期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Optimal hardware/software co-synthesis for core-based SoC desi gns 被引量:5
1
作者 Zhan Jinyu Xiong Guangze 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期402-409,共8页
A hardware/software co-synthesis method is presented for SoC designs consisting of both hardware IP cores and software components on a graph-theoretic formulation. Given a SoC integrated with a set of functions and a ... A hardware/software co-synthesis method is presented for SoC designs consisting of both hardware IP cores and software components on a graph-theoretic formulation. Given a SoC integrated with a set of functions and a set of performance factors, a core for each function is selected from a set of alternative IP cores and software components, and optimal partitions is found in a way to evenly balance the performance factors and to ultimately reduce the overall cost, size, power consumption and runtime of the core-based SoC. The algorithm formulates IP cores and components into the corresponding mathematical models, presents a graph-theoretic model for finding the optimal partitions of SoC design and transforms SoC hardware/software co-synthesis problem into finding optimal paths in a weighted, directed graph. Overcoming the three main deficiencies of the traditional methods, this method can work automatically, evaluate more performance factors at the same time and meet the particularity of SoC designs. At last, the approach is illustrated that is practical and effective through partitioning a practical system. 展开更多
关键词 SOC co-synthesis partition IP core software component optimal path.
下载PDF
Scheduling algorithm based on critical tasks in heterogeneous environments 被引量:4
2
作者 Lan Zhou Sun Shixin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期398-404,F0003,共8页
Heterogeneous computing is one effective method of high performance computing with many advantages. Task scheduling is a critical issue in heterogeneous environments as well as in homogeneous environments. A number of... Heterogeneous computing is one effective method of high performance computing with many advantages. Task scheduling is a critical issue in heterogeneous environments as well as in homogeneous environments. A number of task scheduling algorithms for homogeneous environments have been proposed, whereas, a few for heterogeneous environments can be found in the literature. A novel task scheduling algorithm for heterogeneous environments, called the heterogeneous critical task (HCT) scheduling algorithm is presented. By means of the directed acyclic graph and the gantt graph, the HCT algorithm defines the critical task and the idle time slot. After determining the critical tasks of a given task, the HCT algorithm tentatively duplicates the critical tasks onto the processor that has the given task in the idle time slot, to reduce the start time of the given task. To compare the performance of the HCT algorithm with several recently proposed algorithms, a large set of randomly generated applications and the Gaussian elimination application are randomly generated. The experimental result has shown that the HCT algorithm outperforms the other algorithm. 展开更多
关键词 list scheduling task duplication task graphs heterogeneous environment parallel processing.
下载PDF
Novel algorithm for distributed replicas management based on dynamic programming 被引量:1
3
作者 Wang Tao Lu Xianliang Hou Mengshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期669-672,共4页
Replicas can improve the data reliability in distributed system. However, the traditional algorithms for replica management are based on the assumption that all replicas have the uniform reliability, which is inaccura... Replicas can improve the data reliability in distributed system. However, the traditional algorithms for replica management are based on the assumption that all replicas have the uniform reliability, which is inaccurate in some actual systems. To address such problem, a novel algorithm is proposed based on dynamic programming to manage the number and distribution of replicas in different nodes. By using Markov model, replicas management is organized as a multi-phase process, and the recursion equations are provided. In this algorithm, the heterogeneity of nodes, the expense for maintaining replicas and the engaged space have been considered. Under these restricted conditions, this algorithm realizes high data reliability in a distributed system. The results of case analysis prove the feasibility of the algorithm. 展开更多
关键词 DISTRIBUTED replicas MARKOV dynamic programming.
下载PDF
Integrated dynamic shared protection algorithm for GMPLS networks
4
作者 Wang Yan Zeng Jiazhi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第6期1264-1271,共8页
The path protection approach is widely investigated as a survivability solution for GMPLS networks, which has the advantage of efficient capacity utilization. However, there is a problem of the path protection approac... The path protection approach is widely investigated as a survivability solution for GMPLS networks, which has the advantage of efficient capacity utilization. However, there is a problem of the path protection approach that searching a disjoint backup path for a primary path is often unsuccessful. In order to resolve this problem, an integrated dynamic shared protection (IDSP) algorithm is proposed. The main idea of the proposed algorithm is that the path protection approach is first used to establish a backup path for the primary path; if the establishment is unsuccessful, then the primary path is dynamically divided into segments whose hop count are not fixed but not more than the limitation calculated by the equations introduced. In this proposal, backup bandwidth sharing is allowed to improve the capacity utilization ratio, which makes the link cost function quite different from previous ones. Simulation experiments are presented to demonstrate the efficiency of the proposed method compared with previous methods. Numerical results show that IDSP can not only achieve low protection failure probability but can also gain a better tradeoff between the protection overbuild and the average recovery time. 展开更多
关键词 generalized multi-protocol label switching PROTECTION hop count primary path backup path
下载PDF
RKP based secure tracking in wireless sensor networks
5
作者 Wang Jiahao Qin Zhiguang +1 位作者 Geng Ji Wang Shengkun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第1期175-183,共9页
To enhancing the wireless sensor network's security in target tracking and locating application, this article proposes a tracking cluster based mobile cluster distributed group rekeying protocol (MCDGR). Based on t... To enhancing the wireless sensor network's security in target tracking and locating application, this article proposes a tracking cluster based mobile cluster distributed group rekeying protocol (MCDGR). Based on the given sensitivity, sensors can locate the moving object in the monitored area and form a tracking cluster around it. This tracking cluster can follow the target logically, process data on the target and report to the sink node, and thus achieve the tracking function. We introduce a multi-path reinforcement scheme, q-composition scheme and one-way cryptographic hash function based random key predistribution algorithm (RKP), which can guarantee a high accuracy and security and a low energy consumption on the same time in large-scale sensor networks. 展开更多
关键词 sensor network MCDGR RKP SINK tracking cluster
下载PDF
New SRLG-diverse path selection algorithm in survivable GMPLS networks
6
作者 Wang Yan Zheng Junhui Zeng Jiazhi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期412-419,共8页
In conventional shared risk link group (SRLG)-diverse path selection (CSPS) algorithm in survivable GMPLS networks, SRLG is taken into account when selecting the backup paths, while the primary path selection meth... In conventional shared risk link group (SRLG)-diverse path selection (CSPS) algorithm in survivable GMPLS networks, SRLG is taken into account when selecting the backup paths, while the primary path selection method is the sarne as the algorithms without SRLG constraint. A problem of CSPS algorithm is that, after a primary path is selected, the success probability to select an SRLG-diverse backup path for it is low. If SRLG is taken into account when computing the primary path, then the probability to successfully select an SRLG-diverse backup path will be much increased. Based on this idea, an active SRLG-diverse path selection (ASPS) algorithm is proposed. To actively avoid selecting those SRLG links, when computing the primary path, a link that share risk with more links is assigned a larger link cost. To improve the resource utilization ratio, it is permitted that the bandwidth resources are shared among backup paths. What is more, differentiated reliability (DiR) requirements of different customers are considered in ASPS algorithm. The simulation results show that, compared with CSPS algorithm, ASPS algorithm not only increases successful protection probability but also improves resource utilization ratio. 展开更多
关键词 generaliged multiprotocol label switching shared risk link group path selection SURVIVABILITY
下载PDF
Dynamic shared segment protection algorithm with differentiated reliability in GMPLS networks
7
作者 Wang Yan Zheng Junhu Zeng Jiazhi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期178-184,共7页
To improve the resource utilization ratio and shorten the recovery time of the shared path protection with differentiated reliability (SPP-DiR) algorithm, an algorithm called dynamic shared segment protection with d... To improve the resource utilization ratio and shorten the recovery time of the shared path protection with differentiated reliability (SPP-DiR) algorithm, an algorithm called dynamic shared segment protection with differentiated reliability (DSSP-DiR) is proposed for survivable GMPLS networks. In the proposed algorithm, a primary path is dynamically divided into several segments according to the differentiated reliability requirements of the customers. In the SPP-DiR algorithm, the whole primary path should be protected, while in the DSSP- DiR algorithm, only partial segments on the primary path need to be protected, which can reduce more backup bandwidths than that in the SPP-DiR algorithm. Simulation results show that the DSSP-DiR algorithm achieves higher resource utilization ratio, lower protection failure probability, and shorter recovery time than the SPP-DiR algorithm. 展开更多
关键词 generalized multiprotocal label switching segment protection differentiated reliability resource uti-lization ratio.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部