• Volume 20,Issue 9,2009 Table of Contents
    Select All
    Display Type: |
    • >Review Articles
    • Kernelization Techniques and Its Applications to Parameterized Computation

      2009, 20(9):2307-2319. CSTR:

      Abstract (7075) HTML (0) PDF 772.77 K (10132) Comment (0) Favorites

      Abstract:According to parameterized complexity theory, a decidable parameterized problem is fixed-parameter tractable if and only if it can be kernelized. Kernelization is the most widely applied and effective technique in the parameterized algorithm design. It is one of the hottest issues in parameterized complexity theory. This paper firstly introduces four main kernelization techniques, which are compared and analyzed with practical examples. Then it discusses how to apply these techniques to parameterized problems, such as covering problems, packing problems and cutting problems. Finally, the paper gives the future research directions about kernelization, especially the new possible kernelization technique and the kernel optimization of several FPT problems.

    • Parameter Model Based Strip-Mining Technique on the Stream Processor

      2009, 20(9):2320-2331. CSTR:

      Abstract (4688) HTML (0) PDF 750.01 K (5549) Comment (0) Favorites

      Abstract:The Strip-Mining technique is significant for improving SRF bandwidth utilization on the stream processor. It is critical to quantify the program execution time influenced by the strip size for achieving optimalstrip size. In order to achieve the theoretical optimal strip size, this paper proposes an optimal strip-miningtechnique based on a parameter model to minimize the execution time. Firstly, the paper builds a prefetching and reusing optimizations guided parameter model that characterizes the effect of strip size on program behavios.Secondly, based on the model analysis, this paper explores the optimal strip size selection approaches to the computation intensive programs and memory intensive programs respectively. Finally, an optimal strip-miningtechnique for any program is proposed. The experimental results show that our strip-mining technique caneffectively hide and avoid the memory access latency, so as to exploit the powerful computation ability of stream processor.

    • lgorithm of Optimizing Quantum Reversible Logic Synthesis

      2009, 20(9):2332-2343. CSTR:

      Abstract (4539) HTML (0) PDF 2.89 M (6193) Comment (0) Favorites

      Abstract:The key of optimizing quantum reversible logic lies in automatically constructing quantum reversible logic circuits with the minimal quantum cost. In order to improve the efficiency of an automatic synthesis and optimization of the reversible logic, a semi-template technique and a fast algorithm was proposed. Template is an efficient optimizing tool, and the semi-template technique can significantly improve the matching efficiency in optimization. R-M synthesis arithmetic is a good iterative method in reversible logic synthesis. Based on the original idea of R-M arithmetic, by constructing an optimal and collision-free Hash function, a new fast algorithm for synthesizing the quantum reversible logic circuits was proposed. This algorithm can construct optimal quantum reversible logic circuits with various types of gates and quantum cost. The experimental results show that to the best of the knowledge in the same testing environment, the results are much better than others.

    • Fat Computational Complexity and Heuristic Design for the TSP

      2009, 20(9):2344-2351. CSTR:

      Abstract (5437) HTML (0) PDF 494.75 K (9214) Comment (0) Favorites

      Abstract:The traveling salesman problem (TSP) is one of the classic NP-Hard combinatorial optimization problems. Efficient heuristics for the TSP have been the focus in research of computer science at all times. As a new tool to describe the structure of the TSP, the fat is essential for heuristic algorithm design. Since research on the fat is still at the beginning stage, It still lacks theoretical results and related heuristic algorithms. In this paper Firstly, the fat computational complexity for the TSP is investigated. It’s proved that it is NP-Hard to obtain the fat of the TSP through construction of biased instances, i.e., there is no algorithm to get the full fat of the TSP in polynomial time on the assumption P?NP. Furthermore, a meta-heuristic——dynamic candidate set search (DCSS) was proposed by analysis of the relationship between local optimal solutions and the fat. And the DCSS was applied to the LKH, one of the best existing algorithms for the TSP to improve it. Extensively wide experimental results on typical instances from the benchmark—TSPLIB indicate that the improved algorithm has a better performance than the LKH in terms of solution quality. This new fat-based heuristic shows a new way for other NP-hard problems.

    • BDD-Based Incremental Heuristic Search

      2009, 20(9):2352-2365. CSTR:

      Abstract (5140) HTML (0) PDF 990.78 K (7007) Comment (0) Favorites

      Abstract:Incremental search reuses information from previous searches to find solutions to a series of similar search problems. It is potentially faster than solving each search problem from scratch. This is very important because many artificial intelligence systems have to adapt their plans continuously to changes in the world. If the changes are small, incremental search will be very efficient. BDD (binary decision diagram)-Based heuristic search combines the advantages of BDD-based search and heuristic search. Heuristic search impacts the size of the resulting search trees and BDDs can be used to efficiently describe the sets of states based on their binary encodings. This article first introduces BDD-based heuristic search and incremental search. Combining the two methods, it then gives a BDD-based incremental heuristic search algorithm BDDRPA*. The experimental results show that BDDRPA* is a very efficient incremental heuristic search algorithm. It can be used to solve many problems like symbolic replanning and robot navigation problems and so on.

    • Approach to Chinese Word Segmentation Based on Character-Word Joint Decoding

      2009, 20(9):2366-2375. CSTR:

      Abstract (5197) HTML (0) PDF 546.05 K (8279) Comment (0) Favorites

      Abstract:The performance of Chinese word segmentation has been greatly improved by character-based approaches in recent years. With the help of powerful machine learning strategies, the words extraction via combination of characters becomes the focus in Chinese word segmentation researches. In spite of the outstanding capability of discovering out-of-vocabulary words, the character-based approaches are not as good as word-based approaches in in-vocabulary words segmentation with some internal and external information of the words lost. In this paper we propose a joint decoding strategy that combines the character-based conditional random field model and word-based Bi-gram language model, for segmenting Chinese character sequences. The experimental results demonstrate the good performance of our approach, and prove that two sub models are well integrated as the joint model of character and word could more effectively enhance the performance of Chinese word segmentation systems than any of the single model, thus is fit for many applications in Chinese information processing.

    • Concept-Based Data Clustering Model

      2009, 20(9):2387-2396. CSTR:

      Abstract (5076) HTML (0) PDF 366.22 K (7277) Comment (0) Favorites

      Abstract:In data mining, lots of clustering algorithms have been developed, and most of them are limited by scalability and interpretability. To solve this problem, a concept-based data clustering model is presented. From the perspective of the metadata describing samples, some basic concepts are extracted from the preprocessed dataset firstly in this model, and then generalizes, higher level concepts representing clustering results. Finally, the samples are classified into different final concepts and the clustering process is completed. On the premise of ensuring the accuracy of the clustering results, this model can greatly decrease the number of tuples needing to be processed, improving the data scalability of clustering algorithms. In addition, to discover and analyze knowledge based on concepts, this model can improve the interpretability of clustering results, and facilitate to interact with users. Experimental results show that the proposed model is more useful to the algorithms with higher computation cost and better results.

    • Model for Internet News Force Evaluation Based on Information Retrieval Technologies

      2009, 20(9):2397-2406. CSTR:

      Abstract (4953) HTML (0) PDF 546.50 K (7128) Comment (0) Favorites

      Abstract:Evaluating the force of Internet news is an important aspect in the social security field. This paper establishes a quantitative analysis model for calculating the Internet news force with information retrieval methods based on the correlative information got through information retrieval technologies. This method can help people understand how great the news affects the social security. A lot of experiments, lead to a conclusion: this method can rank a stream of news effectively, and also can find most important news items from a number of news which belong to different types; its result is very close to people’s judgment.

    • >Online First
    • Algorithm for Creating Voronoi Diagrams for Two-Dimensional Riemannian Manifolds

      2009, 20(9):2407-2416. CSTR:

      Abstract (6060) HTML (0) PDF 720.00 K (8095) Comment (0) Favorites

      Abstract:This paper describes objects by Riemannian manifolds and creates Voronoi diagrams based on charts. Difficulties in studying Voronoi diagrams for Riemannian manifolds are discussed. A theorem in existence is given, which demonstrates the present condition of Voronoi diagrams for Riemannian manifolds in a chart. According to the idea and theorem, this paper describes the algorithm of creating charts for two-dimensional Riemannian manifolds and presents the definitions of transition and blend functions. Finally, the algorithm of creating Voronoi diagrams based on charts is given, and some examples are provided.

    • Anchor Shot Detection Based on Face Detection and SIFT

      2009, 20(9):2417-2425. CSTR:

      Abstract (5038) HTML (0) PDF 627.73 K (6150) Comment (0) Favorites

      Abstract:Anchor shot detection is a fundamental step for segmenting news video into stories. In this paper, a algorithm is developed for anchor shot detection based on face detection and SIFT. Face detection is first used to filter out the shots which do not have any face in the special area. Then, color histogram is used to judge whether two shots are similar, and the distinctive image features from scale-invariant key points are detected and matched to find groups of shots which may be anchor shots. Last, anchor shots are identified based on the same prior information of anchor shots. Compared with other algorithms, the significant advantage of the proposed algorithm is that the algorithm is based on neither the templates nor the learned classifiers. The method has been tested on many kinds of news video, which demonstrates its effectiveness.

    • Efficient Trajectory Outlier Detection Algorithm Based on R-Tree

      2009, 20(9):2426-2435. CSTR:

      Abstract (5750) HTML (0) PDF 704.84 K (8011) Comment (0) Favorites

      Abstract:Recent progress on location aware services, GPS and wireless technologies has made it possible to real-timely track moving object and collect a large quarlity of trajectories data. As a result, how to effectively discover the knowledge from these trajectory data becomes an attractive and interesting research topic. The new trajectory outlier detection, proposed in this paper, can be used to determine whether two trajectories are globally matched by calculating the local matching degree between every base comparing unit pairs. Firstly, this paper proposes a new distance measure approach, which treats k consecutive points as a local comparing unit to depict the local features in terms of trajectories, via calculating the matching degree between trajectory segments. In addition, the critical concepts as local match, global match and trajectory outlier are presented. Secondly, based on this distance measure method, a new trajectory outlier detection algorithm based on R-tree is proposed to improve the efficiency of outlier detection. The main idea behind this algorithm is to eliminate unnecessary distance computation by R-tree and distance characteristic matrix between every trajectory pair. Extensive experiments demonstrate the efficiency and effectiveness of the proposed algorithm for trajectory outlier detection.

    • Efficient Subgraph Query Processing Algorithms on Graph-Structured XML Documents

      2009, 20(9):2436-2449. CSTR:

      Abstract (4612) HTML (0) PDF 766.42 K (6890) Comment (0) Favorites

      Abstract:Many challenges arise in subgraph query processing of graph-structured XML data. This paper studies the subgraph query processing of graph-structured XML data and proposes. A hash-based structural join algorithm, HGJoin to handle reachability queries on graph-structured XML data. Then, the algorithm is extended to process subgraph queries in form of bipartite graphs. Finally, based on these algorithms and cost model presented in this paper, a method to process subgraph queries in form of general DAGs is proposed. It is notable that all the algorithms above can be slightly modified to process subgraph queries in form of general graphs. Analysis and experiments show that all the algorithms have high performance.

    • Effective Image Auto-Annotation via Discriminative Hyperplane Tree Based Generative Model

      2009, 20(9):2450-2461. CSTR:

      Abstract (4476) HTML (0) PDF 766.32 K (5627) Comment (0) Favorites

      Abstract:Many machine learning methods such as generative model and discriminative model have been applied to image semantic automatic image annotation. However, due to the “semantic gap”, the imbalanced training data, and the multi-label characteristic of image annotation, the annotation performance still calls for improvement. In this paper, an image annotation method is proposed which augments the classical generative model with the proposed discriminative hyperplane tree. Based on the high visual generative probability training images (neighborhood) of the unlabeled image, the local hyperplane classification tree is adaptively established. The semantic relevant training image set is obtained through top-down hierarchical classification procedure by exploiting the discriminative information at each level. The joint probability between the unlabeled image and the semantic words is estimated based on the obtained semantic relevant local training set under the proposed framework. This method combines the advantages of both generative model and the discriminative models. From the aspect of generative model: by exploiting the discriminative information of the semantic cluster in the discriminative hyperplane tree, a local generative set is progressively refined, and therefore, improves accuracy. From the aspect of discriminative model: the multiple label assignment can be naturally implement by estimating the joint probability, which reduces the limitation of discriminative model induced by the imbalanced and overlapping training set. The experiments on the ECCV2002 benchmark show that the method outperforms state-of-the-art generative model-based annotation method MBRM and discriminative model based ASVM-MIL with F1 measure improving by 14% and 13% respectively.

    • Storage Optimized Containment-Encoded Intervals Indexing for Data Stream Querying

      2009, 20(9):2462-2469. CSTR:

      Abstract (3728) HTML (0) PDF 545.56 K (5396) Comment (0) Favorites

      Abstract:An index structure ACEI (advanced CEI) is proposed in this paper to optimize the storage of CEI (containment-encoded intervals)-based interval index structure for data stream processing which involves a lot of operations of the numerical range query. It is necessary to construct a main memory-based query index with a low storage cost and little search time. The CEI index structure has low storage utilization, although it supports for high-speed query. To solve this problem, index structure ACEI is proposed. Based on CEI, through structural adjustment and optimization of parameters, ACEI can maintain the high speed of query operation and reduce the space complexity from O(R+N·W/L+N·log(L)) to O(sqrt(R·N)+ N·sqrt(W)). Experiments show that ACEI structure can greatly improve the storage utilization and can be used for interval index against a large endpoint range.

    • >Review Articles
    • Techniques of Network Distance Prediction

      2009, 20(9):2470-2482. CSTR:

      Abstract (8331) HTML (0) PDF 716.78 K (9827) Comment (0) Favorites

      Abstract:In this paper, the concept of network distance prediction is firstly presented, and a brief discussion is made on different classification criteria. Then, based on the difference in prediction mechanisms, the existing research on distance prediction is classified into three types: the virtual coordinate based prediction mechanism, the network topology based prediction mechanism and the network proximity estimation mechanism. After a comparison between among the different prediction mechanisms, a comprehensive survey on network distance prediction is made, and the existing prediction mechanisms and their results are analyzed, Furthermore, the shortcomings and problems are outlined. In the end, the future trend of network distance prediction is discussed.

    • MAC Protocol for Wireless Sensor Networks via Collaborative Compression

      2009, 20(9):2483-2494. CSTR:

      Abstract (4684) HTML (0) PDF 676.46 K (5713) Comment (0) Favorites

      Abstract:Based on the broadcast nature of wireless signal, this paper proposes an approach that exploits the overhearing data omitted in conventional MAC protocols to eliminate the spatial correlation. Particularly, sensor nodes can prevent the transmission of redundant data in link layer by using the data they overhear to compress their own sensory data collaboratively before the transmission. Firstly, this paper formulates the problem that sensor nodes collaborate their compression to optimize their lifetime, and establish linear programming model for it. This paper also proposes a lower complexity (O(N2)) heuristic node selection algorithm while achieving a nearly optimal performance. Based on that, an efficient Collaborative ComPression-based MAC (CCP-MAC) protocol is designed to implement the above node selection algorithm in a distributed way. As a result, the corresponding node can receive the data it overhears from the selected sensor node subset to compress redundant data before the transmission. Experimental results show that by exploiting the data nodes overhear CCP-MAC can collaborate the nodes to compress sensory data, thereby conserve energy significantly to prolong the network lifetime.

    • Hierarchical Role-Based Delegation Authorization Execution Model for Service Grid

      2009, 20(9):2495-2510. CSTR:

      Abstract (4487) HTML (0) PDF 923.53 K (6335) Comment (0) Favorites

      Abstract:To satisfy various requirements restricted delegation of in grid applications, a hierarchical role-based delegation authorization execution model for service grid is proposed. The dynamic characteristic of delegation role granting or revocation and the associated constraint of delegation role granting are effectively supported. The fine-grained associated role dependency is implemented by adding trustworthiness. Partial delegation problem is easily solved by defining the role tree as the basic unit of delegation authorization and by pruning the role tree. The delegation spread tree with trustworthiness is defined to implement multi-step delegation in a fine-grained manner. The delegation certification is proposed to fully express temporary delegation, associated role delegation, partial delegation, multi-step delegation. Based on above works, a set of formal delegation authorization execution rules is proposed and proved, and the delegation authorization execution process is effectively controlled. The exhibited example shows that the model can satisty various requirements of restricted delegation in grid applications.

    • Load Balancing for Home Agents in MIPv6 Based on Active Overload Prevention

      2009, 20(9):2511-2519. CSTR:

      Abstract (4172) HTML (0) PDF 1.44 M (5768) Comment (0) Favorites

      Abstract:In order to enhance service availability and improve system performance, it is necessary to configure multiple HAs on the home link and efficiently balance load among these HAs. This paper proposes the Home Agent Load balancing method based on Active Overload Prevention (HALAOP). HALAOP actively selects optimal HA for each registration request to prevent HA’s overload in advance, rather than just passively switching load between HAs like previous methods. HALAOP introduces a dynamic load evaluate algorithm to provide the basis for optimal load balancing decision. In addition, the load slicing mechanism is introduced to eliminate unnecessary additional overhead. The results of numeric analysis show that HALAOP can be more efficient in reducing probability of registration failure due to HA’s overload and registration delay at lower additional cost than previous methods.

    • Efficient Fault Diagnosis Algorithm in Dynamic Internet Service Environment

      2009, 20(9):2520-2530. CSTR:

      Abstract (4697) HTML (0) PDF 703.92 K (6304) Comment (0) Favorites

      Abstract:Dynamic changes in service environment will affect fault diagnosis algorithm. In order to reduce the impact, challenges of fault diagnosis in dynamic environment are analyzed in this paper. Multi-layer management model is presented to model the service system, Bipartite Bayesian network is chosen to model the dependency relationship and binary symmetric channel is chosen to model noises. To deal with the dynamic fault set caused by fault recovery mechanism, prior fault probability is modified based on fault persistent time statistic; To deal with the dynamic model, expected model is built based on the time of observing symptoms and original models in current window. Simulation results show that this fault diagnosis algorithm is efficient in dynamic Internet service environment.

    • Collusion Problem of the EBS-Based Dynamic Key Management Scheme

      2009, 20(9):2531-2541. CSTR:

      Abstract (4594) HTML (0) PDF 796.80 K (6119) Comment (0) Favorites

      Abstract:The security of wireless sensor networks has attracted much attention in recent years and the key management is the focus. EBS-based dynamic key management scheme is a new approach for wireless sensornetworks. Its major advantages are its enhanced network survivability, high dynamic performance and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of the compromised nodes. In this paper, the feature of the collusion problem is analyzed and an optimization model is proposed, maximizing the length of the shortest collusion chain, which is the key issue of the problem. A discrete particle swarm optimization algorithm for the collusion problem is also presented based on the optimization model proposed. Simulation results show that compared with the former works, the resilience of the network and the difficulty to compromise the whole network are both greatly improved.

    • Truthful Mechanisms for Maximum Lifetime Routing in Wireless Ad Hoc Networks

      2009, 20(9):2542-2557. CSTR:

      Abstract (4420) HTML (0) PDF 718.49 K (5606) Comment (0) Favorites

      Abstract:In this paper, existing lifetime-aware routing algorithms are divided into two categories: General Max-Min (GMM) algorithm and Conditional Max-Min (CMM) algorithm. Motivated by algorithmic mechanism design, two truthful mechanisms for these two types of algorithms are proposed: SMM for GMM algorithm and SMM-VCG for CMM algorithm. By giving appropriate payments to the relay nodes, the proposed mechanisms gurantee that existing algorithms achieve their design objectives even in the presence of selfish nodes. It is shown that the payment ratio is relatively small and stable due to the nature of lifetime-aware routing algorithms, which is also confirmed by experiments.

    • Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks

      2009, 20(9):2558-2573. CSTR:

      Abstract (3896) HTML (0) PDF 754.09 K (5647) Comment (0) Favorites

      Abstract:This paper studies the traditional client puzzle scheme and proposes an adaptive scheme which erforms a lightweight client-server interaction to flexibly adjust the puzzle difficulty according to the eal-time statuses of both client and server. To evaluate the applicability, the authors combine the two schemes and develop an adaptive DoS-resistant security framework for Peer-to-Peer networks. The theoretical analyses and experimental results show that the adaptive client puzzle scheme can ffectively defend against various DoS attacks without significantly influencing legitimate clients’ experiences even in a highly malicious environment.

    • Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks

      2009, 20(9):2574-2586. CSTR:

      Abstract (5366) HTML (0) PDF 607.50 K (6719) Comment (0) Favorites

      Abstract:In this paper, new attacks against trust recommendation are identified and relationships between these attacks are analyzed. Then a trust model is presented with recommendation trust revision support based on Bayesian Decision-Making theory and the minimum- loss principle. The proposed trust model with recommendation trust revision (TMRTR) is employed in ad hoc networks for optimizing ad hoc routing. Simulation results in MATLAB environment show the method proposed is helpful to reduce the impact of some new threats to trust management and improves the effect of trust management. Synchronously, the proposed system can effectively detect malicious nodes in ad hoc networks.

    • Impossible Differential Cryptanalysis of CLEFIA-128/192/256

      2009, 20(9):2587-2596. CSTR:

      Abstract (5157) HTML (0) PDF 505.24 K (6514) Comment (0) Favorites

      Abstract:An improved impossible differential attack on the block cipher CLEFIA is presented. CLEFIA was proposed by Sony Corporation at FSE 2007. Combining some observations with new tricks, the wrong keys are filtered out more efficiently, and the original impossible differential attack on 11-round CLEFIA-192/256 published by the designers, is extended to CLEFIA-128/192/256, with about 2103.1 encryptions and 2103.1 chosen plaintexts. By putting more constraint conditions on plaintext pairs, we present an attack on 12-round CLEFIA for all three key lengths with 2119.1 encryptions and 2119.1 chosen plaintexts. Moreover, a birthday sieve method is introduced to decrease the complexity of the precomputation. And an error about the time complexity evaluation in Tsunoo et al.’s attack on 12-round CLEFIA is pointed out and corrected.

    • Multi-Camera Collaboration Based on Trifocal Tensor Transfer

      2009, 20(9):2597-2606. CSTR:

      Abstract (4608) HTML (0) PDF 843.41 K (5941) Comment (0) Favorites

      Abstract:This paper presents a head detection and trifocal tensor pointer transfer based multi-camera collaboration. In this approach, people’s head position is detected after background subtraction and tracked by Kalman and PDA. Trifocal tensor transfer is used to locate objects in the virtual top view by the corresponding head points in two camera views. Compared with existing approach, the approach doesn’t need camera calibration and coplanar precondition, nor does the deterioration of epipolar transfer exist. The experimental comparison between this approach and other traditional ones proves its effectiveness and accuracy.

    • Locally Linear Embedding Based on Relative Manifold

      2009, 20(9):3476-2386. CSTR:

      Abstract (4532) HTML (0) PDF 1.38 M (6557) Comment (0) Favorites

      Abstract:Locally linear embedding greatly depends on whether the neighborhood graph can realistically reflect the underlying geometry structure of the data manifolds. The topological structure of constructed neighborhood with the existing approaches is unstable. It is sensitive to the noisy and sparse data sets. Based on the relative cognitive law, the relative transformation is presented, by which the relative space and the relative manifold are further constructed. The relative transformation can improve the distinguishing ability between data points and reduce the impact of noise and sparsity of data. To determine the neighborhood in the relative space and the relative manifold can more truly reflect the manifold structure, based on which the enhanced local linear embedding algorithms are developed with significantly improved performance. Besides, the speed is also enhanced with this approach. The experiments on challenging benchmark data sets validate the proposed approach.

    • Triangle Mesh Compression Based on Reverse Subdivision for Mobile Terminals

      2009, 20(9):3607-2615. CSTR:

      Abstract (4193) HTML (0) PDF 747.07 K (6478) Comment (0) Favorites

      Abstract:A triangle mesh compression algorithm based on reverse subdivision is introduced. By improving reverse Butterfly simplification algorithm, a mesh simplification algorithm based on reverse Modified Loop scheme is proposed. The dense triangle mesh is decomposed into progressive meshes which consist of a base mesh and a series of displacement wavelets. The progressive meshes are compressed with embedded zerotree coding by constructing displacement wavelets tree structure. The experiments show that the proposed approach is faster and more efficient than previous related techniques. The proposed algorithm can be used for progressive transmission over wireless networks and 3D graphics real-time rendering on mobile terminals.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063