LIAO Bei-Shui , LI Shi-Jian , YAO Yuan , GAO Ji
2008, 19(4):779-802.
Abstract:Autonomic computing is an emerging research hotspot, which aims at hiding system management complexity from human users by means of "technologies managing technologies", to establish guidable, state-aware, and self-adaptive computer systems. Currently, the research of autonomic computing is still in its infancy, without systematic and mature theories. After clarifying the definition of autonomic computing, this paper proposes a conceptual model, which describes the basic working mechanisms and principles of autonomic elements and autonomic computing systems. On the basis of this model, two categories of autonomic computing systems based on knowledge model and mathematical model respectively are summarized and analyzed, with their advantages and disadvantages. Finally, the future research directions of autonomic computing are proposed.
2008, 19(4):803-816.
Abstract:An image filter called the pseudosphere filter is presented in this paper. An edge-preserving parameter is introduced besides a scale parameter in the pseudosphere filter, and thus a better trade-off between image smoothing and edge locating can be obtained by using it. A pseudosphere-based edge detector is built by replacing the Gaussian filter in the classic Canny edge detector with the pseudosphere filter. Experimental results show that, by comparing with the classic Canny edge detector, in the case of having the same smoothness, pseudosphere-based edge detector offers a better precision for edge locating.
ZHANG Kuo , LI Juan-Zi , WU Gang , WANG Ke-Hong
2008, 19(4):817-828.
Abstract:New event detection (NED) is aimed at detecting from one or multiple streams of news stories the one being reported on a new event (i.e. not reported previously). Preliminary experiments show that terms of different types (e.g. Noun and Verb) have different effects for different classes of stories in determining whether or not two stories are on the same topic. Unfortunately, conventional approaches usually ignore the fact. This paper proposes a NED model utilizing two approaches to addressing the problem based on term reweighting. In the first approach, the paper proposes to employ statistics on training data to learn the model for each class of stories, and in the second, the paper proposes to adjust term weights dynamically based on previous story clusters. Experimental results on two linguistic data consortium (LDC) data sets: TDT2 and TDT3 show that both the proposed approaches can effectively improve the performance of NED task, compared to the baseline method and existing methods.
SONG Chuan-Ming , WANG Xiang-Hai , ZHANG Fu-Yan
2008, 19(4):829-841.
Abstract:This paper proposes a fast motion estimation scheme of arbitrarily shaped video object. The instructive role of the alpha-plane taking part in the motion estimation of video object is discussed, and a weighted binary alpha-plane matching criterion (WBAMC) is proposed by using boundary extension and boundary mask techniques. Based on priority search strategy, this paper proposes a fast binary alpha-plane assisted motion estimation (BAAME) scheme of video object. First, the BAAME uses alpha-plane and the WBAMC criterion to limit the search of boundary macro-blocks (MBs) into small unimodal area of two starting points so that a conventional fast motion estimation algorithm can be employed to search the motion vectors (MVs) of boundary MBs. Second, the BAAME predicts the starting points of opaque MBs by using MVs of neighboring boundary MBs and then employs a fast motion estimation algorithm to compute the MVs of opaque MBs. The proposed scheme can be combined with many spatial domain based and frequency domain based different motion estimation algorithms, and be effectively applied to object-based video codecs. The experimental results show that the BAAME scheme can always reach high motion estimation accuracy and better subjective quality for standard test video sequences which have different characteristics respectively. The proposed scheme can achieve 0.1~0.8dB higher prediction quality on average than DS (diamond search) and PSA (priority search algorithm) (BAAS (binary alpha-plane assisted search)+DS), and a little lower PSNR (peak signal-to-noise ratio) than FS (full search). Moreover, the BAAME scheme can speed up the motion estimation about 20 times in terms of computational complexity when compared with FS.
REN Shuang-Qiao , FU Yao-Wen , LI Xiang , ZHUANG Zhao-Wen
2008, 19(4):842-850.
Abstract:Firstly, a distinguishable condition is proposed for separating the features by linear classification hyper surface. Secondly, the paper analyses the properties of the feature linear distinguishable criterion based on support vector machines (SVMs). Finally, the efficiency rate of features are defined by the contribution to classes margin of each feature, and a feature selection algorithm is put forward based on the feature efficiency rate. As experimental results show, validated with the actually measuring data and UCI (University of California, Irvine) data, performance of the new feature selection method, such as classification capability and generalized capability are improved obviously in contrast to the classical Relief method.
2008, 19(4):851-860.
Abstract:Most methods of super resolution so far enhance images by adding exterior information extracted from a given training set. However, this is impractical in lots of cases. From analysis of an ideal edge model and texture contents within images, it is found that many images hold similar local structure at different resolution and preserve it stably in the scale space. Based on this property, Image Analogies can be applied to pass local information onto lower resolution image and thus to achieve resolution enhancement. Original image and its lower-resolution version are used to construct the training set to fit this problem to Image Analogies, and it is resolved by minimizing a graph with energy. Experimental results show that this self analogies algorithm can amplify images much more sharply than traditional interpolation-like methods, and more importantly, it can be executed independently without any supposed outliers.
TANG Xu-Qing , ZHU Ping , CHENG Jia-Xing
2008, 19(4):861-868.
Abstract:In this paper, on the basis of fuzzy quotient space theory, cluster analysis methods based on fuzzy similarity relations and normalized distance are proposed to solve data structure analysis of complex systems. Three conclusions are given: (1) the strictly clustering analysis theoretical description by introducing hierarchical structures of fuzzy similarity relation and normalized distance; (2) the effective and rapid clustering algorithms of their hierarchical structures; (3) a sufficient condition for isomorphic hierarchical structures. These conclusions are suitable to data structure analysis of all complex systems based on similarity relation.
2008, 19(4):869-878.
Abstract:Answer set programming (ASP) is a logic programming paradigm under answer set semantics, which can be utilized in the field of non-monotonic reasoning and declarative problem solving, etc. This paper proposes and implements a cycle breaking heuristic and a bottom-restricted look-ahead procedure for ASP, and the resulting system is called LPS. The experimental results show that, relative to other state-of-the-art ASP systems, LPS could efficiently solve logic programs in phase transition hard-job-regions, and these programs are generally considered difficult to compute. In addition, by applying the so-called dynamic variable filtering (DVF) technique, LPS could greatly reduce the search tree size during the computation.
CAO Xiao-Mei , YU Bo , CHEN Gui-Hai , REN Feng-Yuan
2008, 19(4):879-887.
Abstract:Correct node position information is the prerequisite and foundation of many sensor network modules, such as network building and maintenance, monitoring event localization, and target tracking. The node localization process is vulnerable to diverse attacks. In resource-constrained sensor networks, how to securely and effectively locate sensor's coordinates is one of the most challenging security problems. This paper presents various attacks against different node localization systems, analyses the principles, characteristics, and limitations of recent representative secure localization countermeasures. Finally, future research direction is summarized.
LU Gang , ZHOU Ming-Tian , NIU Xin-Zheng , SHE Kun , TANG Yong , QIN Ke
2008, 19(4):888-911.
Abstract:Network topology can be represented by the proximity graph defined as a graph with a set of vertices V and a set of edges E such that a directed edge (u,v) belong to E if and only if the point v is in the neighborhood induced by some predefined proximity measures of point u. This paper reviews some important graphs obtained so far, and the contents mainly concentrated in five aspects of those proximity graphs including their definitions or conceptions, construction algorithms, illustrations, topological relationships, and some parameters. This paper also outlines several further research directions.
YANG Yu-Hang , ZHAO Tie-Jun , YU Hao , ZHENG De-Quan
2008, 19(4):912-924.
Abstract:Popularity of bloggers and the amount of information in the blogosphere increase fast. Blogs have constituted a dynamic and tightly social network by using frequent links and information interaction, and become an important source of information for the real world. Most researches on blog mainly concentrate on blog definition and identification, content mining, community discovery, importance analysis, blog search and spam blog identification. Methods and technologies of link analysis and natural language processing are used in most works, and some blog-specific methods are proposed. This paper analyzes and compares these researches on blogosphere. Problems of current topics are discussed, and finally future directions are proposed in this paper.
WANG Guo-Jun , WU Min , ZHOU Wei , HE Jian-Biao , CHEN Song-Qiao
2008, 19(4):925-945.
Abstract:Group communications have been studied in the wired Internet for many years and remain a very hot research topic, especially on extending the existing achievements into mobile and wireless network environment. This paper identifies some interesting problems in mobile group communications regarding dynamic group membership due to member joining and leaving, dynamic locations due to node mobility, and dynamic networks due to node/link failures. These problems are solved by proposing a ring-based hierarchy of proxies with bi-directional tokens. The proposed hierarchy is a combination of logical rings and logical trees, which takes advantage of the simplicity of logical rings and the scalability of logical trees. More importantly, such a combination makes the proposed protocol based on this hierarchy more reliable than the existing tree-based protocols. Theoretical analysis and simulation studies of the proposed protocol show that: (1) It scales very well when the size of a group becomes large; (2) It is strongly resilient to failures that occur in the network. It is particularly suitable for those service providers and network operators which have deployed their machines in a hierarchical setting, where each machine can be locally configured to know the information about its sibling and parent machines.
PENG Dong-Sheng , LIN Chuang , LIU Wei-Dong
2008, 19(4):946-955.
Abstract:Reputation-Based trust mechanism can efficiently solve the problems of virus flooding and malicious behaviors in P2P network. Most of the existing trust mechanisms use a single reputation value to depict the node's reliability, which cannot prevent malicious nodes from concealing dishonest selling behaviors with honest buying behaviors, and cannot separate the new node from the malicious one. This paper provides a new distributed trust mechanism, which iteratively calculates for each node a global seller reputation value and a global buyer reputation value based on transaction history, and whether a node is trustable or not can be identified from them. Comparison experiments and performance analysis between the mechanism and EigenTrust show that the mechanism can reduce the global reputation value of malicious node rapidly, restrain collusion attack, and decrease probability malicious transactions.
LI Chun-Hong , FENG Guo-Fu , GU Tie-Cheng , LU Sang-Lu , CHEN Dao-Xu
2008, 19(4):956-966.
Abstract:This paper investigates cache routing and cache management problems for en-route transcoding caching systems. An active cache routing algorithm called CCRA (cost-aware cache routing algorithm) is designed, which, using a controllable probing load, can find the potential cache objects with minimal access cost. Then an analyzable model for en-route transcoding caching is established, with which the cooperative cache placement and replacement problem is formulated as an optimization problem and the optimal locations to cache the object are obtained by using a dynamic programming algorithm. Results of the simulation show that the proposed scheme outperforms existing meta placement algorithms on metric of CSR (cost save ratio).
WANG Jie-Sheng , LI Zhou-Jun , LI Meng-Jun
2008, 19(4):967-980.
Abstract:Aiming at critical issues in the function-oriented composition of semantic Web services, such as the incapability of classic AI planning methods to handle the dynamically created individuals during Web services' executions and the inadequacy of service matchmaking based methods to fully exploit the semantic connections between types of services' I/O parameters. Following a comparative study of description logics and dynamic logics, Web services' IOPR's (inputs, outputs, preconditions and results) are encoded in axioms of description logics, and AI (artificial intelligence) planning method based on dynamic logic is extended to accommodate the transformation of a service composition problem into reasoning task of description logics. It finally overcomes difficulties in the classic AI planning method and defects in those methods based on service matchmaking.
WANG Yong , YUN Xiao-Chun , LI Yi-Fei
2008, 19(4):981-992.
Abstract:Measuring and characterizing the topological properties of peer-to-peer networks will benefit the optimization, management of the P2P systems. It seems infeasible to capture a complete and precise snapshot of P2P overlay networks due to the variety of P2P protocols and dynamics of the servents. Studying the details of P2P protocols and analyzing the specific P2P overlay network instance become an alternative method for this goal. In this paper, the measured Gnutella network topology is basically taken as an example. The architecture and performance of the distributed crawling system (called D-Crawler system) with feedback mechanism is presented. The properties of degree-rank distributions and degree-frequency distributions of the measured topology graphs are analyzed in detail. The small world characteristics for Gnutella network are discussed. The results show that the P2P overlay network topology characters are closely related to the P2P protocols and clients' behaviors. Gnutella network shows different characters in each tier. The top level graphs fit the power law in degree-rank distribution, but follow the Gaussian function in degree-frequency distribution. The bottom level graphs show weak power law in its degree-rank distribution, but are power law in its degree-frequency distribution. Fitting results indicate that power law could fit better for the degree-rank distribution and degree-frequency distribution of bottom level graphs, Gaussian could describe the degree-frequency distribution of the top level graphs. Gnutella overlay network has the small world property, but it is not the scale-free network, its topology may have developed over time following a different set of growth processes from those of the BA (Barabási-Albert) model.
LIU Yan-Heng , TIAN Da-Xin , YU Xue-Gang , WANG Jian
2008, 19(4):993-1003.
Abstract:As Internet bandwidth is increasing at an exponential rate, it's impossible to keep up with the speed of networks by just increasing the speed of processors. In addition, those complex intrusion detection methods also further add to the pressure on network intrusion detection system (NIDS) platforms, and then the continuous increasing speed and throughput of network pose new challenges to NIDS. In order to make NIDS effective in Gigabit Ethernet, the ideal policy is to use a load balancer to split the traffic and forward them to different detection sensors, and these sensors can analyze the splitting data in parallel. If the load balancer is required to make each slice containing all the necessary evidence to detect a specific attack, it has to be designed complicatedly and becomes a new bottleneck of NIDS. To simplify the load balancer, this paper puts forward a distributed neural network learning algorithm. By using the learning algorithm, a large data set can be split randomly and each slice data is handled by an independent neural network in parallel. The first experiment tests the algorithm's learning ability on the benchmark of circle-in-the-square and compares it with ARTMAP (adaptive resonance theory supervised predictive mapping) and BP (back propagation) neural network; the second experiment is performed on the KDD'99 Data Set which is a standard intrusion detection benchmark. Comparisons with other approaches on the same benchmark show that it can perform detection at a high detection speed and low false alarm rate.
SUN Xin , ZHOU Kun , SHI Jiao-Ying
2008, 19(4):1004-1015.
Abstract:All previous algorithms of real-time global illumination rendering based on precomputation assume that the materials are invariant, which makes the transfer from lighting to outgoing radiance a linear transformation. By precomputing the linear transformation, real-time global illumination rendering can be achieved under dynamic lighting. This linearity does not hold when materials change. So far, there are no algorithms applicable to scenes with dynamic materials. This paper introduces a real-time rendering method for scenes with editable materials under direct and indirect illumination. The outgoing radiance is separated into different parts based on the times and corresponding materials of reflections. Each part of radiance is linear dependent on the product of the materials along its path of reflections. So the nonlinear problem is converted to a linear one. All materials available are represented as linear combinations of a basis. The basis is applied to the scene to get numbers of different material distributions. For each material distribution, all parts of radiance are precomputed. This paper simply linear combines the precomputed data by coefficients of materials on basis to achieve the effects of global illumination in real-time. This method is applied to scenes with fixed geometry, fixed lighting and fixed view direction. And the materials are represented with bidirectional reflectance distribution functions (BRDFs), which do not take refraction or translucency into account. The authors can simulate in real-time frame rates up to two bounces of light in the implementation, and some interesting phenomena of global illumination, such as color bleeding and caustics, can be achieved.
LIU Ying , LIU Xue-Hui , WU En-Hua
2008, 19(4):1016-1025.
Abstract:This paper presents an efficient algorithm for encoding the connectivity information of triangular meshes. In the previous algorithms, Huffman or arithmetic coding method is directly used to encode operator series, but in comparison in this method, it can efficiently improve the compression ratio of connectivity information by predicting correctly the operator currently being encoded. By the method, all triangles are traversed first to obtain operator series. Then an arithmetic coder based on variable code-mode is applied to encode the operator series. According to the operator last encoded, the property of triangular mesh and the method of mesh traversal, a code-mode is calculated for each operator currently being encoded, where the operator with higher prediction probability is given a shorter binary strand. Then the binary strand can be obtained according to its code-mode and encode every bit of this binary strand by adaptive arithmetic coding method. The algorithm is a face-based method and also a single-resolution lossless compression method for manifold triangular mesh. Testing results show that the compression ratio of the algorithm is very high and even higher than the compression ratio by using TG algorithm, which is commonly regarded as one of the best in terms of compression ratio.
2008, 19(4):1026-1035.
Abstract:This paper considers the problem of decomposing a polyhedral surface or a polyhedron into simpler components: Monotone patches or terrain polyhedra. It is shown to be NP-complete to decide if a polyhedral surface can be decomposed into k monotone patches, by constructing a geometric model to make a reduction from SAT (satisfiability) problem. And the corresponding optimization problem is shown to be NP-hard. Then, the method is extended to the problems of decomposing a polyhedron with or without holes into the minimum number of terrain polyhedra, both of which are also shown to be NP-hard.
HU Hong-Chao , YI Peng , GUO Yun-Fei
2008, 19(4):1036-1050.
Abstract:Simulation has become a significant way for performance evaluations in switching and scheduling, however, the existing simulation softwares have some limitations in inheritability and extensibility. Based on the current crossbar switching fabric, by employing system level design method, and object oriented technology, a simulation platform called SPES (switching performance evaluation system) for switching fabrics and scheduling policies' developments are designed and implemented. Input queuing, output queuing, combined input-output queuing and combined input-crosspoint queuing and corresponding scheduling policies are integrated. Inheritability and extensibility attributes are obtained by designing traffic sources, switching fabrics and scheduling policies separately, and it exhibits good performances for supporting multi-fabric, variable packets sizes and QoS model's simulations. By configuring the platform through a uniform view, users can fulfill their concrete simulation environment. Besides, it can carry out end to end performances' evaluations with little modification. Finally, this paper presents a simulation case based on combined input-crosspoint queuing switch, displaying the good performance of SPES.
YU Zhi-Bin , JIN Hai , ZOU Nan-Hai
2008, 19(4):1051-1068.
Abstract:Computer architecture simulation is an integral part of modern computer design process. Simulation can help architects reduce the time and cost of computer architecture design dramatically. However, difficulties of constructing simulators, long simulation time, and poor accuracy limit the effectiveness of simulation. Many researchers have proposed a wide range of approaches to resolving the three main problems, which are still open. Meanwhile, new challenges start to emerge for future computer architecture simulation. This paper investigates the history of computer architecture simulation, classifies and compares the existing methodologies and technologies, and analyzes the challenges to help architects select, develop, or research on simulators. A brief description of the simulator SimIPF design is provided as well.
HUANG Kun , MA Ke , ZENG Hong-Bo , ZHANG Ge , ZHANG Long-Bing
2008, 19(4):1069-1080.
Abstract:As the transistor resources and delay of interconnect wires increase, the tiled multi-core processor has been a new direction for multi-core processor. In order to thoroughly study new type processor and explore the design space of it, this paper designs and implements a user-level performance simulator for the tiled CMP architecture. The simulator adopts the directory-based Cache Coherence Protocol and the architecture of store-and-forward Network- on-Chip with Godson-2 CPU as the processing core model, and depicts out-of-order transacted requests and responses and conflictions of requests and their timing characteristics in detail. The simulator can be used to evaluate all kinds of important performance features of the tiled CMP (chip multiprocessor) architecture by running all kinds of sequential or parallel workloads, and thus provides a fast, flexible and efficient platform for architecture design of multi-core processor.