[1] |
ZHANG Liqun, PAN Zulie, HUANG Hui, WANG Ruipeng, LI Yang.
Research on Automatic Verification Method of Tcache Poisoning Heap Vulnerability Based on Symbolic Execution
[J]. Computer Engineering, 2023, 49(6): 24-33.
|
[2] |
YANG Zhoufan, HAN Lin, LI Bingyang, XIE Jingming, HAN Pu, LIU Yongjie.
Large-Scale Pipeline Network Simulation Based on “Songshan” Supercomputer System
[J]. Computer Engineering, 2022, 48(9): 155-161.
|
[3] |
LIU Jiahang, YU Gongjian, LI Peiqi, HUA Xia, CHAI Zhilei, CHEN Wenjie.
Performance Optimization of NEST Simulator Based on SNN Neuron Relocation
[J]. Computer Engineering, 2022, 48(3): 189-196.
|
[4] |
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei.
Research on Strong Cache Consistency Under Generic Cache Replacement Strategy
[J]. Computer Engineering, 2022, 48(12): 180-188,195.
|
[5] |
HE Xiaobin, GAO Jie, XIAO Wei, CHEN Qi, LIU Xin, CHEN Zuoning.
Research on Application-Transparent Supercomputing Multi-tier Storage Acceleration Technology
[J]. Computer Engineering, 2022, 48(12): 1-8.
|
[6] |
YU Zhichao, LI Yangzhong, LIU Lei, FENG Shengzhong.
Survey of Quantum Computing Simulation and Optimization Methods
[J]. Computer Engineering, 2022, 48(1): 1-11.
|
[7] |
CONG Mou, ZHANG Ping, WANG NING.
Method of Timing Attack for Linux Against KASLR
[J]. Computer Engineering, 2021, 47(8): 177-182.
|
[8] |
JIAO Tong, CHEN Lingling, AN Xin, LI Jianhua.
Reuse Information-based Dynamic Bypass Policy for Non-Volatile Cache
[J]. Computer Engineering, 2021, 47(4): 158-165.
|
[9] |
GUO Yuluo, BIAN Haodong, DONG Runting, TANG Jiahao, WANG Xiaoying, HUANG Jianqiang.
Parallel Fourier Space Image Similarity Calculation Based on SIMD
[J]. Computer Engineering, 2021, 47(11): 247-253.
|
[10] |
XU Wenjuan, JIA Xiangdong, CHEN Yuwan.
Content Delivery Method Combined with Cache and MIMO Backhaul
[J]. Computer Engineering, 2020, 46(6): 164-171.
|
[11] |
ZHAO Guofeng, LIN Huan, DUAN Jie, ZOU Yaqin, ZENG Shuai.
ICN-IoT Caching Scheme for Data Freshness
[J]. Computer Engineering, 2020, 46(11): 223-230.
|
[12] |
LI Kang, ZHANG Lufei, ZHANG Xinwei, YU Gongjian, LIU Jiahang, WU Dong, CHAI Zhilei.
Design of Spiking Neural Network Simulator Based on FPGA Cluster
[J]. Computer Engineering, 2020, 46(10): 201-209.
|
[13] |
GU Jie, ZHU Zongwei, XU Youqing, ZHOU Shibin, LI Ao, ZHANG Guopeng.
Research on IEEE 802.11 Service Differentiation Mechanism in NS-3 Simulation Environment
[J]. Computer Engineering, 2019, 45(8): 135-140.
|
[14] |
CHENG Zhiwei, CHEN Caisen, ZHU Lianjun, MO Weifeng, WANG Huiyu.
Cache Timing Template Attack Method Based on Pearson Correlation Coefficient
[J]. Computer Engineering, 2019, 45(7): 159-163.
|
[15] |
MENG Qingqiang,HE Haoqi,BI Nifei,ZHAO Bin,JI Genlin.
Non-Equi join operation algorithm for multi-attribute
[J]. Computer Engineering, 2019, 45(6): 60-66.
|