[1] |
Xie Zhen, Tan Guangming, Sun Ninghui.
Research on Optimal Performance of Sparse Matrix-Vector Multiplication and Convoulution Using the Probability-Process-Ram Model
[J]. Journal of Computer Research and Development, 2021, 58(3): 445-457.
|
[2] |
Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin.
Energy-Efficient Strategy Based on Data Recovery in Storm
[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496.
|
[3] |
Lai Qingkuan, Lü Fang, He Chunlin, He Xianbo, Feng Xiaobing.
An Ideal Performance Oriented Approach for Cross-Framework Compiler Analysis
[J]. Journal of Computer Research and Development, 2021, 58(3): 668-680.
|
[4] |
Zhu Hongrui, Yuan Guojun, Yao Chengji, Tan Guangming, Wang Zhan, Hu Zhongzhe, Zhang Xiaoyang, An Xuejun.
Survey on Network of Distributed Deep Learning Training
[J]. Journal of Computer Research and Development, 2021, 58(1): 98-115.
|
[5] |
Yang Fan, Zhang Peng, Wang Zhan, Yuan Guojun, An Xuejun.
Accelerating Byzantine Fault Tolerance with In-Network Computing
[J]. Journal of Computer Research and Development, 2021, 58(1): 164-177.
|
[6] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[7] |
Li Mengying, Wang Xiaodong, Ruan Shulan, Zhang Kun, Liu Qi.
Student Performance Prediction Model Based on Two-Way Attention Mechanism
[J]. Journal of Computer Research and Development, 2020, 57(8): 1729-1740.
|
[8] |
Zhang Jun, Xie Jingcheng, Shen Fanfan, Tan Hai, Wang Lümeng, He Yanxiang.
Performance Optimization of Cache Subsystem in General Purpose Graphics Processing Units: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(6): 1191-1207.
|
[9] |
Yang Fan, Li Fei, Shu Jiwu.
Survey on Secure Persistent Memory Storage
[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927.
|
[10] |
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui.
Survey on Biometrics Template Protection
[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021.
|
[11] |
Qu Leilei, Xiao Ruojin, Shi Wenchang, Liang Bin, Qin Bo.
Cybersecurity Challenges from the Perspective of Emergence
[J]. Journal of Computer Research and Development, 2020, 57(4): 803-823.
|
[12] |
Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang.
Cyber Security Threat Intelligence Sharing Model Based on Blockchain
[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846.
|
[13] |
Wang Yan, Li Nianshuang, Wang Xiling, Zhong Fengyan.
Coding-Based Performance Improvement of Distributed Machine Learning in Large-Scale Clusters
[J]. Journal of Computer Research and Development, 2020, 57(3): 542-561.
|
[14] |
Shen Jie, Long Biao, Jiang Hao, Huang Chun.
Implementation and Optimization of Vector Trigonometric Functions on Phytium Processors
[J]. Journal of Computer Research and Development, 2020, 57(12): 2610-2620.
|
[15] |
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli.
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327.
|