期刊文献+

一种评测应用程序实际性能开销的方法 被引量:1

Method for evaluating real performance costs of applications
下载PDF
导出
摘要 为评测应用程序的性能开销,提出基序列时延度量法。通过选择合理的基准程序,在其中植入若干观察点,在待测应用程序运行前及运行时,分别评测基准程序各观察点的运行时延,可以测量待测应用程序在各种负载下运行时的相对性能开销。现已在Linux上通过可装入内核模块和系统调用截获技术验证了该方法。 A method to evaluate performance cost of applications was Presented based on execution delay of benchmarking-sequence. With well-chosen benchmark programs and well-designed viewpoints planted in them, the real costs of performance of a certain application can be evaluated relatively by calculating the delay of the characteristic viewpoints before and during executing the application under test. Such method was implemented on Linux with techniques of loadable kernel module and system call interception.
出处 《计算机应用》 CSCD 北大核心 2006年第5期1180-1182,共3页 journal of Computer Applications
关键词 性能 基准 系统调用 时延 performance benchmark system call delay
  • 相关文献

参考文献4

  • 1BROWN AB. A decompositional approach to computer system performance evaluation [R]. Technical Report TR-03-97, Center for Research in Computing Technology, Harvard University, http://www.flashsear. net/fs/prof/papers/harvard-thesis-tr03-97.pdf,1997.
  • 2CHEN B, ENDO Y, CHAN K, et al. The measured performance of personal computer operating systems[A]. Proceedings of the Fifteenth Symposium on Operating System Principles [C]. Copper Mountain, Colorado: Published as ACM Operating Systems Review,SIGOPS, 1995, 29(5) : 299 - 313.
  • 3汪立东,方滨兴.Linux Shell安全审计机制的扩展[J].软件学报,2002,13(1):80-84. 被引量:14
  • 4王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67

二级参考文献13

  • 1RUBINI A.等著 魏永明 骆刚 姜君译.LINUX设备驱动程序(第2版)[M].北京,中国电力出版社,2002..
  • 2White G.B.,Pooch U..Cooperating security managers:Distributed intrusion detection systems. Computers&Security,1996,15(5);441-450.
  • 3Basu A..Buch V.,Vogels W.,yon Eicken Thorsten.U-Net:A user-level network interface for parallel and distributed computing.In:Proceedings of the 15th ACM Symposium on Operating Systems Principles,Copper Mountain,Colorado,1995.
  • 4Welsh M.,Basu A.,yon Eicken T..Incorporating memory management into user-level network interfaces.Cornell University Ithaca,NY,USA:Technical Report TR97-1620,1997.
  • 5Peter J..Denning:Virtual memory.The Computer Science and Engineering Handbook,1997,1747-1760.http://cne.edu/pjd/PUBS/vm.pdf.
  • 6Jacob B.,Mudge T..Software-managed address translation.In:Proceedings of the 3rd International Symposium on High Performance Computer Architecture,San Antonio,Texas,1997.156-167.
  • 7Welsh M.,Basu A.,yon Eicken T..ATM and fast ethernetnetwork interfaces for user-level communication.In:Proceedings of the 3rd International Symposium on High Performance Computer Architecture(HPCA),San Antonio,Texas,1997,332-342.
  • 8Durst, R., Champion, T., Witten, B., et al. Testing and evaluating computer intrusion detection systems. Communications of the ACM, 1999,42(7):53~61.
  • 9Halflife. Linux TTY hijacking. Phrack Magazine, 1997,7(50):5~5.
  • 10Plaguez. Weakening the Linux kernel. Phrack Magazine, 1998,8(52):18~18.

共引文献79

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部