• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dong Aidi, Li Zhanshan, Yu Haihong. A New Table Compression Method Based on STR Algorithm[J]. Journal of Computer Research and Development, 2018, 55(12): 2734-2740. DOI: 10.7544/issn1000-1239.2018.20170529
Citation: Dong Aidi, Li Zhanshan, Yu Haihong. A New Table Compression Method Based on STR Algorithm[J]. Journal of Computer Research and Development, 2018, 55(12): 2734-2740. DOI: 10.7544/issn1000-1239.2018.20170529

A New Table Compression Method Based on STR Algorithm

More Information
  • Published Date: November 30, 2018
  • Constraint propagation is one of the key methods of constraint programming, and it can be used for solving constraint satisfaction problems and also deal with industrial modeling issues. In recent years, simple tabular reduction (STR) algorithms have been frequently used in some constraint propagation algorithms to cut down the consumption of constraint table space, and at the same time increase running speed of the generalised arc consistent (GAC) algorithm. For the past few years, short support method was the most frequently used as a table compression method in constraint propagation algorithms. This method can propagate more constraints than original STR algorithms especially when the memory is small. But when the compression ratio is low, short support method improving the running speed effect is not obvious. In this paper, we present a new algorithm to compress constraint table, called simple tabular reduction optimization (STRO), combined short support compression method and bit-wise operation. STRO algorithm improves the running speed of STR algorithm, and at the same time, the compression of space effect is better. Experimental results show that when the average size of the table is not particularly small, STRO algorithm is faster and more efficient than ShortSTR2 and STR2 algorithm; compared with STRbit algorithm, the compression rate of STRO algorithm is bigger, and it can save more space and replace STRbit algorithm on time.
  • Related Articles

    [1]Zhang Xiaojian, Zhang Leilei, Zhang Zhizheng. Federated Learning Method Under User-Level Local Differential Privacy[J]. Journal of Computer Research and Development, 2025, 62(2): 472-487. DOI: 10.7544/issn1000-1239.202330167
    [2]Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu. Critical Memory Data Access Monitor Based on Dynamic Strategy Learning[J]. Journal of Computer Research and Development, 2019, 56(7): 1470-1487. DOI: 10.7544/issn1000-1239.2019.20180577
    [3]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [4]HePan, TanChun, YuanYue, WuKaigui. Optimal Resources Allocation Algorithm for Optional Redundancy and Monitoring Strategies[J]. Journal of Computer Research and Development, 2016, 53(3): 682-696. DOI: 10.7544/issn1000-1239.2016.20148204
    [5]Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou. Bare-Bones Differential Evolution Algorithm Based on Trigonometry[J]. Journal of Computer Research and Development, 2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230
    [6]Fu Lingxiao, Peng Xin, and Zhao Wenyun. An Agent-Based Requirements Monitoring Framework for Internetware[J]. Journal of Computer Research and Development, 2013, 50(5): 1055-1065.
    [7]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [8]Lu Zhaoxia, Zeng Guangzhou. A Cooperative Monitoring Model of Migrating Workflow[J]. Journal of Computer Research and Development, 2009, 46(3): 398-406.
    [9]Xu Jian, Zhang Kun, Liu Fengyu, Xu Manwu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Yu Wanjun, Liu Dayou, Liu Quan, Yang Bo. An Approach to Monitoring and Controlling Workflow Systems Based on the Instance State[J]. Journal of Computer Research and Development, 2006, 43(8): 1345-1353.

Catalog

    Article views (939) PDF downloads (280) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return