Computer and Modernization ›› 2019, Vol. 0 ›› Issue (05): 13-.doi: 10.3969/j.issn.1006-2475.2019.05.003
Previous Articles Next Articles
Received:
2018-12-17
Online:
2019-05-14
Published:
2019-05-14
CLC Number:
TU Xue-zhen. An Optimized Kernel State File Sending Method[J]. Computer and Modernization, 2019, 0(05): 13-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2019.05.003
[1] 安仲奇,杜昊,李强,等. 基于高性能I/O技术的Memcached优化研究[J]. 计算机研究与发展, 2018,55(4):864-874. [2] 董勇,周恩强,卢宇彤,等. 基于天河2高速互连网络实现混合层次文件系统H2FS高速通信[J]. 计算机学报, 2017,40(9):1961-1979. [3] 秦雄军,张佳程,舒继武,等. 一种基于裸闪存的Key-Value数据库优化方法[J]. 计算机研究与发展, 2017,54(6):1326-1336 [4] 肖月振,华蓓. 基于多核处理器的无锁零拷贝数据包转发框架[J]. 计算机工程, 2013,39(12):35-39. [5] 狐的传说. TCP/IP协议栈到底是内核态的好还是用户态的好?[EB/OL].[2018-06-06]. http://www.imooc.com/article/33613. [6] 刘松,卢泽新,张晓哲,等. 面向用户态Click的I/O优化框架的设计与实现[J]. 计算机科学与探索, 2016,10(12):1693-1700. [7] 袁中书,陆阳. 轻量级TCP/IP协议栈机制分析与优化[J]. 计算机工程, 2015,41(2):317-321. [8] 博韦·西斯特. O’Reilly:深入理解Linux内核[M]. 3版. 陈莉君,张琼声,张宏伟,译. 北京:中国电力出版社, 2009. [9] 陈李飞. Linux内核分析:页回收导致的cpu load瞬间飙高的问题分析与思考[J]. 数字技术与应用, 2016(12):252. [10]钱振江,刘永俊,姚宇峰,等. 微内核架构内存管理的形式化设计和验证方法研究[J]. 电子学报, 2017,45(1):251-256. [11]谢文娣,冷先进,金建. 一种Linux内存管理机制[J]. 新乡学院学报, 2016,33(12):31-36. [12]于国龙,崔忠伟,左羽. 嵌入式Linux内存管理的优化[J]. 四川理工学院学报(自然科学版), 2015,28(4):33-36. [13]田泉,艾丽蓉,陈杰. Linux实时内存的研究与实现[J].微电子学与计算机, 2014(8):45-48. [14]张凡龙,苏小红,孙志岗,等. Hurd操作系统的内存管理及内存共享研究[J]. 智能计算机与应用, 2012,2(4):61-64. [15]文瑾,王宜怀,柏祥. 嵌入式操作系统MQX内存管理机制分析与改进[J]. 计算机应用与软件, 2016,33(7):239-242. [16]姬希娜,浮明军,冯利虎,等. Nucleus PLUS的动态内存管理机制研究[J]. 单片机与嵌入式系统应用, 2018,18(4):6-10. [17]乔磊,杨孟飞,谭彦亮,等. 基于Event-B的航天器内存管理系统形式化验证[J]. 软件学报, 2017,28(5):1204-1220. [18]CHEN J H, DENG Y H, ZHAN H. HDCat: Effectively identifying hot data in large-scale I/O streams with enhanced temporal locality[C]// International Conference on Algorithms and Architectures for Parallel Processing. 2015:120-133. [19]SEDGEWICK R, WAYNE K. 算法(英文版) [M]. 4版. 北京:人民邮电出版社, 2012. [20]张旭,顾乃杰,苏俊杰. Linux调度器免锁优化方法研究[J]. 小型微型计算机系统, 2017,38(4):690-695. [21]胡森森,计卫星,王一拙,等. 片上多核处理器Cache一致性协议优化研究综述[J]. 软件学报, 2017,28(4):1027-1047. [22]李慧娟,栾钟治,王辉,等. NUMA架构内多个节点间访存延时平衡的内存分配策略[J]. 计算机学报, 2017,40(9):2111-2126. [23]陈鲍孜,吴庆波,谭郁松. 应用协同的进程组内存管理支撑技术[J]. 计算机工程与科学, 2014,36(1):57-62. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||