共查询到20条相似文献,搜索用时 88 毫秒
1.
随着多核嵌入式实时系统的发展,DAG任务同步问题得到了广泛的关注.目前的任务同步方法大都采用锁机制,但锁机制存在许多问题,如自旋锁存在任务忙等状态,浪费CPU资源;使用互斥锁的任务若获取不到共享资源会被阻塞,产生上下文切换开销;顺序锁允许写任务有更高的优先级,但写任务不能频繁更新数据,否则读任务会产生饿死现象.上述锁机制如果应用于多核平台下的DAG任务同步,不仅会影响系统整体执行效率,导致后继任务无法执行,严重时会引发死锁现象导致系统崩溃.因此,提出了在DAG任务同步过程中使用DCAS无锁机制,有效避免了锁机制存在的问题.在LITMUSRT多核平台下,以多任务同时申请、填充和释放Vxworks网络缓冲区为例,对缓冲池中的三元组m Blk,clBlk,cluster分别使用DCAS无锁机制.实验结果表明,相比传统锁机制,DCAS无锁机制在DAG任务同步方面有较好的效果,响应时间减少了10.4%,系统的整体执行效率提高了4.2%. 相似文献
2.
直接序列扩展频谱技术正被越来越多地应用于各种测控系统中。讨论了发生伪码错锁原因,并在此基础上针对伪码的自相关特性和互相关特性,分析了产生伪码错锁可能产生的影响。根据伪码错锁的原因以及伪码的捕获过程提出了3种伪码错锁的措施,包括选用改进伪码的自相关特性、互相关特性、功率控制技术以及改进伪码的捕获跟踪策略,并对3种伪码错锁措施进行了详细论述。 相似文献
3.
软件事务存储(software Transaction Memory)思想提出的初衷是用来作为并发控制的一个无锁机制。由于早期的STM实施面临着效率的诸多限制,并且不久之后一种无阻塞的思想出现了,它能够有效解决效率问题,简化STM的实施,因此,现在大多数活跃的STM都是采用了阻塞的设计方法,利用锁机制来保证事务提交操作的原子性。该方法在实际应用中有着更加优越的性能表现,当然部分由于它更加简单。然而当我们将阻塞方法应用到多核系统中,特别当事务写操作频繁的时候,该方法将会暴露出可拓展方面的天生缺陷。 相似文献
4.
5.
6.
7.
8.
9.
陈宏宇 《微电子学与计算机》2005,22(8):32-35
根据关系数据库的基本理论,关系型数据库对数据的存储使用了标准的共享锁、修改锁、独占锁等机制,提供数据库、表、页面、记录等多种不同的资源粒度以及锁升级机制。因此所有的关系型数据库,都存在着并发访问的锁资源争夺风险,如何能在确保数据一致性的前提下避免因锁资源争夺而导致数据库系统性能下降甚至崩溃,一直是数据库系统及其相关应用等领域内关注的焦点。文章将基于图论理论的基础,分析和探讨解决关系数据库死锁的思路和方法,通过构造一些基础的数学模型来分解和本质化死锁现象,提出一些解决方法和理论思路。 相似文献
10.
在光纤锁模激光器中,模式相位锁定产生周期短脉冲的过程称为锁模过程,产生的脉冲在广义上被称为“光耗散孤子”。光纤锁模激光器从传统的单模光纤锁模激光器发展到了多模光纤锁模激光器,锁模机理从一维(1D)时域耗散孤子锁模发展到了(3+1)维时空耗散孤子锁模。通过深入理解耗散孤子的产生机理,有望进一步推动光纤锁模激光器在科学和应用领域的发展,为更多领域带来更多创新和可能性。首先介绍单模光纤锁模激光器中的一维时域耗散孤子锁模,探讨不同色散区域中时域耗散孤子的产生机理;随后介绍多模光纤锁模激光器中时空耗散孤子的最新研究成果,讨论模间色散的补偿方法,揭示其丰富的时空锁模机理和潜在的应用场景;最后对光纤锁模激光器的发展前景进行展望。 相似文献
11.
Novel services in the mobile telecommunication era are far more longer then a few years ago when the price of the call was calculated purely on the length of the session. To overcome possible fraud issues, the corresponding standards are defining partial CDRs that are sent to the billing system periodically during the sessions. These partial CDRs has to be analyzed and stored in a database for correlation. The size of this database, and thus the required processing time is heavily depending on the distributions of the calls. In this paper we gave a method to calculate the expected number of partial CDRs and the required database size if these distributions are at least partially known. 相似文献
12.
This paper applies ideas from fractal compression and optimization theory to attack the problem of efficient content-based image indexing and retrieval. Similarity of images is measured by block matching after optimal (geometric, photometric, etc.) transformation. Such block matching which, by definition, consists of localized optimization, is further governed by a global dynamic programming technique (Viterbi algorithm) that ensures continuity and coherence of the localized block matching results. Thus, the overall optimal transformation relating two images is determined by a combination of local block-transformation operations subject to a regularization constraint. Experimental results on some limited subsets of still binary images from the mpeg-7 database demonstrate the power and potential of the proposed approach. 相似文献
13.
Provable security against a differential attack 总被引:4,自引:0,他引:4
The purpose of this paper is to show that DES-like iterated ciphers that are provably resistant against differential attacks exist. The main result on the security of a DES-like cipher with independent round keys is Theorem 1, which gives an upper bound to the probability of s-round differentials, as defined in [4], and this upper bound depends only on the round function of the iterated cipher. Moreover, it is shown that functions exist such that the probabilities of differentials are less than or equal to 23–n
, where n is the length of the plaintext block. We also show a prototype of an iterated block cipher, which is compatible with DES and has proven security against differential attack.A preliminary version of this paper was presented in the rump session at Crypto '92. The work of Kaisa Nyberg on this project was supported by MATINE Board, Finland. 相似文献
14.
One of the most important research subjects in session initiation protocol (SIP) is mobility management. Session mobility is a key issue in SIP mobility management. Session mobility is an advanced feature that maintains an ongoing media session from one device to another. In this paper, we consider the issue of session mobility and propose a complete integrated solution, referred to as ‘session integration service’, to transfer an ongoing media session over multiple devices. To provide flexibility in session mobility, three new agent states are introduced based on the user agent definition. They consist of session manager, session user, and free node. This paper also proposes two split session integration methods for session integration service based on these three agents. The proposed method provides session mobility flexibility and allows the user the ability to transfer, split, and retrieve a session over multiple devices. Moreover, the split session can be integrated in any devices. To ensure session mobility over multiple devices, the session integration service will be implemented through a modification of the open source project ‘SIP‐communicator’. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
15.
In this work, we study dynamic provisioning of multicast sessions in a wavelength-routed sparse splitting capable WDM network
with an arbitrary mesh topology where the network consists of nodes with full, partial, or no wavelength conversion capabilities
and a node can be a tap-and-continue (TaC) node or a splitting and delivery (SaD) node. The objectives are to minimize the
network resources in terms of wavelength-links used by each session and to reduce the multicast session blocking probability.
The problem is to route the multicast session from each source to the members of every multicast session, and to assign an
appropriate wavelength to each link used by the session. We propose an efficient online algorithm for dynamic multicast session
provisioning. To evaluate the proposed algorithm, we apply the integer linear programming (ILP) optimization tool on a per
multicast session basis to solve off-line the optimal routing and wavelength assignment given a multicast session and the
current network topology as well as its residual network resource information. We formulate the per session multicast routing
and wavelength assignment problem as an ILP. With this ILP formulation, the multicast session blocking probability or success
probability can then be estimated based on solving a series of ILPs off-line. We have evaluated the effectiveness of the proposed
online algorithm via simulation in terms of session blocking probability and network resources used by a session. Simulation
results indicate that our proposed computationally efficient online algorithm performs well even when a fraction of the nodes
are SaD nodes. 相似文献
16.
Wireless networks beyond 2G aim at supporting real-time applications such as VoIP. Before a user can start a VoIP session, the end-user terminal has to establish the session using signaling protocols such as H.323 and session initiation protocol (SIP) in order to negotiate media parameters. The time interval to perform the session setup is called the session setup time. It can be affected by the quality of the wireless link, measured in terms of frame error rate (FER), which can result in retransmissions of packets lost and can lengthen the session setup time. Therefore, such protocols should have a session setup time optimized against loss. One way to do so is by choosing the appropriate retransmission timer and the underlying protocols. In this paper, we focus on SIP session setup delay and propose optimizing it using an adaptive retransmission timer. We also evaluate SIP session setup performances with various underlying protocols (transport control protocol (TCP), user datagram protocol (UDP), radio link protocols (RLPs)) as a function of the FER. For 19.2 Kbps channel, the SIP session setup time can be up to 6.12s with UDP and 7s with TCP when the FER is up to 10 percent. The use of RLP (1, 2, 3) and RLP (1, 1, 1, 1, 1, 1) puts the session setup time down to 3.4s under UDP and 4s under TCP for the same FER and the same channel bandwidth. We also compare SIP and H.323 performances using an adaptive retransmission timer: SIP outperforms H.323, especially for a FER higher than 2 percent. 相似文献
17.
We consider strategies for and performance of a class of connection-oriented data session services that might be supported using only the idle times between telephone calls on the channels of a cellular radio system. Two types of service are envisaged: a short transaction service and a suspendable data session service. We give expressions for the mean active and inactive times for data sessions and show how session assignment and displacement strategies can shape the distributions of session active and inactive times. We find useful amounts of capacity in the background of telephony systems even at high load, but in its raw form the opportunities for data transmission, and the data session suspension times implied, are rather large-grained for interactive data sessions. However, enforced time-sharing can improve these statistics for interactive data uses. With prioritized session assignment, a number of logical data sessions can be supported providing a range of service characteristics onto which interactive users, mobile fax, paging, navigation, and fleet tracking applications can be mapped in decreasing order of required session availability 相似文献
18.
In an all-IP internetworked heterogeneous environment, ongoing VoIP sessions from roaming users will be subject to frequent vertical handoffs across network boundaries. Ensuring uninterrupted service continuity for these handoff calls requires successful session management among the participating access networks. As such, a mobility-aware novel interworking network design (interconnecting UMTS and WLAN over an IP-based common platform) [1] is presented in this article that facilitates VoIP session management, including session establishment and seamless session handoff across different networks. For comparison purposes, VoIP session management is evaluated in terms of session establishment, handoff delays, transient packet loss, end-to-end traffic delays, and jitter value for different voice codecs, which demonstrate satisfactory and feasible results. In the event (e.g., network congestion, buffer overflow) that session continuity cannot be guaranteed (also known as outage) across network boundaries, this article proposes an algorithm that compensates the user by reducing the unit service charge of future sessions (governed by the outage period) through a noncooperative game-theory-based pricing mechanism. 相似文献
19.