• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Bo, Shang Shifeng, Wu Yongwei, and Zheng Weimin. Parallel Task Building in Multicore System[J]. Journal of Computer Research and Development, 2012, 49(4): 818-825.
Citation: Wang Bo, Shang Shifeng, Wu Yongwei, and Zheng Weimin. Parallel Task Building in Multicore System[J]. Journal of Computer Research and Development, 2012, 49(4): 818-825.

Parallel Task Building in Multicore System

More Information
  • Published Date: April 14, 2012
  • In multicore system, system execution efficiency presently has gottn increasing concerns. Generally, a whole system includes several modules and some optimization work has been done on these modules. Given an integrated system including Tomcat, Httpd and Lucene, each of them has processed some optimization to reach the favorable performance. However, when they constitute an integrated system, the system can not have good performance. Based on the deep research for the characteristic of each subtask in the system, several parallel ways are presented to improve the whole execution efficiency. The proposed methods involve: 1) Cancelling the lock of shared object or files; 2) Rearranging subtask; 3) Removing the system call from the multi-thread operation. Experimental results show that the whole performance gets improved and each function the subtask focuses on is more distinct.
  • Related Articles

    [1]Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong. City-Level IP Geolocation Method Based on Network Node Clustering[J]. Journal of Computer Research and Development, 2019, 56(3): 467-479. DOI: 10.7544/issn1000-1239.2019.20170473
    [2]Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063
    [3]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [4]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [5]Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    [6]Lai Xin, Huang Xiaofang, He Dake. An ID-Based Efficient Signcryption Key Encapsulation Scheme[J]. Journal of Computer Research and Development, 2009, 46(5): 857-863.
    [7]Zhou Ling, Sun Yamin. Research on Multicast Routing Algorithm for Mobile IP Based on Bone Node Set[J]. Journal of Computer Research and Development, 2008, 45(7): 1126-1132.
    [8]Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.
    [9]Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
    [10]Wu Yichuan, Huang Kui, Zheng Jianping, Sun Limin, and Cheng Weiming. An Adaptive Robust TCP/IP Header Compression Algorithm[J]. Journal of Computer Research and Development, 2005, 42(4): 655-661.

Catalog

    Article views (682) PDF downloads (425) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return