• Articles • Previous Articles     Next Articles

Why SA Can Beat the Exponential Explosion in Heuristic Search

Zhang Bo; Zhang Ling;   

  1. Tsinghua University; Anqing Teacher s College;
  • Online:1990-05-10 Published:1990-05-10

In tree (or graph) search,most algorithms mainly use the local heuristic information of each indi- vidual node.But in the statistical heuristic search algorithms the global information about subtrees is used effectively so that the computational complexity is greatly reduced.In this paper the problem of how the global information can be extracted from the local one is discussed.Some features of SA are also concerned.

Key words: computer software; query containment; conditioned homomorphism; tree pattern; XML; Xpath; volume visualization; volume rendering; virtual reality; volumegraphics; object simplification; level of detail; wavelets theory;

[1] J.Pearl.Heuristics, Addison-Wesley Publishing Company, 1984.

[2] J.Pearl.Heuristic search theory : survey of recent results, in Proc. 7th IJCAI-81, 554-562..

[3] Zhang Bo and Zhang Ling, Statistical heuristic search, J.of Comput. Sci. & Teclmol., 2:1(1987).1-1.

[4] Zhang Bo and Zhang Ling, The comparison between the statistical heuristic search and A.J.of Comput. Sci.& Technol. 4:2(1989), 126-132.

[5] G.B.Wetherill, Sequential Method in Statistics, John Wiley & Sons, Inc., 1975

[6] S.Zacks. The Theory of Statistical Inference, John Wiley & Sons, Inc., 1971.
[1] Masoud Zadghorban Lifkooee, Celong Liu, Yongqing Liang, Yimin Zhu, Xin Li. Real-Time Avatar Pose Transfer and Motion Generation Using Locally Encoded Laplacian Offsets [J]. Journal of Computer Science and Technology, 2019, 34(2): 256-271.
[2] Xin Bi, Xiang-Guo Zhao, Guo-Ren Wang. Efficient Processing of Distributed Twig Queries Based on Node Distribution [J]. , 2017, 32(1): 78-92.
[3] Jun-Feng Zhou, Guo-Xiang Lan, Zi-Yang Chen, and Xian Tang. Fast Smallest Lowest Common Ancestor Computation Based on Stable Match [J]. , 2013, 28(2): 366-381.
[4] Jie Tang, Chen Liu, Shao-Shan Liu, Zhi-Min Gu, and Jean-Luc Gaudiot. Pinned OS/Services: A Case Study of XML Parsing on Intel SCC [J]. , 2013, 28(1): 3-13.
[5] Jun-Feng Zhou (周军锋), Member, CCF, Tok Wang Ling (林卓旺), Senior Member, ACM, IEEE, Zhi-Feng Bao (鲍芝峰), and Xiao-Feng Meng (孟小峰), Senior Member, CCF, Member, ACM, IEEE. Related Axis: The Extension to XPath Towards Effective XML Search [J]. , 2012, 27(1): 195-212.
[6] Dorde M. Durdević and Igor I. Tartalja. Domino Tiling: A New Method of Real-Time Conforming Mesh Construction for Rendering Changeable Height Fields [J]. , 2011, 26(6): 971-987.
[7] Wai-Ho Mak (麦伟豪), Yingcai Wu (巫英才), Ming-Yuen Chan (陈明远), and Huamin Qu (屈华民), Member, IEEE. Visibility-Aware Direct Volume Rendering [J]. , 2011, 26(2): 217-228.
[8] Takuma Kawamura, Naohisa Sakamoto,and Koji Koyamada, Member, IEEE. Level-of-Detail Rendering of Large-Scale Irregular Volume Datasets Using Particles [J]. , 2010, 25(5): 905-915.
[9] Guo-Liang Li, Member, CCF, ACM, and Jian-Hua Feng, Senior Member, CCF, Member, ACM, IEEE. An Effective Semantic Cache for Exploiting XPath Query/View Answerability [J]. , 2010, 25(2): 347-361.
[10] Jian-Hua Feng, Guo-Liang Li, and Na Ta. A Semantic Cache Framework for Secure XML Queries [J]. , 2008, 23(6 ): 988-997 .
[11] Byron Choi, Gao Cong, Wenfei Fan, and Stratis D. Viglas. Updating Recursive XML Views of Relations [J]. , 2008, 23(4 ): 516-537 .
[12] Jian-Hua Feng, Qian Qian, Jian-Yong Wang, and Li-Zhu Zhou. Efficient Mining of Frequent Closed XML Query Pattern [J]. , 2007, 22(5): 725-735 .
[13] Jian-Hua Feng, Yu-Guo Liao, and Yong Zhang. HCH for checking containment of XPath fragment [J]. , 2007, 22(5): 736-748 .
[14] Chang-Xuan Wan and Xi-Ping Liu. Structural Join and Staircase Join Algorithms of Sibling Relationship [J]. , 2007, 22(2): 171-181 .
[15] Dong-Xi Liu. CSchema: A Downgrading Policy Language for XML Access Control [J]. , 2007, 22(1): 44-53 .
Full text



No Suggested Reading articles found!

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved