期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Intelligent Development Environment and Software Knowledge Graph 被引量:11
1
作者 Ze-Qi Lin Bing Xie +5 位作者 Yan-Zhen Zou Jun-Feng Zhao Xuan-Dong Li Jun Wei Hai-Long Sun Gang Yin 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期242-249,共8页
Software intelligent development has become one of the most important research trends in software engineering. In this paper, we put forward two key concepts -- intelligent development environment (IntelliDE) and so... Software intelligent development has become one of the most important research trends in software engineering. In this paper, we put forward two key concepts -- intelligent development environment (IntelliDE) and software knowledge graph -- for the first time. IntelliDE is an ecosystem in which software big data are aggregated, mined and analyzed to provide intelligent assistance in the life cycle of software development. We present its architecture and discuss its key research issues and challenges. Software knowledge graph is a software knowledge representation and management framework, which plays an important role in IntelliDE. We study its concept and introduce some concrete details and examples to show how it could be constructed and leveraged. 展开更多
关键词 intelligent development environment software big data software knowledge graph semantic search
原文传递
A software architecture centric self-adaptation approach for Internetware 被引量:19
2
作者 MEI Hong HUANG Gang +1 位作者 LAN Ling LI JunGuo 《Science in China(Series F)》 2008年第6期722-742,共21页
Being one of the basic features of Internetware,self-adaptation means that the software system can monitor its runtime state and behavior and adjust them when necessary according to pre-defined policies.Focusing on th... Being one of the basic features of Internetware,self-adaptation means that the software system can monitor its runtime state and behavior and adjust them when necessary according to pre-defined policies.Focusing on the three fundamental issues of self-adaptation,including the scope,operability and trustworthiness,a software architecture(SA)centric approach for Internetware's self-adaptation is presented in this paper.All of the self-adaptive actions,i.e.monitoring,analyzing,planning and executing,are performed based on SA.In detail,runtime state and behavior of Internetware are represented and changed in the form of runtime soft-ware architecture.The knowledge for self-adaptation is captured,organized and reasoned in the form of SA so that automatic analysis and decision-making are achieved. 展开更多
关键词 INTERNETWARE SELF-ADAPTATION software architecture MIDDLEWARE
原文传递
Software techniques for Internet Computing:Current situation and future trend 被引量:4
3
作者 MEI Hong LIU XuanZhe 《Chinese Science Bulletin》 SCIE EI CAS 2010年第31期3510-3516,共7页
The fast development of the Internet has extended wider space for Information and Communications Technology(ICT),and it has brought a series of challenges for traditional software theories,models,approaches and techno... The fast development of the Internet has extended wider space for Information and Communications Technology(ICT),and it has brought a series of challenges for traditional software theories,models,approaches and technologies.This paper looks back some popular Internet-based new computing paradigms and application schemas,discusses the current status and the future trend of software technologies for Internet Computing,including topics of software model,software runtime supporting platform,software development methodologies and software quality measurement and assurance. 展开更多
关键词 INTERNET software technique software methodology INTERNETWARE
在线阅读 下载PDF
Internetware:An Emerging Software Paradigm for Internet Computing 被引量:4
4
作者 梅宏 刘譞哲 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期588-599,共12页
The Internet is undergoing a tremendous change towards the globalized computing environment. Due to the open, dynamic and uncontrollable natures of the Internet, software running in the Internet computing environment ... The Internet is undergoing a tremendous change towards the globalized computing environment. Due to the open, dynamic and uncontrollable natures of the Internet, software running in the Internet computing environment has some new features, which bring challenges to current software technologies in terms of software model, software operating platform, software engineering approaches and software quality. Researchers in China have proposed the term "Internetware" to present the emerging software paradigm. Sponsored by the National Basic Research 973 Program, several research practices have been done on the Internetware in the past decade. This paper summarizes the progress and status of the Internetware researches. A technical solution framework for the Internetware paradigm is proposed from four aspects: the Internetware software model defines what the Internetware is to be; the Internetware middleware determines how to run the Internetware applications; the engineering methodology determines how to develop the Internetware applications; the Internetware quality assurance determines how well the Internetware applications can perform. The paper also discusses the ongoing research issues and future trends of Internetware. 展开更多
关键词 software engineering INTERNETWARE Internet computing
原文传递
Managing Software Requirements Changes Based on Negotiation-Style Revision 被引量:2
5
作者 牟克典 Weiru Liu +2 位作者 金芝 Jun Hong David Bell 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第5期890-907,共18页
For any proposed software project,when the software requirements specification has been established,requirements changes may result in not only a modification of the requirements specification but also a series of mod... For any proposed software project,when the software requirements specification has been established,requirements changes may result in not only a modification of the requirements specification but also a series of modifications of all existing artifacts during the development.Then it is necessary to provide effective and flexible requirements changes management.In this paper,we present an approach to managing requirements changes based on Booth's negotiation-style framework for belief revision.Informally,we consider the current requirements specification as a belief set about the systemto-be.The request of requirements change is viewed as new information about the same system-to-be.Then the process of executing the requirements change is a process of revising beliefs about the system-to-be.We design a family of belief negotiation models appropriate for different processes of requirements revision,including the setting of the request of requirements change being fully accepted,the setting of the current requirements specification being fully preserved,and that of the current specification and the request of requirements change reaching a compromise.In particular,the prioritization of requirements plays an important role in reaching an agreement in each belief negotiation model designed in this paper. 展开更多
关键词 requirements change non-prioritized belief revision inconsistency handling NEGOTIATION
原文传递
An approach to improve the quality of object-oriented models from novice modelers through project practice 被引量:1
6
作者 Zhiyi MA 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期485-498,共14页
The defects in object-oriented models will result in poor quality of applications based on the models, and thus it is necessary to know which defects often occur in practice, to what extent they occur, why they occur,... The defects in object-oriented models will result in poor quality of applications based on the models, and thus it is necessary to know which defects often occur in practice, to what extent they occur, why they occur, and how they can be prevented. To gain deeper insights into these problems, this paper discusses how to improve the quality of object- oriented models from novice modelers through project prac- tice. This paper summarizes a set of typical quality defect types from a large number of the defects, and confirms them through our project practice. Moreover, the paper analyzes the improvement of the quality of object-oriented models by quantifying the level of occurrence for the defect types in dif- ferent phases of the project practice, and presents preventive measures by analyzing the causes for the defects to occur in object-oriented models in the aspects of syntax, semantics, and pragmatics. 展开更多
关键词 quality defects object-oriented models quality analysis project practice
原文传递
Assessing the quality of metamodels
7
作者 Zhiyi MA Xiao HE Chao LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第4期558-570,共13页
The complexity and diversity of modern software demands a variety of metamodel-based modeling languages for software development. Existing languages change continuously, and new ones are constantly emerging. In this s... The complexity and diversity of modern software demands a variety of metamodel-based modeling languages for software development. Existing languages change continuously, and new ones are constantly emerging. In this situation, and especially for metamodel-based modeling languages, a quality assurance mechanism for metamodels is needed. This paper presents an approach to assessing the quality of metamodels. A quality model, which systematically characterizes and classifies quality attributes, and an operable measuring mechanism for effectively assessing the quality of metamodels based on the quality model, are pre- sented, using UML as the main example. 展开更多
关键词 quality assessment METAMODELS METRIC
原文传递
Towards module-based automatic partitioning of Java applications
8
作者 Ying ZHANG Gang HUANG +2 位作者 Wei ZHANG Xuanzhe LIU Hong MEI 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第6期725-740,共16页
When reengineering a monolithic application to be a distributed one, programmers always have to decide how many distributed parts the application should be partitioned, and write many codes related to where a part wil... When reengineering a monolithic application to be a distributed one, programmers always have to decide how many distributed parts the application should be partitioned, and write many codes related to where a part will be placed on network nodes and how these parts communicate with each other through the network. These codes usually have nothing to do with the business functions of the application, and they are laborious to write. In addition, as the distribution architecture of the application is finalized beforehand, it may not adapt well to the everchanging execution environment. In this paper, we propose DPartner, an automatic partitioning system, to help programmers create a distributed Java application without explicitly writing the distribution-related codes. Unlike the other partitioning systems, DPartner does not partition an application directly into the coarse-grained client and server. Instead, it first partitions the application into several modules where each module performs a relatively independent business function of the application. Then it makes these modules be distributable through automatic bytecode rewriting. These modules can distribute in different nodes and cooperate to work just as the original monolithic application. Such a module-based partitioning approach enables a relatively easy reshaping of the distribution architecture of an application, which facilitates the application adapt to the environmental changes without manual recoding or repartitioning with regard to distribution. This paper gives the detailed design of DPartner, and evaluates it using real-world applications. The evaluation results demonstrate the effectiveness and efficiency of DPartner. 展开更多
关键词 application partitioning distributed computing DPartner
原文传递
A Separation Logic for Sequences in Block-Based Cloud Storage Systems and Its Decidability
9
作者 Tian-Yue Cao Bo-Wen Zhang +2 位作者 Zhao Jin Yong-Zhi Cao Han-Pin Wang 《Journal of Computer Science & Technology》 2025年第6期1678-1692,共15页
Cloud storage systems are crucial for ensuring business stability and data reliability.Among them,block-based cloud storage systems(BCSSs)have been widely adopted in the industry due to their high efficiency and stron... Cloud storage systems are crucial for ensuring business stability and data reliability.Among them,block-based cloud storage systems(BCSSs)have been widely adopted in the industry due to their high efficiency and strong performance.However,system failures occur from time to time,causing significant financial losses to companies.Therefore,verifying the reliability of BCSSs has become important and urgent.Nevertheless,since blocks in these systems are of finite but variable sizes,it is difficult to describe and verify properties using first-order logic or separation logic.To address this issue,we propose Sequence-Heap Separation Logic(SeqSL),which introduces sequence values and sequence variables into separation logic.Our logic can simplify property expressions while enhancing the ability to describe these systems.To provide a theoretical foundation for verification,we study the decidability of this logic,with the main conclusions as follows.1)The satisfiability problem of the fragment with a single quantifier alternation is decidable,and belongs to 2-EXPTIME(2-Exponential Time).As a by-product,we propose a decision procedure for this decidable fragment.2)The satisfiability problem of the fragment with two quantifier alternations is undecidable. 展开更多
关键词 cloud storage system decidability formal verification logic separation logic
原文传递
Exploring LLM-Based Data Synthesis Strategies for Aligning Medical Consultation Preferences
10
作者 Cheng-Feng Dou Ying Zhang +4 位作者 Zhi Jin Wen-Pin Jiao Hai-Yan Zhao Yong-Qiang Zhao Zheng-Wei Tao 《Journal of Computer Science & Technology》 2025年第6期1485-1498,共14页
This research explores the application of reinforcement learning from artificial intelligence feedback(RLAIF)techniques to enhance healthcare consultation models,with the aim of addressing the challenges associated wi... This research explores the application of reinforcement learning from artificial intelligence feedback(RLAIF)techniques to enhance healthcare consultation models,with the aim of addressing the challenges associated with preference-aligned data synthesis while reducing the dependence on medical experts.Specifically,we investigate the use of RLAIF in the generation of medical dialogues,focusing on two primary challenges:accurately reflecting doctors’preferences and the unreliability of existing automated assessment systems.To address these issues,we propose a two-stage approach for synthesizing preference-aligned datasets.In the first stage,we leverage the dialogue continuation capabilities of a large language model to sample diverse,contextually aligned dialogue branches,employing one-shot learning for intervention.The second stage involves modeling doctors’preferences through both outcome and process feedback.For outcome feedback,a rule-based reward system is utilized,whereas a planning-based reward strategy is employed for process feedback.To validate our approach,we develop the Chinese Standardized Patient Test(CSPT)dataset that emphasizes user guiding,instruction following,and synthesis ability,and construct an objective assessment system based on standardized patient testing.Experimental results demonstrate that our data synthesis approach performs well across five datasets,achieving a 17.6%improvement in diagnostic accuracy with outcome feedback and a 23.3%improvement with process feedback. 展开更多
关键词 large language model(LLM) medical dialogue reinforcement learning from artificial intelligence feedback(RLAIF) standardized patient testing
原文传递
SAGA:Sumn arization-Guided Assert Statement Generation
11
作者 Yu-Wei Zhang Zhi Jin +2 位作者 Ze-Jun Wang Ying Xing Ge Li 《Journal of Computer Science & Technology》 2025年第1期138-157,共20页
Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models hav... Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models have shown promise in improving the performance of assert statement generation.However,the existing models only rely on the test prefixes along with their corresponding focal methods,yet ignore the developer-written summarization.Based on our observations,the summarization contents usually express the intended program behavior or contain parameters that will appear directly in the assert statement.Such information will help existing models address their current inability to accurately predict assert statements.This paper presents a summarization-guided approach for automatically generating assert statements.To derive generic representations for natural language(i.e.,summarization)and programming language(i.e.,test prefixes and focal methods),we leverage a pre-trained language model as the reference architecture and fine-tune it on the task of assert statement generation.To the best of our knowledge,the proposed approach makes the first attempt to leverage the summarization of focal methods as the guidance for making the generated assert statements more accurate.We demonstrate the effectiveness of our approach on two real-world datasets compared with state-of-the-art models. 展开更多
关键词 assert generation deep learning method summarization pre-trained language model unit testing
原文传递
Coverage-Based Fault Localization in Haskell
12
作者 Feng Li Guo-Qing Wang +1 位作者 Meng Wang Dan Hao 《Journal of Computer Science & Technology》 2025年第1期158-177,共20页
Fault localization is to identify faulty program elements.Among a large number of fault localization approaches in the literature,coverage-based fault localization,especially spectrum-based fault localization(SBFL),ha... Fault localization is to identify faulty program elements.Among a large number of fault localization approaches in the literature,coverage-based fault localization,especially spectrum-based fault localization(SBFL),has been intensively studied due to its effectiveness and lightweightness.Despite the rich literature,almost all existing fault localization approaches and studies have been conducted on imperative programming languages such as Java and C,leaving a gap in other programming paradigms.In this paper,we aim to study fault localization approaches for the functional programming paradigm,using the Haskell language as a representative.To the best of our knowledge,we build up the first dataset on real Haskell projects,including both real and seeded faults.The dataset enables the research of fault localization for functional languages.With it,we explore fault localization techniques for Haskell.In particular,as is typical for SBFL approaches,we study methods for coverage collection and formulae for suspiciousness score computation,and carefully adapt these two components to Haskell considering the language features and characteristics,resulting in a series of adaption approaches.Moreover,we design a learning-based approach and a transfer learning based approach to take advantage of data from imperative languages.Both approaches are evaluated on our dataset to demonstrate the promises of thedirection. 展开更多
关键词 DEBUGGING fault localization HASKELL programming paradigms
原文传递
A survey on EOSIO systems security:vulnerability,attack,and mitigation
13
作者 Ningyu HE Haoyu WANG +3 位作者 Lei WU Xiapu LUO Yao GUO Xiangqun CHEN 《Frontiers of Computer Science》 2025年第6期115-138,共24页
EOSIO,as a representative of blockchain 3.0 platforms,immediately follows in the footsteps of Bitcoin and Ethereum.It has raised the largest ever initial coin offering,and its market capitalization has reached up to$1... EOSIO,as a representative of blockchain 3.0 platforms,immediately follows in the footsteps of Bitcoin and Ethereum.It has raised the largest ever initial coin offering,and its market capitalization has reached up to$14.3 billion.Innovatively,EOSIO brings adopts lots of new features,like the delegated proof of stake consensus algorithm and updatable smart contracts.Not only these features lead to a prosperity of the decentralized application ecosystem,but they also inevitably introduce loopholes.For example,EOSBet,a famous gambling DApp,was attacked twice within a single month and lost more than$1 million.To the best of our knowledge,little work has surveyed the EOSIO from a security researcher’s perspective.To fill this gap,we firstly abstract the complicated EOSIO ecosystem into components following hierarchical relationships,upon which we delve deeper for root causes of all existing vulnerabilities.We also systematically study possible attacks and mitigations against these vulnerabilities,and summarize several best practices for developers,EOSIO official,and security researchers to shed light on future directions. 展开更多
关键词 EOSIO blockchain smart contract
原文传递
Technical framework for Internetware:An architecture centric approach 被引量:32
14
作者 YANG FuQing LüJian MEI Hong 《Science in China(Series F)》 2008年第6期610-622,共13页
Being a new software paradigm evolved by the Internet,Internetware brings many challenges to the traditional software methods and techniques.Sponsored by the national basic research program(973),researchers in China h... Being a new software paradigm evolved by the Internet,Internetware brings many challenges to the traditional software methods and techniques.Sponsored by the national basic research program(973),researchers in China have developed an architecture centric technical framework for the definition,incarnation and engineering of Internetware.First of all,a software model for Internetware is defined for what to be,including that Internetware entities should be packaged as components,behaving as agents,interoperating as services,collaborating in a structured and on demand manner,etc.Secondly,a middleware for Internetware is designed and implemented for how to be,including that Internetware entities are incarnated by runtime containers,structured collaborations are enabled by runtime software architecture,Internetware can be managed in a reflective and autonomic manner,etc.Thirdly,an engineering methodology for Internetware is proposed for how to do,including the way to develop Internetware entities and their collaborations by transforming and refining a set of software architectures which cover all the phases of software lifecycle,the way to identify and organize the disordered software assets by domain modeling,etc. 展开更多
关键词 INTERNETWARE COMPONENT software architecture AGENT MIDDLEWARE
原文传递
Providing Virtual Cloud for Special Purposes on Demand in JointCloud Computing Environment 被引量:4
15
作者 Dong-Gang Cao Member, CCF, IEEE, Bo An +1 位作者 Pei-Chang Shi Huai-Min Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期211-218,共8页
Cloud computing has been widely adopted by enterprises because of its on-demand and elastic resource usage paradigm. Currently most cloud applications are running on one single cloud. However, more and more applicatio... Cloud computing has been widely adopted by enterprises because of its on-demand and elastic resource usage paradigm. Currently most cloud applications are running on one single cloud. However, more and more applications demand to run across several clouds to satisfy the requirements like best cost efficiency, avoidance of vender lock-in, and geolocation sensitive service. JointCloud computing is a new research initiated by Chinese institutes to address the computing issues concerned with multiple clouds. In JointCloud, users' diverse and dynamic requirements on cloud resources axe satisfied by providing users virtual cloud (VC) for special purposes. A virtual cloud for special purposes is in essence a user's specific cloud working environment having the customized software stacks, configurations and computing resources readily available. This paper first introduces what is JointCloud computing and then describes the design rationales, motivation examples, mechanisms and enabling technologies of VC in JointCloud. 展开更多
关键词 cloud computing JointCloud virtual cloud (VC) cloud working environment
原文传递
Test-case prioritization: achievements and challenges 被引量:3
16
作者 Dan HAO Lu ZHANG Hong MEI 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第5期769-777,共9页
Test-case prioritization, proposed at the end of last century, aims to schedule the execution order of test cases so as to improve test effectiveness. In the past years, test-case prioritization has gained much attent... Test-case prioritization, proposed at the end of last century, aims to schedule the execution order of test cases so as to improve test effectiveness. In the past years, test-case prioritization has gained much attention, and has significant achievements in five aspects: prioritization algorithms, coverage criteria, measurement, practical concems involved, and application scenarios. In this article, we will first review the achievements of test-case prioritization from these five as- pects and then give our perspectives on its challenges. 展开更多
关键词 test-case prioritization ACHIEVEMENTS CHALLENGES
原文传递
Energy-Aware GPU Programming at Source-Code Levels 被引量:1
17
作者 Changyou Zhang Kun Huang +1 位作者 Xiang Cui Yifeng Chen 《Tsinghua Science and Technology》 EI CAS 2012年第3期278-286,共9页
To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power... To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power consumption in key situations. First, a set of primitives is abstracted from program statements. Then, data transfer bandwidth and power consumption in different granularity sizes are consid- ered and mapped into proper primitives. With these mappings, a programmer can intuitively determine the power efficiency and performance in different running states of a thread. Finally, this intuition enables the programmer to tune the algorithm in order to achieve the best energy efficiency and performance. Using these power-aware principles, two Fast Fourier Transform (FFT) methods are compared. The mapping be- tween power consumption and primitives is helpful for algorithm tuning in source-code levels. 展开更多
关键词 GPU POWER-AWARE source-code PRIMITIVE
原文传递
User story clustering in agile development:a framework and an empirical study 被引量:1
18
作者 Bo YANG Xiuyin MA +3 位作者 Chunhui WANG Haoran GUO Huai LIU Zhi JIN 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第6期43-59,共17页
Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development process.User stories are the primary means of requirements collection and... Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development process.User stories are the primary means of requirements collection and elicitation in the agile development.A project can involve a large amount of user stories,which should be clustered into different groups based on their functionality’s similarity for systematic requirements analysis,effective mapping to developed features,and efficient maintenance.Nevertheless,the current user story clustering is mainly conducted in a manual manner,which is time-consuming and subjective to human bias.In this paper,we propose a novel approach for clustering the user stories automatically on the basis of natural language processing.Specifically,the sentence patterns of each component in a user story are first analysed and determined such that the critical structure in the representative tasks can be automatically extracted based on the user story meta-model.The similarity of user stories is calculated,which can be used to generate the connected graph as the basis of automatic user story clustering.We evaluate the approach based on thirteen datasets,compared against ten baseline techniques.Experimental results show that our clustering approach has higher accuracy,recall rate and F1-score than these baselines.It is demonstrated that the proposed approach can significantly improve the efficacy of user story clustering and thus enhance the overall performance of agile development.The study also highlights promising research directions for more accurate requirements elicitation. 展开更多
关键词 user story agile development user story mapping CLUSTERING
原文传递
DHC:Distributed,Hierarchical Clustering in Sensor Networks
19
作者 马秀莉 胡海峰 +4 位作者 李双峰 肖红梅 罗琼 杨冬青 唐世渭 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期643-662,共20页
In many sensor network applications, it is essential to get the data distribution of the attribute value over the network. Such data distribution can be got through clustering, which partitions the network into contig... In many sensor network applications, it is essential to get the data distribution of the attribute value over the network. Such data distribution can be got through clustering, which partitions the network into contiguous regions, each of which contains sensor nodes of a range of similar readings. This paper proposes a method named Distributed, Hierarchical Clustering (DHC) for online data analysis and mining in senior networks. Different from the acquisition and aggregation of raw sensory data, DHC clusters sensor nodes based on their current data values as well as their geographical proximity, and computes a summary for each cluster. ~3arthermore, these clusters, together with their summaries, are produced in a distributed, bottom-up manner. The resulting hierarchy of clusters and their summaries facilitates interactive data exploration at multiple resolutions. It can also be used to improve the efficiency of data-centric routing and query processing in sensor networks. We also design and evaluate the maintenance mechanisms for DHC to make it be able to work on evolving data. Our simulation results on real world datasets as well as synthetic datasets show the effectiveness and efficiency of our approach. 展开更多
关键词 CLUSTERING data mining wireless sensor networks.
原文传递
WPIA:accelerating DNN warm-up in Web browsers by precompiling WebGL programs
20
作者 Deyu TIAN Yun MA +3 位作者 Yudong HAN Qi YANG Haochen YANG Gang HUANG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第6期281-283,共3页
1 Introduction.With the advent of artificial intelligence,it is becoming increasingly common to leverage deep learning technologies to provide intelligent services in Web apps[1].Compared with traditional approaches w... 1 Introduction.With the advent of artificial intelligence,it is becoming increasingly common to leverage deep learning technologies to provide intelligent services in Web apps[1].Compared with traditional approaches where deep neural network(DNN)runs at cloud servers,DNN inference in Web browsers avoids serverconnections,boostingtheresponsivenesssand enhancing user privacy of Web apps[2].Typically,GPU acceleration is required during DNN inference,especially on enddevices. 展开更多
关键词 WEB BROWSER WEBGL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部