Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

   Online First

Administered by

, Volume 5 Issue 3

For Selected: View Abstracts Toggle Thumbnails
RESEARCH ARTICLE
Learning multiple metrics for ranking
Xiubo GENG, Xue-Qi CHENG
Front Comput Sci Chin. 2011, 5 (3): 259-267.  
https://doi.org/10.1007/s11704-011-0152-5

Abstract   HTML   PDF (174KB)

Directly optimizing an information retrieval (IR) metric has become a hot topic in the field of learning to rank. Conventional wisdom believes that it is better to train for the loss function on which will be used for evaluation. But we often observe different results in reality. For example, directly optimizing averaged precision achieves higher performance than directly optimizing precision@3 when the ranking results are evaluated in terms of precision@3. This motivates us to combine multiple metrics in the process of optimizing IR metrics. For simplicity we study learning with two metrics. Since we usually conduct the learning process in a restricted hypothesis space, e.g., linear hypothesis space, it is usually difficult to maximize both metrics at the same time. To tackle this problem, we propose a relaxed approach in this paper. Specifically, we incorporate one metric within the constraint while maximizing the other one. By restricting the feasible hypothesis space, we can get a more robust ranking model. Empirical results on the benchmark data set LETOR show that the relaxed approach is superior to the direct linear combination approach, and also outperforms other baselines.

Figures and Tables | References | Related Articles | Metrics
An improved spectral clustering algorithm based on random walk
Xianchao ZHANG, Quanzeng YOU
Front Comput Sci Chin. 2011, 5 (3): 268-278.  
https://doi.org/10.1007/s11704-011-0023-0

Abstract   HTML   PDF (925KB)

The construction process for a similarity matrix has an important impact on the performance of spectral clustering algorithms. In this paper, we propose a random walk based approach to process the Gaussian kernel similarity matrix. In this method, the pair-wise similarity between two data points is not only related to the two points, but also related to their neighbors. As a result, the new similarity matrix is closer to the ideal matrix which can provide the best clustering result. We give a theoretical analysis of the similarity matrix and apply this similarity matrix to spectral clustering. We also propose a method to handle noisy items which may cause deterioration of clustering performance. Experimental results on real-world data sets show that the proposed spectral clustering algorithm significantly outperforms existing algorithms.

References | Related Articles | Metrics
Human behavior clustering for anomaly detection
Xudong ZHU, Zhijing LIU
Front Comput Sci Chin. 2011, 5 (3): 279-289.  
https://doi.org/10.1007/s11704-011-0080-4

Abstract   HTML   PDF (413KB)

This paper aims to address the problem of modeling human behavior patterns captured in surveillance videos for the application of online normal behavior recognition and anomaly detection. A novel framework is developed for automatic behavior modeling and online anomaly detection without the need for manual labeling of the training data set. The framework consists of the following key components. 1) A compact and effective behavior representation method is developed based on spatial-temporal interest point detection. 2) The natural grouping of behavior patterns is determined through a novel clustering algorithm, topic hidden Markov model (THMM) built upon the existing hidden Markov model (HMM) and latent Dirichlet allocation (LDA), which overcomes the current limitations in accuracy, robustness, and computational efficiency. The new model is a four-level hierarchical Bayesian model, in which each video is modeled as a Markov chain of behavior patterns where each behavior pattern is a distribution over some segments of the video. Each of these segments in the video can be modeled as a mixture of actions where each action is a distribution over spatial-temporal words. 3) An online anomaly measure is introduced to detect abnormal behavior, whereas normal behavior is recognized by runtime accumulative visual evidence using the likelihood ratio test (LRT) method. Experimental results demonstrate the effectiveness and robustness of our approach using noisy and sparse data sets collected from a real surveillance scenario.

Figures and Tables | References | Related Articles | Metrics
A temporal-spatial background modeling of dynamic scenes
Jiuyue HAO, Chao LI, Zhang XIONG, Ejaz HUSSAIN
Front Comput Sci Chin. 2011, 5 (3): 290-299.  
https://doi.org/10.1007/s11704-011-0377-3

Abstract   HTML   PDF (519KB)

Moving object detection in dynamic scenes is a basic task in a surveillance system for sensor data collection. In this paper, we present a powerful background subtraction algorithm called Gaussian-kernel density estimator (G-KDE) that improves the accuracy and reduces the computational load. The main innovation is that we divide the changes of background into continuous and stable changes to deal with dynamic scenes and moving objects that first merge into the background, and separately model background using both KDE model and Gaussian models. To get a temporal-spatial background model, the sample selection is based on the concept of region average at the update stage. In the detection stage, neighborhood information content (NIC) is implemented which suppresses the false detection due to small and un-modeled movements in the scene. The experimental results which are generated on three separate sequences indicate that this method is well suited for precise detection of moving objects in complex scenes and it can be efficiently used in various detection systems.

Figures and Tables | References | Related Articles | Metrics
An adaptive polling interval and short preamble media access control protocol for wireless sensor networks
Defu CHEN, Zhengsu TAO
Front Comput Sci Chin. 2011, 5 (3): 300-307.  
https://doi.org/10.1007/s11704-011-0134-7

Abstract   HTML   PDF (529KB)

Media access control (MAC) protocols control how nodes access a shared wireless channel. It is critical to the performance of wireless sensor networks (WSN). An adaptive polling interval and short preamble MAC protocol (AX-MAC) is proposed in this paper. AX-MAC is an asynchronous protocol which composed of two basic features. First, rendezvous between the sender and the receiver is reached by a series of short preambles. Second, nodes dynamically adjust their polling intervals according to network traffic conditions. Threshold parameters used to determine traffic conditions and adjust polling intervals are analyzed based on a Markov chain. Energy consumption and network latency are also discussed in detail. Simulation results indicate that AX-MAC is suited to dynamic network traffic conditions and is superior to both X-MAC and Boost-MAC in energy consumption and latency.

Figures and Tables | References | Related Articles | Metrics
Traceback in wireless sensor networks with packet marking and logging
Jun XU, Xuehai ZHOU, Feng YANG
Front Comput Sci Chin. 2011, 5 (3): 308-315.  
https://doi.org/10.1007/s11704-011-0361-y

Abstract   HTML   PDF (239KB)

In a hostile environment, sensor nodes may be compromised and then be used to launch various attacks. One severe attack is false data injection which is becoming a serious threat to wireless sensor networks. An attacker uses the compromised node to flood the network and exhaust network resources by injecting a large number of bogus packets. In this paper, we study how to locate the attack node using a framework of packet marking and packet logging. We propose a combined packet marking and logging scheme for traceback (CPMLT). In CPMLT, one packet can be marked by up to M nodes, each node marks a packet with certain probability. When one packet is marked by M nodes, the next marking node will log this packet. Through combining packet marking and logging, we can reconstruct the entire attack path to locate the attack node by collecting enough packets. In our simulation, CPMLT achieves fast traceback with little logging overhead.

References | Related Articles | Metrics
REVIEW ARTICLE
Toward in vivo nanoscale communication networks: utilizing an active network architecture
Stephen F. BUSH
Front Comput Sci Chin. 2011, 5 (3): 316-326.  
https://doi.org/10.1007/s11704-011-0116-9

Abstract   HTML   PDF (356KB)

A safe and reliable in vivo nanoscale communication network will be of great benefit for medical diagnosis and monitoring as well as medical implant communication. This review article provides a brief introduction to nanoscale and molecular networking in general and provides opinions on the role of active networking for in vivo nanoscale information transport. While there are many in vivo communication mechanisms that can be leveraged, for example, forms of cell signaling, gap junctions, calcium and ion signaling, and circulatory borne communication, this review examines two in particular: molecular motor transport and neuronal information communication. Molecular motors transport molecules representing information and neural coding operates by means of the action potential; these mechanisms are reviewed within the theoretical framework of an active network. This review suggests that an active networking paradigm is necessary at the nanoscale along with a new communication constraint, namely, minimizing the communication impact upon the living environment. The goal is to assemble efficient nanoscale and molecular communication channels while minimizing disruption to the host organism.

Figures and Tables | References | Related Articles | Metrics
RESEARCH ARTICLE
Reasonable routing in delay/disruption tolerant networks
Haizheng YU, Jianfeng MA, Hong BIAN
Front Comput Sci Chin. 2011, 5 (3): 327-334.  
https://doi.org/10.1007/s11704-011-0139-2

Abstract   HTML   PDF (249KB)

Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nodes to carry and forward messages, messages can be eventually delivered to their destination by mobile nodes with an appropriate routing protocol. To have achieved a successful delivery, most DTN routing protocols use message duplication methods. Although messages are rapidly transferred to the destination, the redundancy in the number of message copies increases rapidly. This paper presents a new routing scheme based on a stochastic process for epidemic routing. Message redundancy is efficiently reduced and the number of message copies is controlled reasonably. During the contact process of nodes in the network, the number of message copies changes, and according to the variability in the number of copies, we construct a special Markov chain, birth and death process, on the number of message copies then calculate and obtain a stationary distribution of the birth and death process. Comparing the theoretical model with the simulation we have performed we see similar results. Our method improves on time-to-live (TTL) and anti-packet methods, in both redundancy and delivery success efficiency.

References | Related Articles | Metrics
Security analysis of two recently proposed RFID authentication protocols
Chao LV, Hui LI, Jianfeng MA, Meng ZHAO
Front Comput Sci Chin. 2011, 5 (3): 335-340.  
https://doi.org/10.1007/s11704-011-0153-4

Abstract   HTML   PDF (158KB)

Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.

Figures and Tables | References | Related Articles | Metrics
Pre-post notation is questionable in effectively specifying operations of object-oriented systems
Shaoying LIU
Front Comput Sci Chin. 2011, 5 (3): 341-352.  
https://doi.org/10.1007/s11704-011-0130-y

Abstract   HTML   PDF (207KB)

There is a growing tendency for people in the community of object-oriented methods to use pre- and post-conditions to write formal specifications for operations (methods) of classes. The motivation for trying to take advantage of well established formalism in precisely defining the functionality of operations is laudable, but unfortunately this exercise may be flawed because the use of pre- and post-conditions containing method calls (or similar) with side effects are likely to cause confusion in the interpretation of specifications. This paper analyzes, with comprehensible examples, why using pre-post notation is not effective to specify operations in object-oriented systems in general, discusses existing approaches to using pre-post notation for object-oriented systems, and offers some solutions to the problem.

Figures and Tables | References | Related Articles | Metrics
REVIEW ARTICLE
Green challenges to system software in data centers
Yuzhong SUN, Yiqiang ZHAO, Ying SONG, Yajun YANG, Haifeng FANG, Hongyong ZANG, Yaqiong LI, Yunwei GAO
Front Comput Sci Chin. 2011, 5 (3): 353-368.  
https://doi.org/10.1007/s11704-011-0369-3

Abstract   HTML   PDF (735KB)

With the increasing demand and the wide application of high performance commodity multi-core processors, both the quantity and scale of data centers grow dramatically and they bring heavy energy consumption. Researchers and engineers have applied much effort to reducing hardware energy consumption, but software is the true consumer of power and another key in making better use of energy. System software is critical to better energy utilization, because it is not only the manager of hardware but also the bridge and platform between applications and hardware. In this paper, we summarize some trends that can affect the efficiency of data centers. Meanwhile, we investigate the causes of software inefficiency. Based on these studies, major technical challenges and corresponding possible solutions to attain green system software in programmability, scalability, efficiency and software architecture are discussed. Finally, some of our research progress on trusted energy efficient system software is briefly introduced.

Figures and Tables | References | Related Articles | Metrics
RESEARCH ARTICLE
Static typing for a substructural lambda calculus
Baojian HUA
Front Comput Sci Chin. 2011, 5 (3): 369-380.  
https://doi.org/10.1007/s11704-011-9106-1

Abstract   HTML   PDF (244KB)

Substructural type systems are designed from the insight inspired by the development of linear and substructural logics. Substructural type systems promise to control the usage of computational resources statically, thus detect more program errors at an early stage than traditional type systems do. In the past decade, substructural type systems have been deployed in the design of novel programming languages, such as Vault, etc. This paper presents a general typing theory for substructural type system. First, we define a universal semantic framework for substructural types by interpreting them as characteristic intervals composed of type qualifiers. Based on this framework, we present the design of a substructural calculus λSL with subtyping relations. After giving syntax, typing rules and operational semantics for λSL, we prove the type safety theorem. The new calculus λSL can guarantee many more safety invariants than traditional lambda calculus, which is demonstrated by showing that the λSL calculus can serve as an idealized type intermediate language, and defining a type- preserving translation from ordinary typed lambda calculus into λSL.

Figures and Tables | References | Related Articles | Metrics
12 articles