›› 2009, Vol. 24 ›› Issue (6): 997-999.

• Special Section on International Partnership Programs Supported by CAS •     Next Articles

Preface

Fei-Yue Wang1, Ning-Hui Sun2, Wen-Ji Mao1, and Xiao-Wei Li2   

  1. 1Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
    2Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
  • Online:2009-11-05 Published:2009-11-05
  • About author:
    Fei-Yue Wang received his Ph.D. degree in computer and systems engineering from Rensselaer Polytechnic Institute in 1990. He is the director of the Key Laboratory of Complex Systems and Intelligence Science at the Chinese Academy of Sciences. He is also a professor in the University of Arizona's Systems & Industrial Engineering Department and the director of the university's Program in Advanced Research of Complex Systems. Prof. Wang is a fellow of IEEE, INCOSE, IFAC, ASME, and AAAS. His current research interests include social computing, Web and services science, modeling, analysis and control of complex systems, especially social and cyber-physical systems.
    Ning-Hui Sun received the Bachelor's degree from Peking University in 1989 and the Master's and Ph.D. degrees from the Chinese Academy of Science (CAS) in 1992 and 1999, respectively. He is a professor in the Institute of Computing Technology (ICT), CAS. He is the architect and main designer of Dawning2000, Dawning3000, Dawning4000, and Dawning5000 high-performance computers. His major research interests include computer architecture, operating system, and parallel algorithm. He is a member of IEEE and senior member of CCF.
    Wen-Ji Mao received her Ph.D. degree in computer science from the University of Southern California in 2006. She is an associate professor at the Institute of Automation, Chinese Academy of Sciences. Prof. Mao is a member of ACM and AAAI, and a senior member of the China Computer Federation. Her research interests include artificial intelligence, multi-agent systems and social modeling.
    Xiao-Wei Li received his B.Eng. and M.Eng. degrees in computer science from Hefei University of Technology, China, in 1985 and 1988, respectively, and his Ph.D. degree in computer science from the Institute of Computing Technology (ICT), Chinese Academy of Sciences (CAS), in 1991. From 1991 to 2000, he was an assistant professor and an associate professor (since 1993) in the Department of Computer Science, Peking University, China. He joined the ICT, CAS as a professor in 2000. He is now the deputy director of the Key Lab. of Computer System and Architecture, CAS. He is a senior member of IEEE. Dr. Li's research interests include VLSI testing, design for testability, design verification, dependable computing, wireless sensor networks. He has co-published over 150 papers in academic journals and international conference, hold 21 patents and 29 software copyrights. Dr. Li serves as chair of Technical Committee on Fault Tolerant Computing, CCF (China Computer Federation) since 2008. He serves as vice chair of IEEE Asian Pacific Regional TTTC (Test Technology Technical Council) since 2004. He serves as the steering committee vice-chair of IEEE Asian Test Symposium (ATS) since 2007, he also served as the steering committee chair of IEEE Workshop on RTL and High Level Testing (WRTLT). In addition, he serves on the Technical Program Committee of several IEEE and ACM conferences, including VTS, DATE, ASP-DAC, PRDC, etc. He also serves as member of editorial board of JCST, JOLPE, JETTA, etc.

This special section is based on collaborative research results accomplished by the two teams under the support by the International Partnership Programs for Creative Research Teams, funded by the Chinese Academy of Sciences and State Administration of Foreign Experts Affairs. The two teams are on Intelligence and Security Informatics and Advanced Computer Systems and Architectures, respectively. The papers selected for this special section are peer-reviewed through the normal review process of the JCST.
The first group consists of five contributions, which record recent progress in the representative growing fields of security informatics and social computing. The first paper, "Customer Activity Sequence Classification for Debt Prevention in Social Security'', by Huaifeng Zhang et al., proposes a novel hierarchical algorithm for sequence classification using discriminative sequential patterns. The algorithm first mines for the sequential patterns that are most strongly correlated to each target class, and then employs pattern pruning and coverage test to select the mined patterns. The patterns that pass the test in each loop are used to form sub-classifiers at different levels of the final classifier. The authors apply the proposed algorithm to the prediction of debt occurrences based on customer activity sequence data, and show the efficiency and effectiveness of the algorithm in real-world social security application.
Security informatics and social computing are faced with the same research challenge of analyzing huge amounts of data from various information sources. Machine learning methods play a critical role in such domains. "Performance Evaluation of Machine Learning Methods in Cultural Modeling'', by Xiao-Chen Li et al., investigates the performance of representative classification methods in cultural modeling and analyzes the empirical results as to group behavior forecasting using benchmark cultural data sets. Cultural modeling addresses important research issues such as the discovery of the correlation between cultural factors and organizations' behavior, efficient and effective identification of behavioral patterns of organizations from tons of cultural-related data, and the prediction of organizational behavior based on the cultural context.
Due to the data characteristics and information overload, data mining techniques have become popular in recent years. However, many information-intensive, knowledge-critical domains in security informatics and social computing require a pervasive data analysis platform so that decisions can be made rapidly under distributed and dynamic system environments. "Ubiquitous Mining with Interactive Data Mining Agents'', by Xin-Dong Wu et al., presents an interactive data mining agent --- OIDM, which provides three categories (i.e., classification, association analysis and clustering) of data mining tools, and interacts with the user to facilitate the mining process. OIDM can help users find appropriate mining algorithms, refine and compare the mining process and finally achieve the best mining results, so that security informatics and social computing applications can benefit from it.
As a typical representation of social computing and Web 2.0 application, collaborative social annotation systems allow users to record and share their original keywords or tag attachments to Web resources. These annotations are a method for organizing and labeling information, however, there exist problems such as spam and synonymous annotations. "Exploring Social Annotations with the Application to Web Page Recommendation'', by Hui-Qian Li et al., discusses the advantage of organizing social annotations from semantic perspective and embedding them into algorithms for knowledge discovery. The authors propose four graphic models in which user, Web page and annotation clusters are associated based on real users' surfing and annotating activity patterns. The experimental results show that the graphic models outperform the classical methods and are robust for the real applications.
In recent years, the scope of social computing has expanded tremendously, with almost all branches of software research and practice strongly feeling its impact. The last paper in this group, "Innovative Batik Design with an Interactive Evolutionary Art System'', by Yang Li et al., explores the use of Interactive Evolutionary Algorithm (IEA) in an art system, with the goal of enhancing user's creativity to generate innovative Batik-like patterns. In the paper, first, a new representation is proposed to capture the features in Batik and create innovative patterns through evolutionary processes; second, an out-breeding mechanism is applied to the system, in order to sustain user's interests for a longer period. The authors develop the first Batik design system, and the experimental results show its effectiveness and potential in evolving novel Batik design.
The second group of this special section contains four research papers on advanced computer systems and architectures. They represent recent progress in system-level simulation, many-core architecture, design for reliable Network-on-Chip (NOC), and DRAM row buffer locality optimization.
The paper "SimK: A Large-Scale Parallel Simulation Engine'' by Jian-Wei Xu et al. proposes a parallel simulator engine (SimK) towards the prevalent SMP/CMP platform, which aims at large-scale fine-grained computer system simulation. Based on SimK, large-scale parallel simulators HppSim and HppNetSim have been developed, which can simulate a full supercomputer system and its interconnection network respectively.
The paper "Godson-T: An Efficient Many-Core Architecture for Parallel Program Executions'' by Dong-Rui Fan et al. proposes a many-core architecture, Godson-T. It features a region-based cache coherence protocol, asynchronous data transfer agents and hardware-supported synchronization mechanisms, to provide full potential for high efficiency of the on-chip resource utilization.
The paper "Selected Crosstalk Avoidance Code for Reliable Network-on-Chip'' by Ying Zhang et al. proposes a reliable NOC design using a code with the capability of both crosstalk avoidance and single error correction. It can handle possible error caused by either crosstalk effects or single event upset (SEU). In comparison with previous crosstalk avoidance methods, the proposed method can reduce wire overhead, power dissipation and the total delay.
The paper "PARBLO: Page-Allocation-Based DRAM Row Buffer Locality Optimization '' by Wei Mi et al. proposes a new page-allocation-based optimization that works seamlessly together with some existing hardware and software optimizations to eliminate significantly more row buffer conflicts. The proposed method can reduce row buffer miss rates by up to 76%, and translates into performance speedups by up to 15%.
The guest editors hope that the perspectives, technological developments, research findings and empirical findings as presented in this special section will help encourage exciting research on the related fields. We thank all contributing authors and reviewers for their hard work. In particular, we thank the Journal of Computer Science and Technology editorial staffs for their significant assistance in the process.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Li Renwei;. Soundness and Completeness of Kung s Reasoning Procedure[J]. , 1988, 3(1): 7 -15 .
[2] Weigeng Shi;. Reconnectable Network with Limited Resources[J]. , 1991, 6(3): 243 -249 .
[3] Zhao Yu; Zhang Qiong; Xiang Hui; Shi Jiaosing; He Zhijun;. A Simplified Model for Generating 3D Realistic Sound in the Multimedia and Virtual Reality Systems[J]. , 1996, 11(4): 461 -470 .
[4] Shuai Dianxun;. Concurrent Competitive Wave Approach to Hyper-Distributed Hyper-Parallel AI Processing[J]. , 1997, 12(6): 543 -554 .
[5] Byounghyun Yoo and Soonhung Han. Representation of Urban Buildings Using Modified Relief Mapping[J]. , 2006, 21(2): 204 -208 .
[6] Cai-Ming Zhang, Hui-Jian Han, and Fuhua Frank Cheng. Determining Knots by Minimizing Energy[J]. , 2006, 21(2): 261 -264 .
[7] Hong Mei, Dong-Gang Cao, and Fu-Qing Yang. Development of Software Engineering: A Research Perspective[J]. , 2006, 21(5): 682 -696 .
[8] Min Liu, Zhong-Cheng Li, and Xiao-Bing Guo. An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN[J]. , 2007, 22(1): 114 -120 .
[9] Shi-Zhu Liu and He-Ping Hu. Text Classification Using Sentential Frequent Itemsets[J]. , 2007, 22(2): 334 -ver .
[10] Bai-Lin Yang, Frederick W. B. Li, Zhi-Geng Pan, and Xun Wang. An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks[J]. , 2008, 23(6 ): 1015 -1025 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved