• Articles • Previous Articles     Next Articles

Macro-Dataflow Computational Model and Its Simulation

Sun Yudong; Xie Zhiliang;   

  1. Shanghai Jiaotong University;
  • Online:1990-05-10 Published:1990-05-10

This paper discusses the relationship between parallelism granularity and system overhead of dataflow computer systems,and indicates that a trade-off between them should be determined to obtain optimal efficiency of the overall system.On the basis of this discussion,a macro-dataflow computational model is established to exploit the task-level parallelism.Working as a macro-dataflow computer,an Ex- perimental Distributed Dataflow Simulation System (EDDSS) is developed to examine the effectiveness of the macr…

Key words: computer software; frequent closed pattern; data mining; XML; Xpath; finite automata; invertibility; public key cryptosystem;

[1] W.B.Ackerman, Data flow languages, IEEE Computer,15:2(1982).

[2] Arvind and D.E.Culler, Why Dataflow Architecture, Proc. 4th Jerusalem Conf. on Information Technology. Jerusalem. Israel, May 1983.

[3] A.L.Davis and R.M.Keller, Data flow program graphs. IEEE Computer,15:2 (1982).

[4] J.B.Dennis. Data Flow Ideas for Suppercomputers. Proc. Compcon Spring 84, Feb. 1984.

[5] D.D.Gajski et al., A second opinion on data flow machines and languages. IEEE Conpmter,15:2 (1982). ………..
[1] Hui-Na Chao, Hua-Wei Li, Xiaoyu Song, Tian-Cheng Wang, Xiao-Wei Li. Evaluating and Constraining Hardware Assertions with Absent Scenarios [J]. Journal of Computer Science and Technology, 2020, 35(5): 1198-1216.
[2] De-Fu Lian, Qi Liu. Jointly Recommending Library Books and Predicting Academic Performance: A Mutual Reinforcement Perspective [J]. , 2018, 33(4): 654-667.
[3] Guo-Wei Wang, Jin-Dou Zhang, Jing Li. Complete Your Mobility: Linking Trajectories Across Heterogeneous Mobility Data Sources [J]. , 2018, 33(4): 792-806.
[4] Yu-Geng Song, Hui-Min Cui, Xiao-Bing Feng. Parallel Incremental Frequent Itemset Mining for Large Data [J]. , 2017, 32(2): 368-385.
[5] Xin Bi, Xiang-Guo Zhao, Guo-Ren Wang. Efficient Processing of Distributed Twig Queries Based on Node Distribution [J]. , 2017, 32(1): 78-92.
[6] Shi-Ming Guo, Hong Gao. HUITWU: An Efficient Algorithm for High-Utility Itemset Mining in Transaction Databases [J]. , 2016, 31(4): 776-786.
[7] Ke-Yan Cao, Guo-Ren Wang, Dong-Hong Han, Guo-Hui Ding, Ai-Xia Wang, and Ling-Xu Shi. Continuous Outlier Monitoring on Uncertain Data Streams [J]. , 2014, 29(3): 436-448.
[8] Jun-Feng Zhou, Guo-Xiang Lan, Zi-Yang Chen, and Xian Tang. Fast Smallest Lowest Common Ancestor Computation Based on Stable Match [J]. , 2013, 28(2): 366-381.
[9] Jie Tang, Chen Liu, Shao-Shan Liu, Zhi-Min Gu, and Jean-Luc Gaudiot. Pinned OS/Services: A Case Study of XML Parsing on Intel SCC [J]. , 2013, 28(1): 3-13.
[10] Philip Leroux, Student Member, IEEE, Bart Dhoedt, Member, IEEE, Piet Demeester, Fellow, IEEE, and Filip De Turck, Senior Member, IEEE. Performance Characterization of Game Recommendation Algorithms on Online Social Network Sites [J]. , 2012, 27(3): 611-623.
[11] Jun-Qiang Liu (刘君强). Publishing Set-Valued Data Against Realistic Adversaries [J]. , 2012, 27(1): 24-36.
[12] Jun-Feng Zhou (周军锋), Member, CCF, Tok Wang Ling (林卓旺), Senior Member, ACM, IEEE, Zhi-Feng Bao (鲍芝峰), and Xiao-Feng Meng (孟小峰), Senior Member, CCF, Member, ACM, IEEE. Related Axis: The Extension to XPath Towards Effective XML Search [J]. , 2012, 27(1): 195-212.
[13] Xiu-Li Ma (马秀莉), Hai-Feng Hu (胡海峰), Shuang-Feng Li (李双峰), Hong-Mei Xiao (肖红梅), Qiong Luo (罗琼), Dong-Qing Yang (杨冬青), Member,CCF, and Shi-Wei Tang (唐世渭), Senior Member, CCF. DHC: Distributed, Hierarchical Clustering in Sensor Networks [J]. , 2011, 26(4): 643-662.
[14] Yuan Jiang (姜远), Member, CCF, Ming Li (黎铭), Member, CCF, ACM, IEEE, and Zhi-Hua Zhou (周志华), Senior Member, CCF, IEEE, <. Software Defect Detection with ROCUS [J]. , 2011, 26(2): 328-342.
[15] Ming-Wei Zhang (张明卫), Member, CCF, Bin Zhang (张斌), Senior Member, CCF, Ying Liu (刘莹), Jun Na (那俊) and Zhi-Liang Zhu (朱志良), Senior Member, CCF. Web Service Composition Based on QoS Rules [J]. , 2010, 25(6): 1143-1156.
Full text



[1] Lu Xuemiao;. On the Complexity of Induction of Structural Descriptions[J]. , 1987, 2(1): 12 -21 .
[2] Yao Rong; Kang Tai; Chen Tinghuai;. Algorithms for the Determination of Cutsets in a Hypergraph[J]. , 1990, 5(1): 41 -46 .
[3] Peng Chenglian;. Combining Gprof and Event-Driven Monitoring for Analyzing Distributed Programs:A Rough View of NCSA Mosaic[J]. , 1996, 11(4): 427 -432 .
[4] Tan Qingping;. A Higher-Order Unification Algorithm for Inductive Types and Dependent Types[J]. , 1997, 12(3): 231 -243 .
[5] Luo Tiegeng; Chen Huowang; Wang Bingshan; Wang Ji; Gong Zhenghu; Qi Zhichang;. Verifying Automata Specification of Distributed Probabilistic Real-Time Systems[J]. , 1998, 13(6): 588 -596 .
[6] GU Jing; SHUAI Dianxun;. A New Parallel-by-Cell Approach to Undistorted DataCompression Based on Cellular Automatonand Genetic Algorithm[J]. , 1999, 14(6): 572 -579 .
[7] ZHANG Wensong; JIN Shiyao; WU Quanyuan;. LinuxDirector: A Connection Director for Scalable Internet Services[J]. , 2000, 15(6): 560 -571 .
[8] Peter M. Haverty, Zhi-Ping Weng, and Ulla Hansen. Transcriptional Regulatory Networks Activated by PI3K and ERK Transduced Growth Signals in Human Glioblastoma Cells[J]. , 2005, 20(4): 439 -445 .
[9] Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. , 2007, 22(1): 79 -87 .
[10] Jia Li, Li-Yong Shen, and Xiao-Shan Gao. Proper Reparametrization of Rational Ruled Surface[J]. , 2008, 23(2): 290 -297 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved