派博傳思國際中心

標題: Titlebook: Computer Engineering and Technology; 21st CCF Conference, Weixia Xu,Liquan Xiao,Zhenzhen Zhu Conference proceedings 2018 Springer Nature Si [打印本頁]

作者: 誓約    時間: 2025-3-21 19:47
書目名稱Computer Engineering and Technology影響因子(影響力)




書目名稱Computer Engineering and Technology影響因子(影響力)學科排名




書目名稱Computer Engineering and Technology網(wǎng)絡(luò)公開度




書目名稱Computer Engineering and Technology網(wǎng)絡(luò)公開度學科排名




書目名稱Computer Engineering and Technology被引頻次




書目名稱Computer Engineering and Technology被引頻次學科排名




書目名稱Computer Engineering and Technology年度引用




書目名稱Computer Engineering and Technology年度引用學科排名




書目名稱Computer Engineering and Technology讀者反饋




書目名稱Computer Engineering and Technology讀者反饋學科排名





作者: Cupidity    時間: 2025-3-21 20:49

作者: 勾引    時間: 2025-3-22 03:49
Tax Havens and Intermediate Companiespaper. The anti-harsh environment reinforcement chassis is taken environmental tests to make sure that it has good reliability and integrated protection capabilities, which provides a reference for similar engineering design.
作者: 朦朧    時間: 2025-3-22 07:04

作者: 不再流行    時間: 2025-3-22 08:54

作者: 吹氣    時間: 2025-3-22 15:33

作者: 吹氣    時間: 2025-3-22 20:57
Tax Havens and Intermediate Companiesed classification model can achieve AUC?=?0.9973 in best case and the influence by the data size or kernel size is very little. Moreover, by comparison with other CNNs trained with software-based features, it is indicated that the proposed model has higher accuracy than the other ones.
作者: 預(yù)定    時間: 2025-3-22 21:48
ACCDSE: A Design Space Exploration Framework for Convolutional Neural Network Accelerator, data precision for inference of LeNet. By theoritical analysis, the ACCDSE framework can obtain optimal matrix tiling parameters. Without decreasing the classification accuracy, the power consumption can be reduced by 33.57% and the storage can be reduced by 41.47% after weight pruning.
作者: Calculus    時間: 2025-3-23 02:32

作者: propose    時間: 2025-3-23 06:21
Malware Detection with Convolutional Neural Network Using Hardware Events,ed classification model can achieve AUC?=?0.9973 in best case and the influence by the data size or kernel size is very little. Moreover, by comparison with other CNNs trained with software-based features, it is indicated that the proposed model has higher accuracy than the other ones.
作者: 確定方向    時間: 2025-3-23 11:41

作者: 落葉劑    時間: 2025-3-23 14:09

作者: 油膏    時間: 2025-3-23 18:10
1865-0929 , China, in August 2017.?.The 13 full papers presented were carefully reviewed and selected from 108 submissions. They address topics such as processor architecture; application specific processors; computer application and software optimization; technology on the horizon..978-981-10-7843-9978-981-1
作者: 商議    時間: 2025-3-24 02:04

作者: outer-ear    時間: 2025-3-24 04:31

作者: 階層    時間: 2025-3-24 07:00

作者: Ostrich    時間: 2025-3-24 10:46

作者: 要求比…更好    時間: 2025-3-24 18:20

作者: Germinate    時間: 2025-3-24 22:32

作者: 使成核    時間: 2025-3-25 02:08
A Low TC Voltage Reference Generator Suitable for Low Temperature Applications,it is implemented with SMIC CMOS 0.18?um process technology. The simulation results show that the power consumption is 2.1?uW and the TC is 9.3?ppm/°C. The temperature range is from ?75°C to 65°C, which indicates that the proposed circuit can be applied in low temperature environment.
作者: 是限制    時間: 2025-3-25 06:53

作者: GOAT    時間: 2025-3-25 09:27
A Low TC Voltage Reference Generator Suitable for Low Temperature Applications,ion relationship between threshold voltage and thermal voltage, and provides a mean reference voltage of 692?mV. A proportional to absolute temperature (PTAT) current containing the thermal voltage which has a positive TC is generated, and then it is injected into a diode-connected NMOS transistor t
作者: collagen    時間: 2025-3-25 12:34

作者: 真實的你    時間: 2025-3-25 15:51
ACCDSE: A Design Space Exploration Framework for Convolutional Neural Network Accelerator, research. Because of CNN’s memory-intensive and compute-intensive features, increasing size of network poses a greater challenge on the design of the hardware accelerator. We need to determine the parameters of the accelerator at the early stages of the accelerator design..This paper presents a des
作者: 無意    時間: 2025-3-25 21:25

作者: Seizure    時間: 2025-3-26 00:44
A Radiation-Immune Low-Jitter High-Frequency PLL for SerDes,ve the anti-radiation capability. A High matched current-based charge pump is hardened by using sensitive nodes compression and transformation technology. The simulation results show that the proposed PLL has no significant variations under heavy-ion and it could output good jitter signals with high
作者: Vulnerary    時間: 2025-3-26 06:59

作者: Root494    時間: 2025-3-26 11:44
RBPCCM: Relax Blocking Parallel Collective Communication Mechanism Base on Hardware with Scalabilitas become its bottleneck. The collective communication with the hardware support has the relatively high performance. However, scalability of collective communication is always a crucial problem, because the number of nodes involved is not fixed. This paper proposes the Relax Blocking Parallel Colle
作者: Indict    時間: 2025-3-26 13:27
Experiment and Finite Element Analysis of Stochastic Vibration of Severe Environment Computer,ement model of the computer is established and the validity of the model is verified by free modal analysis. The modal solution, stress distribution and acceleration power spectral density (PSD) are obtained by modal analysis and stochastic dynamics analysis of the finite element model. The accelera
作者: 心神不寧    時間: 2025-3-26 20:10

作者: 埋伏    時間: 2025-3-26 21:19
A High Efficient Control Flow Authentication Method Basing on Loop Isolation,ograms may be attacked and then result in unintended behaviors, such as jumping to malicious code and leakage of sensitive data. Control flow authentication is one of efficient methods to protect the security of embedded system by ensuring system run along the designed control flow path. In this pap
作者: Oversee    時間: 2025-3-27 01:14

作者: ADORE    時間: 2025-3-27 06:37
Research of Configurable Hybrid Memory Architecture for Big Data Processing,computing node can be configured according to the requirement of different applications to improve the applicability of the computing system. The memory node contains the memory control chip and memory network that support to build memory system with different type of memory devices. Each memory con
作者: Fester    時間: 2025-3-27 11:27
An Efficient Model for Soft Error Vulnerability of Dynamic Circuits,charge for vulnerable nodes of dynamic circuits is developed. As the accurate model is too complex to calculate, a simplified efficient model is proposed by using an approximate method. Proposed model are verified by SPICE simulation and error analysis respectively. Results demonstrate that these mo
作者: Grandstand    時間: 2025-3-27 14:53

作者: 無意    時間: 2025-3-27 19:20

作者: frugal    時間: 2025-3-28 01:02
Supply-Side Economics or Demand Management?,ion relationship between threshold voltage and thermal voltage, and provides a mean reference voltage of 692?mV. A proportional to absolute temperature (PTAT) current containing the thermal voltage which has a positive TC is generated, and then it is injected into a diode-connected NMOS transistor t
作者: 無聊的人    時間: 2025-3-28 02:54

作者: Ovulation    時間: 2025-3-28 07:59

作者: Infinitesimal    時間: 2025-3-28 12:13

作者: 引起痛苦    時間: 2025-3-28 15:47

作者: 透明    時間: 2025-3-28 20:33

作者: 欲望    時間: 2025-3-29 00:13
Tax Assignment and Revenue Sharingas become its bottleneck. The collective communication with the hardware support has the relatively high performance. However, scalability of collective communication is always a crucial problem, because the number of nodes involved is not fixed. This paper proposes the Relax Blocking Parallel Colle
作者: 驚呼    時間: 2025-3-29 05:00

作者: 人充滿活力    時間: 2025-3-29 09:50

作者: Noisome    時間: 2025-3-29 15:05

作者: collateral    時間: 2025-3-29 18:08
Tax Havens and Intermediate Companieschine learning, especially neural network, performs well in malware detection. In this paper, convolution neural network (CNN) is used to build the malware classification model. Different from other works, our work uses hardware events to generate the feature image of programs. These hardware events
作者: 偉大    時間: 2025-3-29 23:14

作者: 桶去微染    時間: 2025-3-30 03:41

作者: mitten    時間: 2025-3-30 07:45

作者: 設(shè)想    時間: 2025-3-30 08:26
Conference proceedings 2018n August 2017.?.The 13 full papers presented were carefully reviewed and selected from 108 submissions. They address topics such as processor architecture; application specific processors; computer application and software optimization; technology on the horizon..
作者: Cpr951    時間: 2025-3-30 14:28





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
富平县| 澜沧| 东光县| 阳泉市| 绍兴市| 三江| 清原| 宁海县| 金平| 长垣县| 三台县| 航空| 黔西| 常山县| 克什克腾旗| 平乐县| 淮南市| 九江县| 衢州市| 红桥区| 富民县| 白朗县| 余庆县| 海宁市| 金溪县| 丰顺县| 凉城县| 北京市| 滨州市| 江山市| 宝鸡市| 务川| 鄯善县| 绍兴县| 明溪县| 永和县| 泊头市| 温宿县| 大关县| 政和县| 汝南县|