comment (0) Favorites

      Abstract:Multi-replication definition (MRD) is a new trend of database replication, but it will increase the propagation costs. In this paper, three optimized propagation algorithms for MRD are presented, D-M, ILS and LIS. D-M Algorithm gets the minimum individual propagation cost by dividing replication objects and merging propagation objects. Based on it, ILS makes the total costs to the least in strict Chain Topology scenarios, and LIS gets optimized total costs in other common situations by decomposing the propagation task. Their correctness and efficiencies are validated both theoretical and experimentally.

    • A Novel Peer-to-Peer System Based on Self-Configuration

      2003, 14(2):237-246. CSTR:

      Abstract (3942) HTML (0) PDF 770.51 K (5335) Comment (0) Favorites

      Abstract:One of the most important features for a peer-to-peer (P2P) distributed system is to share information and services among nodes with equivalent capabilities and responsibilities by pooling their resources together. Nowadays, most of the existing P2P systems such as Napster and Gnutella only provide some kinds of coarse granularity information sharing without taking account of the content of the file. And, typically nodes (peers) are defined statically. In addition, there is no mechanism to support the join of nodes with temporary network addresses. In this paper, a prototyping P2P system, BestPeer is presented. The BestPeer is unique in several ways. Firstly, it combines the power of mobile agents into P2P systems to perform operations at peers?sites. Secondly, it is self-configurable. A node can dynamically select the set of peers with which it can communicate directly based on some optimization criterion. Thirdly, the BestPeer provides a location independent global named lookup server (LIGLO) to identify peers with dynamic (or unpredictable) IP addresses. The BestPeer is evaluated on a PC cluster consisting of 32 Pentium II running Java-based storage manager. The experimental results show that the BestPeer provides excellent performance compared with traditional non-configurable models. Further experimental study reveals its superiority over Gnutella抯 protocol.

    • Study on Set of Temporal Functional Dependencies with Totally Ordered Set of Temporal Types

      2003, 14(2):247-252. CSTR:

      Abstract (3588) HTML (0) PDF 632.24 K (5180) Comment (0) Favorites

      Abstract:The purpose of good database logical design is to eliminate data redundancy and insertion, deletion and update anomalies. For temporal databases, temporal schemes may be normalized by using constraints of temporal functional dependencies (TFDs) with multiple temporal granularities. However, the adoption of temporal dimension and usage of multiple temporal granularities make it very complicated to design a temporal database. Generally, the set of temporal types that can be processed by a system and involved in lots of applications, meet totally ordered relation, and the set of TFDs with a totally ordered set of temporal types is closely related to the Armstrong axioms of traditional functional dependencies (FDs). By analyzing the existing relationships between TFDs and FDs and utilizing corresponding algorithms for traditional set of FDs, some important algorithms such as membership and finite closure of attributes algorithms are proposed for given set of TFDs. These algorithms are the basis of further normalization for temporal databases.

    • >Review Articles
    • Analysis and Research on Network Processor

      2003, 14(2):253-267. CSTR:

      Abstract (8330) HTML (0) PDF 1.11 M (8638) Comment (0) Favorites

      Abstract:Nowadays the most salient trend with network is the increase in data rates while there is significant effort in developing new protocols and services. However, the traditional network devices which are custom logic based or pure software based, could hardly satisfy both performance and flexibility requirements. To overcome this obstacle, the parallel and programmable network processors have been involved into processing path of routers (switch). Besides network processors which are built on ASIP technology and optimized for network applications, possess the characteristic of hardware and software solution simultaneously. Network processors extend the classic store-and-forward pattern to store-process-and-forward, which makes room for complex QoS control and payload processing. In this paper, the related research work is introduced from two aspects, system and application, and the system issues and challenges of network processors are analyzed. In the end, the future evolution of network processors and associate researches are also speculated.

    • A Survey on Software Watermarking

      2003, 14(2):268-277. CSTR:

      Abstract (8858) HTML (0) PDF 877.07 K (9679) Comment (0) Favorites

      Abstract:With the rapid development of software industry, the copyright protection of software product already becomes a very important issue. In this paper, the software watermarking technique is presented in detail. An overview of software watermarking including the taxonomy, the methods of attacking, the current algorithms, and their advantages and disadvantages are presented in this paper. Finally the state of arts and possible new directions of software watermarking are also stated.

    • Multi-Networking Communication Based on Myrinet/GM

      2003, 14(2):278-284. CSTR:

      Abstract (3900) HTML (0) PDF 621.95 K (5074) Comment (0) Favorites

      Abstract:Communication subsystem is crucial for cluster computing, which affects its efficiency, adaptability and scalability. Large-Scale applications require challenging communication performance and availability from cluster systems. Multi-Networking communication is a novel approach to improve the communication performance and availability by using multiple network links in parallel. In this paper, the effect of multi-process multiplexing one network link is analyzed, a dynamic link dispatch scheme is proposed, and the design and implementation of a multi-networking communication layer, MNC is introduced, which extends GM messaging layer, and supports multi-Myrinet parallel communication. MNC provides multi-process effectively exploiting the raw performance of multi-Myrinet, and improves the communication performance of application layer significantly. Compared with one-way Myrinet/GM environment, the communication bandwidth between MNC processes has increased by 34% on the PC cluster interconnected with 2-way Myrinet.

    • Design and Implementation of a High Performance VIA Based on Myrinet

      2003, 14(2):285-292. CSTR:

      Abstract (3834) HTML (0) PDF 845.49 K (5798) Comment (0) Favorites

      Abstract:Virtual interface architecture (VIA) established a communication model with low latency and high bandwidth, and defined the standard of user-level high-performance communication specification in cluster system. In this paper, the current development, the principle and implementations of VIA are analyzed, and a user-level high-performance communication software MyVIA based on Myrinet is presented, which is comfortable with VIA specification. First, the design principle and the framework of MyVIA are described, and then the optimized technologies for MyVIA are proposed, which include UTLB, continued physical memory and varied NIC buffer, the pipelining process based on resource and DMA chain, physical descriptor ring and dynamic cache. The experimental results indicate that the bandwidth of MyVIA for 4KB message is 250MB/s, the lowest one-way latency is 8.46ms, which show that the performance of MyVIA surpasses that of other VIA.

    • A Cluster Storage Architecture on Network-Attached Object-Based Devices

      2003, 14(2):293-299. CSTR:

      Abstract (3889) HTML (0) PDF 630.91 K (5279) Comment (0) Favorites

      Abstract:With the ever-increasing development of Internet, today抯 data-centric applications require storage platforms not only to possess some properties including high capacity and high scalability, but also to support structured data directly, which is beyond the abilities of current file systems and DBMS. In this paper, a model of network-attached object-based storage devices is presented. It provides storage and index interfaces for structured data employing the power of embedded processors, which eliminates the bottleneck of conventional storage systems. Then the architecture of cluster storage based on the model OStorage is proposed. It introduces the uniform storage of data and meta-data as well as query-locating mechanism to adapt storage hierarchies to structured data. These two methods improve the scalability and availability of the storage system. The prototype of Ostorage is implemented. The experimental results show that the throughput of it increases with the system scale linearly.

    • Analysis of Efficient Monitoring Method for the Network Flow

      2003, 14(2):300-304. CSTR:

      Abstract (5124) HTML (0) PDF 535.04 K (5357) Comment (0) Favorites

      Abstract:In this paper, the problem of efficient monitoring for the network flow is regarded as the problem to find out the minimum weak vertex cover set for a given graph G=(V,E). An approximation algorithm is presented. It is proved that the algorithm has a ratio bound of 2(lnd+1), where d is the maximum degree of the vertices in graph G. It is showed that the running time of the algorithm is O(|V|2).

    • An Overlay-Based Congestion Management Mechanism in Differentiated Services Networks

      2003, 14(2):305-311. CSTR:

      Abstract (4112) HTML (0) PDF 630.66 K (5189) Comment (0) Favorites

      Abstract:An overlay-based congestion management mechanism for assured forwarding in differentiated services (DiffServ) network is presented in this paper. In the proposed scheme, a control packet is sent from the ingress to the egress router every fixed time interval. The ingress router employs a simple additive increase and explicitly decrease algorithm to adjust the aggregate's sending rate according to the QoS (quality of services) information reflected from the egress routers. For the performance evaluation of the proposed scheme, the simulation of the (proportional) fairness of aggregates traffic and packet loss ratio is presented.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063