工学 >>> 计算机科学技术 >>> 计算机工程 >>> 计算机存储技术 >>>
搜索结果: 1-15 共查到知识库 计算机存储技术相关记录227条 . 查询时间(1.744 秒)
氧化物阻变存储器机理与性能调控。
当今,电脑系统采用层次化存储架构:缓存、内存和闪存。离CPU越近,对存储器存储速度需求越高,如内存的速度为纳秒级别,而缓存则需要皮秒级别。作为下一代存储器的有力竞争者,相变存储器的速度决定了其应用领域,而相变存储器速度主要由相变材料的结晶速度(写速度)所决定。研究表明,相变存储器的热稳定性越差,结晶速度越快,而单质锑(Sb)是目前已知热稳定性最差的相变材料,可能具有最快的操作速度。
Recent developments in Building Information Modelling (BIM) technologies are facilitating the management of historic complex structures using new applications. This paper proposes a generative method ...
随着遥感、定位等技术的不断发展,时空数据大量的产生需要科学化的管理,从而发挥其价值。研究现状中,大量的工作关注于如何利用HBase有效存储和快速查询结构化的时空数据,然而实际中,有些时空数据存在于半结构文档中,如描述遥感产品的元数据,对于这类数据,往往进行如XPath的半结构化+时空查询,这个问题在前序工作中较少讨论。本文针对在HBase中如何进行有效的半结构化时空数据存储和查询问题展开研究,首先...
Much research has been devoted to studies of and algorithms for memory management based on garbage collection or explicit allocation and deallocation. An alternative approach, region-based memory mana...
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying escape analysis: any a...
We present a compiler for machines with an explicitly managed memory hierarchy and suggest that a primary role of any compiler for such architectures is to manipulate and schedule a hierarchy of bulk ...
We present a platform independent runtime interface for moving data and computation through parallel machines with multi-level memory hierarchies. We show that this interface can be used as a compiler...
Many relational static analysis techniques for precise reasoning about heap contents perform an explicit case analysis of all possible heaps that can arise. We argue that such precise relational reaso...
Real-world garbage collectors in managed languages are complex.We investigate whether this complexity is really necessary and show that by having a different (but wider) interface between the collecto...
Traditionally storage has not been part of a programming model’s semantics and is added only as an I/O library interface.
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provi...
云存储中,应用异地容灾备份的方式,可有效防止大规模停电和天灾发生情况下的数据丢失.目前对于异地容灾能力的保障大多基于云存储服务提供商的合同约束,还没有高效且安全的数据异地容灾能力验证机制.针对此问题,本文提出了一种对云端数据的异地容灾能力进行验证的方案——DPBDL(Data disaster-tolerant Proving Based on Different Location),其核心思想是...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...