• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.
Citation: Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.

A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling

More Information
  • Published Date: April 14, 2011
  • Reconfigurable computing (RC) is a kind of computation schema with hardware efficiency and software flexibility. The management of the reconfigurable resources and the scheduling of the hardware tasks are two critical factors that are concerned closely with the performance of RC. Focusing on the scheduling of hardware tasks in linear dimension reconfigurable device, one method based on boundary table (BT) is proposed for reconfigurable resource management by using the BT data structure to record the regional boundaries and their location relations in R-T coordinates. On the basis of the method, a new algorithm BT-P (boundary table placement) is also proposed to achieve the scheduling and placement of hardware tasks. By utilizing the weighted overlapping boundary length as the evaluation function and combining it with the reconfigurable resource management method, the proposed scheduling algorithm can realize optimization in a smaller runtime overhead way. The simulation results show that, compared with the stuffing algorithm, the proposed algorithm can effectively increase the chip utilization by 5% to 11% with the change of the load rate and lower rejection rate of the tasks by 9% to 11% with the change of load rate and the relaxation factor. The average time overhead of each task in scheduling and placement is between 2-4 microseconds.
  • Related Articles

    [1]Li Shunyong, Zhang Miaomiao, Cao Fuyuan. A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data[J]. Journal of Computer Research and Development, 2019, 56(6): 1325-1337. DOI: 10.7544/issn1000-1239.2019.20180737
    [2]Wang Yanhui, Xiao Xuemei, Jia Limin. Dynamic and Comprehensive Evaluation Mothod for Interoperability Trust Based on Fuzzy Variable Weighting[J]. Journal of Computer Research and Development, 2012, 49(6): 1235-1242.
    [3]Mu Chengpo, Huang Houkuan, Tian Shengfeng. Hierarchical Online Risk Assessment for Intrusion Scenarios[J]. Journal of Computer Research and Development, 2010, 47(10): 1724-1732.
    [4]Xu Jiaqing, Peng Xin, and Zhao Wenyun. Program Clustering for Comprehension Based on Fuzzy Formal Concept Analysis[J]. Journal of Computer Research and Development, 2009, 46(9): 1556-1566.
    [5]Zhai Junhai, Wang Xizhao, Zhang Sufang. Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral[J]. Journal of Computer Research and Development, 2009, 46(3): 470-477.
    [6]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [7]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [8]Bao Xuhua, Dai Yingxia, Lian Yifeng, and Zhu Pengfei. The Correlation Determine Algorithm for Implied Restriction[J]. Journal of Computer Research and Development, 2007, 44(12): 2028-2035.
    [9]Zhang Xiaoning and Feng Dengguo. Intrusion Detection for Ad Hoc Routing Based on Fuzzy Behavior Analysis[J]. Journal of Computer Research and Development, 2006, 43(4): 621-626.
    [10]Mu Chengpo, Huang Houkuan, and Tian Shengfeng. A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8.

Catalog

    Article views (818) PDF downloads (412) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return