Guest Editorial
This issue of Computer Science and Information Systems contains revised and expanded versions of selected quality papers presented either at the Third International Symposium on Computer Science and Computational Technology (ISCSCT 2010) or at the Fourth International Symposium on Electronic Commerce and Security (ISECS 2011).
The first conference, ISCSCT 2010, took place on September 14–15, 2010, in Jiaozuo, China, and was co-sponsored by Henan Polytechnic University, China; Peoples' Friendship University of Russia, Russia; Feng Chia University, Taiwan; Zhengzhou University, China; Fudan University, China; South China University of Technology, China; Nanchang Hang Kong University, China; Jiaxing University, China; and Academy Publisher of Finland. ISECS 2011 took place on June 24–26, 2011 in Shanghai, China, and was co-sponsored by Fudan University, China; Peoples’ Friendship University of Russia, Russia; South China University of Technology, China; Feng Chia University, Taiwan; Henan Polytechnic University, China; Nanchang Hang Kong University, China; Jiangxi University of Science and Technology, China; Qingdao University of Science & Technology; and Academy Publisher, Finland. This issue of ComSIS includes a collection of 14 papers selected from the 527 submissions to ISCSCT 2010 and ISECS 2011. All the papers included in this issue have gone through a rigorous peer-review and revision process for their originality and quality. The first paper has the title “Code Cache Management based on Working Set in Dynamic binary translator” and the authors are Ruhui Ma, Zhichen Ni, Erzhou Zhu, Kai Chen, and Haibing Guan. The paper presents two novel code cache management schemes, SCC (static code cache) and DCC (dynamic code cache) based on working sets, which adapt to software code cache, compared to conventional replacement policy, such as Flush and LRU, etc.
The paper “Data Extraction and Annotation based on Domain-specific Ontology Evolution for Deep Web” by Chen Kerui, Zuo Wanli, He Fengling, Chen Yongheng, and Wang Ying presents a robust, highly efficient data annotation method based on ontology evolution. A simpler ontology which can significantly improve annotating efficiency is defined. The dynamic ontology adopted in this paper can evolve concurrently with the process of data annotation. In this way, the new ontology will work more accurately and sufficiently for new web annotation. Experiments indicate that this method can improve the accuracy and efficiency of data extraction and annotation.
The paper “Extracting Minimal Unsatisfiable Subformulas in Satisfiability Modulo Theories” by Jianmin Zhang, Shengyu Shen, Jun Zhang, and Sikun Li presents a depth-first-search algorithm and a breath-first-search algorithm to compute minimal unsatisfiable cores in SMT, adopting different searching strategy. They also report and analyze experimental results obtained from a very extensive test on SMT-LIB benchmarks.
The paper “Indexing Temporal Information for Web Pages” by Peiquan Jin, Hong Chen, Xujian Zhao, Xiaowen Li, and Lihua Yue presents several alternatives to integrate the inverted index and MAP21-tree together to answer keyword queries with temporal constraints. Experimental results about five alternatives were analyzed and presented. The topic discussed in the paper is a very interesting issue. The paper “Parallel processing on Block-based Gauss-Jordan Algorithm for Desktop Grid” by Yizi Shang, Zhizhong Liu, and Ling Shang analyzes all the possibilities for parallelism in the block-based Gauss Jordan algorithm, while former research works just focused on intra-step based parallelism. Then a formal description on data dependence between operations is made and some regulations of data dependence on different operations are summarized. According to those regulations and features of desktop grid environments, this paper proposes a new parallel programming paradigm for desktop grid systems. Experiments testify that the algorithm proposed in this paper can better adapt to volatile environments.
The paper “Problem Solving by Soaking the Concept Network” by Xixu Fu and Hui Wei presents a solution for reasoning with dense knowledge. By soaking the knowledge network, the proposed process is discovered and represented as a reasoning graph.
The paper “Research on Discovering Deep Web Entries” by Ying Wang, Wanli Zuo, and Yulan Qi presents a new framework WFF for efficiently locating domain-specific deep web databases based on focused crawling and ontologies, by constructing a Web page classifier (WPC), form structure classifier (FSC), and form content classifier (FCC) in a hierarchical fashion.
The paper “Study of Privacy-Preserving Framework for Cloud Storage” by Ruwei Huang and Xiaolin Gui presents a privacy-preserving cloud storage framework to resolve the following problems: the data organization structure, the generation and management of keys, data retrieval, the treatment of change of users’ access rights and dynamic operations of data, and the interactions among participants.
The paper “SVM Based Forest Fire Detection Using Static and Dynamic Features” by Jianhui Zhao, Zhong Zhang, Shizhong Han, Chengzhang Qu, Zhiyong Yuan, and Dengyi Zhang describes a method to detect forest fires from video images. In the light of rapidly changing weather patterns, the proposed method has great utility. The proposed method is technically sound and has great promise. The paper “The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information” by Xianwen Fang, Changjun Jiang, and Zhixiang Yin presents a behavior trustworthiness analysis method for business process based on induction information. The contributions of the authors have two aspects. One is that the behavior relativity analyzing method is proposed based on Petri nets at the static interacting stage. The other is that the behavior conformance is studied based on K-bounded process-mining methods at the dynamic running stage. The paper “Voice Activity Detection Method Based on Multi-valued Coarse-graining Lempel-Ziv Complexity” by Huan Zhao, Gangjin Wang, Cheng Xu, and Fei Yu presents a novel robust method for voice activity detection (VAD) that is based on multi-valued coarse-graining Lempel-Ziv Complexity (MLZC), which is an improved algorithm of the binary coarse-graining Lempel-Ziv Complexity (BLZC). In addition, authors use the fuzzy c-Means clustering algorithm and the Bayesian information criterion algorithm to estimate the thresholds of the MLZC characteristic, and adopt the dual-thresholds method for VAD. The paper “Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network” by Ke Xiong, Shenghui Wang, Yu Zhang, Zhifei Zhang, and Zhengding Qiu presents a lower E2E delay bound for QTNPOSS networks by using network calculus theory, where the inherent properties (e.g., packet length and peak rate) of the flow are taken into account. The paper “A Two-Tiered Reliable Application Layer Multicast” by Xinchang Zhang, Meihong Yang, Guanggang Geng, Wanming Luo, and Xingfeng Li presents a two-tiered reliable application layer multicast protocol called HRALM. The protocol uses a domain-based clustering solution to build the ALM tree, and the paper presents a feasible retransmission approach. The paper “Multi-Scale Image Semantic Recognition with Hierarchical Visual Vocabulary” by Xinghao Jiang, Tanfeng Sun, and GuangLei Fu presents a hierarchical semantic model which organizes multi-scale semantics from the semantic space. The hierarchical semantic model is used to organize the multi-scale semantics into a level-by-level structure and to define the relationship between the semantics.
I would like to give our great thanks to the reviewers for their helpful comments and all of the authors for their contributions, efforts and enthusiasm. Thanks are also due to the ComSIS Consortium, and especially to the Editor-in-Chief of ComSIS, Mirjana Ivanović and other staff in the Editorial Office for their advice and help in making the publication of these selected papers possible. Finally, my gratitude goes out to Paul Werbos (National Science Foundation, USA), Gary G. Yen (Oklahoma State University, USA), Derong Liu (Chinese Academy of Sciences, China), and Jun Wang (Chinese University of Hong Kong, Hong Kong), for their vital roles in the organization of ISCSCT 2010 and ISECS 2011 events.
Guest Editor
Fei Yu
Peoples’ Friendship University of Russia