×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [8]
物质科学与技术学院 [2]
大科学中心 [2]
更多...
作者
梁俊睿 [1]
哈亚军 [1]
赵建龙 [1]
赵振堂 [1]
宋富 [1]
姜伟雄 [1]
更多...
文献类型
期刊论文 [7]
会议论文 [4]
发表日期
2025 [2]
2024 [4]
2023 [2]
2022 [2]
2021 [1]
出处
APPLIED MA... [1]
EUROSYS 20... [1]
GUANGXUE X... [1]
HE JISHU/N... [1]
IEEE TRANS... [1]
INFORMATIO... [1]
更多...
语种
英语 [8]
中文 [3]
资助项目
Informatiz... [1]
Ministry o... [1]
National K... [1]
National N... [1]
National N... [1]
Shanghai M... [1]
更多...
资助机构
收录类别
EI [11]
SCI [3]
CPCI [1]
CPCI-S [1]
SCIE [1]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
WOS被引频次升序
WOS被引频次降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines
会议论文
EUROSYS 2025 - PROCEEDINGS OF THE 2025 20TH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS, Rotterdam, Netherlands, March 30, 2025 - April 3, 2025
作者:
Zhang, Chuqi
收藏
|
浏览/下载:1/0
|
提交时间:2025/04/25
Computer operating systems
Metadata
Modeling languages
Problem oriented languages
Virtual machine
Cloud environments
Common software
Confidential virtual machine
OS design
Private data
Sandboxed container
Sandboxing
Service clouds
Software stacks
Software-as-a- Service (SaaS)
Dep-TEE: Decoupled Memory Protection for Secure and Scalable Inter-enclave Communication on RISC-V
会议论文
PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, Miraikan 7F, Tokyo, Japan, January 20, 2025 - January 23, 2025
作者:
Pan, Shangjie
;
Peng, Xuanyao
;
Man, Zeyuan
;
Zhao, Xiquan
;
Zhang, Dongrong
收藏
|
浏览/下载:15/0
|
提交时间:2025/04/11
Computer software selection and evaluation
Digital storage
Memory architecture
Privacy by design
Secure communication
Software prototyping
ARM TrustZone
Environment systems
Memory isolation
Memory protection
Page table
Performance and scalabilities
Security and privacy
Security performance
Sensitive application
Trusted execution environments
AISL: a LAMMPS-based automated XFEL irradiation damage simulation program
期刊论文
HE JISHU/NUCLEAR TECHNIQUES, 2024, 卷号: 47, 期号: 4
作者:
Zhou, Yue
;
Hai, Xue
;
Ren, Cuilan
;
Yin, Yaru
;
Shang, Kunlin
Adobe PDF(2129Kb)
|
收藏
|
浏览/下载:253/3
|
提交时间:2024/05/11
Automation
Computer software
Digital storage
Electrons
Free electron lasers
Information management
Molecular dynamics
Radiation damage
Thin films
Damage simulation
High intensity
High-throughput
Irradiation Damage
LAMMPS
Laser facilities
Laser radiation damage
Simulation projects
Work-flows
X-ray free electron lasers
DOMAS: a data management software framework for advanced light sources
期刊论文
JOURNAL OF SYNCHROTRON RADIATION, 2024, 卷号: 31, 期号: Pt 2, 页码: 312-321
作者:
Hu, Hao
;
Lei, Lei
;
Wang, Haofan
;
Zhuang, Bo
;
Zhang, Ruojin
Adobe PDF(2606Kb)
|
收藏
|
浏览/下载:274/26
|
提交时间:2024/03/22
Computer programming
Data acquisition
Data handling
Data transfer
Digital storage
Light sources
Metadata
Synchrotron radiation
X ray detectors
Advanced Light Source
Data management software
Data organization
Data services
Metadata catalogues
Organization management
Rapid construction
Software frameworks
X ray data
X-ray detector
Design of SystemVerilog Assertions Hardware Towards Efficient Processor Functional Verification
期刊论文
JISUANJI YANJIU YU FAZHAN/COMPUTER RESEARCH AND DEVELOPMENT, 2024, 卷号: 61, 期号: 6, 页码: 1436-1449
作者:
Zhang, Ziqing
;
Shi, Kan
;
Xu, Shuoxiang
;
Wang, Lianghui
;
Bao, Yungang
Adobe PDF(1427Kb)
|
收藏
|
浏览/下载:191/0
|
提交时间:2024/08/09
Computer software
Efficiency
Integrated circuit design
Program debugging
Verification
Assertion
Fine grained
Functional verification
Hardware simulation
Processor verification
Prototyping
Software simulation
SystemVerilog
SystemVerilog assertions
Verification process
RefSCAT: Formal Verification of Logic-Optimized Multipliers via Automated Reference Multiplier Generation and SCA-SAT Synergy
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: PP, 期号: 99, 页码: 1-1
作者:
Rui Li
;
Lin Li
;
Heng Yu
;
Masahiro Fujita
;
Weixiong Jiang
Adobe PDF(6854Kb)
|
收藏
|
浏览/下载:322/10
|
提交时间:2024/08/26
Benchmarking
Boolean functions
Constraint satisfaction problems
Integer programming
Multiplying circuits
Program debugging
Reverse engineering
Software design
Trees (mathematics)
Binary decision
Binary decision diagram
Computer algebra
Decision diagram
Logic
Logic-optimized multiplier
Optimisations
Satisfiability
Symbolic computer algebra
Reinforcement Learning for Free Electron Laser Online Optimization
期刊论文
GUANGXUE XUEBAO/ACTA OPTICA SINICA, 2023, 卷号: 43, 期号: 21
作者:
Wu, Jiacheng
;
Cai, Meng
;
Lu, Yujie
;
Huang, Nanshun
;
Feng, Chao
Adobe PDF(1863Kb)
|
收藏
|
浏览/下载:265/2
|
提交时间:2024/01/19
Computer software
Deep learning
Electrons
Orbits
Quality control
Reinforcement learning
Wigglers
Deep reinforcement learning
Free-electron lasers
Laser power
Light spot
Multi-parameter optimizations
Orbit corrections
Output power
Reinforcement learnings
Soft-X-ray free-electron-laser
X-ray free electron lasers
Sequential biofluid sampling microfludic multi-sensing patch for more accurate sweat analysis under sedentary condition
期刊论文
APPLIED MATERIALS TODAY, 2023, 卷号: 34
作者:
Sun, Teng
;
Hui, Jianan
;
Lin, Bo
;
Sun, Hebin
;
Zhou, Lin
Adobe PDF(6621Kb)
|
收藏
|
浏览/下载:379/0
|
提交时间:2023/09/22
Computer software
Electrochemical sensors
Electrophoresis
Metabolites
Microfluidics
Physiological models
Physiology
Biofluids
Condition
Continuous monitoring
Electrochemical analysis
Iontophoresis
Microfludics
Microfluidic-chips
Monitoring of physiological parameters
Sweat rates
Sweat sensor
Motion-Powered Gameboy
会议论文
SENSYS 2022 - PROCEEDINGS OF THE 20TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, Boston, MA, United states, November 6, 2022 - November 9, 2022
作者:
Zhu, Yue
;
Li, Xin
;
Liang, Junrui
Adobe PDF(697Kb)
|
收藏
|
浏览/下载:157/0
|
提交时间:2023/03/10
Computer games
Computer hardware
Computer software
Electric batteries
Energy gap
Game design
Human computer interaction
Internet of things
Software design
User interfaces
Battery-free
Battery-free IoT
Computing functions
Connectivity function
Critical energy
Hardware and software
Motion energy
Motion energy harvesting
Power
Sensing functions
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
会议论文
WWW 2022 - PROCEEDINGS OF THE ACM WEB CONFERENCE 2022, Virtual, Online, France, April 25, 2022 - April 29, 2022
作者:
Sun, Zhensu
;
Du, Xiaoning
;
Song, Fu
;
Ni, Mingze
;
Li, Li
Adobe PDF(2115Kb)
|
收藏
|
浏览/下载:558/1
|
提交时间:2022/05/27
Deep learning
Open Data
Open source software
Computer science research
Copyleft
Data poisoning
Dataset protection
Deep learning
Ethical problems
Learn+
Learning models
Open-source code
Security problems
首页
上一页
1
2
下一页
末页