[1] |
Wang Qinglin, Li Dongsheng, Mei Songzhu, Lai Zhiquan, Dou Yong.
Optimizing Winograd-Based Fast Convolution Algorithm on Phytium Multi-Core CPUs
[J]. Journal of Computer Research and Development, 2020, 57(6): 1140-1151.
|
[2] |
Zhang Xiao, Zhi Tian.
Machine Learning Inference Framework on Multi-Core Processor
[J]. Journal of Computer Research and Development, 2019, 56(9): 1977-1987.
|
[3] |
Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng.
Optimization of Library Function Disposing in Dynamic Binary Translation
[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791.
|
[4] |
Zhou Weiwei, Yu Bin.
A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things
[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408.
|
[5] |
Zhang Chun, Zhou Jing.
Optimization Algorithm of Association Rule Mining for EMU Operation and Maintenance Efficiency
[J]. Journal of Computer Research and Development, 2017, 54(9): 1958-1965.
|
[6] |
Chen Jicheng, Li Yihan, Zhao Yaqian, Wang Endong, Shi Hongzhi, Tang Shibin.
A Shared-Forwarding State Based Multiple-Tier Cache Coherency Protocol
[J]. Journal of Computer Research and Development, 2017, 54(4): 764-774.
|
[7] |
Wang Bohong, Liu Yi, Zhang Guozhen, Qian Depei.
Debugging Multi-Core Parallel Programs by Gradually Refined Snapshot Sequences
[J]. Journal of Computer Research and Development, 2017, 54(4): 821-831.
|
[8] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[9] |
Huang Xiaohui, Li Dong, Shi Hailong, Cui Li.
EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home
[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720.
|
[10] |
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming.
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254.
|
[11] |
Zhu Suxia, Chen Deyun, Ji Zhenzhou, Sun Guanglu, Zhang Hao.
A Concurrent Memory Race Recording Algorithm for Snoop-Based Coherence
[J]. Journal of Computer Research and Development, 2016, 53(6): 1238-1248.
|
[12] |
WuTao,JinJianguo,WeiMingjun.
A Hash Function Algorithm Based on Variable Parameter Cascade Chaos
[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681.
|
[13] |
Yang Xiaoyan, Hou Mengbo, Wei Xiaochao.
Verifier-Based Three-Party Password Authenticated Key Exchange Protocol
[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238.
|
[14] |
Wang Endong, Tang Shibin, Chen Jicheng, Wang Hongwei, Ni Fan, Zhao Yaqian.
Directory Cache Design for Multi-Core Processor
[J]. Journal of Computer Research and Development, 2015, 52(6): 1242-1253.
|
[15] |
Gao Shujing, Qu Yingjie, Song Tingqiang.
Pseudorandom Number Generators Based on One-Way Functions
[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399.
|