• Volume 22,Issue 5,2011 Table of Contents
    Select All
    Display Type: |
    • Hybrid Particle Swarm Optimization Algorithm for VLSI Circuit Partitioning

      2011, 22(5):833-842. DOI: 10.3724/SP.J.1001.2011.03980 CSTR:

      Abstract (6121) HTML (0) PDF 725.52 K (6586) Comment (0) Favorites

      Abstract:Circuit partitioning is an important part of any very large scale integration (VLSI) physical design automation, but it is a NP-hard combinatorial optimization problem. In this paper, a hybrid particle swarm optimization algorithm with FM strategy is proposed to approch this problem. Inspired by the mechinism of genetic algorithm (GA), two-point crossover and random two-point exchange mutation operators have been designed to avoid generating infeasible solutions. To improve the ability of local exploration, FM strategy is applied to the proposed algorithm to update its position. A mutation strategy is also built into the proposed algorithm to achieve better diversity and break away from local optima. Experiments on ISCAS89 benchmark circuits show that the proposed algorithm is efficient.

    • Cuboid Arrangement Approach Based on Caving Degree for Solving the Cuboid Packing Problem

      2011, 22(5):843-851. DOI: 10.3724/SP.J.1001.2011.03799 CSTR:

      Abstract (5681) HTML (0) PDF 673.08 K (6956) Comment (0) Favorites

      Abstract:Based on the caving degree method, this paper proposes a heuristic approach to solve the cuboid packing problem by incorporating the cuboid arrangement strategy. Experiments on 15 classic LN benchmark instances, performed by Loh and Nee in 1992, have shown that this approach has the potential of performing very well. In the difficult instance of LN2, it achieved a volume utilization of 98.2%, which is an improvement from the current best record by 1.6%. In another difficult instance of LN6, it achieved a volume utilization of 96.2%, which matches that of the current best record. For each of the other 13 instances, it maintains optimal layout that packs all cuboid items into the container, matching current best record. As a whole, the average volume utilization on the 15 LN instances is 70.96%.

    • Trustworthy Services Selection Based on Preference Recommendation

      2011, 22(5):852-864. DOI: 10.3724/SP.J.1001.2011.03804 CSTR:

      Abstract (6531) HTML (0) PDF 523.49 K (8838) Comment (0) Favorites

      Abstract:This paper presents a Trustworthy Services Selection Based on Preference Recommendation (TSSPR) method that assists users in selecting the right Web services, according to their own preferences. First, a group of recommenders that have similar preferences are found, and then the similarity rating is computed by using the Pearson correlation method. Second, filtering services based on the user’s recommending level, relative domain degrees, and similarity ratings can improve the quality of recommendations. Experimental results show that given an appropriate setting, this method can effectively solve the weaknesses of recommendation systems, such as sparseness, cold starts, and inaccurate recommendations.

    • Monitoring Properties of Open Environments

      2011, 22(5):865-876. DOI: 10.3724/SP.J.1001.2011.03800 CSTR:

      Abstract (5283) HTML (0) PDF 507.26 K (6371) Comment (0) Favorites

      Abstract:This paper proposes a framework for the specification of open environment properties. This framework enables convenient and formal specification of properties of asynchronous environments, including temporal properties which cannot be handled in the existing work. This framework also supports implementation of effective schemes for monitoring environment properties based on distributed predicate detection. A middleware infrastructure is designed and implemented, which supports efficient monitoring of environment properties for building high-confidence systems in open environments. This paper also evaluates design of the proposed infrastructure with a case study.

    • Quantum Programming Language NDQJava-2

      2011, 22(5):877-886. DOI: 10.3724/SP.J.1001.2011.03979 CSTR:

      Abstract (5379) HTML (0) PDF 615.24 K (6301) Comment (0) Favorites

      Abstract:This paper presents an overview of a quantum programming language NDQJava-2. NDQJava-2 is an extension of NDQJava with additional quantum components such as quantum conditional statement, quantum loop statement, quantum subprogram, quantum module, and quantum exception handling mechanism. The added commponents make NDQJava-2 a structured quantum programming language. Experience in writing quantum programs indicates that compared with NDQJava, NDQJava-2 is a more practical, more readable and more suitable (components setting) quantum programming language.

    • Appraisal Expression Recognition Based on Syntactic Path

      2011, 22(5):887-898. DOI: 10.3724/SP.J.1001.2011.03767 CSTR:

      Abstract (5726) HTML (0) PDF 748.95 K (8449) Comment (0) Favorites

      Abstract:Different from previous works such as hand-crafted patterns and rule based methods, this paper proposes a novel method that uses syntactic paths to automatically recognize the appraisal expressions. In detail, the syntactic paths are first automatically collected to describe the relationships between the polarity words and their corresponding targets. Next, an edit distance based syntactic path matching strategy is used to improve the performance of the exact syntactic path matching method. Experimental results on the camera and MP3 player domains show that (1) syntactic paths are helpful for appraisal expression recognition, and (2) edit distance based syntactic path matching method can further improve the performance of appraisal expression recognition.

    • Gene Expression Programming Evolution Difficulty Prediction Based on Posture Model

      2011, 22(5):899-913. DOI: 10.3724/SP.J.1001.2011.03768 CSTR:

      Abstract (5180) HTML (0) PDF 509.16 K (5533) Comment (0) Favorites

      Abstract:Fitness Distance Correlation (FDC) can hardly predict the evolution difficulty of Gene Expression Programming (GEP) because problems with different hardness would result in very similar FDC values in GEP. To solve the problem, the authors propose a posture model and region density to predict GEP’s evolution difficulty. This study made the following contributions: (1) It introduces the concepts of the chromosomes’ distance and posture model in GEP; (2) It proposes region density of a posture model; (3) It proves that the posture model is a mapping from the original searching space, and the mapping preserves the population’s dynamic migration property in the original searching space; (4) It demonstrates the validity of using posture model and region density to predict GEP’s evolution difficulty; (5) It conducts extensive experiments to show that the new model can precisely predict the evolution difficulty of GEP.

    • Admissible Subgoal Ordering for Automated Planning

      2011, 22(5):914-928. DOI: 10.3724/SP.J.1001.2011.03778 CSTR:

      Abstract (4761) HTML (0) PDF 897.37 K (6214) Comment (0) Favorites

      Abstract:This paper proposes an ordering relation named Admissible Subgoal Ordering (ASO). The definition of ASO is formalized, and its relative importance for incremental planning is discussed. Then, this paper introduces the notion of dependency relations over facts, and develops fact dependency graph technique that can approximate admissible ordering relations in polynomial time. Finally, an algorithm to compute subgoals sequence with admissible orderings is presented. All the ideas presented in the paper are implemented in the planning system ASOP, and the effectiveness of the techniques is demonstrated on the benchmarks of International Planning Competitions (IPC). The results show that these techniques can efficiently solve large planning problems and lead to a greater improvement in planning performance.

    • Configuration Solving and Computing Explanations Based on Equivalence Class Partition

      2011, 22(5):929-937. DOI: 10.3724/SP.J.1001.2011.03814 CSTR:

      Abstract (4402) HTML (0) PDF 642.81 K (5698) Comment (0) Favorites

      Abstract:Some variables in a constraint-based configuration model may not have any immediate or indirect relationship between them; therefore, these variables will never intervene with each other in a constraint propagation. According to this characteristic of configuration, this paper proposes a preprocessing approach based on equivalent class partition, which can be used in the process of building the product model, so that the original configuration problem can be effectively divided into several sub-problems, and these sub-problems can be solved independently. The two backtracking-strategies are used in testing this method. The experimental results show that this method can effectively improve searching efficiency. Moreover, the method is integrated with the QUICKXPLAIN algorithm to compute conflict explanations, and the result show that it can also improve the efficiency of the algorithm.

    • O(2.983n) Time Complexity Algorithm for Optimal Coalition Structure Generation

      2011, 22(5):938-950. DOI: 10.3724/SP.J.1001.2011.03817 CSTR:

      Abstract (5273) HTML (0) PDF 821.38 K (6225) Comment (0) Favorites

      Abstract:First, this paper establishes an effective partition relationship in the finite integer set and an effective splitting relationship in the coalition set, and devises an EOCS (effective optimal coalition structure) algorithm, which only evaluates bipartite effective splittings of coalition to find the optimal value from bottom to top, so it decreases the number of bipartite splitting. Secondly, the correctness of the EOCS algorithm is proved based on the Kleene closure function. Moreover, this paper proves that the EOCS lower bound is Ω(2.818n) by the integration limit theorem, and discovers that the EOCS upper bound is O(2.983n) by the time serial analysis technique. Finally, this paper compares the EOCS algorithm with other algorithms to point out that the EOCS algorithm can find optimal coalition structure in O(2.983n) time whether the coalition values meet which probability distributions or not. The DP (dynamic programming) algorithm and the IDP (improved dynamic programming) algorithm proposed by Rothkopf and Rahwan can find an optimal solution in O(3n). The EOCS algorithm’s design, correctness proof, and time complexity analysis are all improvements of Rothkopf and Rahwan’s related work.

    • Mining Hierarchical Community Structure Within Networks from Density-Connected Traveling Orders

      2011, 22(5):951-961. DOI: 10.3724/SP.J.1001.2011.03939 CSTR:

      Abstract (5642) HTML (0) PDF 877.62 K (7310) Comment (0) Favorites

      Abstract:This paper proposes a density-based network clustering algorithm, TRAVEL. The algorithm produces a traveling order containing clustering with various densities and finds the optimal clusters in it. The traveling order is subsequently transformed into a data structure of contiguous subinterval heap based on which a clustering algorithm, HCLU, is designed to find the hierarchical cluster boundaries of the network without any user interaction. Experimental results on real-world and computer-generated synthetic networks show that the clustering accuracy of the proposed algorithms is higher than the baseline methods. Furthermore, they are able to produce robust hierarchical communities in various networks with low redundancy in the presence of noise.

    • Compact Dependencies and Intent Waned Values

      2011, 22(5):962-971. DOI: 10.3724/SP.J.1001.2011.03807 CSTR:

      Abstract (4994) HTML (0) PDF 690.74 K (5493) Comment (0) Favorites

      Abstract:In this paper, Intent Waned Values and Compact Dependency are proposed as new concepts. It has strictly been proven that a dependent foundation that consisted of compact dependencies is an irredundant and complete dependency basis on an axiom system that includes only one rule: attributes are increased at the left side and reduced at the right side. In this way, another irredundant and complete dependency basis is found, which is distinguished from the Guigues-Duquenne basis. This basis changes the traditional idea that there exists a sole irredundant and complete dependency basis and discloses the prospect of finding multiple kinds of irredundant and complete dependency basis for a variety of requirements.

    • Application-Level Multicast Routing Algorithms for Supporting Multipoint Interaction Synchronization

      2011, 22(5):972-985. DOI: 10.3724/SP.J.1001.2011.03760 CSTR:

      Abstract (4524) HTML (0) PDF 540.69 K (6099) Comment (0) Favorites

      Abstract:This paper introduces an idea that solves the synchronization problem in the process of application-level multicast routing without using the dedicated synchronizing controller. Furthermore, the low-delay multicast communication is achieved on base of an idea. The contributions of this paper include: (1) The process of multipoint synchronizing interaction is modeled, and the theorem of application-level multicast routing algorithms supporting multipoint interaction synchronization is proved; (2) An effective low-delay multicast routing algorithm that supports multipoint interaction synchronization is proposed; (3) Performance analysis of this algorithm and the existing similar algorithm is carried out by mathematic methods. Both simulation experiments and practical applications demonstrate that the algorithm is correct and effective.

    • Fine-Grained Parallel Betweenness Centrality Algorithm Without Lock Synchronization

      2011, 22(5):986-995. DOI: 10.3724/SP.J.1001.2011.03811 CSTR:

      Abstract (5202) HTML (0) PDF 706.09 K (6658) Comment (0) Favorites

      Abstract:Through a joint study in architecture and application, it is found that lock synchronization in a fine-grained parallel betweenness centrality (BC) program poses an obstacle for the efficient execution of parallel architectures. This paper proposes a data-centric parallel algorithm that eliminates lock synchronization. This algorithm reduces execution time and improves speeds up twice as fast on both AMD 32 core SMP and Intel 8core SMP.

    • Layered Intrusion Scenario Reconstruction Method for Automated Evidence Analysis

      2011, 22(5):996-1008. DOI: 10.3724/SP.J.1001.2011.03759 CSTR:

      Abstract (5054) HTML (0) PDF 837.22 K (5944) Comment (0) Favorites

      Abstract:In order to analyze intrusion evidences automatically, a layered method for reconstructing intrusion scenario is proposed. It includes 3 main phrases. First, the intruder’s abstract steps and the relationships between them are reconstructed by the alert correlation. Secondly, detailed behaviors of each step are reconstructed based on attack signatures and the OS-Level dependency tracking. Finally, the results are mapped and refined, and a behavior graph is generated. This graph can describe the completed intrusion process. The experiments on DARPA 2000 prove that the results are not only easy to understand, but are also full and accurate. Hence, it is fit to be presented in the court. Compared with current methods, this method shows more advantages. For example, it can process more complex scenarios.

    • Topology-Hiding Secure Multipath Routing Protocol for MANET

      2011, 22(5):1009-1019. DOI: 10.3724/SP.J.1001.2011.03801 CSTR:

      Abstract (4641) HTML (0) PDF 771.25 K (6743) Comment (0) Favorites

      Abstract:This paper provides a detailed analysis on the threats of topology-exposure in Mobile Ad Hoc Network (MANET) and proposes a secure topology-hiding multipath routing protocol based on the analysis. In Route Discovery, the new protocol exposes no routing information in packets to hide the network topology and adopts a node-excluded mechanism to find multiple paths. During this process, this protocol implements on-demand Neighbor Discovery to verify node identities. In Route Maintenance, a fault detection mechanism is designed to provide assurance that the selected paths are available and secure. Considering the factors of both reaction time and the path length, the scheme aims to find the shortest secure path. The security analysis shows that this scheme can resist the black hole attack, the wormhole attack, the rushing attack, the sybil attack, and other types of common attacks. Through extensive simulations, results demonstrate that this approach can find many more active paths than SRP without bringing negative influences into the normal scenario. Furthermore, this solution largely improves the packet delivery ratio in the black hole attack scenario at an acceptable cost.

    • Optimal Mining on Security Labels in Multilevel Security System

      2011, 22(5):1020-1030. DOI: 10.3724/SP.J.1001.2011.03823 CSTR:

      Abstract (5697) HTML (0) PDF 745.50 K (6494) Comment (0) Favorites

      Abstract:This paper presents a bottom-up approach to implement the automatic and scientific transform of access control policies in the migration. First, the problem of mining security labels optimally is described formally, and it is then proved to be NP-complete. Next, an approximate optimization algorithm based on hierarchical clustering and genetic algorithm is presented, which decomposes the problem into two parts: category partition and secret level assignation. Finally, experimental results show that the algorithm is effective in finding an optimal solution. The proposed approach can be applied to migration projects in hierarchy protection in information security.

    • Efficient Identity-Based Authenticated Key Agreement Protocol in the Standard Model

      2011, 22(5):1031-1040. DOI: 10.3724/SP.J.1001.2011.03828 CSTR:

      Abstract (5622) HTML (0) PDF 706.81 K (7177) Comment (0) Favorites

      Abstract:This paper proposes an efficient Identity-Based authenticated key agreement protocol based on Waters’ Identity-Based Encryption scheme and gives a detail security analysis with provable security techniques in the standard model. It is more efficient than other similar protocols, and provides known-key security and forward secrecy. And it also resists key-compromise impersonation and unknown key share attacks. Moreover, this protocol is extended to satisfy the requirement that the session key should be escrowed by the Private Key Generation (PKG) center, and is given a key confirmation property with a secure message authentication code algorithm.

    • Cross Layer Transmission Control Protocol Interacting with Link Reliable Routing in MANET

      2011, 22(5):1041-1052. DOI: 10.3724/SP.J.1001.2011.03840 CSTR:

      Abstract (4874) HTML (0) PDF 817.54 K (5970) Comment (0) Favorites

      Abstract:Routing fails frequently because of the node mobility of MANET. The regular TCP works badly in MANET because the congestion control algorithm takes all the problems in MANET (disconnections, route changes, etc.) as congestion. To improve the efficiency of end to end transmission, this paper proposes a cross-layer transmission control protocol that interacts with link reliable routing protocols, which are called TCP-PLRT (transmission control protocol based on probability of link residual lifetime). TCP-PLRT judges the stability of end to end connection through information about the probability of the link residual lifetime that feedback from routing layer. Three complementary mechanisms have been proposed: ROUTING SWITCH, if the link is not stable enough, SAVE THEN FORWARD, if the link is about to break, and ACK RECONFIRM, if the routing has been rebuilt. Therefore, TCP-PLRT can do prediction before routing failure, and do remediation after it happens. It has been shown by computer simulation that results of TCP-PLRT have significantly improved the packet loss, caused by routing failure, and have increased the throughput much more.

    • Constructing Distributed Connected Dominating Sets in Wireless Ad Hoc and Sensor Networks

      2011, 22(5):1053-1066. DOI: 10.3724/SP.J.1001.2011.00586 CSTR:

      Abstract (4779) HTML (0) PDF 830.15 K (6674) Comment (0) Favorites

      Abstract:Ad hoc and sensor networks have a wide range of potential, practical and useful applications. Efficient hierarchical cluster organization plays an important role in wireless network systems without centralized control or infrastructure. In cluster-based wireless networks, in order to select a few dominating nodes to form a virtual backbone that supports routing and other tasks, such as broadcasting, area monitoring, etc., most of the published research regarding construction of connected dominating sets (CDS) in the literature has focused on selecting a small nodes set for high efficient performance based on different assumptions and design objectives. A review on more than 20 CDS construction mechanisms based on various assumptions, design objectives and performance results is provided in this paper. Some future research directions in this area are also pointed out.

    • Vision-Based Gesture Interfaces Toolkit for Interactive Games

      2011, 22(5):1067-1081. DOI: 10.3724/SP.J.1001.2011.03733 CSTR:

      Abstract (5279) HTML (0) PDF 686.45 K (7089) Comment (0) Favorites

      Abstract:In this paper, a toolkit is created for designing vision-based gesture interactions. First, an abstract model for non-contact devices is proposed. Then, based on a data flow diagram method and an interactive learning approach, the IEToolkit is presented. It is designed based on the attributes of vision interaction and shields the underlying details of the computer vision algorithms. It has the following characteristics: a scalable interface to facilitate developers to add new classifiers, a unified management mechanism that provides dynamic configuration for all of the classifiers, and a visual user interface that supports the definition of a high-level semantic gesture. Finally, several prototypes are given. Experimental results show that the IEToolkit can provide a unified platform and a general solution for vision-based hand gesture games.

    • Post-WIMP User Interface Model for Personal Information Management

      2011, 22(5):1082-1096. DOI: 10.3724/SP.J.1001.2011.03749 CSTR:

      Abstract (5566) HTML (0) PDF 503.31 K (6221) Comment (0) Favorites

      Abstract:This paper proposes a Post-WIMP interface model for personal information management (PWPIM), presents five facets to elaborate user character, domain objects, and interaction tasks, and gives the modeling method. Finally, this paper applies PWPIM to a physical interface based PIM (personal information management) system. The application example of PWPIM shows that, PWPIM can effectively describe the Post-WIMP interface for personal information management. Results also show that PWIM is fit for the feature of PIM system and is capable of guiding the PIM interface in design, development, and evaluation.

    • Efficient Algorithm for Surface Simplification Based on Variational Mesh

      2011, 22(5):1097-1105. DOI: 10.3724/SP.J.1001.2011.03750 CSTR:

      Abstract (4448) HTML (0) PDF 568.78 K (6166) Comment (0) Favorites

      Abstract:The paper presents a local greedy algorithm that minimizes the energy defined by a variational mesh approximation. The algorithm simplifies the mesh by controlling the number of target polygons, while attempting to gain ideal effect from adaptively selected seed triangles. The algorithm has an intuitive geometric meaning. The algorithm is efficient enough to be efficiently adopted in the geometric modeling system.

    • Equivalence Analysis of 3D Geometric Constraint Systems

      2011, 22(5):1106-1120. DOI: 10.3724/SP.J.1001.2011.03775 CSTR:

      Abstract (4637) HTML (0) PDF 641.72 K (5808) Comment (0) Favorites

      Abstract:This paper proposes a 3D geometric constraint solving method, based on equivalence analysis in graph theory, that can handle over-constrained, well-constrained, and under-constrained configurations naturally and efficiently. The basic idea is that there are equivalent geometric constraint systems with different geometric constraint graphs. If the geometric domain knowledge is exploited to transform a geometric constraint system into an equivalent one that has a better geometric constraint graph structure using equivalent constraint substitution, the decomposition of geometric constraint system can be optimized. Therefore, the proposed approach will not depend on the initial geometric constraint graph structure, but on the inherent characteristic of the geometric constraint system. This proposition can usually find the optimal decomposition of the geometric constraint system. Several typical examples have been given to illustrate the correctness and effectiveness of the proposed method.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063