Loading...




Bimonthly    Since 1986
ISSN 1000-9000(Print)
/1860-4749(Online)
CN 11-2296/TP
Indexed in:
SCIE, Ei, INSPEC, JST, AJ, MR, CA, DBLP, etc.
Publication Details
Edited by: Editorial Board of Journal Of Computer Science and Technology
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
Other Countries: Springer
 
ip访问总数:
ip当日访问总数:
当前在线人数:
  • Table of Content
      15 March 2004, Volume 19 Issue 2 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Articles
    Web Caching: A Way to Improve Web QoS
    Ming-Kuan Liu, Fei-Yue Wang, and Daniel Dajun Zeng
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(380KB) ( 4083 )   Chinese Summary
    As the Internet and World Wide Web grow at a fast pace, it is essential that the Web's performance should keep up with increased demand and expectations. Web Caching technology has been widely accepted as one of the effective approaches to alleviating Web traffic and increase the Web Quality of Service (QoS). This paper provides an up-to-date survey of the rapidly expanding Web Caching literature. It discusses the state-of-the-art web caching schemes and techniques, with emphasis on the recent developments in Web Caching technology such as the differentiated Web services, heterogeneous caching network structures, and dynamic content caching.
    Related Articles | Metrics
    Verifying Functions in Online Stock Trading Systems
    Yu-Yue Du and Chang-Jun Jiang
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(375KB) ( 2578 )   Chinese Summary
    Temporal colored Petri nets, an extension of temporal Petri nets, are introduced in this paper. It can distinguish the personality of individuals (tokens), describe clearly the causal and temporal relationships between events in concurrent systems, and represent elegantly certain fundamental properties of concurrent systems, such as eventuality and fairness. The use of this method is illustrated with an example of modeling and formal verification of an online stock trading system. The functional correctness of the modeled system is formally verified based on the temporal colored Petri net model and temporal assertions. Also, some main properties of the system are analyzed. It has been demonstrated sufficiently that temporal colored Petri nets can verify efficiently some time-related properties of concurrent systems, and provide both the power of dynamic representation graphically and the function of logical inference formally. Finally, future work is described.
    Related Articles | Metrics
    QoS Routing Optimization Strategy Using Genetic Algorithm in Optical Fiber Communication Networks
    Zhao-Xia Wang, Zeng-Qiang Chen, and Zhu-Zhi Yuan
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(270KB) ( 2185 )   Chinese Summary
    This paper describes the routing problems in optical fiber networks, defines five constraints, induces and simplifies the evaluation function and fitness function, and proposes a routing approach based on the genetic algorithm, which includes an operator [OMO] to solve the QoS routing problem in optical fiber communication networks. The simulation results show that the proposed routing method by using this optimal maintain operator genetic algorithm (OMOGA) is superior to the common genetic algorithms (CGA). It not only is robust and efficient but also converges quickly and can be carried out simply, that makes it better than other complicated GA.
    Related Articles | Metrics
    A New Family of Interconnection Networks of Fixed Degree Three
    Shu-Ming Zhou and Wen-Jun Xiao
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(296KB) ( 1381 )   Chinese Summary
    A new family of interconnection networks WGn is proposed, that is constant degree 3 Cayley graph, and is isomorphic to a Cayley graph of the wreath product Z2|Sn when the generator set is chosen properly. Its different algebraic properties is investigated and a routing algorithm is given with the diameter upper bounded by 3n^2-6n+4. The embedding properties and the fault tolerance are devired. In conclusion, we present a comparison of some familiar networks with constant degree 3.
    Related Articles | Metrics
    RPE Query Processing and Optimization Techniques for XML Databases
    Guo-Ren Wang, Bing Sun, Jian-Hua Lv, and Ge Yu
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(451KB) ( 2419 )   Chinese Summary
    An extent join to compute path expressions containing parent-children and ancestor-descendent operations and two path expression optimization rules, path-shortening and path-complementing, are presented in this paper. Path-shortening reduces the number of joins by shortening the path while path-complementing optimizes the path execution by using an equivalent complementary path expression to compute the original one. Experimental results show that the algorithms proposed are more efficient than traditional algorithms.
    Related Articles | Metrics
    Domain-Specific Ontology of Botany
    Fang Gu, Cun-Gen Cao, Yue-Fei Sui, and Wen Tian
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(358KB) ( 2276 )   Chinese Summary
    Domain-specific ontologies are greatly useful in knowledge acquisition, sharing and analysis. In this paper, botany-specific ontology for acquiring and analyzing botanical knowledge is presented. The ontology is represented in a set of well-defined categories, and each concept is viewed as an instance of certain category. The authors also introduce botany-specific axioms, an integral part of the ontology, for checking and reasoning with the acquired knowledge. Consistency, completeness and redundancy of the axioms are discussed.
    Related Articles | Metrics
    Rule Extraction: Using Neural Networks or for Neural Networks?
    Zhi-Hua Zhou
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(216KB) ( 2550 )   Chinese Summary
    In the research of rule extraction from neural networks, fidelity describes how well the rules mimic the behavior of a neural network while accuracy describes how well the rules can be generalized. This paper identifies the fidelity-accuracy dilemma. It argues to distinguish rule extraction using neural networks and rule extraction for neural networks according to their different goals, where fidelity and accuracy should be excluded from the rule quality evaluation framework, respectively.
    Related Articles | Metrics
    A Note on the Single Genotype Resolution Problem
    Hao Lin, Ze-Feng Zhang, Qiang-Feng Zhang,Dong-Bo Bu, and Ming Li
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(227KB) ( 1256 )   Chinese Summary
    This note settles the complexity of the single genotype resolution problem showing it is NP-complete. This solves an open problem raised by P. Bonizzoni, G.D. Vedova, R. Dondi, and J. Li. The same proof also gives an alternative and simpler reduction of the NP-hardness of Maximum Resolution problem.
    Related Articles | Metrics
    Provisioning QoS Guarantee by Multipath Routing and Reservation in Ad Hoc Networks
    Yan-Tai Shu, Guang-Hong Wang, Lei Wang, Oliver W. W. Yang, and Yong-Jie Fan
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(330KB) ( 1718 )   Chinese Summary
    In this paper, a QoS multipath source routing protocol (QoS-MSR) is proposed for ad hoc networks. It can collect QoS information through route discovery mechanism of multipath source routing (MSR) and establish QoS route with reserved bandwidth. In order to reserve bandwidth efficiently, a bandwidth reservation approach called the multipath bandwidth splitting reservation (MBSR) is presented, under which the overall bandwidth request is split into several smaller bandwidth requests among multiple paths. In simulations, the anthors introduce Insignia, an in-bind signaling system that supports QoS in ad hoc networks, and extend it to multipath Insignia (M-Insignia) with QoS-MSR and MBSR. The results show that QoS-MSR routing protocol with the MBSR algorithm can improve the call admission ratio of QoS traffic, the packet delivery ratio, and the end-to-end delay of both best-effort traffic and QoS traffic. Therefore, QoS-MSR with MBSR is an efficient mechanism that supports QoS for ad hoc networks.
    Related Articles | Metrics
    A Conceptual Model of Service Customization and Its Implementation
    Su-Bin Shen, Guan-Qun Gu, and Shun-Yi Zhang
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(310KB) ( 1664 )   Chinese Summary
    With the development of Internet and next generation networks in telecommunications, more and more new services are required to be introduced into networks. Introducing new services into traditional network is always associated with standardizing new protocols. The progress of protocol standardization usually takes several years, which cannot meet the increasing demands of the applications in Internet and next generation networks. Service customization in network systems may be one possible solution to cope with this problem. Based on the principle that network service is provided by interactions among protocol entities, this paper proposes a conceptual model of service customization (SECUM) by separating the service logic from protocol interactive logic within existing network architecture. The theory of Communicating Sequential Processes (CSP) is used to formalize the SECUM in order to locate exactly the service logic and to define precisely the SECUM. For validating the SECUM's usability in practical network systems, this paper also proposes an implementation model for SECUM: a component-based protocol implementation model (CPIM). CPIM discomposes protocol entity into application component, service component, message component and communication component. Service component associates application component with message component. Users or network managers can customize network services by configuring service component. The paper shows respectively the applications of SECUM and CPIM by proposing a customizable IP service model based on SECUM and describing an implementation of Session Initiation Protocol (SIP) based on CPIM. Compared with the existing service-customization techniques, SECUM is a service customization model internal to network system and may provide more powerful capabilities of service customization.
    Related Articles | Metrics
    Performance Enhancement and Bandwidth Guarantee in IEEE 802.11 Wireless LANs
    Yong Peng and Shi-Duan Cheng
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(337KB) ( 1422 )   Chinese Summary
    This paper first revisits the previously proposed NSAD (New Self-Adapt DCF) mechanism. Some modifications are presented to further enhance the performance of NSAD in the error-prone environment. Then a new MAC mechanism is proposed that can realize bandwidth guarantee by assigning different self-adapt parameters to users at different priority levels. The bandwidth guarantee property of this new mechanism is analyzed and the high priority users are found to have bandwidth guaranteed even in heavy contention condition, which is proved true not only by theoretical analysis but also by simulation results. At the same time the new scheme keeps the self-adapt character of NSAD, so the overall system utilization is kept very high in heavy contention condition compared with the previously studied DCF-based QoS mechanisms.
    Related Articles | Metrics
    An Analytical Framework for Performance of Different Fault Restoration Policies with QoS Constraints in MPLS Networks
    Xian-Si Tan, Zong-Kai Yang, Liang Ou, Jing-Wen Chen, and Ya-Jie Ma
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(512KB) ( 1436 )   Chinese Summary
    An analytical framework for the performance of different protection switching restoration mechanisms with different protection policies in Multi-Protocol Label Switching (MPLS) networks is developed, where the protection policy may be 1+1, 1:1, n:1 or n:m. As a general rule, it aims at the MPLS networks with the protection paths created in advance of fault occurrence without resources reserved, and it reroutes the protected traffic in the event of link or router failures while trying to maintain quality of service (QoS) requirements. Based on the proposed protocol for processing faults, an analytical model and an evaluating model are created, and the benefits and penalties of different mechanisms with different protection policies are evaluated. In particular, an improvement on the proposed protocol is presented to overcome the drawbacks of n:m protection policy in which m>1 and n>1.
    Related Articles | Metrics
    Authenticating Tripartite Key Agreement Protocol with Pairings
    Sheng-Li Liu, Fang-Guo Zhang, and Ke-Fei Chen
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(318KB) ( 1865 )   Chinese Summary
    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.
    Related Articles | Metrics
    A General Probability Formula of the Number of Location Areas Boundaries Crossed by a Mobile Between Two Successive Call Arrivals
    Yi-Hua Zhu, Ding-Hua Shi, Yong Xiong, Ji Gao, and He-Zhi Luo
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(290KB) ( 1353 )   Chinese Summary
    Mobility management is a challenging topic in mobile computing environment. Studying the situation of mobiles crossing the boundaries of location areas is significant for evaluating the costs and performances of various location management strategies. Hitherto, several formulae were derived to describe the probability of the number of location areas' boundaries crossed by a mobile. Some of them were widely used in analyzing the costs and performances of mobility management strategies. Utilizing the density evolution method of vector Markov processes, we propose a general probability formula of the number of location areas' boundaries crossed by a mobile between two successive calls. Fortunately, several widely-used formulae are special cases of the proposed formula.
    Related Articles | Metrics
    On Fault Tolerance of 3-Dimensional Mesh Networks
    Gao-Cai Wang, Jian-Er Chen, and Guo-Jun Wang
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(307KB) ( 1507 )   Chinese Summary
    In this paper, the concept of k-submesh and k-submesh connectivity fault tolerance model is proposed. And the fault tolerance of 3-D mesh networks is studied under a more realistic model in which each network node has an independent failure probability. It is first observed that if the node failure probability is fixed, then the connectivity probability of 3-D mesh networks can be arbitrarily small when the network size is sufficiently large. Thus, it is practically important for multicomputer system manufacturer to determine the upper bound for node failure probability when the probability of network connectivity and the network size are given. A novel technique is developed to formally derive lower bounds on the connectivity probability for 3-D mesh networks. The study shows that 3-D mesh networks of practical size can tolerate a large number of faulty nodes thus are reliable enough for multicomputer systems. A number of advantages of 3-D mesh networks over other popular network topologies are given. Compared to 2-D mesh networks, 3-D mesh networks are much stronger in tolerating faulty nodes, while for practical network size, the fault tolerance of 3-D mesh networks is comparable with that of hypercube networks but enjoys much lower node degree.
    Related Articles | Metrics
    Fault-Tolerant Scheduling for Real-Time Embedded Control Systems
    Chun-Hua Yang, Geert Deconinck, and Wei-Hua Gui
    Journal of Computer Science and Technology, 2004, 19 (2): 0-0. 
    Abstract   PDF(367KB) ( 1819 )   Chinese Summary
    With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the characteristics of real-time tasks in ECS, an integrated algorithm is proposed to schedule real-time tasks and to guarantee that all real-time tasks are completed before their deadlines even in the presence of faults. Based on the nonpreemptive critical-section protocol (NCSP), this paper analyzes the blocking time introduced by resource conflicts of relevancy tasks in fault-tolerant multiprocessor systems. An extended schedulability condition is presented to check the assignment feasibility of a given task to a processor. A primary/backup approach and on-line replacement of failed processors are used to tolerate processor failures. The analysis reveals that the integrated algorithm bounds the blocking time, requires limited overhead on the number of processors, and still assures good processor utilization. This is also demonstrated by simulation results. Both analysis and simulation show the effectiveness of the proposed algorithm in ECS.
    Related Articles | Metrics
  Journal Online
Just Accepted
Archive
Top Cited Papers
Top 30 Most Read
Paper Lists of Areas
Surveys
Special Issues
  Download
   ScholarOne Manuscripts
   Log In

User ID:

Password:

  Forgot your password?

Enter your e-mail address to receive your account information.

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved