Advanced Search

    column
    Summary of Research for Erasure Code in Storage System
    Luo Xianghong and Shu Jiwu
    2012, 49(1): 1-11.
    Abstract PDF
    Research and Development on Key Techniques of Data Deduplication
    Fu Yinjin, Xiao Nong, and Liu Fang
    2012, 49(1): 12-20.
    Abstract PDF
    Survey of Design-for-Debug of VLSI
    Qian Cheng, Shen Haihua, Chen Tianshi, Chen Yunji
    2012, 49(1): 21-34.
    Abstract PDF
    Accelerating Program Behavior Analysis with Dynamic Binary Translation
    Zhao Tianlei, Tang Yuxing, Fu Guitao, Jia Xiaomin, Qi Shubo, and Zhang Minxuan
    2012, 49(1): 35-43.
    Abstract PDF
    A Best-Effort Hardware Transactional Memory Based on Dependency Graph
    Zeng Kun and Yang Xuejun
    2012, 49(1): 44-54.
    Abstract PDF
    A 2D-Cache Based Memory Bandwidth Optimization Method for H.264 Motion Compensation
    Wang Wenxiang, Zhang Guangfei, Shen Haihua
    2012, 49(1): 55-63.
    Abstract PDF
    High Efficient Memory Race Recording Scheme for Parallel Program Deterministic Replay Under Multi-Core Architecture
    Liu Lei, Huang He, Tang Zhimin
    2012, 49(1): 64-75.
    Abstract PDF
    InfiniBand-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems
    Xia Xiaoshuang, Liu Yi, Wang Yunbin, Qian Depei
    2012, 49(1): 76-82.
    Abstract PDF
    Revisiting Amdahl’s Law in the Hierarchical Chip Multicore Processors
    Chen Shuming, Chen Shenggang, and Yin Yaming
    2012, 49(1): 83-92.
    Abstract PDF
    Program’s Performance Profiling Optimization for Guiding Static Cache Partitioning
    Jia Yaocang, Wu Chenggang, Zhang Zhaoqing
    2012, 49(1): 93-102.
    Abstract PDF
    A New Analysis Model for Task Buffer of Pipeline Simulator Based on Queueing Network
    Qiu Tie, Guo He, Feng Lin, Si Weisheng, Liu Xiaoyan
    2012, 49(1): 103-110.
    Abstract PDF
    An Alternating-Complementary Self-Recovering Method Based on Dual FSMs
    Chen Xiumei, Liang Huaguo, Huang Zhengfeng, Wu Zhenni, Cao Yuan
    2012, 49(1): 111-117.
    Abstract PDF
    A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines
    Wang Kai, Hou Zifeng
    2012, 49(1): 118-127.
    Abstract PDF
    Inheritance, Subversion and Transcendence—Computational Photography
    Xu Shukui, Zhang Jun, Tu Dan, and Li Guohui
    2012, 49(1): 128-143.
    Abstract PDF
    Global Topology Based Image Stitching Using Hierarchical Triangulation
    Zeng Dan, Chen Jian, Zhang Qi, and Shi Hao
    2012, 49(1): 144-151.
    Abstract PDF
    Cubic Bézier Triangular Patch with Shape Parameters
    Liu Zhi, Tan Jieqing, Chen Xiaoyan
    2012, 49(1): 152-157.
    Abstract PDF
    Audio Authentication Based on Music Content Analysis
    Wang Zhurong, Li Wei, Zhu Bilei, Li Xiaoqiang
    2012, 49(1): 158-166.
    Abstract PDF
    A Computation Method of Path Diversity Based on AS Relationships
    Zhang Weiguo, Yin Xia, and Wu Jianping
    2012, 49(1): 167-173.
    Abstract PDF
    An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment
    Cheng Yanhong, Li Zhishu, and Chen Liangyin
    2012, 49(1): 174-182.
    Abstract PDF
    A NoC Router with Dynamically Allocated Virtual-Output-Queueing
    Zhu Honglei, Peng Yuanxi, Yin Yaming, and Chen Shenggang
    2012, 49(1): 183-192.
    Abstract PDF
    Lifetime Optimizing Scheme of WSN
    Sun Dayang, Liu Yanheng, Yang Dong, Wang Aimin
    2012, 49(1): 193-201.
    Abstract PDF
    An Unsupervised Rough Cognition Algorithm for Salient Object Extraction
    Li Zhongsheng, Li Renfa, Cai Zesu
    2012, 49(1): 202-209.
    Abstract PDF
    A Data Sealing Approach Based on Integrity Measurement Architecture
    Shen Qingni, Du Hong, Wen Han, Qing Sihan
    2012, 49(1): 210-216.
    Abstract PDF