咨询与建议

限定检索结果

文献类型

  • 19 篇 期刊文献
  • 15 篇 会议
  • 7 册 图书

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 15 篇 电气工程
    • 15 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 测绘科学与技术
  • 12 篇 理学
    • 6 篇 物理学
    • 2 篇 数学
    • 2 篇 地球物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 41 篇 data pattern
  • 5 篇 test
  • 5 篇 error
  • 5 篇 pdp11
  • 5 篇 data
  • 3 篇 200dpi
  • 3 篇 fiche
  • 3 篇 jsr
  • 3 篇 trap
  • 3 篇 mov
  • 3 篇 mov mov
  • 3 篇 tst
  • 2 篇 global
  • 2 篇 macro
  • 2 篇 error number
  • 2 篇 clustering
  • 2 篇 cylinder
  • 2 篇 flying height
  • 2 篇 crossbar array
  • 2 篇 channel loss

机构

  • 2 篇 univ bristol art...
  • 2 篇 univ pittsburgh ...
  • 2 篇 univ bristol com...
  • 1 篇 natl innovat ins...
  • 1 篇 univ oslo dept i...
  • 1 篇 univ pittsburgh ...
  • 1 篇 macronix int co ...
  • 1 篇 univ western syd...
  • 1 篇 csiro data61 nsw...
  • 1 篇 korea adv inst s...
  • 1 篇 chinese acad sci...
  • 1 篇 robert bosch gmb...
  • 1 篇 natl chiao tung ...
  • 1 篇 natl univ def te...
  • 1 篇 jilin univ coll ...
  • 1 篇 beijing natl res...
  • 1 篇 baidu secur peop...
  • 1 篇 *professor quant...
  • 1 篇 indian inst engn...
  • 1 篇 chinese acad sci...

作者

  • 2 篇 yang jun
  • 2 篇 oikonomou george
  • 2 篇 zhang youtao
  • 2 篇 wen wen
  • 2 篇 martin trevor
  • 2 篇 zhao lei
  • 2 篇 kim lee-sup
  • 2 篇 joo hye-yoon
  • 2 篇 lee myoung jin
  • 2 篇 zakrzewski rober...
  • 1 篇 zheng zhisheng
  • 1 篇 moh sangman
  • 1 篇 edstrom jonathon
  • 1 篇 sung-chang lee
  • 1 篇 gu dawu
  • 1 篇 chung ilyong
  • 1 篇 he wei
  • 1 篇 xia wentao
  • 1 篇 xiang yang
  • 1 篇 xu hui

语言

  • 40 篇 英文
  • 1 篇 其他
检索条件"主题词=Data Pattern"
41 条 记 录,以下是11-20 订阅
排序:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 5167-5181页
作者: Zhang, Zhi He, Wei Cheng, Yueqiang Wang, Wenhao Gao, Yansong Wang, Minghua Li, Kang Nepal, Surya Xiang, Yang CSIRO Data61 Sydney NSW 2122 Australia Chinese Acad Sci Inst Informat Engn SKLOIS Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China NIO Shanghai 215332 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing 210094 Peoples R China Ant Grp Hangzhou 100020 Peoples R China Baidu Secur Beijing 100085 Peoples R China Swinburne Univ Technol Sch Software & Elect Engn Melbourne Vic 3122 Australia
Rowhammer is a destructive software-induced DRAM fault, which an attacker can leverage to break system security. Both individual customers and enterprise users (e.g., cloud providers) might refrain from using a comput... 详细信息
来源: 评论
PCSG: pattern-Coverage Snippet Generation for RDF datasets  20th
PCSG: Pattern-Coverage Snippet Generation for RDF Datasets
收藏 引用
20th International Semantic Web Conference (ISWC)
作者: Wang, Xiaxia Cheng, Gong Lin, Tengteng Xu, Jing Pan, Jeff Z. Kharlamov, Evgeny Qu, Yuzhong Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China Univ Edinburgh Sch Informat Edinburgh Midlothian Scotland Robert Bosch GmbH Bosch Ctr Artificial Intelligence Gerlingen Germany Univ Oslo Dept Informat Oslo Norway
For reusing an RDF dataset, understanding its content is a prerequisite. To support the comprehension of its large and complex structure, existing methods mainly generate an abridged version of an RDF dataset by extra... 详细信息
来源: 评论
Anomaly detection of data and topology patterns in WSNs  17
Anomaly detection of data and topology patterns in WSNs
收藏 引用
17th Annual IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS)
作者: Zakrzewski, Robert Martin, Trevor Oikonomou, George Univ Bristol Commun Syst & Networks Bristol Avon England Univ Bristol Artificial Intelligence Grp Bristol Avon England
Wireless sensor networks are often distributed which makes detection of cyber-attacks or misconfiguration hard. Topology and data patterns change may result from attacks leading to the compromise of data and service a... 详细信息
来源: 评论
CDS-RSRAM: a Reconfigurable SRAM Architecture to Reduce Read Power with Column data Segmentation  21
CDS-RSRAM: a Reconfigurable SRAM Architecture to Reduce Read...
收藏 引用
21st International Symposium on Quality Electronic Design (ISQED)
作者: Xu, Han Li, Ziru Qiao, Fei Wei, Qi Liu, Xinjun Yang, Huazhong Tsinghua Univ Beijing Peoples R China Beijing Natl Res Ctr Informat Sci & Technol Beijing Peoples R China
SRAM access takes a significant part of onchip power consumption in many signal processing systems. Reconfigurable data-adaptive SRAMs (RSRAM) can save considerable read power by utilizing data patterns. In these RSRA... 详细信息
来源: 评论
data Mining pattern Valuation in Apparel Industry E-commerce Cloud
Data Mining Pattern Valuation in Apparel Industry E-commerce...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Mingli Wu Hui Zhang Yebai Li College of Information Engineering North China University of Technology
For B2B(Business to Business) E-commerce systems in cloud environment,we propose a model for mining patterns in multi-databases in this *** gets the global pattern by analyzing local patterns globally,and then gets ... 详细信息
来源: 评论
Speeding Up Crossbar Resistive Memory by Exploiting In-memory data patterns  17
Speeding Up Crossbar Resistive Memory by Exploiting In-memor...
收藏 引用
IEEE/ACM 36th International Conference on Computer-Aided Design (ICCAD)
作者: Wen, Wen Zhao, Lei Zhang, Youtao Yang, Jun Univ Pittsburgh Dept Elect & Comp Engn Pittsburgh PA 15260 USA Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA
Resistive Memory (ReRAM) has emerged as a promising non-volatile memory technology that may replace a significant portion of DRAM in future computer systems. ReRAM has many advantages such as high density, low standby... 详细信息
来源: 评论
A Space-Filling Multidimensional Visualization (SFMDVis) for Exploratory data Analysis
收藏 引用
INFORMATION SCIENCES 2017年 390卷 32-53页
作者: Huang, Tze-Haw Huang, Mao Lin Quang Vinh Nguyen Zhao, Laiping Huang, Weidong Chen, Jinjun Univ Technol Sydney Sch Software FEIT POB 123 Broadway NSW 2007 Australia Univ Western Sydney Locked Bag 1797 South Penrith Dc NSW 1797 Australia Tianjin Univ Sch Comp Software China 92 Weijin Rd Tianjin Peoples R China Univ Tasmania Sch Engn & ICT Newnham Tas 7248 Australia
The space-filling visualization model was first invented by Ben Shneiderman [28] for maximizing the utilization of display space in relational data (or graph) visualization, especially for tree visualization. It uses ... 详细信息
来源: 评论
Quasi-Analytical Model of 3-D Vertical-RRAM Array Architecture for MB-Level Design
收藏 引用
IEEE TRANSACTIONS ON ELECTRON DEVICES 2017年 第4期64卷 1568-1574页
作者: Li, Zhiwei Chen, Pai-Yu Liu, Haijun Li, Qingjiang Xu, Hui Yu, Shimeng Natl Univ Def Technol Coll Elect Sci & Engn Changsha 410073 Hunan Peoples R China Arizona State Univ Sch Elect Comp & Energy Engn Tempe AZ 85287 USA
This paper addresses the design challenges of simulating the 3-D vertical-resistive random access memory (V-RRAM) toward MB-level. The interconnect IR drop and sneak paths are known to be the limiting factors for buil... 详细信息
来源: 评论
Creation of data pattern for High Accuracy Flying Height Measurement
Creation of Data Pattern for High Accuracy Flying Height Mea...
收藏 引用
9th Perpendicular Magnetic Recording Conference (PMRC)
作者: Tang, Yawshing Lee, Sung-Chang Suk, Mike Samsung Informat Syst Amer San Jose CA 95134 USA
A common technique for measuring flying height is using the ratio of the 1(st) and the 3(rd) harmonic of a periodic data pattern. Since the 3(rd) harmonic is typically smaller than the 1(st), and the recording channel... 详细信息
来源: 评论
Dec :: Pdp11 :: Xxdp :: Fiche 200Dpi :: 0062 Cndmaa0 Dmv11Uctl
收藏 引用
2016年
Dec :: Pdp11 :: Xxdp :: Fiche 200Dpi :: 0062 Cndmaa0 Dmv11Uctl by published by
来源: 评论