Int. J. Softw. Informatics最新文献

筛选
英文 中文
Exploit-oriented Automated Information Leakage 面向漏洞的自动信息泄露
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00290
Songtao Yang, Kaixiang Chen, Zhun Wang, Chao Zhang
{"title":"Exploit-oriented Automated Information Leakage","authors":"Songtao Yang, Kaixiang Chen, Zhun Wang, Chao Zhang","doi":"10.21655/ijsi.1673-7288.00290","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00290","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database Translation Mechanism: Generating Data Dictionary for Relational Database 数据库转换机制:关系型数据库数据字典的生成
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00291
Wei Zhang, Hang Zhou, Jiayin Chen, Xi Chen, Zhiyi Ma
{"title":"Database Translation Mechanism: Generating Data Dictionary for Relational Database","authors":"Wei Zhang, Hang Zhou, Jiayin Chen, Xi Chen, Zhiyi Ma","doi":"10.21655/ijsi.1673-7288.00291","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00291","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132452595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structurally-Enhanced Approach for Automatic Code Transformation 自动代码转换的结构增强方法
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00263
Yingkui Cao, Zeyu Sun, Yanzhen Zou, Bing Xie
{"title":"Structurally-Enhanced Approach for Automatic Code Transformation","authors":"Yingkui Cao, Zeyu Sun, Yanzhen Zou, Bing Xie","doi":"10.21655/ijsi.1673-7288.00263","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00263","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Access Cache Indexing Framework Adapted to GPU 适合GPU的混合存取缓存索引框架
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00249
Hongjun Zhang, Yanjun Wu, Heng Zhang, Libo Zhang
{"title":"Hybrid Access Cache Indexing Framework Adapted to GPU","authors":"Hongjun Zhang, Yanjun Wu, Heng Zhang, Libo Zhang","doi":"10.21655/ijsi.1673-7288.00249","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00249","url":null,"abstract":"Hash tables, as a type of data indexing structure that provides efficient data access based on key values, are widely used in various computer applications, especially in system software, databases, and high-performance computing field that requires extremely high performance. In network, cloud computing and IoT services, hash tables have become the core system components of cache systems. However, with the large-scale increase in the amount of large-scale data, performance bottlenecks have gradually emerged in systems designed with a multi-core CPU as the core of the hash table structure. There is an urgent need to further improve the high performance and scalability of the hash tables. With the increasing popularity of general-purpose Graphic Processing Units (GPUs) and the substantial improvement of hardware computing capabilities and concurrency performance, various types of system software tasks with parallel computing as the core have been optimized on the GPU and have achieved considerable performance improvements. Due to the sparseness and randomness, using the existing parallel structure of the hash tables directly on the GPUs will inevitably bring high-frequency memory access and frequent bus data transmission, which affects the performance of the hash tables on the GPUs. This study focuses on the analysis of memory access, hit ratio, and index overhead of hash table indexes in the cache system. The hybrid access cache indexing framework CCHT (Cache Cuckoo Hash Table) adapted to GPU is proposed and provided. The cache strategy suitable to different requirements of hit ratios and index overheads allows concurrent execution of write and query operations, maximizing the use of the computing performance and concurrency characteristics of GPU hardware, reducing memory access and bus transferring overhead. Through GPU hardware implementation and experimental verification, CCHT is shown to have better performance than other cache indexing hash tables while ensuring cache hit ratios.","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidence-weighted Learning for Feature Evolution 特征演化的置信度加权学习
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00271
Yanfang Liu, Wenbin Li, Yang Gao
{"title":"Confidence-weighted Learning for Feature Evolution","authors":"Yanfang Liu, Wenbin Li, Yang Gao","doi":"10.21655/ijsi.1673-7288.00271","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00271","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Instruction Set Extension and Code Mapping Mechanism 神经网络指令集扩展和代码映射机制
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00251
Wenqi Lou, Chao Wang, Lei Gong, Xuehai Zhou
{"title":"Neural Network Instruction Set Extension and Code Mapping Mechanism","authors":"Wenqi Lou, Chao Wang, Lei Gong, Xuehai Zhou","doi":"10.21655/ijsi.1673-7288.00251","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00251","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Empirical Software Engineering Models: Can They Become the Equivalent of Physical Laws in Traditional Engineering? 经验软件工程模型:它们能成为传统工程中的物理定律吗?
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-37395-4_1
H. D. Rombach
{"title":"Empirical Software Engineering Models: Can They Become the Equivalent of Physical Laws in Traditional Engineering?","authors":"H. D. Rombach","doi":"10.1007/978-3-642-37395-4_1","DOIUrl":"https://doi.org/10.1007/978-3-642-37395-4_1","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-granularity Inter-class Correlation Based Contrastive Learning for Open Set Recognition 基于多粒度类间相关对比学习的开放集识别
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00266
Peng Fei Zhu, Wanying Zhang, Yu Wang, Qinghua Hu
{"title":"Multi-granularity Inter-class Correlation Based Contrastive Learning for Open Set Recognition","authors":"Peng Fei Zhu, Wanying Zhang, Yu Wang, Qinghua Hu","doi":"10.21655/ijsi.1673-7288.00266","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00266","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Schedulability Analysis of AADL Architecture with Storage Resource Constraint 考虑存储资源约束的AADL体系结构可调度性分析
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00255
Yin Lu, Shudong Qin, Leqi Xi, Yunwei Dong
{"title":"On Schedulability Analysis of AADL Architecture with Storage Resource Constraint","authors":"Yin Lu, Shudong Qin, Leqi Xi, Yunwei Dong","doi":"10.21655/ijsi.1673-7288.00255","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00255","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125050902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Robust Adversarial Training via Dual-label Supervised and Geometry Constraint 基于双标签监督和几何约束的鲁棒对抗训练
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00268
Liujuan Cao, Huafeng Kuang, Hong Liu, Yan Wang, Baochang Zhang, Feiyue Huang, Yongjian Wu, Rongrong Ji
{"title":"Towards Robust Adversarial Training via Dual-label Supervised and Geometry Constraint","authors":"Liujuan Cao, Huafeng Kuang, Hong Liu, Yan Wang, Baochang Zhang, Feiyue Huang, Yongjian Wu, Rongrong Ji","doi":"10.21655/ijsi.1673-7288.00268","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00268","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信