2003 Vol. 29, No. 10

Display Method:
Practical and efficient method for computations over real closed fields
Ma Shilong
2003, 29(10): 847-851.
Abstract:
The conventional methods do not work in practice when dealing with large polynomials because of their high complexity. Thus, finding practical and efficient methods (not necessary to be decision method) to solve systems of large polynomial equations and inequalities is very important in symbolic com...
Association of management functions and managed objects in the dynamically constructed network management
Qian Depei, Luan Zhongzhi, Chen Heng, Li Yunchun
2003, 29(10): 852-855.
Abstract:
The association of management functions and managed objects is the key technology to obtain the scalability of the dynamically constructed network management. The concept of managed objects sets(MOS) was introduced as an important functional element of the association mechanism. The MOS offers the d...
WSDL presentation model and implementation method
Ma Dianfu, Ge Sheng, Liu Xudong
2003, 29(10): 856-859.
Abstract:
Web services description language(WSDL) plays an important role in web services technology. But since WSDL is usually described by protocols, it is lack of strictness and preciseness. From logic point of view, there's no consistent implementation technology of WSDL. A formalized model of WSDL, which...
Goal operationalization-based multi-engine collaboration architecture
Zhang Wenyi, Huai Jinpeng, Liu Xudong
2003, 29(10): 860-864.
Abstract:
The goal operationalizational domain atomic operational model was proposed to analyze the essential problems in realizing goal-oriented system designand implementation. The interpreting engine was introduced to propose an integrative method for the goal-oriented formal model and software design and ...
Level of motion model for semi-dynamic objects in virtual scenes
Wang Lili, Zhao Qinping
2003, 29(10): 865-868.
Abstract:
There always are some semi-dynamic objects in virtual scenes for enhancing realistic immersion, such as trees, flame and smoke. In order to solve the problem of lower rendering speed brought by graphically modeling the action of these objects, level of motion(LOM) model for semi-dynamic objects was ...
On adequate testing of context-free grammars
Li Hu, Jin Maozhong, Gao Zhongyi, Liu Chao
2003, 29(10): 869-872.
Abstract:
Grammar testing was discussed, including related concepts, its characteristics, application scenarios, and a comparison with traditional software testing. Test adequacy criterion of context-free grammar was formally defined and a family of grammar testing criteria was proposed. A formal analysis of ...
Research on integrated model and transmission controlling algorithm for distributed multimedia information system
Hou Yarong, Xiong Zhang, Ouyang Yuanxin
2003, 29(10): 873-876.
Abstract:
To resolve the synchronization for multimedia communication and multimedia presentation of distributed multimedia system, a distributed multimedia information system integrated model(DMISIM) was put forward. In this model, distributed multimedia information system was formulated as synchronization i...
Research on algorithm for distributed service register and recovery based on hierarchical model
Yuan Man, Hu Jianping, He Rui, Kan Zhigang
2003, 29(10): 877-880.
Abstract:
Based on research for data replication protocol, a kind of algorithm for distributed service register and recovery based on hierarchical model was proposed. All the service locators(SL) locating different administrative domains were organized hierarchically, by means of data replication protocol, it...
Web and component based bandwidth adaptive multimedia surveillance system
Fan Shengyin, Li Bo, Zhang Guangwei
2003, 29(10): 881-884.
Abstract:
The useability and expandability are insufficient in digital multimedia surveillance systems. Most of them cannot be adapted to the fluctuation of available network bandwidth. To enhance the useability, the new surveillance structure was presented, which based on browser/server model and media-strea...
Research and implementation of security architecture for Web service runtime
Xue Wei, Liu Xudong, Ge Sheng, Lin Xuelian
2003, 29(10): 885-888.
Abstract:
The application modes and security requirements of Web service runtime (WSR) were analyzed using several fundamental concepts, such as security administration domain. A security architecture based on processing chain structure was presented. The security architecture supports the latest security tec...
Research and implementation of composite Web service supporting system
Du Zongxia, Huai Jinpeng, Wang Yong, Zhang Yu
2003, 29(10): 889-892.
Abstract:
To realize inter-enterprise business process integration, the requirement of composite Web service supporting system was analyzed. Based on the requirement, the principle of system and the architecture were proposed. With this system, you can design, deploy, execute and monitor the composite Web ser...
MPLS traffic engineering routing system supporting fault recovery
Huang He, Li Weiqin, Zhang Hui
2003, 29(10): 893-896.
Abstract:
Based on network policy and traffic profile information, a new constrained routing algorithm for MPLS traffic engineering was proposed. The algorithm pre-allocates the network bandwidth resources to different traffic classes according to the traffic profile information. Through the combination of ex...
Research and implementation of Web services-based software runtime platform
Ge Sheng, Ma Dianfu, Hu Chunming, Du Zongxia
2003, 29(10): 897-900.
Abstract:
Web services based application supporting environment(WebSASE)is a set of software, which can interact with each other to build an environment for Web services applications deployment, running, monitoring and management. The platform adopted the layered design method. Key runtime environment, dynami...
Research of automatic intrusion response implementation methods based on mobile agents
Lang Bo, Zheng Jiudan, Liu Junhe
2003, 29(10): 901-904.
Abstract:
To protect the system promptly and effectively when an intrusion was detected, a mobile agent based automatic intrusion response system was advanced. The response plan was automatically created and the mobile agents were sent to the hosts that are attacked to disable accounts, close ports, make the ...
Algorithm for robust blind image watermark
Cai Su, Qi Yue, Shen Xukun
2003, 29(10): 905-908.
Abstract:
Based on DCT(Discrete Cosine Transformation) domain, an algorithm for robust blind color image watermark was presented. It inserted adaptively a gray image for watermark to a color image according to block correlation of DCT coefficients, and extracted watermark without the original image. It can be...
Review of augmented virtuality technology in virtual reality
Hao Aimin, He Bing, Zhao Qinping
2003, 29(10): 909-913.
Abstract:
Augmented virtuality(AV) is a kind of technology which can be used to describe very complex models and accelerate rendering with images based modeling and rendering(IBMR) under the framework of graphics based modeling and rendering(GBMR). It can decrease the conflict between realism display and real...
Software bypass and fine-grained parallel scheduling on VLIW
Zhu Kaijia, Wang Lei, Yin Baolin
2003, 29(10): 914-918.
Abstract:
A new very long instruction word(VLIW) machine model was described and analyzed.In order to exploit the parallelism in this model, a software bypass method based on static single assignment and an integrated operation-based instruction scheduling and register allocation algorithm were presented. Com...
Multi-level and multi-policy model of distributed network information filtering system
Huang Xin, Yin Baolin
2003, 29(10): 919-922.
Abstract:
On the basis of analyzing the current network information filtering technologies, a scalable multi-level and multi-policy model of a distributed network information filtering system was described, which combines the functions of the packet analyzing, filtering and forwarding. A fine-granularity info...
Design and implementation of embedded infrared video digital recorder
Wang Qingyuan, Wang Rui, Li Bo, Teng Hao
2003, 29(10): 923-926.
Abstract:
An embedded infrared video digital recorder was designed and implemented. Based on PC/104Plus embedded computer architecture, the recorder implements parallel operation between infrared video acquisition and data transmission, parallel operation between infrared video output and data transmission, w...
Modified DS evidence combination strategy based on evidence classification and uncertain entropy
He Bing
2003, 29(10): 927-930.
Abstract:
A modified DS evidence combination method based on evidence classification and uncertain entropy was introduced. Such a method imitates human's behavior in classification to solve the problem of combing evidences with high degree of conflict. When a series of beliefs are available, first those evide...
Study on software measurement process
Ren Fake, Zhou Bosheng, Wu Chaoying
2003, 29(10): 931-934.
Abstract:
Software measurement process is a basis of implementing software process improvement. In order to establish the software measurement process for software process improvement, several standards and models were investigated. Then, an improved process that base on the practical software measurement was...
Research and realization of UML-based integrated software development environment
Tian Licong, Zhang Li, Zhou Bosheng
2003, 29(10): 935-938.
Abstract:
Unified modeling language (UML) lays the foundation of building integrated object-oriented software development environment. After analyzing the characteristics of current modern software development method, combining with the consideration of the users' real requirements, an approach of building UM...
Self-organizing network measurement infrastructure
Li Yunchun, Li Wei, Qian Depei
2003, 29(10): 939-942.
Abstract:
To solve the problem of deploying the network measurement node in a large scale distributed environment, a management mechanism based on hierarchical overlay network was introduced to make all measurement nodes self-organizedinto equivalent classes and reduce inconsistence introduced by manual inter...
Design and implementation of a compositional Web service modeling tool
Cui Hang, Ma Dianfu, Wang Yong, Du Zongxia
2003, 29(10): 943-946.
Abstract:
Based on analyse of the Web service flow language(WSFL) proposed by IBM,a composed Web service modeling tool(CWSMT)was proposed. The tool can help user to design the interaction model among Web services easily and can be integrated with a Web service runtime environment, translating graphic modeling...
Empirical-based software defect content estimation improvement
Zhu Yongchun, Xu Hong
2003, 29(10): 947-950.
Abstract:
Capture-recapture models were often used to estimate the number of defects remaining in the product after inspection. Using mean square error as the evaluation criterion, performance of several estimators based on capture-recapture models were evaluated. An improved empirical-based estimator was pro...