期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
面向Java多线程机制的软件重构方法 被引量:9
1
作者 张杨 柳晨光 +2 位作者 张冬雯 郑琨 郑雅洁 《北京理工大学学报》 EI CAS CSCD 北大核心 2018年第11期1149-1155,共7页
针对Java语言中Thread和Executor两种线程机制在线程管理模式、代码编写量和性能上的不同,提出了一种面向Java多线程机制的软件自动重构方法,该方法可以实现Thread和Executor之间的自动重构转换,进而帮助程序员选择更适合的线程机制.在E... 针对Java语言中Thread和Executor两种线程机制在线程管理模式、代码编写量和性能上的不同,提出了一种面向Java多线程机制的软件自动重构方法,该方法可以实现Thread和Executor之间的自动重构转换,进而帮助程序员选择更适合的线程机制.在Eclipse JDT环境下实现了从Thread到Executor的自动重构工具Rethreader.在实验中,使用Rethreader对JGF基准测试程序套件中的Series、Crypt、Lufact、Sparsematmult和Montecarlo等基准程序进行了重构测试,实验结果表明,Rethreader可以在小于1s的短时间内实现从Thread到Executor的转换. 展开更多
关键词 Thread框架 Executor框架 软件重构 软件分析 抽象语法树
在线阅读 下载PDF
线程池技术在考试系统中的应用 被引量:2
2
作者 葛萌 于博 欧阳宏基 《计算机系统应用》 2016年第4期107-111,共5页
当较大规模客户端并发请求服务器端应用程序时,传统的为每个请求创建线程的解决方法会导致服务器端性能的严重下降甚至死机.通过分析JDK的Executor框架,从工作原理、核心线程池对象、执行策略等方面详细描述了线程池模型,应用到一个三层... 当较大规模客户端并发请求服务器端应用程序时,传统的为每个请求创建线程的解决方法会导致服务器端性能的严重下降甚至死机.通过分析JDK的Executor框架,从工作原理、核心线程池对象、执行策略等方面详细描述了线程池模型,应用到一个三层C/S架构的在线考试系统中,给出了服务端的设计架构和实现代码.通过仿真测试证明了线程池技术在解决较大并发访问方面的稳定性. 展开更多
关键词 线程池 Executor框架 在线考试系统
在线阅读 下载PDF
关于不规则计算 被引量:2
3
作者 王丽宏 刘勇 +1 位作者 李晓明 胡铭曾 《小型微型计算机系统》 CSCD 北大核心 1998年第7期1-7,共7页
本文首先提出了不规则计算,说明了不规则计算的应用及其特征和意义,然后归纳了处理不规则计算的inspector/executor基本方法,并介绍了不规则计算的国内外研究现状,最后指出了当前不规则计算系统中存在的问题及解... 本文首先提出了不规则计算,说明了不规则计算的应用及其特征和意义,然后归纳了处理不规则计算的inspector/executor基本方法,并介绍了不规则计算的国内外研究现状,最后指出了当前不规则计算系统中存在的问题及解决方法。 展开更多
关键词 不规则计算 并行编译技术 inspector/executor
在线阅读 下载PDF
关于不规则计算的研究
4
作者 王丽宏 王超 +1 位作者 方滨兴 胡铭曾 《计算机工程与应用》 CSCD 北大核心 1999年第7期16-19,共4页
该文首先论述了不规则计算,说明了不规则计算的应用、特征、意义及其研究现状,然后归纳了处理不规则计算的inspector/executor基本方法,并提出了支持不规则计算的运行库CHAOS+的设计方案。最后,以结点程序作为示例。
关键词 不规则计算 INSPECTOR EXECUTOR 并行编译
在线阅读 下载PDF
采用Scheduled Thread Pool Executor执行定时重试任务时内存溢出的分析及解决 被引量:1
5
作者 余志坚 姜春志 《科技资讯》 2016年第7期15-17,共3页
开发Java Web项目中发现服务之间的调用存在超时情况,由于涉及的处理逻辑全部是异步,引入定时重试的机制,重试工具选择了JDK自带的Scheduled Thread Pool Executor。当A服务依赖B服务,B服务由于在业务高峰期处理能力降低,导致大量A服务... 开发Java Web项目中发现服务之间的调用存在超时情况,由于涉及的处理逻辑全部是异步,引入定时重试的机制,重试工具选择了JDK自带的Scheduled Thread Pool Executor。当A服务依赖B服务,B服务由于在业务高峰期处理能力降低,导致大量A服务过来的请求超时,A加入了超时重试机制,间隔时间根据重试次数的多少来决定,次数越多,两次重试之间间隔的时间越多,此时的业务高峰也会给A带来大量请求,大量的超时会导致重试队列迅速堆积,直到内存溢出。该文从线程池工作机制、Scheduled Thread Pool Executor实例的创建,获取重试任务的过程以及提交任务的过程角度分析,并通过源代码的剖析和测试工具My Eclipse进行演示测试内存泄露的情况,得出避免内存泄露的解决方案。 展开更多
关键词 Scheduled THREAD POOL EXECUTOR 线程池 内存溢出
在线阅读 下载PDF
大学生拖延心理调查及劝导式手表Executor功能设计 被引量:1
6
作者 马梦雪 赵娟娟 《现代农村科技》 2020年第4期90-91,共2页
拖延心理是当代大学生日常生活和学习效能的重要影响因素,深入研究并加强干预大学生拖延心理,有助于促进其学习效率的提高。本文对大学生的拖延心理进行了调查,分析了拖延心理产生的原因,主要包括环境层面、思维习惯层面、自我调节能力... 拖延心理是当代大学生日常生活和学习效能的重要影响因素,深入研究并加强干预大学生拖延心理,有助于促进其学习效率的提高。本文对大学生的拖延心理进行了调查,分析了拖延心理产生的原因,主要包括环境层面、思维习惯层面、自我调节能力层面、任务难度层面以及时间管理层面。并在此基础上从事情罗列、事情规划、监督机制以及如何培养主观能动性等几个方面出发,进行了劝导式手表产品Executor的功能设计分析,并提出了应用策略。 展开更多
关键词 大学生 拖延心理 Executor功能设计 应用策略
在线阅读 下载PDF
Design and realization of runtime library support for irregular computation 被引量:1
7
作者 王丽宏 方滨兴 胡铭曾 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第2期159-163,共5页
Firstly analyzes the CHAOS and points out its shortages, and then uses the basic method—inspector/executor to deal with irregular computation, and offers the realization scheme for the CHAOS+ runtime library that sup... Firstly analyzes the CHAOS and points out its shortages, and then uses the basic method—inspector/executor to deal with irregular computation, and offers the realization scheme for the CHAOS+ runtime library that supports irregular computation, and finally gives the node code program to show the example with CHAOS+ runtime library. 展开更多
关键词 irregular computation INSPECTOR EXECUTOR SPMD program
在线阅读 下载PDF
The whole process confirmation management and its application in coal mine safe production 被引量:1
8
作者 YAO Hai-fei 《Journal of Coal Science & Engineering(China)》 2012年第4期390-395,共6页
After analyzing the reasons for coal mine accidents and the current management methods, effective actions for the implementation of safety management were put forward by carrying out the whole process confirmation man... After analyzing the reasons for coal mine accidents and the current management methods, effective actions for the implementation of safety management were put forward by carrying out the whole process confirmation management. The ba- sic content and the five implementation steps were described, and the implementation method and the program of every step were introduced. Some rules for the implementation of the whole process confirmation management in coal mine safety pro- duction were explained, such as during the process of preproduction, before descent, descent, after descent, walking in the roadway, post-operation, shift, and hoisting after work. The results show that the guardians and the executors should both con- firm the implementation, which can improve the workers' attention and self-awareness to avoid errors in detail and reduce the "three violations" phenomenon. To ensure the effect of the whole process confirmation management, relevant departments should designate a person-in-charge in the specific work in all stages, make a work plan, and strengthen the internal evaluation. 展开更多
关键词 whole process confirmation risk assessment GUARDIAN EXECUTOR safe production
在线阅读 下载PDF
The Double Edge Sword Based Distributed Executor Service
9
作者 Faisal Bahadur Arif Iqbal Umar +2 位作者 Insaf Ullah Fahad Algarni Muhammad Asghar Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期589-604,共16页
Scalability is one of the most important quality attribute of softwareintensive systems,because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload.In order to ... Scalability is one of the most important quality attribute of softwareintensive systems,because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload.In order to achieve scalability,thread pool system(TPS)(which is also known as executor service)has been used extensively as a middleware service in software-intensive systems.TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime.In case of distributed-TPS(DTPS),another issue is the load balancing b/w available set of TPSs running at backend servers.Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload.Consequently,the performance of software-intensive system is suffered.Thus,in this paper,we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword.On the one hand,it effectively performs the load balancing(in case of overload situation)among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs.And on the other hand,its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size,because the pool size in each TPS is kept equal to the request rate on it,hence dynamically optimizes TPS.We evaluated the results of the proposed system against state of the art DTPSs by a clientserver based simulator and found that our system outperformed by sustaining smaller response times. 展开更多
关键词 Software-intensive systems distributed executor service load balancing overload monitoring MULTI-THREADING thread pool performance
在线阅读 下载PDF
A Content Audit Model for Validity of Service in Peer-to-Peer Networks
10
作者 徐光伟 朱明 +2 位作者 石秀金 罗辛 吴敏 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期499-506,共8页
Validity of service in the service system is significantly affected by reliability of providers and availability of service contents. Most service inspiring schemes in pecr-to-pecr (P2P) networks associate each prov... Validity of service in the service system is significantly affected by reliability of providers and availability of service contents. Most service inspiring schemes in pecr-to-pecr (P2P) networks associate each provider with reputation or money to ensure provider's reliability so as to improve the availability of service contents. However, these schemes bring considerable risk to consumers when a provider with high reputation or money publishes a malicious service content. Moreover, the number of providers decreases as some providers are rejected while they have unconsciously published one or several polluted content., ever. The risk may spread to more users and cause the collapse of the service system. Recently, some researches have shown that the unconscious polluted contents are over twice as many as the intentional polluted contents. In order to distinguish the unconscious polluled contents from the intentional polluted contents and rescue those correlative users, we propose an audit model based on each service content to improve the validity of services. In our model, each node is associated with money, and each service content is associated with reputation. The unconscious polluted contents are prevented via consumers' evaluation, and the intentional polluted cantents and malicious providers are rejected via audit executors' evaluation. Simulatinn results show that the model improves the ratio of available service contents and reliable providers. 展开更多
关键词 SERVICE service content audit executor audit model
在线阅读 下载PDF
Spark计算节点同构环境下Executor的内存分配优化模型
11
作者 朱蓉 《进展》 2020年第1期49-52,共4页
本文在对Spark云计算平台的作业执行机制进行研究分析的基础上,针对目前Spark处理作业时Executor的人为请求资源机制,提出了一种Spark计算节点同构环境下Executor所需内存资源的优化分配算法。该算法能够基于处理数据的数据量对分布式... 本文在对Spark云计算平台的作业执行机制进行研究分析的基础上,针对目前Spark处理作业时Executor的人为请求资源机制,提出了一种Spark计算节点同构环境下Executor所需内存资源的优化分配算法。该算法能够基于处理数据的数据量对分布式内存资源进行弹性分配,达到了Spark在数据量变化情况下合理利用分布式内存资源这一目的,并对此进行了仿真实验验证。 展开更多
关键词 SPARK EXECUTOR 内存资源 资源分配
在线阅读 下载PDF
Apache Spark内存管理
12
《电脑编程技巧与维护》 2017年第7期4-4,共1页
Spark作为一个基于内存的分布式计算引擎,其内存管理模块在整个系统中扮演着非常重要的角色。理解Spark内存管理的基本原理,有助于更好地开发Spark应用程序和进行性能调优。在执行Spark的应用程序时,Spark集群会启动Driver和Executor两... Spark作为一个基于内存的分布式计算引擎,其内存管理模块在整个系统中扮演着非常重要的角色。理解Spark内存管理的基本原理,有助于更好地开发Spark应用程序和进行性能调优。在执行Spark的应用程序时,Spark集群会启动Driver和Executor两种JVM进程,前者为主控进程,负责创建Spark上下文,提交Spark作业,并将作业转化为计算任务,在各个Executor进程间协调任务的调度,后者负责在工作节点上执行具体的计算任务,并将结果返回给Driver,同时为需要持久化的RDD提供存储功能。 展开更多
关键词 内存管理模块 APACHE EXECUTOR DRIVER 计算引擎 应用程序 性能调优 存储功能
在线阅读 下载PDF
计算机时代2009年总目录
13
《计算机时代》 2009年第12期I0001-I0005,共5页
技术广角 基于纹理块连贯性的纹理合成技术1-1 基于多尺度小波分解的时间序列预测方法研究1-4 量子计算与计算机科学1-7 多机系统中cache一致性问题的研究与评价2-1 基于内容和协作的推荐系统的研究2-5 基于Java
关键词 计算机科学 时间序列预测方法 EXECUTOR 多尺度小波分解 目录 合成技术 一致性问题 CACHE
在线阅读 下载PDF
Good things come in pairs:Crop disease resistance from sensor–helper to sensor–executor pairs
14
作者 Brande B.H.Wulff Zhiyong Liu 《The Crop Journal》 2025年第6期1655-1659,共5页
1.Background Crop diseases diminish potential yields by over 20%annually worldwide[1],driving a century-long quest to understand and harness genetic resistance in plants.The genetic basis of disease resistance was fir... 1.Background Crop diseases diminish potential yields by over 20%annually worldwide[1],driving a century-long quest to understand and harness genetic resistance in plants.The genetic basis of disease resistance was first recognized in the early 1900s,when Biffen(1905)demonstrated that resistance to stripe rust in wheat(Triticum aestivum)followed Mendelian rules of inheritance[2].This foundational insight was later expanded by Flor(1942),who formulated the“gene-for-gene”model describing the genetic interplay between host resistance(R)genes and pathogen avirulence(Avr)genes[3]. 展开更多
关键词 sensor executor pairs stripe rust understand harness genetic resistance sensor helper pairs crop diseases mendelian rules inheritance genetic basis disease resistance genetic interplay
在线阅读 下载PDF
Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
15
作者 Sisi SHAO Zhibo HE +7 位作者 Shangdong LIU Weili ZHANG Fei WU Fukang ZENG Jun ZUO Longfei ZHOU Yukun NIU Yimu JI 《Frontiers of Information Technology & Electronic Engineering》 2025年第8期1279-1292,共14页
Mimic active defense technology effectively disrupts attack routes and reduces the probability of successful attacks by using a dynamic heterogeneous redundancy(DHR)architecture.However,current approaches often overlo... Mimic active defense technology effectively disrupts attack routes and reduces the probability of successful attacks by using a dynamic heterogeneous redundancy(DHR)architecture.However,current approaches often overlook the adaptability of the adjudication mechanism in complex and variable network environments,focusing primarily on system security while neglecting performance considerations.To address these limitations,we propose an output difference feedback and system benefit control based DHR architecture.This architecture introduces an adjudication mechanism based on output difference feedback,which enhances adaptability by considering the impact of each executor's output deviation on the global decision.Additionally,the architecture incorporates a scheduling strategy based on system benefit,which models the quality of service and switching overhead as a bi-objective optimization problem,balancing security with reduced computational costs and system overhead.Simulation results demonstrate that our architecture improves adaptability towards different network environments and effectively reduces both the attack success rate and average failure rate. 展开更多
关键词 Mimic defense Adjudication mechanism Scheduling strategy Executor output difference System benefit
原文传递
XA23 Is an Executor R Protein and Confers Broad-Spectrum Disease Resistance in Rice 被引量:78
16
作者 Chunlian Wang Xiaoping Zhang +10 位作者 Yinglun Fan Ying Gao Qinlong Zhu Chongke Zheng Tengfei Qin Yanqiang Li Jinying Che Mingwei Zhang Bing Yang Yaoguang Liu Kaijun Zhao 《Molecular Plant》 SCIE CAS CSCD 2015年第2期290-302,共13页
The majority of plant disease resistance (R) genes encode proteins that share common structural features. However, the transcription activator-like effector (TALE)-associated executor type R genes show no consider... The majority of plant disease resistance (R) genes encode proteins that share common structural features. However, the transcription activator-like effector (TALE)-associated executor type R genes show no considerable sequence homology to any known R genes. We adopted a map-based cloning approach and TALE-based technology to isolate and characterize Xa23, a new executor R gene derived from wild rice (Oryza rufipogon) that confers an extremely broad spectrum of resistance to bacterial blight caused by Xanthomonas oryzae pv. oryzae (Xoo). Xa23 encodes a 113 amino acid protein that shares 50% identity with the known executor R protein XA10. The predicted transmembrane helices in XA23 also overlap with those of XA10. Unlike XalO, however, Xa23 transcription is specifically activated by AvrXa23, a TALE present in all examined Xoo field isolates. Moreover, the susceptible xa23 allele has an identical open reading frame of Xa23 but differs in promoter region by lacking the TALE binding element (EBE) for AvrXa23. XA23 can trigger a strong hypersensitive response in rice, tobacco, and tomato. Our results provide the first evidence that plant genomes have an executor R gene family of which members execute their function and spectrum of disease resistance by recognizing the cognate TALEs in the pathogen. 展开更多
关键词 XA23 executor R gene TAL effector Xanthomonas oryzae pv. oryzae AvrXa23 RICE
原文传递
Xa7, a new executor R gene that confers durable and broad-spectrum resistance to bacterial blight disease in rice 被引量:23
17
作者 Xifeng Chen Pengcheng Liu +11 位作者 Le Mei Xiaoling He Long Chen Hui Liu Shurong Shen Zhandong Ji Xixi Zheng Yuchen Zhang Zhenyu Gao Dali Zeng Qian Qian Bojun Ma 《Plant Communications》 2021年第3期68-81,共14页
Bacterial blight(BB)is a globally devastating rice disease caused by Xanthomonas oryzae pv.oryzae(Xoo).The use of disease resistance(R)genes in rice breeding is an effective and economical strategy for the control of ... Bacterial blight(BB)is a globally devastating rice disease caused by Xanthomonas oryzae pv.oryzae(Xoo).The use of disease resistance(R)genes in rice breeding is an effective and economical strategy for the control of this disease.Nevertheless,a majority of R genes lack durable resistance for long-term use under global warming conditions.Here,we report the isolation of a novel executor R gene,Xa7,that confers extremely durable,broad-spectrum,and heat-tolerant resistance to Xoo.The expression of Xa7 was induced by incompatible Xoo strains that secreted the transcription activator-like effector(TALE)AvrXa7 or PthXo3,which recognized effector binding elements(EBEs)in the Xa7 promoter.Furthermore,Xa7 induction was faster and stronger under high temperatures.Overexpression of Xa7 or co-transformation of Xa7 with avrXa7 triggered a hypersensitive response in plants.Constitutive expression of Xa7 activated a defense response in the absence of Xoo but inhibited the growth of transgenic rice plants.In addition,analysis of over 3000 rice varieties showed that the Xa7 locuswas found primarily in the indica and aus subgroups.A variation consisting of an 11-bp insertion and a base substitution(G to T)was found in EBEAvrXa7 in the tested varieties,resulting in a loss of Xa7 BB resistance.Through a decade of effort,we have identified an important BB resistance gene and characterized its distinctive interaction with Xoo strains;these findings will greatly facilitate research on the molecular mechanism of Xa7-mediated resistance and promote the use of this valuable gene in breeding. 展开更多
关键词 Xa7 executor R gene durable resistance TALE bacterial blight RICE
原文传递
Emergency Law in China: Its Formation, Present State and Future
18
作者 Meng Tao 《Social Sciences in China》 2011年第3期104-119,共16页
China's emergency laws have emerged as a result of dealing with crises. They comprise laws and regulations, emergency plans, and military regulations, and define three exceptional or emergency states: war, emergency... China's emergency laws have emerged as a result of dealing with crises. They comprise laws and regulations, emergency plans, and military regulations, and define three exceptional or emergency states: war, emergency and emergency response, with the aim of constructing a comprehensive integrated system based on the specialized division of labor. In practice, however, emergency plans take the place of laws and regulations and provide the fundamental normative basis for tackling emergencies, with government and the military playing the dominant role. Developing out of necessity and possessing temporary applicability, China's emergency laws are characterized by authorization and prevention. Integrating emergency law with the socialist legal system with Chinese characteristics, formulating basic law for emergency situations and improving the specific mechanisms of emergency law should be regarded as major steps in its future development. 展开更多
关键词 state of emergency comprehensive treatment dominant role of the executor preventive law
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部