Please wait a minute...

当期目录

2012年, 第3期 刊出日期:2012-03-01 上一期    下一期
Task mapper and application-aware virtual machine scheduler oriented for parallel computing
Jing Zhang, Xiao-jun Chen, Jun-huai Li, Xiang Li
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 155-177.   https://doi.org/10.1631/jzus.C1100217
摘要( 2702 )     PDF(0KB)( 2482 )
We design a task mapper TPCM for assigning tasks to virtual machines, and an application-aware virtual machine scheduler TPCS oriented for parallel computing to achieve a high performance in virtual computing systems. To solve the problem of mapping tasks to virtual machines, a virtual machine mapping algorithm (VMMA) in TPCM is presented to achieve load balance in a cluster. Based on such mapping results, TPCS is constructed including three components: a middleware supporting an application-driven scheduling, a device driver in the guest OS kernel, and a virtual machine scheduling algorithm. These components are implemented in the user space, guest OS, and the CPU virtualization subsystem of the Xen hypervisor, respectively. In TPCS, the progress statuses of tasks are transmitted to the underlying kernel from the user space, thus enabling virtual machine scheduling policy to schedule based on the progress of tasks. This policy aims to exchange completion time of tasks for resource utilization. Experimental results show that TPCM can mine the parallelism among tasks to implement the mapping from tasks to virtual machines based on the relations among subtasks. The TPCS scheduler can complete the tasks in a shorter time than can Credit and other schedulers, because it uses task progress to ensure that the tasks in virtual machines complete simultaneously, thereby reducing the time spent in pending, synchronization, communication, and switching. Therefore, parallel tasks can collaborate with each other to achieve higher resource utilization and lower overheads. We conclude that the TPCS scheduler can overcome the shortcomings of present algorithms in perceiving the progress of tasks, making it better than schedulers currently used in parallel computing.
Topology awareness algorithm for virtual network mapping
Xiao-ling Li, Huai-min Wang, Chang-guo Guo, Bo Ding, Xiao-yong Li, Wen-qi Bi, Shuang Tan
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 178-186.   https://doi.org/10.1631/jzus.C1100282
摘要( 2837 )     PDF(0KB)( 1795 )
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual networks to the substrate network with efficient utilization of infrastructure resources. The problem can be divided into two phases: node mapping phase and link mapping phase. In the node mapping phase, the existing algorithms usually map those virtual nodes with a complete greedy strategy, without considering the topology among these virtual nodes, resulting in too long substrate paths (with multiple hops). Addressing this problem, we propose a topology awareness mapping algorithm, which considers the topology among these virtual nodes. In the link mapping phase, the new algorithm adopts the k-shortest path algorithm. Simulation results show that the new algorithm greatly increases the long-term average revenue, the acceptance ratio, and the long-term revenue-to-cost ratio (R/C).
Large margin classification for combating disguise attacks on spam filters
Xi-chuan Zhou, Hai-bin Shen, Zhi-yong Huang, Guo-jun Li
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 187-195.   https://doi.org/10.1631/jzus.C1100259
摘要( 1910 )     PDF(0KB)( 1135 )
This paper addresses the challenge of large margin classification for spam filtering in the presence of an adversary who disguises the spam mails to avoid being detected. In practice, the adversary may strategically add good words indicative of a legitimate message or remove bad words indicative of spam. We assume that the adversary could afford to modify a spam message only to a certain extent, without damaging its utility for the spammer. Under this assumption, we present a large margin approach for classification of spam messages that may be disguised. The proposed classifier is formulated as a second-order cone programming optimization. We performed a group of experiments using the TREC 2006 Spam Corpus. Results showed that the performance of the standard support vector machine (SVM) degrades rapidly when more words are injected or removed by the adversary, while the proposed approach is more stable under the disguise attack.
Synthesizing style-preserving cartoons via non-negative style factorization
Zhang Liang, Jun Xiao, Yue-ting Zhuang
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 196-207.   https://doi.org/10.1631/jzus.C1100202
摘要( 2003 )     PDF(0KB)( 1434 )
We present a complete framework for synthesizing style-preserving 2D cartoons by learning from traditional Chinese cartoons. In contrast to reusing-based approaches which rely on rearranging or retrieving existing cartoon sequences, we aim to generate stylized cartoons with the idea of style factorization. Specifically, starting with 2D skeleton features of cartoon characters extracted by an improved rotoscoping system, we present a non-negative style factorization (NNSF) algorithm to obtain style basis and weights and simultaneously preserve class separability. Thus, factorized style basis can be combined with heterogeneous weights to re-synthesize style-preserving features, and then these features are used as the driving source in the character reshaping process via our proposed subkey-driving strategy. Extensive experiments and examples demonstrate the effectiveness of the proposed framework.
Driving intention recognition and behaviour prediction based on a double-layer hidden Markov model
Lei He, Chang-fu Zong, Chang Wang
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 208-217.   https://doi.org/10.1631/jzus.C11a0195
摘要( 2179 )     PDF(0KB)( 2404 )
We propose a model structure with a double-layer hidden Markov model (HMM) to recognise driving intention and predict driving behaviour. The upper-layer multi-dimensional discrete HMM (MDHMM) in the double-layer HMM represents driving intention in a combined working case, constructed according to the driving behaviours in certain single working cases in the lower-layer multi-dimensional Gaussian HMM (MGHMM). The driving behaviours are recognised by manoeuvring the signals of the driver and vehicle state information, and the recognised results are sent to the upper-layer HMM to recognise driving intentions. Also, driving behaviours in the near future are predicted using the likelihood-maximum method. A real-time driving simulator test on the combined working cases showed that the double-layer HMM can recognise driving intention and predict driving behaviour accurately and efficiently. As a result, the model provides the basis for pre-warning and intervention of danger and improving comfort performance.
Grasp evaluation and contact points planning for polyhedral objects using a ray-shooting algorithm
Shuang-quan Wen, Tie-jun Wu
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 218-231.   https://doi.org/10.1631/jzus.C1100151
摘要( 1995 )     PDF(0KB)( 1275 )
Grasp evaluation and planning are two fundamental issues in robotic grasping and dexterous manipulation. Most traditional methods for grasp quality evaluation suffer from non-uniformity of the wrench space and a dependence on the scale and choice of the reference frame. To overcome these weaknesses, we present a grasp evaluation method based on disturbance force rejection under the assumption that the normal component of each individual contact force is less than one. The evaluation criterion is solved using an enhanced ray-shooting algorithm in which the geometry of the grasp wrench space is read by the support mapping. This evaluation procedure is very fast due to the efficiency of the ray-shooting algorithm without linearization of the friction cones. Based on a necessary condition for grasp quality improvement, a heuristic searching algorithm for polyhedral object regrasp is also proposed. It starts from an initial force-closure unit grasp configuration and iteratively improves the grasp quality to find the locally optimum contact points. The efficiency and effectiveness of the proposed algorithms are illustrated by a number of numerical examples.
Array based HV/VH tree: an effective data structure for layout representation
Jie Ren, Wei-wei Pan, Yong-jun Zheng, Zheng Shi, Xiao-lang Yan
Front. Inform. Technol. Electron. Eng., 2012, 13(3): 232-237.   https://doi.org/10.1631/jzus.C1100193
摘要( 2305 )     PDF(0KB)( 1887 )
We present a new data structure for the representation of an integrated circuit layout. It is a modified HV/VH tree using arrays as the primary container in bisector lists and leaf nodes. By grouping and sorting objects within these arrays together with a customized binary search algorithm, our new data structure provides excellent performance in both memory usage and region query speed. Experimental results show that in comparison with the original HV/VH tree, which has been regarded as the best layout data structure to date, the new data structure uses much less memory and can become 30% faster on region query.
7 articles

编辑部公告More

友情链接