• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Yili, Fu Xianglin, Han Xiaoming, and Xu Lu. The Separation between Storage and Computation[J]. Journal of Computer Research and Development, 2005, 42(3).
Citation: Ma Yili, Fu Xianglin, Han Xiaoming, and Xu Lu. The Separation between Storage and Computation[J]. Journal of Computer Research and Development, 2005, 42(3).

The Separation between Storage and Computation

More Information
  • Published Date: March 14, 2005
  • Classical computer architecture is challenged by the development of current computing application. Systems constructed by fix-linked computation and storage can not satisfy the demand of dynamic computing. To resolve this problem, the concept of physical separation and logic separation between storage and computation is introduced, and a three-dimensional reconstructed computing environment is constructed based on this concept. In this case, user program, storage and computation can be assembled dynamically to satisfy the demand of application. Without the restriction of resource location and operating environment, the computing process presents the feature of being data-driven, and computing on demand is realized as well. Therefore, the computing system can provide the user with more wide service.
  • Related Articles

    [1]Zhao Anning, Xu Nuo, Liu Kang, Luo Li, Pan Bingzheng, Bo Ziyi, Tan Chenghao. The Synthesis of Multiple Stateful Logic Gates for In-memory Computing with Low Wear[J]. Journal of Computer Research and Development, 2025, 62(3): 620-632. DOI: 10.7544/issn1000-1239.202440627
    [2]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [3]Ning Zhenyu, Zhang Fengwei, Shi Weisong. A Study of Using TEE on Edge Computing[J]. Journal of Computer Research and Development, 2019, 56(7): 1441-1453. DOI: 10.7544/issn1000-1239.2019.20180522
    [4]Xu Shaoping, Liu Tingyun, Li Chongxi, Tang Yiling, Hu Lingyan. Noise Level Estimation Algorithm Using Convolutional Neural Network-Based Noise Separation Model[J]. Journal of Computer Research and Development, 2019, 56(5): 1060-1070. DOI: 10.7544/issn1000-1239.2019.20180185
    [5]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [6]Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
    [7]Wang Zhuxiao, Hu Hong, Chen Limin, Shi Zhongzhi. Parallel Computation Techniques for Dynamic Description Logics Reasoning[J]. Journal of Computer Research and Development, 2011, 48(12): 2317-2325.
    [8]Fan Liya, Zhang Fa, Wang Gongming, Liu Zhiyong. Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN[J]. Journal of Computer Research and Development, 2010, 47(12).
    [9]Zhao Feng, Jin Hai, Jin Li, Yuan Pingpeng. VFRS: A Novel Approach for Intrusion Tolerance in Virtual Computing Environment[J]. Journal of Computer Research and Development, 2010, 47(3): 493-499.
    [10]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.

Catalog

    Article views (1643) PDF downloads (2774) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return