188体育app官网_188体育投注

返回首页

《中国计算机学会通讯》2012年第2期出版

阅读量:15
2012-02-14

2012年1月7日,2011 CCF颁奖大会在北京隆重举行。会上颁发了CCF终身成就奖CCF青年科学奖CCF优秀博士学位论文奖以及CCF杰出贡献奖、C卓越服务奖、优秀工作委员会奖和CCF会员发展优秀单位和个人奖。同时,还举行了CCF第十届理事会理事长就职仪式。

本期的专题是“嵌入式系统软件前沿”。嵌入式系统的早期定义是指对仪器、机器和工厂运作进行监控的设备,通常表现为针对特定应用的计算机系统。经过发展,现在嵌入式系统有了与互联、融合、云计算等相结合的特点,嵌入式软件的比重也越来越大。本期专题文章,从五个不同方面阐述了嵌入式系统,包括软硬件协同设计、嵌入式软件测试、验证和调试、可高信系统。

特别报道

中国计算机学会举行2011颁奖大会
  CCF第十届理事长就职仪式
  李国杰理事长在颁奖大会上的讲话
  郑纬民发表理事长就职演说
  CCF颁发2011终身成就奖
  CCF颁发2011青年科学家奖
  CCF颁发2011优秀博士学位论文奖
  2011 CCF杰出贡献奖
  2011 CCF卓越服务奖
  2011 CCF优秀工作委员会奖
  2011 CCF会员发展优秀单位及个人

专 题

嵌入式系统软件前沿  特邀编辑:吴甘沙 王 涛
  片上系统芯片的软硬件协同设计  邓仰东
  嵌入式软件自动分析和验证技术  刘 剑 马 越 易秋萍
  嵌入式系统软件测试  张成志 谢 涛 曹东刚 张 路
  嵌入式系统调试浅谈  张银奎
  安全关键系统的嵌入式软件  李 允 罗 蕾

专 栏

背后的背后  潘柱廷
  社会计算还是社会化计算  王飞跃
  文件系统的发展脉络  熊 劲 潘锋烽 刘凯捷 张子刚等

动 态

人物专访:英特尔中国研究院院长方之熙  孟小峰 丁治明
  ACM 地理信息系统国际会议  郑 宇
  IEEE“今日计算”技术热点  黄铁军

译 文

研究型大学里的教学型教师  史蒂夫·沃夫曼(Steve Wolfman)等(译者:王 新)

Special Report

2011 CCF Awarding Ceremony
  The 10th CCF President’s Inauguration Ceremony
  The 9th CCF President’ Speech at 2011 CCF Awarding Ceremony
  The 10th CCF President’ Speech at the Inauguration Ceremony
  2011 CCF Lifetime Achievement Award Recipients
  2011 CCF Young Scientist Award Recipients
  2011 CCF Outstanding Doctoral Dissertation Award Recipients
  2011 Outstanding Contribution to CCF Award Recipients
  2011 CCF Distinguished Service Award Recipients
  2011 CCF Excellent Working Committee Award Recipient
  2011 CCF Top 10 Organizations and Top 10 Individuals in Developing the Members

Features
The Frontiers of Embedded System Software
Guest Editors: Wu Gansha and Wang Tao
Hardware/Software Co-Design for System-on-Chips
Deng Yangdong
The development of System-on-Chips (SoCs) involves both hardware and software design. After reviewing the major challenges, Prof. Deng from Tsinghua University introduces major SoC design solutions. To shorten the turn-around time of design, the hardware and software of a SoC must be developed in parallel. Virtual platform based SoC
design methodology is proposed. He also reviews the high level synthesis technologies.
Automatic Analysis and Verification of Embedded Software
Liu Jian, Ma Yue and Yi Qiuping
How to maintain the high-assurance and security of software is the challenge for embedded systems. Prof. Liu et al. from the Institute of Software, CAS give their survey on the research of automatic analysis and verification of embedded software, summarize the techniques on this area, and propose the main challenges. They also show their
research work on verification and testing of real system including Android and embedded Linux.
Testing Embedded System Software
Zhang Chengzhi, Xie Tao, Cao Donggang and Zhang Lu
Quality assurance for embedded system software is an important and challenging task. Software testing remains as one of the most commonly used approaches for this task. Prof. Zhang from Hong Kong University of Science and Technology, Dr. Xie from the North Carolina State University, Dr. Cao and Prof. Zhang from Peking University give an overview
of technical issues in testing embedded system software (focusing on test coverage criteria and test oracles), through concrete examples of testing wireless senor network software.
Debugging for Embedded Systems
Zhang Yinkui
Debug is not just to remove bugs. Dr. Zhang from Intel Asia-Pacific R&D Center summarizes three kinds of debugging methods for embedded systems, Contents Communications of the CCF Vol.8 No.2 2012/2 including power-on and low-level hardware/firmware debugging, kernel-mode debuggers for OS boot loader and kernel modules, and user-mode debugger for Java/Android applications. He concludes with the concept of “Design for Debug”.
High-Dependable Technology of Embedded Software for Safety-Critical Systems
Li Yun and Luo Lei
With the rapid development of Safety-Critical Systems, the related dependable technology receives more and more attention. Dr. Li et al. from the University of Electronic Science and Technology of China present some dependable technologies, including the architecture, model-driven architecture, qualification based on standards and integration of tools. These technologies are systematic, which are helpful to build a high-dependable safety-critical system.

Columns
Internet Governance and Ecosystem
Pan Zhuting
As the chair of CCF YOCSEF forum titled Password Database Exposure on CSDN.net, Dr. Pan, the CSO of the Beijing Venustech, summarizes the major viewpoints of invited speakers on the relevant issues.
Social Computing or Socialized Computing?
Wang Feiyue
Prof. Wang from the Institute of Automation, CAS makes a discussion on direction and origin of social computing. He presents that social computing should not be considered as or pushed into a means of socialized computing and makes an investigation on the origin of terms “social computing” and“computational social studies” or “computational
sociology”. The relationship and history between social computing and computational thinking are also addressed.
The Development of File System
Xiong Jin, Pan Feng, Liu Kaijie, Zhang Zigang, Ma Jiuyue, Jiang Ji and Sun Ninghui
File system is always an indispensable component for computing systems. Dr. Xiong et al. from the Institute of Computing Technology, CAS review the evolution of existing file systems from the perspective of the technological background and the changes of I/O requirements, and make a prediction on the potential technological innovations of
file systems for data centers. They also summarize their research work in this area in the past 20 years.

Advances
Profiles Dr. Jesse Fang -- the President of Intel Labs China
Meng Xiaofeng and Ding Zhiming
2011 ACM SIGSPATIAL Conference on Advances in Geographic Information Systems
Zheng Yu
Review of the Hot Topics of Computing Now
Huang Tiejun

Translations
Teaching-Oriented Faculty at Research Universities
Steve Wolfman, Owen Astrachan, Mike Clancy,
Kurt Eiselt, Jeffrey Forbes, Diana Franklin, David
Kay, Mike Scott, and Kevin Wayne.
(translated
by Wang Xin)
Developing a well-rounded university through specialization.

读完这篇文章后,您心情如何?