CN104182235B - Software architecture system and design method used for solving sneak path of software - Google Patents

Software architecture system and design method used for solving sneak path of software Download PDF

Info

Publication number
CN104182235B
CN104182235B CN201410424481.9A CN201410424481A CN104182235B CN 104182235 B CN104182235 B CN 104182235B CN 201410424481 A CN201410424481 A CN 201410424481A CN 104182235 B CN104182235 B CN 104182235B
Authority
CN
China
Prior art keywords
function
component
data
software
called
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410424481.9A
Other languages
Chinese (zh)
Other versions
CN104182235A (en
Inventor
康梅
康一梅
姚赟政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201410424481.9A priority Critical patent/CN104182235B/en
Publication of CN104182235A publication Critical patent/CN104182235A/en
Application granted granted Critical
Publication of CN104182235B publication Critical patent/CN104182235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a software architecture system and design method used for solving sneak path of software. The design mode of the architecture system is to divide a software system into an advocate tone function component module, a called function component module, a controller component module, an event component module and a data component module; the controller component module is added among all data interaction of a program, so that overall management of data between an event and the modules can be realized; the interior of the controller component module comprises a timer component, a function processing component and a function registering component, and the controller component module is used for controlling time for data interaction among the modules; if the data do not return within the required time, one fault datum is forced to return through the function processing component, and the calling process of the fault function is completed. The software architecture system and design method has the advantages that the components can be reused, prototype design is performed step by step, the components can be parallelly developed without mutual influence, most importantly, the problem about the sneak path is solved, and stability and robustness of the software are improved.

Description

A kind of software architecture system and method for designing for solving software sneak path
Technical field
The present invention relates to a kind of DEPC (data Data, event Event, processing Process, controller Controller tetra- The abbreviation of individual English word) architecture management system and implementation method are specifically between a kind of each module to program Data interaction carries out the software architecture system and method for designing of global administration, and the software architecture is independently of hardware cell The actual realization of function is controlled;Belong to field of computer technology.
Background technology
Originally, people are in the selection for focusing on Data Structure and Algorithm of software design, with software system scale It is increasing, become increasingly complex, the structure and specification of whole system seem more and more important.It is soft for large-scale complexity For part system, overall system structure design and specification is bright compared with the selection of the algorithm to calculating and data structure It is aobvious to become much more significant.Since software system is divided into first number of modules, interact again between module, combining, there have to be whole The attribute of body, is just provided with architecture.
Before 20 century 70s, software development is based on assembly program design.Due to system scale at that time it is less, institute There is no the concept of software system structure.The eighties in 20th century, OO development approach was opened to the mid-90 Begin to flourish and progressively ripe.After the nineties in 20th century, then the component-based software development stage is entered into, the stage is with process Centered on, emphasize software development using Component Technology and architecture technique, it is desirable to the software developed possess it is very strong from Adaptability, interoperability, expansibility and reusability.The appearance of software architecture so that the software division of labor at all levels is bright Really, it is non-interference.The demand of certain level there occurs change, just only need to the code changed in equivalent layer, not interfere with it Code in its layer.
But the conventional architecture mode of real-time software mainly has traditional poll architecture, function queue system knot Structure, AM/BAM (interruption) architecture and the layered architecture based on operating system.At present in personal computer and service The architectures such as MVC, SOA that the application software run on device is adopted are not suitable for real-time software.Most of real-time softwares only have Less man-machine interaction, even without man-machine interaction, can regard man-machine interaction as event.There is substantial amounts of thing in real-time software Part, these events are not necessarily the event of man-machine interaction generation, and the circulation of all these events meeting control programs is such as interrupted, And what many events often occurred at random, this event easily causes program sneak path.
Early in the eighties in 20th century, people have begun to set about the analysis and research to software sneak path.Sneak path is referred to Some potential paths in software system, they belong to not in calculated path, are that people are undesirable.Sneak path It is constantly present, because subsystem designer lacks the behavior of the overall point of view of total system or some carelessness, has Logical problem when being then software design, also some data interactions are difficult by look-ahead, or even also some sneak paths are Caused due to electromagnetic interference or other factorses.
Causing the factor of software sneak path has a lot, here can be for an example that may produce software sneak path. At present in real-time software design, to the process interrupted usually in accordance with its priority, the high interruption of priority can seize and be System resource, this is that the state of processing procedure that should be to being preempted is preserved, and continues to complete after the completion of interrupt processing and is hung The processing procedure for rising.But, these are required for developer to go to process one by one, are many times likely to occur not preserving and are preempted The state of processing procedure is preserved imperfect.It is as shown in Figure 1 a sneak path due to interrupting generation, if do not examined during design Consider such case, it is likely that routine call is not returned.The appearance of sneak path problem can to program performing bring it is many can not Prediction and uncontrollable factor.If necessary process is not done to sneak path in program operation, it will to overall software item Mesh engineering brings huge risk.
If being possible to produce add one layer of control member layer between the component of data interaction, global supervision is carried out, Above-mentioned for avoiding the occurrence of, then sneak path problem that can be effectively to occurring in program performing is processed, while Add timer function in controller component, then program performing can be avoided unlimited situation about waiting occur, also can be real-time The time that constraint interpolation is performed in software.
The pertinent literature report of the sneak path problem occurred in settlement procedure running is at home and abroad there is no at present.
The content of the invention
The technology of the present invention solution:Overcome the deficiencies in the prior art, there is provided a kind of DEPC architecture managements system and Implementation method, the sneak path problem occurred in settlement procedure running;Can apply in real-time software and non-real time software; It is not only restricted to the programming language used during exploitation program;Public high-level abstract of system can be represented;Contribute in proper order Progressive prototype;Support member concurrent development, and be independent of each other.
The technology of the present invention solution:1st, a kind of software architecture system for solving software sneak path, its feature It is, in software development, software to be divided into into homophony function component, called function component, event component, data members and control The part of device component five;Wherein:
User-defined power function is called in homophony function component, realization, it would be desirable to which the function information called gives control Device component is processed;
Called function component, realizes processing the specific data mart modeling of correspondence system and process, is called by controller component, Then controller component is returned result to;
Event component, realizes processing all events being likely to occur in correspondence system, such as interrupts or connect network, controlled Device component processed is called, and then returns result to controller component;
Controller component, realizes that the data interaction to being likely to occur in program is managed and controls, and homophony function will The module information called gives controller component, controller component when specific called function is called, using timer to quilt The implementation procedure of letter of transfer number carries out timing, if program within the expected time without normal return, force disconnect perform into Journey, returns an abnormal data;Another function of controller component is the function registration that controller will be needed to be controlled Enter function information list;
Data members, there is provided access the component of data structure, file, data base's definition and data storage interface.
One software system is divided into into data (Data), event (Event), processing (Process), controller (Controller) four parts, wherein processing is divided into homophony processing and is adjusted two kinds of situations of processing.
Sneak path refers to some potential paths in software system, and they belong to not in calculated path, are not Wish what is occurred.The appearance of sneak path problem can bring many unpredictable and uncontrollable factor to program performing.If Necessary process is not done to sneak path in program operation, it will bring huge risk to overall software project engineering.
Due to many reasons, sneak path is always existed in software system data interaction.One layer of controller structure of addition Part layer, carries out global supervision, above-mentioned for avoiding the occurrence of, then can effectively to the sneak path of appearance in program performing Problem is processed, while adding timer function in controller component, then can be prevented effectively from program performing and nothing is occurred Limit wait situation, also can in real-time software constraint interpolation perform time.
Controller component is the core component in DEPC architecture modes, and it is supervised to current event, state, data Listen, there is provided corresponding mechanism coordination event is corresponding, state is hung up, data are preserved, and preserves correct path and performs, and blocks sneak path Perform.
Described homophony function component is needed comprising program principal function, that is, the entrance function of program, and other use The power function of family oneself definition.
Described controller component is needed comprising function process assembly, timer component and component registration.Wherein registration group Part is used for storage needs the function information that function process assembly is processed (to return including function name, function parameter list, function Return type);Timer component carries out timing according to the clock of program institute application system platform to the time of certain thread operation; Function process assembly finds called function information, Ran Houjian by according to the incoming function information of homophony function from function list Two threads are found, a thread is used to perform called function, and another thread is used for the called function run time to performing and enters Row timing.
A kind of Software Architecture Design Method for solving software sneak path, realizes that step is as follows:
(1) application developer sets up controller (Controller), data when projects are set up under project directory Process (DataProcessing), event handling (DataProcessing), four files of power function (Functions) or Bag;
(2) principal function and other main called functions are write in power function bag;
(3) correlation function for accessing data base, operated to database data is write in data processing bag;
(4) may in writing in event handling bag for realizing all programs such as interrupt operation, network data communication operation The event functions of appearance;
(5) in controller bag, need to write timer function, function process function and function registration function, write meter When device function when need write according to the clock module of institute's application system, read system first when timer is started working Current time, program does not stop to obtain newest system time when running, and has been subtracted each other with the time started and be obtained program The time of Jing operations, if will force to terminate called function process beyond the scheduled time, and return erroneous values;Function registration function Needing to construct one is used to deposit the memory space of function information, can be a file, a data structure or table etc., The function information of storage includes function name, function return value, function parameter list;Function processes function to be needed to realize from function row The function of called function is searched in table, after finding function information, two processes can be set up, a process is used to perform by letter of transfer Number a, process carries out timing for performing timer to the time that called function runs;
(6) resource and head text can be set up in the case where controller, event handling, data processing, power function are with first class catalogue Part catalogue, for depositing the header file information of picture, audio and video resources and function.
Present invention advantage compared with prior art is:
(1) present invention provides a kind of most basic DEPC architecture frames, and it is preferably managed for programmer Solution and application, it is often more important that programmer can use the global design thought of DEPC architectures when software is developed.For Different application scenarios, DEPC architectures can carry out appropriate expansion and adjustment.
(2) range of application of the invention is wider, is not only restricted to the programming language used during exploitation program, and can apply In real-time software and non-real time software.Controller component mainly has two effects, and one is that the data between component are carried out entirely Office's management, two is that the run time to program control effectively.The present invention also provides a kind of basic controller component and realizes Mode.Because in different application scenarios, specific requirement of the software to controller is also not quite similar.Such as different software works Journey is different to its tolerable run time of each task process and service requirement;It is not each in non-real time software Task is required for being processed by controller component, as long as registration needs mission function of control etc..So, control Device component is also to need to carry out relative modification according to different situations and adjust.
(3) present invention can effectively solve the problems, such as the sneak path occurred in software running process.Open in current software In sending out, also without a kind of effective solution for software sneak path, the design of DEPC can be described as compensate for this blank. Carrying out design software with DEPC software architectures effectively can be processed the sneak path of appearance in software running process, this Sample can greatly improve the overall safety and reliability of software.
(4) present invention provides a kind of software architecture for contributing to incremental prototype.In software development, point Layer design can be analyzed to project, and project is constructed into prototype by eXecute UML.Contribute to exploitation in terms of two Movable is smoothed out, and one can be the clearly potential system performance problems of early stage in software life-cycle;Two be The early stage of software life-cycle can just obtain an executable system.The two aspects will all reduce the latent of project development In risk.
(5) present invention can represent public high-level abstract of system.Most of related personnel of system can be it As a basis for understanding mutually is set up, unified understanding, mutually exchange are formed.DEPC software architectures specify that to system The constraints of realization, is divided into the component of regulation, by regulation side by the structural design decision met described by architecture Formula is interacted.So the designer of DEPC software configurations needs not be algorithm designer or is proficient in programming language, it is only necessary to Emphasis considers the overall trade-off problem of system;And the developer of component develops under the constraint that architecture gives.This The design of sample so that homophony component, logically keep relatively only by tune component, control member, event component and data members Vertical property, so that the logical structure of whole system is relatively sharp, it is possible to increase the maintainable and expansibility of system and software.
Description of the drawings
Fig. 1 is to interrupt the situation for producing sneak path;
Fig. 2 is the DEPC architecture management system construction drawings of the present invention, reflects and carry out between each component data friendship Mutual mode;
Fig. 3 is timer component in the present invention in controller component, processes function component, registration function component and homophony Relation between function component and called function component.The direction of arrow expresses possibility the data interaction direction of presence, function note Volume list then represents the file or data structure of storage function information;
Fig. 4 is the component registration workflow in the present invention in controller component, after a function is realized, if desired The control of the overall situation is carried out to it, then needs to register it using registration function, then registration function believes the function registered During breath (function name, function parameter, function return value) is stored in function list;
Fig. 5 is the process assembly workflow in the present invention in controller component, when the called function of homophony function call When, process assembly can search function from registration function list, then create two processes, and one is used to perform called function, And another is for when calling timer, whether the execution of the called function of judgement to surpass the expectation the time, most at last result is returned Return;
Fig. 6 shows the timer component workflow in controller component.Timing bench receives function process assembly meter When order after start timing, while whether determining program run time beyond the prespecified time, if exceeding the time, will It is forced back to a wrong data;
Fig. 7 shows the workflow diagram of the image acquisition subsystem in the face identification system based on 3G network;
Fig. 8 shows the workflow diagram of the recognition subsystem in the face identification system based on 3G network.
Specific embodiment
The simple words of term included below, initial and abbreviation, it will help understand the following examples Describe in detail, but these details are not meant to limit the present invention.Those skilled in the art obviously can deviate these The present invention is put into practice in other embodiments of detail.For example, despite with the reality based on the face identification system of 3G network Apply scheme to describe the present invention, but the present invention can also be applied in real-time software and non-real time software is arbitrarily included.
Term "comprising" and " including " and its derivative represent it is non-limiting including;Term "or" is inclusive, meaning And/or;Phrase " with ... be associated " and " being further associated " and its derivative can represent including, be included, therewith interconnection, Comprising, included, be attached thereto, it is coupled thereto, communicate, cooperate, interweaving, side by side, be close to, be limited to, with, tool There is its property etc.;" component " is the reusable software module of software-oriented architectural framework.Component (component) is reusable Software composition, can be used to construct other software, and in the present invention component is commonly referred to as packed object class, class tree With some functional modules;" component " refers to the simplified package to data and method;" DEPC " refers to data (Data), event (Event), (Process), the abbreviation of controller (Controller) four English words are processed." 3G network " is referred to use and propped up Hold the G mobile communication of the cellular mobile telecommunications technology of high speed data transfer the laying of circuit and equipment it is logical Communication network.
In order to verify the effectiveness of DEPC architecture Design patterns, we are employed with the present invention and without the present invention Two ways is realizing a face identification system based on 3G network.As shown in Figure 7 and Figure 8, reflect from top to bottom and be based on The main flow of the face identification system of 3G network, the system is made up of image capturing system and identifying system two subsystems. Image capturing system is only responsible for collection human face data, then the human face data for collecting is transferred to into identification system by 3G network System.Identifying system is received after original image information, and process is analyzed to image information, extracts face, eyes, the nose of people After the features such as son, mouth, eyebrow, compare with the image in data base, judge whether corresponding face information, finally will Object information sends back image acquisition end again by 3G network.Image acquisition termination is received will by display screen after return information As a result show.
In this system, one four key nodes are had.It is respectively that judging whether in image capturing system starts figure As collection and feedback information to be received is waited, view data that the wait in face identification system is collected and from human face data Face characteristic data are matched in storehouse.
When user proceeds by image acquisition, need triggering manually to interrupt (such as touching the button), tell image capturing system Start to gather view data.After data acquisition is finished, face identification system is passed information to by mobile Internet.Face is known Other system needs the view data to be received such as ceaselessly.It is also to pass through when there is new view data to need identifying system to receive The mode that triggering is interrupted, tells that identifying system starts receiving data.It will be seen that existing in this system a lot Unstable factor.Realized after this system with common non-DEPC software architectures, when the quick continuous triggering collection of user When image interrupts, program is it sometimes appear that situation about crashing, shows that program enters sneak path.When the timing of 3G swingings of signal, The problem that system latency time can be caused long.
When this system is designed using DEPC architectures, we user are triggered the event interrupted and are divided into event structure Part, the face database that will be accessed is divided into data members, and other function calls are followed successively by homophony component and by tune component, most Also add control member between the elements afterwards and control for global.So, user triggers every time interruption, all can be by controlling Component is such to design the generation that effectively prevent sneak path being processed.When accessing face database, need to call data Component, it is to avoid other users directly conduct interviews to data base, safety has very high lifting.As image capturing system and people When face identifying system is communicated by 3G network, control member can carry out timer supervision, if network communication is beyond regulation Time requirement, control member can be forced back to information alert data is activation time-out or data is activation failure.
Fig. 7 show the flow chart of video acquisition subsystem.When acquisition subsystem is realized, overall code is distributed in In controller, power function, three bags of event.Storage in controller bag has process function, timer function, registration function and letter Number information table;Storage in power function bag has principal function, image acquisition function;Storage in event package has button interrupt to process letter Number, network service function.
Need to process function to image acquisition function, button interrupt before system operation and network service function registered, As shown in figure 4, realizing that image acquisition function, button interrupt are processed after function and network service function, need their function Title, parameter list and return value type information are stored in function information table.When user wants to gather image, by pressing thing Reason button triggering interrupt processing function, interrupt processing function notification controller as shown in Figure 3 needs to call image acquisition function, controls Device processed finds called function information from function information list, and then the function in controller as shown in Figure 5 processes function and adjusts Image acquisition function is used, while start timer carries out timing to the run time of called function.After being collected image, pass through Network service function sends the image information for getting to recognition of face subsystem.It is required for passing through during function call Process function in controller component is processed, and processing function can call timer function to count the execution time of function Calculate and control, will be forced back to wrong data if the time as shown in Figure 6.
Fig. 8 show the flow chart of recognition of face subsystem.When recognition of face subsystem is realized, by overall code point Cloth is in controller, power function, four bags of event and data.Storage in controller bag has process function, timer function, note Volume function;Storage in power function bag has principal function, feature extraction function, aspect ratio to function, result feedback function;Event package Middle storage has network service function;Storage in packet has access database functions.
Need before system operation to feature extraction function, aspect ratio to function, result feedback function, network service function, Access database functions registered, as shown in figure 4, realize feature extraction function, aspect ratio to function, result feedback function, After network service function, access database functions, need to deposit their function name, parameter list and return value type information In being placed on function information table.After recognition of face subsystem receives new gathered data, notification controller as shown in Figure 3 needs Call feature extraction function, controller that called function information is found from function information list, then controller as shown in Figure 5 In function process function call feature extraction function will carry out face characteristic extraction and calculating to the data for collecting, while opening Dynamic timer carries out timing to the run time of called function.Then call aspect ratio to function, access all in data base Human face data, determines whether matched data, then the data after comparison is returned to into acquisition subsystem.The process of function call In be required for being processed by the process function in controller component, process function can as shown in Figure 6 call timer function The execution time of function is calculated and controlled, such as the time of access data base execution and network service duration are such as Fruit to surpass the expectation and will be forced back to wrong data if the time, without departing from expeced time, will return correct data.
By the checking of actual items, when finding using DEPC software architecture codings, the speed of service of program Can somewhat decline, but the overall stability of system and reliability but have huge lifting.

Claims (3)

1. a kind of software architecture system for solving software sneak path, it is characterised in that:In software development, by software It is divided into homophony function component, called function component, event component, data members and the part of controller component five;Wherein:
User-defined power function is called in homophony function component, realization, it would be desirable to which the function information called gives controller structure Part is processed;
Called function component, realizes processing the specific data mart modeling of correspondence system and process, is called by controller component, then Return result to controller component;
Event component, realizes processing all events being likely to occur in correspondence system, including interrupts or connect network, by controller Component is called, and then returns result to controller component;
Controller component, realizes that the data interaction to being likely to occur in program is managed and controls, and homophony function will be called Module information give controller component, controller component when specific called function is called, using timer to by letter of transfer Several implementation procedures carries out timing, if program is returned within the expected time without normal, force disconnect executive process is returned Return an abnormal data;Another function of controller component is that the function registration that controller will be needed to be controlled enters function Information list;
Data members, there is provided access the component of data structure, file, data base's definition and data storage interface;
Described controller component includes function process assembly, timer component and component registration, and wherein component registration is used to deposit The function information for needing function process assembly to be processed is put, the function information includes function name, function parameter list, letter Number return type;Timer component is counted according to the clock of program institute application system platform to the time of certain thread operation When;Function process assembly finds called function information, then by according to the incoming function information of homophony function from function list Two threads are set up, a thread is used to perform called function, and another thread is used for the called function run time to performing Carry out timing.
2. the software architecture system for solving software sneak path according to claim 1, it is characterised in that:It is described Homophony function component need comprising program principal function, that is, the entrance function of program, and other users oneself definition Power function.
3. a kind of Software Architecture Design Method for solving software sneak path, it is characterised in that:Realize that step is as follows:
(1) application developer sets up controller (Controller), data processing when projects are set up under project directory (DataProcessing), event handling (Event Processing), four files of power function (Functions) or Bag;
(2) principal function and other main called functions are write in power function bag;
(3) correlation function for accessing data base, operated to database data is write in data processing bag;
(4) it is likely to occur in writing in event handling bag for realizing all programs such as interrupt operation, network data communication operation Event functions;
(5) in controller bag, need to write timer function, function process function and function registration function, write timer Need to be write according to the clock module of institute's application system during function, read system first when timer is started working current Time, program do not stop to obtain newest system time when running, and is subtracted each other with the time started and obtain program and run Time, if will force to terminate called function process beyond the scheduled time, and return erroneous values;Function registration function needs structure One is made for depositing the memory space of function information, can be a file, a data structure or a table, the letter of storage Number information includes function name, function return value, function parameter list;Function processes function to be needed to realize being searched from function list The function of called function, after finding function information, can set up two processes, and process is used to performing called function, one Process carries out timing for performing timer to the time that called function runs;
(6) resource and header file mesh can be set up in the case where controller, event handling, data processing, power function are with first class catalogue Record, for depositing the header file information of picture, audio and video resources and function.
CN201410424481.9A 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software Active CN104182235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410424481.9A CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410424481.9A CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Publications (2)

Publication Number Publication Date
CN104182235A CN104182235A (en) 2014-12-03
CN104182235B true CN104182235B (en) 2017-04-12

Family

ID=51963314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410424481.9A Active CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Country Status (1)

Country Link
CN (1) CN104182235B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833455A (en) * 2010-05-13 2010-09-15 北京大学 Code splitting method for converting traditional software into rich client software
CN102331733A (en) * 2010-07-14 2012-01-25 中国科学院沈阳计算技术研究所有限公司 Numerical control system logic controller on basis of system on programmable chip and implementing method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833455A (en) * 2010-05-13 2010-09-15 北京大学 Code splitting method for converting traditional software into rich client software
CN102331733A (en) * 2010-07-14 2012-01-25 中国科学院沈阳计算技术研究所有限公司 Numerical control system logic controller on basis of system on programmable chip and implementing method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Hibernate和Struts的J2EE应用开发研究;肖杰浩;《开发与应用》;20070531(第5期);第19-20页 *

Also Published As

Publication number Publication date
CN104182235A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
US10534773B2 (en) Intelligent query parameterization of database workloads
CN105556482B (en) Monitor mobile application performance
US10545856B2 (en) Test case generation system
US9367601B2 (en) Cost-based optimization of configuration parameters and cluster sizing for hadoop
CN103064690B (en) A kind of Development Framework based on Android operation system and the method for execution thereof
WO2018126964A1 (en) Task execution method and apparatus and server
CN109033109B (en) Data processing method and system
US7640538B2 (en) Virtual threads in business process programs
CN102542007A (en) Method and system for synchronization of relational databases
US20140172401A1 (en) Method of simulating discrete event
CN105095329B (en) A kind of demographic data check method
CN110555074B (en) Method, terminal and computer readable storage medium for timing data extraction and processing
CN103049264A (en) Method for controlling business system by dynamic modeling of state machine
CN104166701B (en) machine learning method and system
CN104731606B (en) The system and method for Enterprise information integration management is realized based on identification crawl technology
US8839208B2 (en) Rating interestingness of profiling data subsets
Debreceni et al. Property-based locking in collaborative modeling
CN113918637A (en) BPMN2.0 specification-based process engine platform creation method and system
CN107368498A (en) The lock for optimizing MySQL Pessimistic Lockings waits the method and device of time-out time
CN104182235B (en) Software architecture system and design method used for solving sneak path of software
CN112241373A (en) Automatic test method, test device, processor and test system
Johnsen et al. A formal model of object mobility in resource-restricted deployment scenarios
WO2021036987A1 (en) Method and device for achieving operation and maintenance monitoring
JP2011513842A5 (en)
US20180067837A1 (en) Framework for detecting source code anomalies

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant