[1] |
ZHAO Zhi-qiao, ZHOU Li, XUN Chang-qing, PAN Guo-teng, TIE Jun-bo, WANG Wei-zheng.
Efficient analysis of coherent hub interface protocol mixturing hardware and software
[J]. Computer Engineering & Science, 2024, 46(02): 224-231.
|
[2] |
DENG Xi, FAN Guang-sheng, CHEN Li-qian, LI Tun, WANG Ji.
A Verilog code verification method based on C program analysis and verification techniques
[J]. Computer Engineering & Science, 2023, 45(12): 2146-2154.
|
[3] |
LIU Yong-mei, WANG Guo-hui, GUAN Yong, ZHANG Jing-zhi, SHI Zhi-ping, DONG Lu .
Formal verification of Greens theorem and its applications
[J]. Computer Engineering & Science, 2023, 45(07): 1178-1187.
|
[4] |
BAI Xian-ping, YAO Xi-xin, CHEN Xiang-lan, LIU Chong, LI Xi.
An AADL end-to-end flow specification verification method based on timed automata
[J]. Computer Engineering & Science, 2023, 45(05): 810-819.
|
[5] |
LUO Li, SHI Wei, HE Hong-jun, PAN Guo-teng, WANG Lei, GONG Rui.
An agile verification method of IO Die
[J]. Computer Engineering & Science, 2023, 45(04): 571-576.
|
[6] |
WANG Zheng, HUANG Rong, WU Mao-wen, SUN Yin-han, SUN Zhi-gang.
OpenEmulator: A co-emulation platform based on TSN chip verification
[J]. Computer Engineering & Science, 2023, 45(03): 411-419.
|
[7] |
CHEN Qiang, TAN Lin, WANG Yun-li, XIAO Jing.
A CUDA-based data-parallel processing method in industrial blockchain
[J]. Computer Engineering & Science, 2022, 44(12): 2102-2110.
|
[8] |
LI Hui, JU Peng-jin, JI Yong-xing.
Error tracing and location technology in multi-processor cache coherence verification
[J]. Computer Engineering & Science, 2022, 44(07): 1171-1180.
|
[9] |
CHEN Xiao-fan, YANG Zhi-jie, PENG Ling-hui, WANG Shi-ying, ZHOU Gan, LI Shi-ming, KANG Zi-yang, WANG Yao, SHI Wei, WANG Lei.
A verification framework of network on chip for neuromorphic processors
[J]. Computer Engineering & Science, 2022, 44(05): 769-778.
|
[10] |
RUAN Ou, CHEN Ji-chen, MAO Hao.
An efficient batch verification algorithm for SM2 signatures
[J]. Computer Engineering & Science, 2021, 43(07): 1236-1242.
|
[11] |
GUO Hui, HUANG Li-bo, ZHENG Zhong, SUI Bing-cai, WANG Yong-wen.
Proto-Perf:Fast and accurate processor prototype performance evaluation
[J]. Computer Engineering & Science, 2021, 43(04): 579-585.
|
[12] |
LUO Li, ZHOU Hong-wei, ZHOU Li, PAN Guo-teng, ZHOU Hai-liang, LIU Bin.
QoS design and verification of direct connection interface for multi-core processors
[J]. Computer Engineering & Science, 2021, 43(04): 620-627.
|
[13] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(07): 1197-1207.
|
[14] |
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.
A certificateless public key authenticated searchable
encryption scheme with efficient authorization
[J]. Computer Engineering & Science, 2020, 42(03): 418-426.
|
[15] |
ZHANG Jian-min,LI Tie-jun,MA Ke-fan,XIAO Li-quan.
Research advances in the solving methods of
satisfiability modulo theories based on first-order logic
[J]. Computer Engineering & Science, 2019, 41(12): 2119-2126.
|