[1] |
MENG Huiling, WANG Yaobin, LI Ling, YANG Yang, WANG Xinyi, LIU Zhiqin.
Loop-level speculative parallelism analysis of kernel program in TACLeBench
[J]. Journal of Computer Applications, 2021, 41(9): 2652-2657.
|
[2] |
AN Xin, YANG Haijiao, LI Jianhua, REN Fuji.
Dynamic mapping method for heterogeneous multi-core system under thermal safety constraint
[J]. Journal of Computer Applications, 2021, 41(9): 2631-2638.
|
[3] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[4] |
AN Xin, XIA Jinwei, YANG Haijiao, OUYANG Yiming, REN Fuji.
Discrete controller synthesis based resource management method of heterogeneous multi-core processor system
[J]. Journal of Computer Applications, 2020, 40(6): 1698-1706.
|
[5] |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang.
Integral attack on PICO algorithm based on division property
[J]. Journal of Computer Applications, 2020, 40(10): 2967-2972.
|
[6] |
AN Xin, KANG An, XIA Jinwei, LI Jianhua, CHEN Tian, REN Fuji.
Heterogeneous sensing multi-core scheduling method based on machine learning
[J]. Journal of Computer Applications, 2020, 40(10): 3081-3087.
|
[7] |
AN Xin, ZHANG Ying, KANG An, CHEN Tian, LI Jianhua.
Machine learning based online mapping approach for heterogeneous multi-core processor system
[J]. Journal of Computer Applications, 2019, 39(6): 1753-1759.
|
[8] |
HAN Litao, LIU Hailong, KONG Qiaoli, YANG Fanlin.
Parallel algorithm for hillshading under multi-core computing environment
[J]. Journal of Computer Applications, 2017, 37(7): 1911-1915.
|
[9] |
MA Yunfei, WANG Tao, CHEN Hao, HUANG Changyang.
Algebraic fault attack on lightweight block ciphers SIMON
[J]. Journal of Computer Applications, 2017, 37(7): 1953-1959.
|
[10] |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui.
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm
[J]. Journal of Computer Applications, 2017, 37(6): 1605-1608.
|
[11] |
WANG Shoucheng, XU Jinhui, YAN Yingjian, LI Gongli, JIA Yongwang.
Software pipelining realization method of AES algorithm based on cipher stream processor
[J]. Journal of Computer Applications, 2017, 37(6): 1620-1624.
|
[12] |
ZHANG Wang, JIA Jia, MENG Yuan, BAI Xu.
Research and design of AES algorithm based on high-level synthesis
[J]. Journal of Computer Applications, 2017, 37(5): 1341-1346.
|
[13] |
JIANG Jianchun, CHEN Huiling, DENG Lu, ZHAO Jianpeng.
Configuration tool design based on control-oriented multi-core real-time operating system
[J]. Journal of Computer Applications, 2016, 36(3): 765-769.
|
[14] |
QIN Guanjie, MA Jianshe, CHENG Xuemin.
Method for increasing S-box nonlinearity based on combination of hill climbing
[J]. Journal of Computer Applications, 2015, 35(8): 2195-2198.
|
[15] |
FU Lin, HU Jin, LIANG Liping.
Key techniques for fast instruction set simulator
[J]. Journal of Computer Applications, 2015, 35(5): 1421-1425.
|