Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Collections

“核高基”专题
Sort by Default Latest Most read  
Please wait a minute...
  • Select all
    |
  • Networks and Communications
    HAO Yun-Long, DIAO Rong-Cai, HOU Yong-Sheng, SHU Jia-Feng
    Computer Engineering. 2011, 37(9): 32-34. https://doi.org/10.3969/j.issn.1000-3428.2011.09.012
    Baidu(50) CSCD(2)
    Aiming at the difficulty to complete and accurate analyse loop-level performance using current procedure technique, this paper proposes a method for procedure loop-level performance analysis. The method uses a feedback-directed compiling optimization technique, combined with some static analysis methods, without the support of hardware architecture, wide range of applications. Experimental result manifests that the method can complete accurate loop-level performance analysis, help the programmers finding the hot-spot and carrying out hand optimization.
  • Networks and Communications
    WANG Lin, SHE Qiang, ZHANG Ji, MU Ying, AN He-Ming
    Computer Engineering. 2011, 37(9): 35-37. https://doi.org/10.3969/j.issn.1000-3428.2011.09.011
    Baidu(1) CSCD(1)
    Aiming at the high demand of portability and reusability for embedded system software development, a reasonable and effective schedule table synchronization algorithm is proposed. Through analysis on schedule table function, a real-time algorithm is used to calculate the synchronization time of the schedule table, which can achieve the synchronization between schedule table and synchronized counter, and increase the execution efficiency of the schedule table. The comparison results show that the algorithm can better ensure the system’s stability and real-time.
  • Networks and Communications
    SHU Jia-Feng, DIAO Rong-Cai, HOU Yong-Sheng, HAO Yun-Long
    Computer Engineering. 2011, 37(9): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2011.09.013
    Baidu(2) CSCD(2)
    Traditional vectorization method and superword level parallelism both rely on data dependence analysis to exploit the parallelism of the programs. However, the up-to-date compiler has less ability to analyze such statements as non-structured control flow statements, which the data dependence analysis cannot deal with. This paper presents a vectorization method of export branch statements for SIMD extension, which can effectively vectorize the export branch statements within a vector length. Test results show that this method can both fully exploit the parallelism of the data flow and ensure the semantic correctness of control flow.
  • Networks and Communications
    GU Li-Gong, LIN Zhi-Jiang, TUN Shao-Gang
    Computer Engineering. 2011, 37(9): 41-43. https://doi.org/10.3969/j.issn.1000-3428.2011.09.014
    Baidu(7) CSCD(3)
    Loongson 2F processor provides a register for software to scale the frequency. For producing lower power consumption of Loongson computer, this paper uses CPUFreq driver framework in Linux kernel, writes driver code of CPUFreq for Loongson 2F processor, and realizes the dynamic frequency scaling of 2F processor. An experiment to measure the power saving and performance of CPUFreq is done. Experimental results show that OnDemand adjusting strategy of CPUFreq provides better synthesized effect.
  • Networks and Communications
    LIU Jian, SANG Nan, GUO Wen-Sheng
    Computer Engineering. 2011, 37(9): 44-46,50. https://doi.org/10.3969/j.issn.1000-3428.2011.09.015
    Baidu(1) CSCD(1)
    The efficiency of Cascading Style Sheet(CSS) engine is the bottleneck of embedded browser, this paper puts forward two methods of style management improvement and design for efficiency promotion of CSS engine. Adding classification of user operation related pseudo-class style rules, it can reduce unnecessary match of pseudo-class style rules; The memory of node for matching absolutely can provide brother nodes with instruction of suiting for the style rule, and reduce the times of style match. Experimental result shows that the total time consumption of style rules match reduces 3% ~15% or so for different Web page.
  • Networks and Communications
    CHEN Zhong-Xiang, DAN Jin-Yu, HAO Zong-Bei
    Computer Engineering. 2011, 37(9): 47-50. https://doi.org/10.3969/j.issn.1000-3428.2011.09.016
    Baidu(6) CSCD(2)
    This paper puts forward a new method for the static function call analysis with control flow, by which can get the information of control flow and function call through creating a model to carry out static analysis of the source code. Comparing with existing tools like calltree and Source Insight, the function call flow graph generated by using the new method can not only reveal the call order of the functions, but also help to understand the complexity of the logic of the program. With the help of the new function call flow graph, the code reader has a better mastery of control flow of the program and a better understanding of the structure and design of the program. It also provides the basis of convenience to analyse control conditions of the program, design path coverage test cases and optimization for the program.
  • Networks and Communications
    SHE Qiang, ZHANG Xiao-Xian, DAI Rou-Yi
    Computer Engineering. 2011, 37(9): 51-53,56. https://doi.org/10.3969/j.issn.1000-3428.2011.09.017
    Baidu(8) CSCD(1)
    After an in-depth study of AUTOSAR communication specification, this paper uses its methodology to design the AUTOSAR communication cluster with reference to its software architecture. The design has complete definitions, clear interfaces and full functions. It is able to meet the future automotive requirements of complex vehicle bus network. As an example, the procedure and methodology of the design and implementation of a communication system is based on CAN, which is run on MC9S12DG128 developed by Freescale, and the bus communication module is realized.
  • Networks and Communications
    LI Dui, WANG San-Hong, FAN De-Quan, JIANG Jian-Chun
    Computer Engineering. 2011, 37(9): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2011.09.018
    Baidu(3) CSCD(2)
    This paper studies the conformance test specification of OSEK Operating System(OS), and proposes a generation method of conformance test cases based on classification tree. This method is mainly to the test object classification division, the analysis of the relationship between classification subsets, and with the CTE tool to reduce the number of test cases. The effectiveness of OSEK operating system conformance test using classification tree method are proved through the conformance test of the resource management of AutoOSEK.
  • Networks and Communications
    DENG Beng, FAN Ke-Feng, ZHANG Su-Bing, MO Wei
    Computer Engineering. 2011, 37(9): 57-58,61. https://doi.org/10.3969/j.issn.1000-3428.2011.09.019
    Baidu(3) CSCD(2)
    Aiming at the problem of security operating system risk management is difficult to evaluate quantitatively, this paper puts forward a suitable operating system security risk grade quantitatively evaluation model. Through introducing the risk matrix method, putting the information safety risk assessment as the risk evaluation model by experts matrix, Borda rule and Analytic Hierarchy Process(AHP) assess the risk assessment process, and achieve safe operation system risk management quantitative evaluation, enhance the objectivity of the operating system risk rank quantitative evaluation. In conclusion, the application evaluation model is validated through the examples, and the results show that the model can effectively assess the operating system security risk levels.
  • Networks and Communications
    LIU Dao-Hong, LEI Hang, GUO Wen-Sheng
    Computer Engineering. 2011, 37(9): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2011.09.020
    In order to protect the process in kernel from attack, a process inspector for embedded system is designed and implemented. The process inspector periodically detects and recovers the system inconsistency. This protection method can provide recovery actions for the system which is based on checkpoint and recovery technique. It realizes in Linux and gives experimental result and analysis. Experimental results show the the inspector can correctly detect and recover the system inconsistency with acceptable penalty to the system performance.
  • Networks and Communications
    WANG An-Jun, JIANG Jian-Chun, CHEN Pei-Ran
    Computer Engineering. 2011, 37(9): 62-64,67. https://doi.org/10.3969/j.issn.1000-3428.2011.09.021
    Baidu(7) CSCD(1)
    In order to develop a stable driver according with AUTOSAR specification quickly and effectively, this paper proposes design and implementation procedure for the driver from the standard of driver interface, parameter configuration interface, error handling and so on. The feasibility and effectiveness of the procedure are verified by the development of CAN driver. Test results show that the CAN driver developed by the procedure can capture effectively the runtime errors of CAN controller and active the appropriate exception handler. So it can bring less effect to the stability of upper-level system.