咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 173 篇 期刊文献

馆藏范围

  • 516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 331 篇 工学
    • 233 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 54 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 32 篇 机械工程
    • 31 篇 电气工程
    • 19 篇 生物工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 冶金工程
  • 134 篇 理学
    • 70 篇 数学
    • 26 篇 系统科学
    • 24 篇 物理学
    • 22 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 化学
  • 68 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 14 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 56 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 15 篇 protocols
  • 14 篇 throughput
  • 13 篇 routing
  • 13 篇 fault tolerance
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 petri nets
  • 12 篇 system-on-a-chip

机构

  • 94 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 26 篇 national enginee...
  • 23 篇 key laboratory o...
  • 19 篇 graduate univers...
  • 18 篇 department of el...
  • 17 篇 key laboratory o...
  • 16 篇 chinese academy ...
  • 13 篇 department of el...
  • 12 篇 guangdong provin...
  • 11 篇 department of co...
  • 11 篇 shenzhen institu...
  • 11 篇 university of ch...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...
  • 10 篇 school of comput...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 25 篇 li xiaowei
  • 21 篇 yu hu
  • 19 篇 shen linlin
  • 18 篇 yinhe han
  • 17 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 13 篇 li huawei
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 hu yu
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 10 篇 jiang changjun
  • 9 篇 hu weiwu
  • 9 篇 yuzhong sun

语言

  • 467 篇 英文
  • 29 篇 中文
  • 20 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
516 条 记 录,以下是501-510 订阅
排序:
Loop fusion conscious inline model
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2007年 第7期44卷 1265-1271页
作者: Zhou, Qian Feng, Xiaobing Zhang, Zhaoqing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China
Optimization directed inlining is a good direction for inlining, but it does not consider the factor of the execution frequency and size of the function. Although a traditional inlining model considers the factor of e... 详细信息
来源: 评论
Physical-annotation-based power modeling and estimation method for processor
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2007年 第11期19卷 1471-1475页
作者: Huang, Kun Zhang, Ge Wang, Jun Zeng, Hongbo Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
The proposed method is focused on synthesis-based static circuits, and a power modeling library is developed for modeling processors by means of parametric RTL and physical annotation, and all kinds of processor modul... 详细信息
来源: 评论
Cache adaptive write allocate policy
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2007年 第2期44卷 348-354页
作者: Huan, Dandan Li, Zusong Hu, Weiwu Liu, Zhiyong Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
The bandwidth becomes the major bottleneck of the performance improvement for modern microprocessors. A cache adaptive write allocate policy that improves the bandwidth of microprocessor significantly is proposed by i... 详细信息
来源: 评论
Innovative architecture-level power estimation methodology for godson processor
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2007年 第5期44卷 782-789页
作者: Huang, Kun Zhang, Longbing Hu, Weiwu Zhang, Ge Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
Now the research of computer architecture focuses on how to utilize the energy of CPU to attain high performance as much as possible. Obviously the architecture-level power estimation tool is important. Existing archi... 详细信息
来源: 评论
Fault tolerant communication algorithm for network on chip
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2007年 第4期19卷 508-514页
作者: Zhang, Lei Li, Huawei Li, Xiaowei Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Beijing 100080 China Advanced Test Technology Laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
This paper proposes a random routing algorithm with end-to-end feedback. Random routing has the capability of handling random transmission errors efficiently with high forwarding speed. End-to-end feedback promises th... 详细信息
来源: 评论
High Performance General-Purpose Microprocessors: Past and Future
收藏 引用
Journal of computer Science & technology 2006年 第5期21卷 631-640页
作者: 胡伟武 侯锐 肖俊华 章隆宾 Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China
It can be observed from looking backward that processor architecture is improved through spirally shifting from simple to complex and from complex to simple. Nowadays we are facing another shifting from complex to sim... 详细信息
来源: 评论
Improved adaptive buffer replacement algorithm used for second level buffer
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2007年 第8期44卷 1331-1338页
作者: Sun, Guozhong Yuan, Qingbo Chen, Mingyu Fan, Jianping National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China Graduate University Chinese Acad. of Sci. Beijing 100049 China Key Laboratory of Computer System and Architecture Chinese Acad. of Sci. Beijing 100080 China Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China
In a cluster or a database server system, the performance of some data intensive applications will be degraded much because of the limited local memory and large amount of interactions with slow disk. In high speed ne... 详细信息
来源: 评论
Locality and parallelism optimization for dynamic programming algorithm in bioinformatics
Locality and parallelism optimization for dynamic programmin...
收藏 引用
2006 ACM/IEEE Conference on Supercomputing, SC'06
作者: Tan, Guangming Feng, Shengzhong Sun, Ninghui Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Graduate School Chinese Academy of Sciences
Dynamic programming has been one of the most efficient approaches to sequence analysis and structure prediction in biology. However, their performance is limited due to the drastic increase in both the number of biolo... 详细信息
来源: 评论
Virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: Zeng, Yu Wang, Jie Sun, Ninghui Li, Jun Nie, Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Under visualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in trad... 详细信息
来源: 评论
A virtual machine-based invasion detection system for the virtual computing environment
收藏 引用
High technology Letters 2006年 第4期12卷 379-384页
作者: 曾宇 Wang Jie Sun Ninghui Li Jun Nie Hua Research and Development Center for National Intelligence Computing System Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 P.R. China
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... 详细信息
来源: 评论