- Computational Medicine with Deep Learning2016/06/28
- Cache-Memory Attacks in Clouds and Mobile Devices2016/06/22
- The IC security and reliability research of Florida University2016/06/21
- IP Fingerprinting: From Theory to Practice2016/06/21
- Symbolic AI reconsidered2016/06/02
- Memory Sluice Gate Theory: Have we found a solution for memory wall?2016/06/02
- The Case for Targeting Open Defects instead of Transition Faults during IC Te...2016/03/11
- 非易失存储器发展态势和挑战2015/12/25
- Emerging HPC Technologies for High-Performance Data Management Systems2015/11/24
- Toward Energy-Efficient Computing2015/10/16
- 谁动了我的饼干——Web Cookie的完整性和现实威胁2015/10/13
- 2015年度开放课题指南2015/09/29
- 关于异构系统上性能可移植性的报告2014/11/10
- Computer System Protection through Hardware-Software Collaboration2014/10/16
- 电信诈骗案日趋频发 如何防骗?----拦截哥给您来支招2014/10/15
- 相对标准的基本原理2014/10/08