咨询与建议

限定检索结果

文献类型

  • 311 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 402 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 236 篇 工学
    • 162 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 64 篇 电子科学与技术(可...
    • 39 篇 信息与通信工程
    • 25 篇 机械工程
    • 24 篇 控制科学与工程
    • 16 篇 电气工程
    • 12 篇 动力工程及工程热...
    • 12 篇 生物工程
    • 10 篇 仪器科学与技术
    • 8 篇 交通运输工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 4 篇 冶金工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 化学工程与技术
  • 68 篇 理学
    • 32 篇 数学
    • 27 篇 系统科学
    • 14 篇 物理学
    • 11 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 4 篇 化学
  • 37 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 5 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 农学

主题

  • 72 篇 computer archite...
  • 41 篇 laboratories
  • 33 篇 delay
  • 27 篇 circuit faults
  • 26 篇 hardware
  • 23 篇 circuit testing
  • 21 篇 costs
  • 20 篇 bandwidth
  • 20 篇 clocks
  • 20 篇 system testing
  • 18 篇 protocols
  • 17 篇 microprocessors
  • 16 篇 computer network...
  • 15 篇 network-on-a-chi...
  • 14 篇 switches
  • 14 篇 automatic test p...
  • 13 篇 parallel process...
  • 13 篇 fault tolerance
  • 13 篇 system-on-a-chip
  • 12 篇 concurrent compu...

机构

  • 95 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 37 篇 graduate univers...
  • 29 篇 beijing key labo...
  • 29 篇 chinese academy ...
  • 27 篇 institute of com...
  • 21 篇 graduate univers...
  • 16 篇 chinese academy ...
  • 12 篇 key laboratory o...
  • 12 篇 chinese academy ...
  • 11 篇 loongson technol...
  • 10 篇 graduate school ...
  • 10 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 department of co...
  • 8 篇 key laboratory o...
  • 6 篇 school of comput...
  • 6 篇 beijing key labo...
  • 6 篇 key laboratory o...

作者

  • 58 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 yu hu
  • 28 篇 li xiaowei
  • 18 篇 yinhe han
  • 18 篇 chen mingzhe
  • 16 篇 weiwu hu
  • 15 篇 dongrui fan
  • 14 篇 hu yu
  • 13 篇 li huawei
  • 13 篇 hong an
  • 13 篇 sun ninghui
  • 12 篇 han yinhe
  • 12 篇 yin changchuan
  • 11 篇 ninghui sun
  • 11 篇 yang yang
  • 11 篇 ge zhang
  • 10 篇 fan dongrui
  • 10 篇 saad walid
  • 10 篇 李晓维

语言

  • 371 篇 英文
  • 29 篇 中文
  • 2 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture "
402 条 记 录,以下是151-160 订阅
排序:
Design and Implementation of Floating Point Stack on General RISC architecture
Design and Implementation of Floating Point Stack on General...
收藏 引用
Euromicro Conference on Parallel, Distributed and Network-Based Processing
作者: Xuehai Qian He Huang Hao Zhang Guoping Long Junchao Zhang Dongrui Fan Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences China
This paper presents a framework for implementing the X86 FP stack used in an x86-compliant processor based on a general RISC architecture. Architectural supports are added to a typical RISC architecture to maintain th... 详细信息
来源: 评论
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance
DMA cache: Using on-chip storage to architecturally separate...
收藏 引用
IEEE Symposium on High-Performance computer architecture
作者: Dan Tang Yungang Bao Weiwu Hu Mingyu Chen Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences China
As technology advances both in increasing bandwidth and in reducing latency for I/O buses and devices, moving I/O data in/out memory has become critical. In this paper, we have observed the different characteristics o... 详细信息
来源: 评论
Empirical design bugs prediction for verification
Empirical design bugs prediction for verification
收藏 引用
作者: Guo, Qi Chen, Tianshi Shen, Haihua Chen, Yunji Wu, Yue Hu, Weiwu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Beijing 100049 China Loongson Technologies Corporation Limited Beijing 100190 China
Coverage model is the main technique to evaluate the thoroughness of dynamic verification of a Design-under-Verification (DUV). However, rather than achieving a high coverage, the essential purpose of verification is ... 详细信息
来源: 评论
IFill: An Impact-Oriented X-Filling Method for Shift- and Capture-Power Reduction in At-Speed Scan-Based Testing  08
IFill: An Impact-Oriented X-Filling Method for Shift- and Ca...
收藏 引用
2008 Design, Automation and Test in Europe (DATE 2008), vol.3
作者: Jia LI Qiang XU Yu HU Xiaowei LI Key Laboratory of Computer System and Architecture ICT CAS Beijing China and Graduate University of Chinese Academy of Sciences Beijing China The Chinese University of Hong Kong Key Laboratory of Computer System and Architecture ICT CAS Beijing China
In scan-based tests, power consumptions in both shift and capture phases may be significantly higher than that in normal mode, which threatens circuits' reliability during manufacturing test. In this paper, by ana... 详细信息
来源: 评论
Optimizing MPI alltoall communication of large messages in multicore clusters
Optimizing MPI alltoall communication of large messages in m...
收藏 引用
2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2011
作者: Li, Qiang Huo, Zhigang Sun, Ninghui Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing 100190 China Chinese Academy of Sciences Graduate University Beijing 100049 China
MPI Alltoall communication is widely used in many high performance computing (HPC) applications. In Alltoall communication, each process sends a distinct message to all other participating processes. In multicore clus... 详细信息
来源: 评论
Testing content addressable memories using instructions and march-like algorithms
Testing content addressable memories using instructions and ...
收藏 引用
15th IEEE International Conference on Electronics, Circuits and systems, ICECS 2008
作者: Lin, Ma Yunji, Chen Menghao, Su Zichu, Qi Heng, Zhang Weiwu, Hu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704-25 Beijing 100080 China Graduate University Chinese Academy of Science Beijing 100049 China
CAM is widely used in microprocessors and SOC TLB modules. It gives great advantage for software development. And TLB operations become bottleneck of the microprocessor performance. The test cost of normal BIST approa... 详细信息
来源: 评论
DCMTs: Supporting dynamically created migratory threads
DCMTs: Supporting dynamically created migratory threads
收藏 引用
International Conference on Computational Science and Engineering
作者: Zhu, Yueting Zhang, Wu Jiang, Hai Lei, Yu Peng, Junjie Department of Computer Science and Engineering Shanghai University Shanghai China Department of Computer Science Arkansas State University Jonesboro AR United States Department of Computer Science and Engineering University of Texas Arlington TX United States Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences China
Thread migration is an effective technique for fault resilience and load balancing in high performance computing. However, flexible thread migration is not easy to achieve. In this paper, we present an approach to cre... 详细信息
来源: 评论
A differential public PUF design for lightweight authentication  16
A differential public PUF design for lightweight authenticat...
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Duan, Shengyu Sai, Gaole School of Computer Engineering and Science Shanghai University Shanghai200444 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Physical Unclonable Functions (PUFs) have emerged as a promising primitive to provide a hardware keyless security mechanism for integrated circuit applications. Public PUFs (PPUFs) address the crucial PUF vulnerabilit... 详细信息
来源: 评论
MCC: A Load Balancing and Deadlock Free Interconnect Network for Cache Coherent Chip Multiprocessors
MCC: A Load Balancing and Deadlock Free Interconnect Network...
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Liwei Chen Guangfei Zhang Huandong Wang Wenxiang Wang Ling Li Hua Jing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
As the number of cores in chip multiprocessors (CMPs) increases, network-on-chip (NoC) has become a major role in ensuring performance and power scalability. In this paper, we propose multiple-combinational-channel (M... 详细信息
来源: 评论
Low Power Techniques on a High Speed Floating-point Adder Design
Low Power Techniques on a High Speed Floating-point Adder De...
收藏 引用
IEEE International Conference on Integration Technology (ICIT)
作者: Ge Zhang Kun Huang Haihua Shen Feng Zhang Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy and Sciences Beijing China
A 64 bit low power, high speed floating-point adder design is presented in this paper. The proposed floating-point adder is based on dual path architecture, and both dynamic and leakage power are reduced by exploiting... 详细信息
来源: 评论