• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Yanxiang, Yu Tao, Chen Yong, Li Qingan, Jiang Nan, Xu Chao, Wen Weidong. Green Demands Oriented Data Allocation for Embedded Systems[J]. Journal of Computer Research and Development, 2015, 52(1): 94-104. DOI: 10.7544/issn1000-1239.2015.20140485
Citation: He Yanxiang, Yu Tao, Chen Yong, Li Qingan, Jiang Nan, Xu Chao, Wen Weidong. Green Demands Oriented Data Allocation for Embedded Systems[J]. Journal of Computer Research and Development, 2015, 52(1): 94-104. DOI: 10.7544/issn1000-1239.2015.20140485

Green Demands Oriented Data Allocation for Embedded Systems

More Information
  • Published Date: December 31, 2014
  • Green demands, such as energy efficiency and resource utilization, have become critical issues during the design of embedded systems. Data allocation, one of the most important back-end optimization methods of compiler, can largely influence the utilization of energy and resources. This paper proposes a data allocation approach to improve the effective utilization of resources and energy. First, a green evaluation model for data allocation is proposed in this paper. In this model, green indicators are proposed to represent both energy efficiency and resource utilization. Second, based on the evaluation model, an iterative-style multi-objective data allocation approach is proposed to reduce the energy consumption and to balance the resource utilization. This data allocation approach resorts to two common compilation optimization techniques, i.e., exchangeable instructions rearrangement and register reallocation, to improve the green indicators. In addition, an iterative framework is employed to synthesize the exchangeable instructions rearrangement and register reallocation techniques smoothly to improve the green indicators further. Simulation experiment results show that the proposed method can obtain about 23% improvement on average when GCC compiler is the baseline. Therefore, the proposed method can significantly improve the green indicators.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744
    [2]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [3]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [4]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [5]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [6]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [7]Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
    [8]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Chen Huiyan, Wang Lianqiang, Lü Shuwang. A Study of Key Problems of HFE Cryptosystem[J]. Journal of Computer Research and Development, 2007, 44(7): 1205-1210.

Catalog

    Article views (1119) PDF downloads (599) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return