期刊文献+
共找到762篇文章
< 1 2 39 >
每页显示 20 50 100
Ultra-Fast Next Generation Human Genome Sequencing Data Processing Using DRAGEN<sup>TM</sup>Bio-IT Processor for Precision Medicine 被引量:3
1
作者 Amit Goyal Hyuk Jung Kwon +5 位作者 Kichan Lee Reena Garg Seon Young Yun Yoon Hee Kim Sunghoon Lee Min Seob Lee 《Open Journal of Genetics》 2017年第1期9-19,共11页
Slow speed of the Next-Generation sequencing data analysis, compared to the latest high throughput sequencers such as HiSeq X system, using the current industry standard genome analysis pipeline, has been the major fa... Slow speed of the Next-Generation sequencing data analysis, compared to the latest high throughput sequencers such as HiSeq X system, using the current industry standard genome analysis pipeline, has been the major factor of data backlog which limits the real-time use of genomic data for precision medicine. This study demonstrates the DRAGEN Bio-IT Processor as a potential candidate to remove the “Big Data Bottleneck”. DRAGENTM accomplished the variant calling, for ~40× coverage WGS data in as low as ~30 minutes using a single command, achieving the over 50-fold data analysis speed while maintaining the similar or better variant calling accuracy than the standard GATK Best Practices workflow. This systematic comparison provides the faster and efficient NGS data analysis alternative to NGS-based healthcare industries and research institutes to meet the requirement for precision medicine based healthcare. 展开更多
关键词 NGS data Analysis BWA-GATK DRAGEN Bio-IT processor Genomics INDEL Mapping
暂未订购
BFM:A Bus-Like Data Feedback Mechanism Between Graphics Processor and Host CPU
2
作者 DENG Junyong JIANG Lin 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第5期615-622,共8页
Graphics processors have received an increasing attention with the growing demand for gaming,video streaming,and many other applications.During the graphics rendering with OpenGL,host CPU needs the runtime attributes ... Graphics processors have received an increasing attention with the growing demand for gaming,video streaming,and many other applications.During the graphics rendering with OpenGL,host CPU needs the runtime attributes to move on to the next procedure of rendering,which covers almost all the function units of graphics pipeline.Current methods suffer from the memory capacity issues to hold the variables or huge amount of data parsing paths which can cause congestion on the interface between graphics processor and host CPU.This paper refers to the operation principle of commuting bus,and proposes a bus-like data feedback mechanism(BFM)to traverse all the pipeline stages and collect the run-time status data or execution error of graphics rendering,then send them back to the host CPU.BFM can work in parallel with the graphics rendering logic.This method can complete the data feedback ta.sk easily with only 0.6%increase of resource utilization and has no negative impact on performance,which also obtains 1.3 times speed enhancement compared with a traditional approach. 展开更多
关键词 data feedback mechanism run-time attributes OjienGL graphics processor host CPU
原文传递
Understanding the Importance of Effective Third-Party Risk Management on Data Governance
3
作者 Marios E.Menexiadis Michail Ch.Xanthopoulos 《Management Studies》 2023年第6期307-311,共5页
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio... With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges. 展开更多
关键词 third-party risk data governance data breach internal control system risk mitigation
在线阅读 下载PDF
低空经济视域下旅客数据处理者的损害赔偿责任
4
作者 郝秀辉 李佳睿 《西北工业大学学报(社会科学版)》 2026年第1期112-119,共8页
旅客数据是低空载人运输与低空旅游消费的关键要素,但数据处理者侵害旅客数据权益的现象时有发生。明确旅客数据处理者的损害赔偿责任与纠纷解决进路,对推动低空经济高质量发展具有重要意义。当前,责任认定面临规范适配缺口、数据属性... 旅客数据是低空载人运输与低空旅游消费的关键要素,但数据处理者侵害旅客数据权益的现象时有发生。明确旅客数据处理者的损害赔偿责任与纠纷解决进路,对推动低空经济高质量发展具有重要意义。当前,责任认定面临规范适配缺口、数据属性多元及主体实力差异等现实困境。对此,旅客数据聚合风险为处理者义务设定提供了现实正当性依据,处理者的义务通过类型化措施得以落实。在认定损害赔偿责任时,核心在于以损害结果界定行为,客观判断因果关系,并依据义务履行情况判定过错,同时厘清免责边界。为推动旅客数据权益纠纷的解决,应构建由数据处理者主导、以风险分担为核心的数据使用机制。 展开更多
关键词 低空经济 旅客数据 数据处理者 赔偿责任
在线阅读 下载PDF
信息处理者安全保障义务的体系阐释 被引量:1
5
作者 苏成慧 《河北法学》 北大核心 2026年第1期120-138,共19页
安全保障义务本质上是一种危险、风险防免义务,其保障的安全权益包括国家安全、公共安全和个人安全。法律在风险防范中的价值追求为信息处理者安全保障义务的承担提供正当性基础。数字技术条件下,“信息处理者”的主体范围并不限于机构... 安全保障义务本质上是一种危险、风险防免义务,其保障的安全权益包括国家安全、公共安全和个人安全。法律在风险防范中的价值追求为信息处理者安全保障义务的承担提供正当性基础。数字技术条件下,“信息处理者”的主体范围并不限于机构主体,还应包括自然人主体。信息处理者安全保障义务包括积极义务和消极义务,其具体内容体现在不同领域、性质、等级的法规范中,以强制性规范为主要表达方式。信息处理者安全保障义务的体系展开应以宪法规定的基本权利为基点,在以强制性规范为主的公法体系中设置具体行为规范,《民法典》中相关引致条款和转介条款具有实现安全保障义务规范在公、私法体系中的衔接功能,使得作为保护性规范的安全保障义务规范在个人信息权益受损时的私法救济体系中能发挥“违法推定过失”的规范效果。 展开更多
关键词 数据安全保护 信息处理者 数据安全保障义务 数据安全风险 数据安全法治
原文传递
swDaCe:一种申威众核处理器上以数据为中心的并行编程模型设计与实现
6
作者 沈沛祺 陈俊仕 安虹 《小型微型计算机系统》 北大核心 2026年第3期751-759,共9页
高性能科学计算是超级计算机的核心应用领域,包括粒子模拟、气候分析等关键任务.然而,随着摩尔定律逐渐失效,超级计算机体系结构日益趋向异构和复杂,导致科学计算应用的开发和优化变得更加困难.为解决这一问题,本文基于新一代申威超级... 高性能科学计算是超级计算机的核心应用领域,包括粒子模拟、气候分析等关键任务.然而,随着摩尔定律逐渐失效,超级计算机体系结构日益趋向异构和复杂,导致科学计算应用的开发和优化变得更加困难.为解决这一问题,本文基于新一代申威超级计算平台,提出并实现了一种以数据为中心的并行编程模型——swDaCe.该模型通过解耦数据流图优化与原始程序,使得编程人员可以使用Python描述计算逻辑,并最终生成适配申威众核架构的高性能C++代码.此外,本文提出了一系列针对申威架构的数据流优化方法,包括从核任务映射、向量化并行以及DMA访存优化,以充分利用申威众核处理器的计算能力.实验结果表明,swDaCe生成的代码在稀疏矩阵计算等典型应用中实现了显著的性能提升,单核组加速比达到25倍以上,验证了该框架在申威架构上的有效性. 展开更多
关键词 新一代神威平台 异构众核处理器 数据流编程 并行计算 稀疏矩阵乘
在线阅读 下载PDF
智能网联汽车采集数据权利研究
7
作者 乔朝飞 任福 《测绘地理信息》 2026年第2期41-45,共5页
汽车产业在快速发展的同时,也给配套的法律制度建设提出了许多新的亟待解决的问题。其中,智能网联汽车(intelligent connected vehicles,ICV)采集数据权利的确定是一个亟待解决的关键问题。智能网联汽车采集数据的生成涉及多类主体,各... 汽车产业在快速发展的同时,也给配套的法律制度建设提出了许多新的亟待解决的问题。其中,智能网联汽车(intelligent connected vehicles,ICV)采集数据权利的确定是一个亟待解决的关键问题。智能网联汽车采集数据的生成涉及多类主体,各类主体享有的数据权利目前尚不明确。针对此问题,本文根据《数据二十条》的有关规定,利用文献分析法,区分了智能网联汽车采集数据的来源者和处理者,并从数据来源者和数据处理者的角度出发,分析智能网联汽车采集数据的权利归属。智能网联汽车采集数据来源者促成了汽车采集数据的生成,享有数据的访问权、使用权和收益权。智能网联汽车采集数据处理者能够自主决定数据处理目的和处理方式,享有数据的持有权、使用权和经营权。 展开更多
关键词 智能网联汽车 汽车采集数据 数据产权 数据来源者 数据处理者
原文传递
浮点数字信号处理器Data-RAM的RTL模型设计
8
作者 胡正伟 仲顺安 陈禾 《北京理工大学学报》 EI CAS CSCD 北大核心 2007年第1期68-72,共5页
提出了一种双精度浮点数字信号处理器Data-RAM的RTL模型设计方法.分析了Data-RAM的结构和访问机制,采用自顶向下的方法和VHDL语言,实现了Data-RAM的RTL模型设计并验证了其功能的正确性.该模型支持3地址独立进行数据存取,支持字节、半字... 提出了一种双精度浮点数字信号处理器Data-RAM的RTL模型设计方法.分析了Data-RAM的结构和访问机制,采用自顶向下的方法和VHDL语言,实现了Data-RAM的RTL模型设计并验证了其功能的正确性.该模型支持3地址独立进行数据存取,支持字节、半字、字的读写访问和双字的读访问.在访问地址不冲突的前提下,最大可以在同一时钟周期进行2次64 bit的读操作和1次32 bit读写操作.Data-RAM的RTL模型设计为门级和物理级的性能设计提供了参考. 展开更多
关键词 数字信号处理器 data-RAM RTL模型
在线阅读 下载PDF
论个人数据来源者财产权的法律构造
9
作者 侯跃伟 《法学论坛》 北大核心 2026年第1期58-69,共12页
明确数据来源者的权利内涵及边界,是构建数据产权制度的核心议题之一。当前学界探讨多集中于个人信息保护这一非财产性自决权,而忽视了对其财产性权益的保障。事实上,数据价值并非完全由收集者或加工者创造,其源头亦凝结着数据来源者的... 明确数据来源者的权利内涵及边界,是构建数据产权制度的核心议题之一。当前学界探讨多集中于个人信息保护这一非财产性自决权,而忽视了对其财产性权益的保障。事实上,数据价值并非完全由收集者或加工者创造,其源头亦凝结着数据来源者的劳动贡献。因此,在制度层面确立数据来源者的财产性权利,通过明晰权属,可以有效激励数据供给、促进数据自由流通与价值创造。在实现路径上,相较于依赖个体行使权利的“分散式路径”,我国更适合采用以制度化、集体化方式运作的“集中式路径”,通过数据信托、数字税、数据入股等方式,聚合分散的个体权益,降低大规模数据交易中的协商成本,提升数据来源者的整体议价和维权能力。因数据来源者的财产权并非绝对化,必须同步构建科学的权利限制和公共利益平衡机制,在数据采集、加工、流通等环节,依法对数据来源者财产权加以必要限制,以确保数据在个人权益、商业价值和公共利益之间实现动态平衡。 展开更多
关键词 数据产权 数据来源者 数据处理者 集中式路径 数据信托
原文传递
加工制度对数据产品财产权的归属判定
10
作者 高宁宁 《佛山科学技术学院学报(社会科学版)》 2026年第2期70-79,共10页
数据权利体系是数据流通规则有效运行的基础,但目前其建构仍处于探索阶段,尤其在权利归属方面存在争议。数据产品是形态最为成熟的数据类型,可率先将其纳入财产权客体范畴。然而,现有法律制度难以为数据产品财产权归属的判定提供充分的... 数据权利体系是数据流通规则有效运行的基础,但目前其建构仍处于探索阶段,尤其在权利归属方面存在争议。数据产品是形态最为成熟的数据类型,可率先将其纳入财产权客体范畴。然而,现有法律制度难以为数据产品财产权归属的判定提供充分的依据。如何实现传统财产权理论与数据产品这一新型客体的有效衔接,已成为法律体系必须回应的关键议题。传统物权理论中的加工制度在确权逻辑上与数据产品的生成具有相似性,即原材料与劳动力结合产生新事物,导致原材料权属发生变动。这一类比为数据产品的权属判定提供了理论支持。借助加工制度,能够清晰地彰显数据产品生成过程中各参与主体的贡献程度和权益享有范围。数据处理者在数据产品生成过程中的劳动贡献显著高于数据来源者,因此数据产品财产权应归数据处理者享有。同时,可借助加工制度中的利益衡平原则对数据来源者给予相应补偿。 展开更多
关键词 数据产品 加工制度 利益衡平 数据处理者 数据来源者
在线阅读 下载PDF
基于多源数据整合的小提琴音乐风格识别系统构建
11
作者 杨阳冰 林广乐 《山西师范大学学报(自然科学版)》 2026年第1期24-29,共6页
研究采用双处理器对工作顺序设置以及工作程序运作进行分配,让音乐播放的顺畅且实现稳定的可视化,通过音频读取模块和音频采集模块对信号数据进行读取和采集.对多种颜色的灯管在不同的光时、光波进行交替操作实现混光效果;然后通过多源... 研究采用双处理器对工作顺序设置以及工作程序运作进行分配,让音乐播放的顺畅且实现稳定的可视化,通过音频读取模块和音频采集模块对信号数据进行读取和采集.对多种颜色的灯管在不同的光时、光波进行交替操作实现混光效果;然后通过多源数据整合计算对野值数据修正与填充,对多源异构数据进行校对,在分解法的处理下完成音频数据的去噪;最后在获取多源数据的特征值获取识别分类结果的基础上,通过对旋律片断、音符序列、节奏的分析,实现小提琴音乐风格识别.实验表明,文章系统在识别小提琴音乐风格时,最高用时将近11.2 s远低于其他系统;数据整合准确率最高为98.96%;对小提琴的旋律片断、音符序列、节奏识别效果精准率高达99.76%,多源数据整合精准度方面最优,且识别系统可靠性最强. 展开更多
关键词 双处理器 小提琴音乐 风格识别 系统构建 多源异构数据
在线阅读 下载PDF
Use of community mobile phone big location data to recognize unusual patterns close to a pipeline which may indicate unauthorized activities and possible risk of damage 被引量:1
12
作者 Shao-Hua Dong He-Wei Zhang +2 位作者 Lai-Bin Zhang Li-Jian Zhou Lei Guo 《Petroleum Science》 SCIE CAS CSCD 2017年第2期395-403,共9页
Damage caused by people and organizations unconnected with the pipeline management is a major risk faced by pipelines,and its consequences can have a huge impact.However,the present measures to monitor this have major... Damage caused by people and organizations unconnected with the pipeline management is a major risk faced by pipelines,and its consequences can have a huge impact.However,the present measures to monitor this have major problems such as time delays,overlooking threats,and false alarms.To overcome the disadvantages of these methods,analysis of big location data from mobile phone systems was applied to prevent third-party damage to pipelines,and a third-party damage prevention system was developed for pipelines including encryption mobile phone data,data preprocessing,and extraction of characteristic patterns.By applying this to natural gas pipelines,a large amount of location data was collected for data feature recognition and model analysis.Third-party illegal construction and occupation activities were discovered in a timely manner.This is important for preventing third-party damage to pipelines. 展开更多
关键词 PIPELINE Big location data third-party damage Model Prevention
原文传递
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method 被引量:1
13
作者 J.Stanly Jayaprakash Kishore Balasubramanian +3 位作者 Rossilawati Sulaiman Mohammad Kamrul Hasan B.D.Parameshachari Celestine Iwendi 《Computers, Materials & Continua》 SCIE EI 2022年第7期519-534,共16页
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ... Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 展开更多
关键词 Cloud computing cloud data storage cloud service provider merkle hash tree multi-owner authentication third-party auditor
在线阅读 下载PDF
Web Data Aggregation in MOLAP:Approach,Language,and Implementation
14
作者 朱焱 唐慧佳 马永强 《Journal of Southwest Jiaotong University(English Edition)》 2007年第3期179-186,共8页
This paper investigates the Web data aggregation issues in multidimensional on-line analytical processing (MOLAP) and presents a rule-driven aggregation approach. The core of the approach is defining aggregate rules... This paper investigates the Web data aggregation issues in multidimensional on-line analytical processing (MOLAP) and presents a rule-driven aggregation approach. The core of the approach is defining aggregate rules. To define the rules for reading warehouse data and computing aggregates, a rule definition language - array aggregation language (AAL) is developed. This language treats an array as a function from indexes to values and provides syntax and semantics based on monads. External functions can be called in aggregation rules to specify array reading, writing, and aggregating. Based on the features of AAL, array operations are unified as function operations, which can be easily expressed and automatically evaluated. To implement the aggregation approach, a processor for computing aggregates over the base cube and for materializing them in the data warehouse is built, and the component structure and working principle of the aggregation processor are introduced. 展开更多
关键词 Web data aggregation Aggregation language MOLAP Aggregation processor
在线阅读 下载PDF
Exploring the Approaches to Data Flow Computing
15
作者 Mohammad B.Khan Abdul R.Khan Hasan Alkahtani 《Computers, Materials & Continua》 SCIE EI 2022年第5期2333-2346,共14页
Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture... Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture employ fine-grain data-driven parallelism.These architectures have thepotential to exploit the inherent parallelism in compute intensive applicationslike signal processing,image and video processing and so on and can thusachieve faster throughputs and higher power efficiency.In this paper,severaldata flow computing architectures are explored,and their main architecturalfeatures are studied.Furthermore,a classification of the processors is presented based on whether they employ either the data flow execution modelexclusively or in combination with the control flow model and are accordinglygrouped as exclusive data flow or hybrid architectures.The hybrid categoryis further subdivided as conjoint or accelerator-style architectures dependingon how they deploy and separate the data flow and control flow executionmodel within their execution blocks.Lastly,a brief comparison and discussionof their advantages and drawbacks is also considered.From this study weconclude that although the data flow architectures are seen to have maturedsignificantly,issues like data-structure handling and lack of efficient placementand scheduling algorithms have prevented these from becoming commerciallyviable. 展开更多
关键词 processor architecture data flow architectures Von-Neumann model control flow architectures
在线阅读 下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
16
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
在线阅读 下载PDF
PhiBench 2.0: characterizing data analytics workloads on Intel Knights Landing
17
作者 Xie Biwei Zhan Jianfeng +1 位作者 Wang Lei Zhang Lixin 《High Technology Letters》 EI CAS 2019年第2期121-128,共8页
With high computational capacity, e.g. many-core and wide floating point SIMD units, Intel Xeon Phi shows promising prospect to accelerate high-performance computing(HPC) applications. But the application of Intel Xeo... With high computational capacity, e.g. many-core and wide floating point SIMD units, Intel Xeon Phi shows promising prospect to accelerate high-performance computing(HPC) applications. But the application of Intel Xeon Phi on data analytics workloads in data center is still an open question. Phibench 2.0 is built for the latest generation of Intel Xeon Phi(KNL, Knights Landing), based on the prior work PhiBench(also named BigDataBench-Phi), which is designed for the former generation of Intel Xeon Phi(KNC, Knights Corner). Workloads of PhiBench 2.0 are delicately chosen based on BigdataBench 4.0 and PhiBench 1.0. Other than that, these workloads are well optimized on KNL, and run on real-world datasets to evaluate their performance and scalability. Further, the microarchitecture-level characteristics including CPI, cache behavior, vectorization intensity, and branch prediction efficiency are analyzed and the impact of affinity and scheduling policy on performance are investigated. It is believed that the observations would help other researchers working on Intel Xeon Phi and data analytics workloads. 展开更多
关键词 Intel Xeon Phi data analytics workloads characterization Knights Landing(KNL) many core x86 processors
在线阅读 下载PDF
我国数据知识产权登记制度试点改革路径研究 被引量:6
18
作者 孟奇勋 程伟佳 戴运 《科技进步与对策》 北大核心 2025年第12期151-160,共10页
厘清数据、数据集合与数据产品,数据产权登记、数据产品登记与数据知识产权登记的关系,是推进数据知识产权登记制度试点改革的逻辑前提。通过对9项政策文本的比较,得出以下结论:①数据知识产权登记试点为我国数据知识产权保护规则构建... 厘清数据、数据集合与数据产品,数据产权登记、数据产品登记与数据知识产权登记的关系,是推进数据知识产权登记制度试点改革的逻辑前提。通过对9项政策文本的比较,得出以下结论:①数据知识产权登记试点为我国数据知识产权保护规则构建提供了有益经验,但仍然存在登记规则不统一、权益配置不清晰、应用场景有待拓展等现实挑战;②从法律关系来看,数据知识产权登记以特定的数据集合为对象,以数据处理者为主体,以有限排他权为权利内容;③在推进数据要素市场化配置改革和全国统一大市场建设背景下,亟待明确数据知识产权登记效力与审查标准、强化相关部门职能协同与监督管理,探索区块链赋能数据交易流通效率提升路径。 展开更多
关键词 数据产权 数据产品 数据集合 数据处理者 数据知识产权登记
在线阅读 下载PDF
The Design and Implementation of a Distributed Data Acquisition、Monitoring & Processing System (DDAMAP)
19
作者 Guoshun Zhou Hua Shen HuiQi Yan 《软件工程师》 2011年第2期123-127,共5页
This report presents the design and implementation of a Distributed Data Acquisition、 Monitoring and Processing System (DDAMAP)。It is assumed that operations of a factory are organized into two-levels: client machin... This report presents the design and implementation of a Distributed Data Acquisition、 Monitoring and Processing System (DDAMAP)。It is assumed that operations of a factory are organized into two-levels: client machines at plant-level collect real-time raw data from sensors and measurement instrumentations and transfer them to a central processor over the Ethernets, and the central processor handles tasks of real-time data processing and monitoring. This system utilizes the computation power of Intel T2300 dual-core processor and parallel computations supported by multi-threading techniques. Our experiments show that these techniques can significantly improve the system performance and are viable solutions to real-time high-speed data processing. 展开更多
关键词 软件 数据处理 传感器 仪表
在线阅读 下载PDF
处理器数据预取器安全研究综述
20
作者 刘畅 黄祺霖 +4 位作者 刘煜川 林世鸿 秦中元 陈立全 吕勇强 《电子与信息学报》 北大核心 2025年第9期3038-3056,共19页
数据预取器是现代处理器用于提高性能的重要微架构组件。然而,由于在设计之初缺乏系统性的安全评估与考量,主流商用处理器中的预取器近年来被揭示出存在严重安全隐患,已被用于针对浏览器、操作系统和可信执行环境的侧信道攻击。面对这... 数据预取器是现代处理器用于提高性能的重要微架构组件。然而,由于在设计之初缺乏系统性的安全评估与考量,主流商用处理器中的预取器近年来被揭示出存在严重安全隐患,已被用于针对浏览器、操作系统和可信执行环境的侧信道攻击。面对这类新型微架构攻击,处理器安全研究亟需解决以下关键问题:如何系统性地分析攻击方法,全面认识预取器潜在风险,量化评估预取器安全程度,从而设计更加安全的数据预取器。为解决这些问题,该文系统调研了商用处理器中已知预取器设计及相关侧信道攻击,通过提取内存访问模式,为7种预取器建立行为模型,并基于此为20种侧信道攻击建立攻击模型,系统整理了各类攻击的触发条件和泄露信息,并分析可能存在的其他攻击方法。在此基础上,该文提出1套包含3个维度和24个指标的安全性评估体系,为数据预取器的安全性提供全面量化评估。最后,该文深入探讨了防御策略、安全预取器设计思路及未来研究方向。作为首篇聚焦于商用处理器数据预取器安全问题的综述性文章,该文有助于深入了解数据预取器面临的安全挑战,推动预取器的安全性量化评估体系构建,从而为设计更加安全的数据预取器提供指导。 展开更多
关键词 计算机体系结构 处理器 数据预取器 微架构安全 侧信道攻击
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部