ID |
原文 |
译文 |
25995 |
自定义指令自动识别是可扩展处理器设计中的关键问题之一。 |
Automatic custom instruction identification is one of the key issues involved in the design of extensible processors. |
25996 |
针对可扩展处理器的应用领域和发展趋势,介绍近年来自定义指令自动识别的研究进展; |
In view of the application fields and development trends of extensible processors, this survey introduces the research progress of automatic identification of custom instructions in recent years. |
25997 |
在此基础上,对于自定义指令识别涉及的关键步骤:中间表示生成、自定义指令枚举、自定义指令选择和代码转换,分别进行总结和归纳,分析不同方法的优点和难点;按照不同应用领域,对可扩展处理器的应用进行了总结和分析; |
On this basis, there are four key issues involved in the automatic identification of custom instructions: intermediate representation generation, custom instructions e-numeration, custom instructions selection and code transformation. This survey analyzes the advantages and difficulties of previous methods, and presents the summary of the applications of extensible processor in terms of different application fields. |
25998 |
最后展望了自定义指令自动识别的未来发展趋势和研究方向。 |
Finally, the trends and possible research directions of automatic identification of custom instructions is presented. |
25999 |
针对现有的应用于基于属性加密方案的安全模指数外包算法存在会降低安全性、验证概率低、外包计算结果可能出错等问题,利用改进的安全模指数外包算法,提出一种支持可验证加解密外包的 CP-ABE(Ciphertext-PolicyAttribute-Based Encryption)方案。 |
The existing outsourcing algorithms for modular exponentiations has some problems such as low security, low probability of validation and wrong calculation results. A CP-ABE (Ciphertext-Policy Attribute-Based Encryption) scheme with verifiable outsourced encryption and decryption is proposed with the help of the improved algorithm for secure outsourcing of modular exponentiations. |
26000 |
将属性相关密钥子项外包,将共享密文子项的一半计算任务外包,并对所有的外包结果进行验证。 |
The scheme outsources attribute-related key subitems, outsources half of the computing tasks of shared ciphertext subitems, and verifies all the outsourced results. |
26001 |
理论分析和实验结果都表明,和现有相关方案相比,无论在密钥生成时,还是在加密时,所提出方案的授权机构和用户客户端的计算量都有明显减少。 |
Theoretical and experimental analysis show that compared with the existing related schemes, both in key generation and encryption, the computing overhead of both authority centers and user clients of the proposed scheme has been significantly reduced. |
26002 |
安全性分析表明,所提出的方案达到 CPA(Chosen Plaintext Attack)安全。 |
Security analysis shows that the proposed scheme can defend against chosen plaintext attacks. |
26003 |
针对集成电路测试过程中测试时间长,影响测试效率的问题,提出了一种集成电路测试流程分级动态调整方法。 |
Aiming at the problem of long test time and affecting test efficiency in integrated circuit testing process, a hi-erarchical dynamic adjustment method for integrated circuit testing process was proposed. |
26004 |
通过统计样本集成电路中每种测试类型和每条测试向量的测试故障率来建立贝叶斯概率模型,根据其命中故障点的概率高低分级调整它们的加载顺序。 |
The Bayesian probability model was established by counting the test failure rate of each test type and each test vector in the sample integrated circuit, and the testing process is hierarchically adjusted according to the probability of their hit fault. |