计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 1
Published: 15 January 2012

   
 
       Paper
1 Summary of Research for Erasure Code in Storage System
Luo Xianghong and Shu Jiwu
2012 Vol. 49 (1): 1-11 [Abstract] ( 755 ) HTML (1 KB)  PDF (3434 KB)  ( 1251 )
12 Research and Development on Key Techniques of Data Deduplication
Fu Yinjin, Xiao Nong, and Liu Fang
2012 Vol. 49 (1): 12-20 [Abstract] ( 458 ) HTML (1 KB)  PDF (1133 KB)  ( 686 )
21 Survey of Design-for-Debug of VLSI
Qian Cheng, Shen Haihua, Chen Tianshi, and Chen Yunji,
2012 Vol. 49 (1): 21-34 [Abstract] ( 516 ) HTML (1 KB)  PDF (1580 KB)  ( 582 )
35 Accelerating Program Behavior Analysis with Dynamic Binary Translation
Zhao Tianlei, Tang Yuxing, Fu Guitao, Jia Xiaomin, Qi Shubo, and Zhang Minxuan
2012 Vol. 49 (1): 35-43 [Abstract] ( 412 ) HTML (1 KB)  PDF (2370 KB)  ( 374 )
44 A Best-Effort Hardware Transactional Memory Based on Dependency Graph
Zeng Kun and Yang Xuejun
2012 Vol. 49 (1): 44-54 [Abstract] ( 264 ) HTML (1 KB)  PDF (1783 KB)  ( 419 )
55 A 2D-Cache Based Memory Bandwidth Optimization Method for H.264 Motion Compensation
Wang Wenxiang, Zhang Guangfei, and Shen Haihua,
2012 Vol. 49 (1): 55-63 [Abstract] ( 480 ) HTML (1 KB)  PDF (2880 KB)  ( 417 )
64 High Efficient Memory Race Recording Scheme for Parallel Program Deterministic Replay Under Multi-Core Architecture
Liu Lei, Huang He, and Tang Zhimin
2012 Vol. 49 (1): 64-75 [Abstract] ( 410 ) HTML (1 KB)  PDF (4293 KB)  ( 594 )
76 InfiniBand-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems
Xia Xiaoshuang, Liu Yi, Wang Yunbin, and Qian Depei,
2012 Vol. 49 (1): 76-82 [Abstract] ( 599 ) HTML (1 KB)  PDF (2087 KB)  ( 342 )
83 Revisiting Amdahl’s Law in the Hierarchical Chip Multicore Processors
Chen Shuming, Chen Shenggang, and Yin Yaming
2012 Vol. 49 (1): 83-92 [Abstract] ( 376 ) HTML (1 KB)  PDF (2679 KB)  ( 331 )
93 Program’s Performance Profiling Optimization for Guiding Static Cache Partitioning
Jia Yaocang, Wu Chenggang, and Zhang Zhaoqing
2012 Vol. 49 (1): 93-102 [Abstract] ( 388 ) HTML (1 KB)  PDF (2793 KB)  ( 377 )
103 A New Analysis Model for Task Buffer of Pipeline Simulator Based on Queueing Network
Qiu Tie, Guo He, Feng Lin, Si Weisheng, and Liu Xiaoyan
2012 Vol. 49 (1): 103-110 [Abstract] ( 435 ) HTML (1 KB)  PDF (2132 KB)  ( 538 )
111 An Alternating-Complementary Self-Recovering Method Based on Dual FSMs
Chen Xiumei, Liang Huaguo, Huang Zhengfeng, Wu Zhenni, and Cao Yuan
2012 Vol. 49 (1): 111-117 [Abstract] ( 416 ) HTML (1 KB)  PDF (1554 KB)  ( 423 )
118 A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines
Wang Kai, and Hou Zifeng,
2012 Vol. 49 (1): 118-127 [Abstract] ( 494 ) HTML (1 KB)  PDF (1907 KB)  ( 505 )
128 Inheritance, Subversion and Transcendence—Computational Photography
Xu Shukui, Zhang Jun, Tu Dan, and Li Guohui
2012 Vol. 49 (1): 128-143 [Abstract] ( 440 ) HTML (1 KB)  PDF (10742 KB)  ( 358 )
144 Global Topology Based Image Stitching Using Hierarchical Triangulation
Zeng Dan, Chen Jian, Zhang Qi, and Shi Hao
2012 Vol. 49 (1): 144-151 [Abstract] ( 412 ) HTML (1 KB)  PDF (3488 KB)  ( 330 )
152 Cubic Bézier Triangular Patch with Shape Parameters
Liu Zhi, Tan Jieqing, and Chen Xiaoyan
2012 Vol. 49 (1): 152-157 [Abstract] ( 385 ) HTML (1 KB)  PDF (1062 KB)  ( 452 )
158 Audio Authentication Based on Music Content Analysis
Wang Zhurong, Li Wei, Zhu Bilei, and Li Xiaoqiang
2012 Vol. 49 (1): 158-166 [Abstract] ( 414 ) HTML (1 KB)  PDF (2496 KB)  ( 399 )
167 A Computation Method of Path Diversity Based on AS Relationships
Zhang Weiguo, Yin Xia, and Wu Jianping
2012 Vol. 49 (1): 167-173 [Abstract] ( 228 ) HTML (1 KB)  PDF (1265 KB)  ( 652 )
174 An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment
Cheng Yanhong, Li Zhishu, and Chen Liangyin
2012 Vol. 49 (1): 174-182 [Abstract] ( 286 ) HTML (1 KB)  PDF (1937 KB)  ( 404 )
183 A NoC Router with Dynamically Allocated Virtual-Output-Queueing
Zhu Honglei, Peng Yuanxi, Yin Yaming, and Chen Shenggang
2012 Vol. 49 (1): 183-192 [Abstract] ( 339 ) HTML (1 KB)  PDF (3611 KB)  ( 442 )
193 Lifetime Optimizing Scheme of WSN
Sun Dayang, Liu Yanheng, Yang Dong, and Wang Aimin,
2012 Vol. 49 (1): 193-201 [Abstract] ( 273 ) HTML (1 KB)  PDF (1877 KB)  ( 496 )
202 An Unsupervised Rough Cognition Algorithm for Salient Object Extraction
Li Zhongsheng, Li Renfa, and Cai Zesu
2012 Vol. 49 (1): 202-209 [Abstract] ( 336 ) HTML (1 KB)  PDF (2956 KB)  ( 377 )
210 A Data Sealing Approach Based on Integrity Measurement Architecture
Shen Qingni, Du Hong, Wen Han, and Qing Sihan,
2012 Vol. 49 (1): 210-216 [Abstract] ( 431 ) HTML (1 KB)  PDF (1142 KB)  ( 560 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech