• Volume 24,Issue 1,2013 Table of Contents
    Select All
    Display Type: |
    • Convergence of Warning Propagation Algorithms for Random Satisfiable Instances

      2013, 24(1):1-11. DOI: 10.3724/SP.J.1001.2013.04213 CSTR:

      Abstract (5736) HTML (0) PDF 0.00 Byte (6984) Comment (0) Favorites

      Abstract:Message propagation algorithms are very effective in finding satisfying assignments for random kSAT instances and hard regions become more narrow. Unfortunately, this phenomenon is still lacks rigorous theoretical proofs. The Warning Propagation (WP) algorithm is the most basic message propagation algorithm. In order to analysis the WP algorithm convergence for random kCNF formulas, the study gives the sharp threshold point for the existence of cycles in the factor graph of random kCNF formulas, the threshold for the existence of cycles in model G(n,k,p) of random kCNF formulas is p=1/8n2 for k=3, p=d/n2. When d becomes asymptotically equal to 1/8, cycles begin to appear, but each component contains at most one cycle, the number of the components containing a single cycle and the length of cycle are a constant independent of n. Thus, the factor graph consists of a forest of trees plus a few components that have a single cycle. Then WHP (with high probability) after at most O(logn+s) iterations, WP converges on these instances. Here s is the size of the connected component.

    • Negotiated Scheduling Model and Algorithms of Supply Chain

      2013, 24(1):12-24. DOI: 10.3724/SP.J.1001.2013.04211 CSTR:

      Abstract (5533) HTML (0) PDF 0.00 Byte (6947) Comment (0) Favorites

      Abstract:The negotiated scheduling problem of distributor is studied for a supply chain that consists of a manufacture and a distributor. The manufacturer is more influential than the distributor. It makes scheduling decisions followed by the distributor. The manufacture and distributor do not share information during the process time of any job. To improve scheduling results of the distributor, a negotiation model is built based on compensation mechanism. A negotiated scheduling strategy with information privacy is designed. A distributor negotiation-scheduling algorithm that consists of a scheduling algorithm of the manufacturer and ecologic population competition based coevolutionary algorithm of the distributor is designed and analyzed. Simulation experiments show that the negotiated scheduling of the distributor can effectively improve the scheduling performance of the distributor. Scheduling cost of the distributor can be cut down over 25% while the scheduling performance of the manufacturer does not become worse. Moreover, the proposed coevolutionary algorithm can obtain better scheduling solutions than the genetic, particle swarm optimization, and ant colony optimization algorithms.

    • Point-Based Online Value Iteration Algorithm for POMDPs

      2013, 24(1):25-36. DOI: 10.3724/SP.J.1001.2013.04258 CSTR:

      Abstract (5480) HTML (0) PDF 0.00 Byte (6766) Comment (0) Favorites

      Abstract:Partially observable Markov decision processes (POMDPs) provide a rich framework for sequential decision-making in stochastic domains of uncertainty. However, solving POMDPs is typically computationally intractable because the belief states of POMDPs have two curses: Dimensionality and history, and online algorithms that can not simultaneously satisfy the requirement of low errors and high timeliness. In order to address these problems, this paper proposes a point-based online value iteration (PBOVI) algorithm for POMDPs. This algorithm for speeding up POMDPs solving involves performing value backup at specific reachable belief points, rather than over the entire a belief simplex. The paper exploits branch-and-bound pruning approach to prune the AND/OR tree of belief states online and proposes a novel idea to reuse the belief states that have been computed last time to avoid repeated computation. The experiment and simulation results show that the proposed algorithm has its effectiveness in reducing the cost of computing policies and retaining the quality of the policies, so it can meet the requirement of a real-time system.

    • >Review Articles
    • Progress in Research on String Analysis

      2013, 24(1):37-49. DOI: 10.3724/SP.J.1001.2013.04334 CSTR:

      Abstract (8855) HTML (0) PDF 0.00 Byte (10182) Comment (0) Favorites

      Abstract:With the ubiquitous software application, especially the wide usage of database applications and Web applications, strings have become a more important role in the software programs. At the same time, the program analysis techniques that consider the specialty of strings have been developed, and have been applied to various areas in software engineering. Usually, string value analysis is applied to acquire the possible values of a given string variable. Next, a constraint solver is applied to check whether the values satisfy predefined specifications, so that the correctness of the given string variable can be checked. To further apply string analysis to some security analysis and software maintenance problems, the string analysis is further improved to analyze the possible data origins of a given string variable. This paper presents a survey on string analysis, which mainly introduces the string value analysis, string constraint solving, string data origin analysis, and the applications of string analysis in software engineering.

    • Progress and Challenges of Distributed Caching Techniques in Cloud Computing

      2013, 24(1):50-66. DOI: 10.3724/SP.J.1001.2013.04276 CSTR:

      Abstract (13495) HTML (0) PDF 0.00 Byte (18209) Comment (0) Favorites

      Abstract:As an important application of acceleration in the cloud, the distributed caching technology has received considerable attention in industry and academia. This paper starts with a discussion on the combination of cloud computing and distributed caching technology, giving an analysis of its characteristics, typical application scenarios, stages of development, standards, and several key elements, which have promoted its development. In order to systematically know the state of art progress and weak points of the distributed caching technology, the paper builds a multi-dimensional framework, DctAF. This framework is constituted of 6 dimensions through analyzing the characteristics of cloud computing and boundary of the caching techniques. Based on DctAF, current techniques have been analyzed and summarized; comparisons among several influential products have also been made. Finally, the paper describes and highlights the several challenges that the cache system faces and examines the current research through in-depth analysis and comparison.

    • Network Computing Middleware

      2013, 24(1):67-76. DOI: 10.3724/SP.J.1001.2013.04296 CSTR:

      Abstract (8087) HTML (0) PDF 0.00 Byte (9388) Comment (0) Favorites

      Abstract:Middleware is a kind of fundamental software that boomed in 1990s with the rapid development of computer networks. Its main function is to effectively support the development, deployment, operation and management of the network application software systems. With a new connotation, the network computing middleware has encountered a breakthrough of information networks technology and service-oriented software engineering. The former part of this paper, which starts with the network computing environment, gives a comprehensive interpretation on the basic concepts and main technologies of basic middleware, application integration middleware and domain application framework; the second half focuses on hot research topics such as cloud computing, Internet of things, and indicates a number of concerned research directions as well as several challenges and key technologies that need deep exploration from the point view of middleware.

    • Research on Task Parallel Programming Model

      2013, 24(1):77-90. DOI: 10.3724/SP.J.1001.2013.04339 CSTR:

      Abstract (11311) HTML (0) PDF 0.00 Byte (28037) Comment (0) Favorites

      Abstract:Task parallel programming model is a widely used parallel programming model on multi-core platforms. With the intention of simplifying parallel programming and improving the utilization of multiple cores, this paper provides an introduction to the essential programming interfaces and the supporting mechanism used in task parallel programming models and discusses issues and the latest achievements from three perspectives: Parallelism expression, data management and task scheduling. In the end, some future trends in this area are discussed.

    • Mobile Recommender Systems and Their Applications

      2013, 24(1):91-108. DOI: 10.3724/SP.J.1001.2013.04292 CSTR:

      Abstract (11132) HTML (0) PDF 0.00 Byte (15981) Comment (0) Favorites

      Abstract:Mobile recommender systems have recently become one of the hottest topics in the domain of recommender systems. The main task of mobile recommender systems is to improve the performance and accuracy along with user satisfaction utilizing mobile context, mobile social network and other information. This paper presents an overview of the field of mobile recommender systems including key techniques, evaluation and typical applications. The prospects for future development and suggestions for possible extensions are also discussed.

    • gROC Curve Analysis Method Based on Discernible Granularity

      2013, 24(1):109-120. DOI: 10.3724/SP.J.1001.2013.04230 CSTR:

      Abstract (4576) HTML (0) PDF 0.00 Byte (6313) Comment (0) Favorites

      Abstract:ROC Curve is an important method of model selection, but its uncertainty affects the accuracy of model selection. Based on discernible granularity and the view of reflecting the score's uncertainty, the study proposes the concept of gROC and gAUC, and discusses, theoretically, some properties of the gROC. The study also tests the reasonableness of gROC using binormal model after gave its algorithm. On this basis, the paper also proposes two model selection measures, λAUC and ρAUC. The effieciency of these measures is verified based on UCI data sets. Experimental results show that the gROC can effectively reflect the uncertainty of ROC curve, and the model selection methods based on λAUC and ρAUC are better than the method based on AUC or sAUC. In some cases, gROC has stronger capability on comparison of classifiers performance.

    • >Review Articles
    • Study on BGP Security

      2013, 24(1):121-138. DOI: 10.3724/SP.J.1001.2013.04346 CSTR:

      Abstract (11330) HTML (0) PDF 0.00 Byte (14220) Comment (0) Favorites

      Abstract:BGP is a core Internet routing protocol. The Internet inter-domain routing relies on the exchange of BGP routing information. BGP has significant vulnerabilities, which have been found to cause problems such as prefix hijacking, route leak and Internet-targeted denial of service attack. First, by analyzing BGP route propagation and BGP routing policies, the fundamental flaw in the design of the protocol is revealed. The paper then discusses possible threats to BGP and presents a route leak model, which contributes to the description of its characteristics. Second, the existing defense mechanisms for BGP security are generalized, and their shortcomings are exposed. The paper then classifies various BGP security-enhancing technologies and studies them in detail to explore their advantages and disadvantages. Finally, the research trends of BGP security are discussed in this paper.

    • Overlays in Mobile P2P Networks

      2013, 24(1):139-152. DOI: 10.3724/SP.J.1001.2013.04332 CSTR:

      Abstract (7929) HTML (0) PDF 0.00 Byte (9044) Comment (0) Favorites

      Abstract:The construction of overlays is a crucial problem in the research of mobile peer-to-peer networks. The architecture of overlays determines the robustness, security and performance of MP2P networks. The paper first introduces the concept of mobile P2P overlays, including the definition, significance of the construction of overlays and the classification of them. Next, three kinds of overlays, distributed unstructured, distributed structured and semi distributed (hybrid) network, are described. The application of overlays in MANET, VANET and WMN is especially introduced. Furthermore, the aforementioned overlays are analyzed and compared. Finally, the paper concludes and presents the future research directions.

    • Congestion Control Mechanism Based on Accepting Threshold in Delay Tolerant Networks

      2013, 24(1):153-163. DOI: 10.3724/SP.J.1001.2013.04218 CSTR:

      Abstract (4670) HTML (0) PDF 0.00 Byte (6539) Comment (0) Favorites

      Abstract:In order to decrease the resource cost in delay tolerant networks, single-copy forwarding protocols have been proposed by researchers. However, recent research has pointed out that single-copy forwarding protocols lead to great unfairness of the nodes' traffic load and make the highly connected nodes suffer congestion. In order to bridge this gap, a congestion control mechanism based on accepting the threshold is put forward in this paper, which makes each DTN node dynamically adjust to its accepting threshold and accordingly to its congestion state. Moreover, the mechanism can be widely adopted, since it is independent of the forwarding protocols and does not affect the choice of the relay nodes made by the forwarding protocol. In order to validate the proposed mechanism, an algorithm named SimBetCC is proposed, which incorporates the congestion control mechanism with existing SimBet protocol. Experimental results show that SimBetCC can cope with congestion and also outperforms FairRoute with congestion control in many aspects, e.g., the message delivery ratio, the delivery delay.

    • Accurate Calculation of End-to-End Throughput Capacity for Wireless Multi-Hop Networks

      2013, 24(1):164-174. DOI: 10.3724/SP.J.1001.2013.04220 CSTR:

      Abstract (4835) HTML (0) PDF 0.00 Byte (6548) Comment (0) Favorites

      Abstract:To determine the end-to-end throughput capacity of IEEE 802.11-based wireless networks, existing works used a simplistic approach to divide the 1-hop throughput capacity by the number of contending links in the bottleneck region, which has is limited in terms accuracy, and relies on complicated non-linear equations. This makes it impractical to solve for a large number of hops. This paper presents an optimization methodology to analytically calculate the end-to-end throughput capacity of IEEE 802.11-based chain-topology wireless networks. The calculation considers the interference due to neighboring nodes and assesses the impact of hidden node collision as well as multi-rate terminals (i.e., nodes can transmit at different rates) on throughput capacity. The proposed methodology provides a very accurate calculation of the end-to-end throughput capacity when compared to existing works, and yet, is more practical to implement. With extensive simulation experiments, the study verifies the analysis and validates the proposed methodology.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063