Citation: | Ma Yili, Fu Xianglin, Han Xiaoming, and Xu Lu. The Separation between Storage and Computation[J]. Journal of Computer Research and Development, 2005, 42(3). |
[1] | Zhao Anning, Xu Nuo, Liu Kang, Luo Li, Pan Bingzheng, Bo Ziyi, Tan Chenghao. The Synthesis of Multiple Stateful Logic Gates for In-memory Computing with Low Wear[J]. Journal of Computer Research and Development, 2025, 62(3): 620-632. DOI: 10.7544/issn1000-1239.202440627 |
[2] | Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644 |
[3] | Ning Zhenyu, Zhang Fengwei, Shi Weisong. A Study of Using TEE on Edge Computing[J]. Journal of Computer Research and Development, 2019, 56(7): 1441-1453. DOI: 10.7544/issn1000-1239.2019.20180522 |
[4] | Xu Shaoping, Liu Tingyun, Li Chongxi, Tang Yiling, Hu Lingyan. Noise Level Estimation Algorithm Using Convolutional Neural Network-Based Noise Separation Model[J]. Journal of Computer Research and Development, 2019, 56(5): 1060-1070. DOI: 10.7544/issn1000-1239.2019.20180185 |
[5] | Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511 |
[6] | Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906 |
[7] | Wang Zhuxiao, Hu Hong, Chen Limin, Shi Zhongzhi. Parallel Computation Techniques for Dynamic Description Logics Reasoning[J]. Journal of Computer Research and Development, 2011, 48(12): 2317-2325. |
[8] | Fan Liya, Zhang Fa, Wang Gongming, Liu Zhiyong. Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN[J]. Journal of Computer Research and Development, 2010, 47(12). |
[9] | Zhao Feng, Jin Hai, Jin Li, Yuan Pingpeng. VFRS: A Novel Approach for Intrusion Tolerance in Virtual Computing Environment[J]. Journal of Computer Research and Development, 2010, 47(3): 493-499. |
[10] | Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723. |