• Volume 22,Issue 2,2011 Table of Contents
    Select All
    Display Type: |
    • Ontology-Guided Requirements Modeling Based on Problem Frames Approach

      2011, 22(2):177-194. DOI: 10.3724/SP.J.1001.2011.03755

      Abstract (6665) HTML (0) PDF 631.68 K (9347) Comment (0) Favorites

      Abstract:On the basis of intensive study of the problem frames (PF) approach, this paper extracts and develops an ontology for conceptualizing the requirements model of the PF approach and designs an ontology-guided modeling process. The aim is to present the analysts with a modeling guide and with standard the modeling activities. Finally, a case study has been given to illustrate the whole process.

    • Extending QVT Relations for Business Process Model Transformation

      2011, 22(2):195-210. DOI: 10.3724/SP.J.1001.2011.03753

      Abstract (5422) HTML (0) PDF 458.33 K (6891) Comment (0) Favorites

      Abstract:QVT (Query/View/Transformation) Relations cannot describe the pattern that includes other patterns, so it has some difficulties in defining the rules of a process model transformation. To solve this problem, the paper extends QVT Relations with three new concepts: Pattern Factor, Nested Relation Expression, and Relationship End Constraint. The paper also discusses the pattern matching and the model creating semantics after the extension. At Last, a case study is presented to show how the extension could deal with process model transformations.

    • Model Checking Rate Monotonic Scheduling Algorithm Based on Propositional Projection Temporal Logic

      2011, 22(2):211-221. DOI: 10.3724/SP.J.1001.2011.03729

      Abstract (6003) HTML (0) PDF 503.56 K (6720) Comment (0) Favorites

      Abstract:A propositional projection temporal logic (PPTL) based model checking approach for rate monotonic scheduling (RMS) is presented. With this approach, RMS controlled systems are modeled by PROMELA, which is the system modeling language in model checker SPIN. The desired property is specified by a PPTL formula. Next, whether or not the system satisfies the property can be verified with SPIN. Accordingly, the schedulability of a group of tasks can be obtained; meanwhile, other properties of the tasks scheduling system under RMS algorithm can also be verified.

    • Chinese Semantic Role Labeling Based on Feature Combination

      2011, 22(2):222-232. DOI: 10.3724/SP.J.1001.2011.03844

      Abstract (6573) HTML (0) PDF 457.87 K (8386) Comment (0) Favorites

      Abstract:This paper proposes a semantic role labeling (SRL) approach for the Chinese, based on feature combination and support vector machine (SVM). The approach takes the constituent as the labeling unit. First, this paper defines the basic feature set by selecting the high-performance features of existing parsing-based SRL systems. Then, a statistics-based method is proposed to construct a combined feature set derived from the basic feature set. According to the distribution of combining features in both positive and negative instances, the ratio of between-class to within-class distance is utilized as the measurement of classifying the performance the feature, and then choosing the combining features with high ratios into the combining feature set. Finally, the experimental results show that the feature combination method-based SRL achieved 91.81% F-score on Chinese PropBank (CPB) corpus, nearly 2% higher than the traditional method.

    • Pronoun Resolution in Spoken Dialog

      2011, 22(2):233-244. DOI: 10.3724/SP.J.1001.2011.03720

      Abstract (6504) HTML (0) PDF 410.10 K (9120) Comment (0) Favorites

      Abstract:This paper presents a two-stage pronoun resolution algorithm. It does not need to clean the testing corpus and predefine patterns manually. In the first stage of the algorithm, some new features and machine learning methods are used to classify pronouns into anaphoric and non-anaphoric ones. In the second stage, these two kinds of pronouns are resolved respectively. For the anaphoric ones, some methods are presented to extract distance, syntactic, and semantic features etc. For the non-anaphoric ones, the Right Frontier Rule is improved to do the resolution work. While testing the corpus published by Byron in 2004, this algorithm achieves a precision of 77.0% and a recall of 66.0%. Compared with the work of Byron, the algorithm is fully automatic, and the results are much better.

    • Hierarchically Classified Probabilistic Grammar Parsing

      2011, 22(2):245-257. DOI: 10.3724/SP.J.1001.2011.03809

      Abstract (5693) HTML (0) PDF 458.26 K (7355) Comment (0) Favorites

      Abstract:This paper analyzed various existing approaches of structural grammar parsing, and addressed the problem of over-classification and under-classification. Then a hierarchically classified phase structure grammar (HC-PSG) and a hierarchically classified probabilistic context-free grammar (HC-PCFG) parsing are proposed to respond to this challenge. A measure of class clustering is designed to eliminate the classification ambiguity of grammar rules. The HC approach implements a general learning rule from a small number of phrase instances. An instant clustering method is used to disambiguate rules learned from corpus. The HC method is also extended to context sensitive grammar parsing to improve performance. It employs the classification of the context relevancy to handle the problem of corpus sparsity. By all the means, it can leverage the conflicts between under-classification and over-classification.

    • Modeling, Design and Implementation of Graph OLAPing

      2011, 22(2):258-268. DOI: 10.3724/SP.J.1001.2011.03771

      Abstract (7023) HTML (0) PDF 567.74 K (6703) Comment (0) Favorites

      Abstract:This paper presents a series of models and algorithms to implement OLAPing on graph data. The major contributions include (1) proposing a graph-oriented data warehouse model, called a double star model, (2) proposing the concept of graph data cube and its building algorithm, (3) designing an informational OLAPing algorithm, I-OLAPing, (4) designing topological dimensional OLAPing algorithm, T-OLAPing, and (5) building a Graph OLAPing prototype, Graph OLAPer1.0, based on the proposed approaches. Experimental results show that the Graph OLAPing algorithms designed and implemented in this paper, together with Graph OLAPing prototype, Graph OLAPer1.0 can work effectively on Co-Author Networks.

    • Distributed Spatial Data Fragmentation and Cross-Border Topological Join Optimization

      2011, 22(2):269-284. DOI: 10.3724/SP.J.1001.2011.03798

      Abstract (6315) HTML (0) PDF 552.55 K (7666) Comment (0) Favorites

      Abstract:This paper aims at explaining the cross-border topological join queries of spatial fragments of the zone fragmentation data in distributed spatial database (DSDB), and the optimizing methods for such queries are proposed. First, the fragmentation and distribution of spatial data in a distributed environment are discussed, and the extra principles for spatial data fragmentation are put forward, including spatial clustering, non-partitioning on spatial objects, and maintaining logical seamless. Then, the fragment joins in zone fragmentation are classified into two categories: cross-border join and non-cross-border join; the topological relationships are also classified into two categories. Thus, the emphasis is put on the two types of cross-border topological joins. Two theorems for cross-border topological join optimization are proposed and proved. Based on the theorems, the optimizing rules for cross-border spatial topological join are given, including the removing rules and the transforming rules of fragment joins. Finally, tests are designed to compare three join strategies that include Na?ve join strategy, semi-join strategy and the proposed strategies. The results show that the proposed methods greatly improve the cross-border join optimizing efficiency. Therefore, the theorems and methods proposed in this work can be applied to the optimization of distributed cross-border spatial topological queries.

    • Mining Optimized Probabilistic Intervention Strategy over Uncertain Data Set

      2011, 22(2):285-297. DOI: 10.3724/SP.J.1001.2011.03829

      Abstract (6033) HTML (0) PDF 954.71 K (7754) Comment (0) Favorites

      Abstract:This study provides models to analyze the intervention over uncertain data. The main contributions include: (1) It establishes a base model named Uncertain Surveillance; (2) It proposes probabilistic intervention strategies over uncertain surveillance with evaluating algorithms; (3) It gives extensive experiments and makes comparisons to show that the proposed model is highly precise and efficient in three order magnitudes of na?ve methods.

    • Spectrum Sensing Algorithm Based on Clique Partition for Wireless Cognitive Networks

      2011, 22(2):298-312. DOI: 10.3724/SP.J.1001.2011.03721

      Abstract (5819) HTML (0) PDF 1.57 M (7174) Comment (0) Favorites

      Abstract:A distributed sensing algorithm is proposed which considers the nodes’ contention relation and the sensing cost. The algorithm is based on the distributed minimum clique partition, which can classify nodes into several cliques. Then, the optimal spectrum sensing scheme for each node is calculated on the foundation of cliques. The computation complexity is O(N2+M×N), N is the node number of the network, and M is the number of channels. By a detailed simulation, the results demonstrate that the network performance is improved efficiently with the use of the algorithm.

    • Upper Bounds on Lifetime of Ordinary Clustering Ultra Wide Band Sensor Networks

      2011, 22(2):313-322. DOI: 10.3724/SP.J.1001.2011.03748

      Abstract (4975) HTML (0) PDF 413.49 K (5781) Comment (0) Favorites

      Abstract:This paper considers the time hopping impulse radio ultra wide band (TH-IR UWB) sensor networks, with n sensor nodes uniformly and independently located on a square and a Sink. The upper bounds on the lifetime of ordinary clustering dense and extended TH-IR UWB sensor networks are derived respectively. For ordinary clustering networks, the cluster head aggregates data from the nodes within its own cluster, and relays data to other cluster heads. The results indicate that the upper bounds on the lifetime of ordinary clustering dense TH-IR UWB are in proportion with the node density (or the number of nodes), while the upper bounds on the lifetime of extended networks are inversely proportional to the size of the deployment area (or the number of nodes). The results also reveal that the upper bound on the lifetime of dense network in the ideal case are longer than those of the static network by a factor of (n/log n)1/2, and the upper bound on the lifetime of extended network in the ideal case are longer than those of the static network by a factor of (λn/log(λn))1/2. Therefore, sensor nodes, or the Sink moving randomly in the square, can improve the lifetime of ordinary clustering TH-IR UWB sensor network.

    • XACML Policy Evaluation Engine Based on Multi-Level Optimization Technology

      2011, 22(2):323-338. DOI: 10.3724/SP.J.1001.2011.03707

      Abstract (5235) HTML (0) PDF 1.21 M (8051) Comment (0) Favorites

      Abstract:This paper proposes an implementation scheme of XACML (extensible access control markup language) policy evaluation engine based on multi-level optimization technology, MLOBEE (multi-level optimization based evaluation engine). Before evaluating these policies, the scenario implements rule refinement to lessen scale policies and adjust the sequence at the rule. During evaluation, the engine adopts a multi-cache mechanism that includes result cache, attribute cache, and policy cache to reduce the communication cost between engine and other components. To decrease matching magnitudes and enhance matching exactitudes, policy cache practices two stage index techniques. Finally, emulation tests validate that the overall evaluation performance of MLOBEE, using multi-level optimization technology, is better than most other similar systems.

    • Efficient Remote Attestation Mechanism with Privacy Protection

      2011, 22(2):339-352. DOI: 10.3724/SP.J.1001.2011.03714

      Abstract (7089) HTML (0) PDF 452.61 K (8326) Comment (0) Favorites

      Abstract:A remote attestation mechanism, with high efficiency, flexibility and privacy protection based on Merkle hash tree is proposed in this paper. The problems of IMA (integrity measurement architecture) architecture are analyzed for a special target application scenario; followed by a detailed description of RAMT (remote attestation mechanism based on Merkle hash tree) architecture and its process of integrity measuring and verifying. The function and pseudo-code of command TPM_HashTree, which is a function enhancement to the existing TPM (trusted platform module), are presented for the newly proposed mechanism. The advantages of the new mechanism are analyzed and discussed.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063