• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Zhiwei, Li Peixu, and Zha Li. Four Challenges in Transformative Research of Computer Systems[J]. Journal of Computer Research and Development, 2008, 45(12): 2011-2019.
Citation: Xu Zhiwei, Li Peixu, and Zha Li. Four Challenges in Transformative Research of Computer Systems[J]. Journal of Computer Research and Development, 2008, 45(12): 2011-2019.

Four Challenges in Transformative Research of Computer Systems

More Information
  • Published Date: December 14, 2008
  • As we enter the 21st century, a profound transformation is emerging in the field of computer science and technology, this is also true for the subfield of computer systems. The main characteristic of this transformation is the leap from man-computer symbiosis to man-cyber-physical society (a tri-world of people, computers, and things). This raises four fundamental challenges to computer systems research: 1) we must revisit the very concept of “computation” and “computer system”, and we need to study new workload and usage pattern analytics; 2) we must investigate new metrics of computer systems; 3) we need to explore the possibility of new computer architecture that directly supports network; 4) we need to discover and make use of emergent phenomena. In this paper, based on research work done by oversea researchers and at the Institute of Computing Technology of the Chinese Academy of Sciences, we discuss the four challenges and point out that the answers are still lacking, which may lead to abundant research opportunities.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Wei Junyu, Zhang Guangyan, Chen Junchao. Data-Pattern-Aware Low-Cost Cloud Log Storage Systems[J]. Journal of Computer Research and Development, 2023, 60(11): 2442-2452. DOI: 10.7544/issn1000-1239.202330178
    [3]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [4]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [5]Xiao Fangxiong, Huang Zhiqiu, Cao Zining, Yuan Min, and Zhang Junhua. Describing and Cost Analyzing of Web Services Composition Using PPA[J]. Journal of Computer Research and Development, 2009, 46(5): 832-840.
    [6]Zhao Jia, Han Jun, Zeng Xiaoyang, and Han Lin. A Two-Dimensional Parity-Based Concurrent Error Detection Method for AES Against Differential Fault Attack and Its VLSI Implementation[J]. Journal of Computer Research and Development, 2009, 46(4): 593-601.
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [8]Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng. Power Analysis Attacks Against AES Based on Maximal Bias Signal[J]. Journal of Computer Research and Development, 2009, 46(3): 370-376.
    [9]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.
    [10]Wu Min, Zeng Xiaoyang, Han Jun, Ma Yongxin, Wu Yongyi, and Zhang Guoquan. A Low Cost RSA Chip Design Based on CRT[J]. Journal of Computer Research and Development, 2006, 43(4): 639-645.

Catalog

    Article views (714) PDF downloads (636) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return