Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

   Online First

Administered by

, Volume 7 Issue 1

For Selected: View Abstracts Toggle Thumbnails
REVIEW ARTICLE
Consolidated cluster systems for data centers in the cloud age: a survey and analysis
Jian LIN, Li ZHA, Zhiwei XU
Front. Comput. Sci.. 2013, 7 (1): 1-19.  
https://doi.org/10.1007/s11704-012-2086-y

Abstract   HTML   PDF (718KB)

In the cloud age, heterogeneous application modes on large-scale infrastructures bring about the challenges on resource utilization and manageability to data centers. Many resource and runtime management systems are developed or evolved to address these challenges and relevant problems from different perspectives. This paper tries to identify the main motivations, key concerns, common features, and representative solutions of such systems through a survey and analysis. A typical kind of these systems is generalized as the consolidated cluster system, whose design goal is identified as reducing the overall costs under the quality of service premise. A survey on this kind of systems is given, and the critical issues concerned by such systems are summarized as resource consolidation and runtime coordination. These two issues are analyzed and classified according to the design styles and external characteristics abstracted from the surveyed work. Five representative consolidated cluster systems from both academia and industry are illustrated and compared in detail based on the analysis and classifications. We hope this survey and analysis to be conducive to both design implementation and technology selection of this kind of systems, in response to the constantly emerging challenges on infrastructure and application management in data centers.

References | Related Articles | Metrics
RESEARCH ARTICLE
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture
Yuehua DAI, Yi SHI, Yong QI, Jianbao REN, Peijian WANG
Front Comput Sci. 2013, 7 (1): 34-43.  
https://doi.org/10.1007/s11704-012-2084-0

Abstract   HTML   PDF (398KB)

Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emulation make the VMM code base large and the interface between OS and VMM complex. This results in a code base that is very hard to verify the security of the VMM. For example, a misuse of a VMM hyper-call by a malicious guest OS can corrupt the whole VMM. The complexity of the VMM also makes it hard to formally verify the correctness of the system’s behavior. In this paper a new VMM, operating system virtualization (OSV), is proposed. The multiprocessor boot interface and memory configuration interface are virtualized in OSV at boot time in the Linux kernel. After booting, only inter-processor interrupt operations are intercepted by OSV, which makes the interface between OSV and OS simple. The interface is verified using formal model checking, which ensures a malicious OS cannot attack OSV through the interface. Currently, OSV is implemented based on the AMD Opteron multi-core server architecture. Evaluation results show that Linux running on OSV has a similar performance to native Linux. OSV has a performance improvement of 4%-13% over Xen.

References | Related Articles | Metrics
VGQ-Vor: extending virtual grid quadtree with Voronoi diagram for mobile k nearest neighbor queries over mobile objects
Botao WANG, Jingwei QU, Xiaosong WANG, Guoren WANG, Masaru KITSUREGAWA
Front Comput Sci. 2013, 7 (1): 44-54.  
https://doi.org/10.1007/s11704-012-2069-z

Abstract   HTML   PDF (723KB)

Performing mobile k nearest neighbor (MkNN) queries whilst also being mobile is a challenging problem. All the mobile objects issuing queries and/or being queried aremobile. The performance of this kind of query relies heavily on the maintenance of the current locations of the objects. The index used for mobile objects must support efficient update operations and efficient query handling. This study aims to improve the performance of the MkNN queries while reducing update costs. Our approach is based on an observation that the frequency of one region changing between being occupied or not by mobile objects is much lower than the frequency of the position changes reported by the mobile objects. We first propose an virtual grid quadtree with Voronoi diagram(VGQ-Vor), which is a two-layer index structure that indexes regions occupied by mobile objects in a quadtree and builds a Voronoi diagram of the regions. Then we propose a moving k nearest neighbor (kNN) query algorithm on the VGQ-Vor and prove the correctness of the algorithm. The experimental results show that the VGQ-Vor outperforms the existing techniques (Bx-tree, Bdual-tree) by one to three orders of magnitude in most cases.

References | Related Articles | Metrics
Semantic separator learning and its applications in unsupervised Chinese text parsing
Yuming WU, Xiaodong LUO, Zhen YANG
Front Comput Sci. 2013, 7 (1): 55-68.  
https://doi.org/10.1007/s11704-013-2072-z

Abstract   HTML   PDF (583KB)

Grammar learning has been a bottleneck problem for a long time. In this paper, we propose a method of semantic separator learning, a special case of grammar learning. The method is based on the hypothesis that some classes of words, called semantic separators, split a sentence into several constituents. The semantic separators are represented by words together with their part-of-speech tags and other information so that rich semantic information can be involved. In the method, we first identify the semantic separators with the help of noun phrase boundaries, called subseparators. Next, the argument classes of the separators are learned from corpus by generalizing argument instances in a hypernym space. Finally, in order to evaluate the learned semantic separators, we use them in unsupervised Chinese text parsing. The experiments on a manually labeled test set show that the proposed method outperforms previous methods of unsupervised text parsing.

References | Related Articles | Metrics
A novel unsupervised approach for multilevel image clustering from unordered image collection
Lai KANG, Lingda WU, Yee-Hong YANG
Front Comput Sci. 2013, 7 (1): 69-82.  
https://doi.org/10.1007/s11704-013-1266-8

Abstract   HTML   PDF (1338KB)

A novel unsupervised approach to automatically constructing multilevel image clusters from unordered images is proposed in this paper. The whole input image collection is represented as an imaging sample space (ISS) consisting of globally indexed image features extracted by a new efficientmulti-viewimage featurematchingmethod. By making an analogy between image capturing and observation of ISS, each image is represented as a binary sequence, in which each bit indicates the visibility of a corresponding feature. Based on information theory-inspired image popularity and dissimilarity measures, we show that the image content and distance can be quantitatively described, guided by which an input image collection is organized into multilevel clusters automatically. The effectiveness and the efficiency of the proposed approach are demonstrated using three real image collections and promising results were obtained from both qualitative and quantitative evaluation.

References | Related Articles | Metrics
A general framework for computing maximal contractions
Jie LUO
Front Comput Sci. 2013, 7 (1): 83-94.  
https://doi.org/10.1007/s11704-012-2044-8

Abstract   HTML   PDF (1203KB)

This paper investigates the problem of computing all maximal contractions of a given formula set Γ with respect to a consistent set Δ of atomic formulas and negations of atomic formulas. We first give a constructive definition of minimal inconsistent subsets and propose an algorithmic framework for computing all minimal inconsistent subsets of any given formula set. Then we present an algorithm to compute all maximal contractions fromminimal inconsistent subsets. Based on the algorithmic framework and the algorithm, we propose a general framework for computing all maximal contractions. The computability of the minimal inconsistent subset and maximal contraction problems are discussed. Finally, we demonstrate the ability of this framework by applying it to the first-order language without variables and design an algorithmfor the computation of all maximal contractions.

References | Related Articles | Metrics
Hybrid MARTE statecharts
Jing LIU, Ziwei LIU, Jifeng HE, Frédéric MALLET, Zuohua DING
Front Comput Sci. 2013, 7 (1): 95-108.  
https://doi.org/10.1007/s11704-012-1301-1

Abstract   HTML   PDF (672KB)

The specification of modeling and analysis of real-time and embedded systems (MARTE) is an extension of the unified modeling language (UML) in the domain of real-time and embedded systems. Even though MARTE time model offers a support to describe both discrete and dense clocks, the biggest effort has been put so far on the specification and analysis of discrete MARTE models. To address hybrid real-time and embedded systems, we propose to extend statecharts using both MARTE and the theory of hybrid automata. We call this extension hybrid MARTE statecharts. It provides an improvement over the hybrid automata in that: the logical time variables and the chronometric time variables are unified. The formal syntax and semantics of hybrid MARTE statecharts are given based on labeled transition systems and live transition systems. As a case study, we model the behavior of a train control system with hybrid MARTE statecharts to demonstrate the benefit.

References | Related Articles | Metrics
A graph-based generic type system for object-oriented programs
Wei KE, Zhiming LIU, Shuling WANG, Liang ZHAO
Front Comput Sci. 2013, 7 (1): 109-134.  
https://doi.org/10.1007/s11704-012-1307-8

Abstract   HTML   PDF (754KB)

We present a graph-basedmodel of a generic type system for an OO language. The type system supports the features of recursive types, generics and interfaces, which are commonly found in modern OO languages such as Java. In the classical graph theory, we define type graphs, instantiation graphs and conjunction graphs that naturally illustrate the relations among types, generics and interfaces within complex OO programs. The model employs a combination of nominal and anonymous nodes to represent respectively types that are identified by names and structures, and defines graph-based relations and operations on types including equivalence, subtyping, conjunction and instantiation. Algorithms based on the graph structures are designed for the implementation of the type system. We believe that this type system is important for the development of a graph-based logical foundation of a formal method for verification of and reasoning about OO programs.

References | Related Articles | Metrics
Noisy component extraction with reference
Yongjian ZHAO, Hong HE, Jianxun Mi
Front Comput Sci. 2013, 7 (1): 135-144.  
https://doi.org/10.1007/s11704-013-1135-5

Abstract   HTML   PDF (781KB)

Blind source extraction (BSE) is particularly attractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of noise and can only work well in noise-free environments. In practice, the desired signal is often contaminated by additional noise. Therefore, we try to tackle the problem of noisy component extraction. The reference signal carries enough prior information to distinguish the desired signal from signal mixtures. According to the useful properties of Gaussian moments, we incorporate the reference signal into a negentropy objective function so as to guide the extraction process and develop an improved BSE method. Extensive computer simulations demonstrate its validity in the process of revealing the underlying desired signal.

References | Related Articles | Metrics
Geometric attack resistant image watermarking based on MSER
Xuejuan ZHANG, Xiaochun CAO, Jingjie LI
Front Comput Sci. 2013, 7 (1): 145-156.  
https://doi.org/10.1007/s11704-013-2174-7

Abstract   HTML   PDF (909KB)

Geometric distortions are simple and effective attacks rendering many watermarking methods useless. They make detection and extraction of the embedded watermark difficult or even impossible by destroying the synchronization between the watermark reader and the embedded watermark. In this paper, we propose a blind content-based image watermarking scheme against geometric distortions. Firstly, the MSER detector is adopted to extract a set of maximally stable extremal regions which are affine covariant and robust to geometric distortions and common signal processing. Secondly, every original MSER is fitted into an elliptical region that was proved to be affine invariant. In order to achieve rotation invariance, an image normalization process is performed to transform the elliptical regions into circular ones. Finally, watermarks are repeatedly embedded into every circular disk by modifying the wavelet transform coefficients. Experimental results on standard benchmark demonstrate that the proposed scheme is robust to geometric distortions as well as common signal processing.

References | Related Articles | Metrics
10 articles