[1] |
Xing Baoping, Lü Mengyuan, Jin Peiquan, Huang Guorui, Yue Lihua.
Energy-Efficiency Query Optimization for Green Datacenters
[J]. Journal of Computer Research and Development, 2019, 56(9): 1821-1831.
|
[2] |
Wang Jiye, Zhou Biyu, Zhang Fa, Shi Xiang, Zeng Nan, Liu Zhiyong.
Data Center Energy Consumption Models and Energy Efficient Algorithms
[J]. Journal of Computer Research and Development, 2019, 56(8): 1587-1603.
|
[3] |
Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng.
Optimization of Library Function Disposing in Dynamic Binary Translation
[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791.
|
[4] |
Wang Jun, Pang Jianmin, Fu Liguo, Yue Feng, Shan Zheng, Zhang Jiahao.
A Dynamic and Static Combined Register Mapping Method in Binary Translation
[J]. Journal of Computer Research and Development, 2019, 56(4): 708-718.
|
[5] |
Wang Jun, Pang Jianmin, Fu Liguo, Yue Feng, Zhang Jiahao.
An Efficient Feedback Static Binary Translator for Solving Indirect Branch
[J]. Journal of Computer Research and Development, 2019, 56(4): 742-754.
|
[6] |
Lu Shuaibing, Zhang Ming, Lin Zhechao, Li Hu, Kuang Xiaohui, Zhao Gang.
Dynamic Binary Translation and Instrumentation Based Function Call Tracing
[J]. Journal of Computer Research and Development, 2019, 56(2): 421-430.
|
[7] |
Ou Yan, Feng Yujing, Li Wenming, Ye Xiaochun, Wang Da, Fan Dongrui.
Optimum Research on Inner-Inst Memory Access Conflict for Dataflow Architecture
[J]. Journal of Computer Research and Development, 2019, 56(12): 2720-2732.
|
[8] |
Xu Shaoping, Liu Tingyun, Luo Jie, Zhang Guizhen, Tang Yiling.
An Image Quality-Aware Fast Blind Denoising Algorithm for Mixed Noise
[J]. Journal of Computer Research and Development, 2019, 56(11): 2458-2468.
|
[9] |
Xu Zhiwei, Zhang Yujun.
Efficient Detection of False Data Fusion in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1488-1497.
|
[10] |
Xu Shaoping, Zeng Xiaoxia, Tang Yiling, Jiang Shunliang.
A Noise Level Estimation Algorithm Using Prior Knowledge of Similar Images
[J]. Journal of Computer Research and Development, 2018, 55(12): 2741-2752.
|
[11] |
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke.
Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268.
|
[12] |
Tan Jie, Pang Jianmin, Shan Zheng, Yue Feng, Lu Shuaibing, Dai Tao.
Redundant Instruction Optimization Algorithm in Binary Translation
[J]. Journal of Computer Research and Development, 2017, 54(9): 1931-1944.
|
[13] |
Li Yinglong, Zhu Yihua, Lü Mingqi.
Semantic Event Region Query Processing in Sensor Networks
[J]. Journal of Computer Research and Development, 2017, 54(5): 986-997.
|
[14] |
Bian Chen, Yu Jiong, Xiu Weirong, Qian Yurong, Ying Changtian, Liao Bin.
Partial Data Shuffled First Strategy for In-Memory Computing Framework
[J]. Journal of Computer Research and Development, 2017, 54(4): 787-803.
|
[15] |
Zhang Kun, Guo Feng, Zheng Fang, Xie Xianghui.
Design of a Pipeline-Coupled Instruction Loop Cache for Many-Core Processors
[J]. Journal of Computer Research and Development, 2017, 54(4): 813-820.
|