• 제목/요약/키워드: Computer code

검색결과 2,705건 처리시간 0.03초

Code Generation and Optimization for the Flow-based Network Processor based on LLVM

  • Lee, SangHee;Lee, Hokyoon;Kim, Seon Wook;Heo, Hwanjo;Park, Jongdae
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.42-45
    • /
    • 2012
  • A network processor (NP) is an application-specific instruction-set processor for fast and efficient packet processing. There are many issues in compiler's code generation and optimization due to NP's hardware constraints and special hardware support. In this paper, we describe in detail how to resolve the issues. Our compiler was developed on LLVM 3.0 and the NP target was our in-house network processor which consists of 32 64-bit RISC processors and supports multi-context with special hardware structures. Our compiler incurs only 9.36% code size overhead over hand-written code while satisfying QoS, and the generated code was tested on a real packet processing hardware, called S20 for code verification and performance evaluation.

자바 바이트코드 검증을 위해 기본경로를 통한 BIRS 코드로부터 검증조건 생성 (Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification)

  • 김제민;김선태;박준석;유원희
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권8호
    • /
    • pp.61-69
    • /
    • 2012
  • BIRS는 자바 프로그램의 검증을 위해 사용되는 중간표현 언어이다. 바이트코드 형태의 자바 프로그램은 검증을 위해 BIRS 코드로 변환된다. 변환된 BIRS 형태의 프로그램을 검증하기 위해서는 BIRS 형태의 프로그램에 대한 검증조건을 생성해야 한다. 본 논문에서는 BIRS 코드에 대한 검증조건을 생성하는 방법을 제시한다. 검증조건 생성은 BIRS 코드에 대한 제어흐름그래프 구성, 제어흐름그래프에 대한 깊이우선 탐색을 통한 기본경로 추출, 기본경로에 대한 최약 전조건(weakest precondition) 계산법의 과정을 통해 이루어진다.

Which Code Changes Should You Review First?: A Code Review Tool to Summarize and Prioritize Important Software Changes

  • Song, Myoungkyu;Kwon, Young-Woo
    • Journal of Multimedia Information System
    • /
    • 제4권4호
    • /
    • pp.255-262
    • /
    • 2017
  • In recent software development, repetitive code fragments (i.e., clones) are common due to the copy-and-paste programming practice, the framework-based development, or the reuse of same design patterns. Such similar code fragments are likely to introduce more bugs but are easily disregarded by a code reviewer or a programmer. In this paper, we present a code review tool to help code reviewers identify important code changes written by other programmers and recommend which changes need to be reviewed first. Specifically, to identify important code changes, our approach detects code clones across revisions and investigates them. Then, to help a code reviewer, our approach ranks the identified changes in accordance with several software quality metrics and statistics on those clones and changes. Furthermore, our approach allows the code reviewer to express their preferences during code review time. As a result, the code reviewer who has little knowledge of a code base can reduce his or her effort by reviewing the most significant changes that require an instant attention. To evaluate our approach, we integrated our approach with a modern IDE (e.g., Eclipse) as a plugin and then analyzed two third-party open source projects. The experimental results indicate that our approach can improve code reviewer's productivity.

Construction of Structured q-ary LDPC Codes over Small Fields Using Sliding-Window Method

  • Chen, Haiqiang;Liu, Yunyi;Qin, Tuanfa;Yao, Haitao;Tang, Qiuling
    • Journal of Communications and Networks
    • /
    • 제16권5호
    • /
    • pp.479-484
    • /
    • 2014
  • In this paper, we consider the construction of cyclic and quasi-cyclic structured q-ary low-density parity-check (LDPC) codes over a designated small field. The construction is performed with a pre-defined sliding-window, which actually executes the regular mapping from original field to the targeted field under certain parameters. Compared to the original codes, the new constructed codes can provide better flexibility in choice of code rate, code length and size of field. The constructed codes over small fields with code length from tenths to hundreds perform well with q-ary sum-product decoding algorithm (QSPA) over the additive white Gaussian noise channel and are comparable to the improved spherepacking bound. These codes may found applications in wireless sensor networks (WSN), where the delay and energy are extremely constrained.

대출업무 자동화를 위한 시스팀설계에 관한 연구 (System Analysis for the Automated Circulation)

  • 김광영
    • 한국비블리아학회지
    • /
    • 제4권1호
    • /
    • pp.85-102
    • /
    • 1980
  • Accepting the necessity for maintaining the objectives of the existing circulation system, the computer-based system could be designed by the system analyst and librarians to gain a variety of improvements in the maintenance, accessibility of circulation records and more meaningful statistical records. If the terminal can be operated on-line, then this circulation data is transmitted directly to the computer, where it may update to the circulation file immediately or alternatively be kept in direct access file for updating in batch mode. on-line system in the circulation operations is "data-collection system" and "Bar-coded label system" Bar-coded label system is simple, quick, and error-free input of data. Attached to CRT terminal is a "light pen" which is hand held and will read a bar-coded label as the pen is passed over the labels (one affixed to the book itself, other carried on the borrower cards). Instantaneously the data concerning transaction is stored in the central mini-computer. It is useful, economical for us to co-operate many libraries in Korea and design borrower's ID code, book no., classification code in the Bar-coded label system by the members of the computer center and the library staff at every stage. As for book loan, the borrowers ID code, book number and classification code are scanned by the bar-code scanner or light pen and the computer decides whether to loan and store the data. The visual display unit shows the present status of a borrowers borrowing and decides whether borrower can borrow.

  • PDF

수명적, 계산적 최적화를 위한 희소코드모션 알고리즘 (A Sparse Code Motion Algorithm forlifetime and computational optimization)

  • 심손권
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권9호
    • /
    • pp.1079-1088
    • /
    • 2004
  • 일반적으로 코드 모션 알고리즘은 계산적 최적화와 레지스터 과부하와 연관되는 실행시간 최적화를 수행 한다. 본 논문은 계산적 최적화와 수명적 최적화에 더하여 코드의 크기를 고려하는 희소 코드 모션 알고리즘을 제안한다. 희소 코드 모션 알고리즘에서 BCM 알고리즘은 계산적으로 최적 코드 모션을 수행하고, LCM 알고리즘은 레지스터 과부하를 감소시킨다. 희소 코드 모션 알고리즘은 블필요한 코드 모션을 억제시키기 때문에 계산적으로나 수명적으로 최적인 알고리즘이다. 희소 코드 모션 알고리즘은 성능평가를 통하여 기존의 연구보다 프로그램의 능률 및 실행시간을 향상시켰다.

  • PDF

A Study on Reconstruction Vulnerability of Daugman's Iriscode

  • Youn, Soung-Jo;Anusha, B.V.S;Kim, Gye-Young
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.35-40
    • /
    • 2019
  • In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.

이차원 QR Code에서 데이터 코드워드의 디코딩 알고리즘 (Algorithm of Decoding the Data Codeword in Two-Dimensional QR Code)

  • 박광욱;이종연
    • 한국융합학회논문지
    • /
    • 제4권4호
    • /
    • pp.21-29
    • /
    • 2013
  • 2차원 QR Code는 1차원 바코드의 용량, 크기, 방향에 대한 한계를 개선하였으며, 방대한량의 데이터를 압축하여 저장할 수 있는 능력을 갖추고 많은 응용분야에서 사용되고 있다. 최근에는 QR Code를 인식할 수 있는 스마트 폰의 도입과 사용의 증대로 QR Code의 도입이 급속도로 확산되었다. 하지만 다양한 정보를 저장할 수 있는 QR Code의 디코딩 기술에 대한 구체적인 문서화가 없는 상태이다. 따라서 본 논문에서는 QR code의 인코딩에 따른 디코딩 과정에 대해 구체적인 처리 절차와 알고리즘을 제시하고 예를 통해 디코딩 과정을 상세히 이해시키는데 연구목적이 있다.

Optimization of LU-SGS Code for the Acceleration on the Modern Microprocessors

  • Jang, Keun-Jin;Kim, Jong-Kwan;Cho, Deok-Rae;Choi, Jeong-Yeol
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제14권2호
    • /
    • pp.112-121
    • /
    • 2013
  • An approach for composing a performance optimized computational code is suggested for the latest microprocessors. The concept of the code optimization, termed localization, is maximizing the utilization of the second level cache that is common to all the latest computer systems, and minimizing the access to system main memory. In this study, the localized optimization of the LU-SGS (Lower-Upper Symmetric Gauss-Seidel) code for the solution of fluid dynamic equations was carried out in three different levels and tested for several different microprocessor architectures widely used these days. The test results of localized optimization showed a remarkable performance gain of more than two times faster solution than the baseline algorithm for producing exactly the same solution on the same computer system.

Sparse Representation based Two-dimensional Bar Code Image Super-resolution

  • Shen, Yiling;Liu, Ningzhong;Sun, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2109-2123
    • /
    • 2017
  • This paper presents a super-resolution reconstruction method based on sparse representation for two-dimensional bar code images. Considering the features of two-dimensional bar code images, Kirsch and LBP (local binary pattern) operators are used to extract the edge gradient and texture features. Feature extraction is constituted based on these two features and additional two second-order derivatives. By joint dictionary learning of the low-resolution and high-resolution image patch pairs, the sparse representation of corresponding patches is the same. In addition, the global constraint is exerted on the initial estimation of high-resolution image which makes the reconstructed result closer to the real one. The experimental results demonstrate the effectiveness of the proposed algorithm for two-dimensional bar code images by comparing with other reconstruction algorithms.