Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Public Affairs, Public Policy and Public Administration (14)
- Science and Technology Policy (14)
- Social and Behavioral Sciences (14)
- Computer Sciences (13)
- Physical Sciences and Mathematics (13)
-
- Data Storage Systems (4)
- Data Science (3)
- Databases and Information Systems (3)
- Computer and Systems Architecture (2)
- Artificial Intelligence and Robotics (1)
- Development Studies (1)
- Electrical and Computer Engineering (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Health Information Technology (1)
- Medicine and Health Sciences (1)
- Keyword
-
- Advanced Storage Research Consortium (ASRC),research consortium,innovation consortium (1)
- Artificial intelligence, hospital leading, multi-modal data, research coordinator (1)
- Chip design, artificial intelligence,chip learning, design automation (1)
- Data localization, data,governance, data,regulation, India (1)
- Future network, Internet, deterministic network, network programming, open network (1)
-
- Human-cyber-physical systems, low-entropy computing network, high-goodput computing, constrained tail behavior, intelligence flow (1)
- IT system, self-reliance and self-improvement of technique, opening up and sharing, new paradigm of research (1)
- Information tech-systems, self-reliance and self-strengthening at high level, community of technological destiny, cross layer vertical integration, open source ecology, agile design, agile manufacturing (1)
- Internet of Everything, ubiquitous operating system, open source ecosystem, construction method (1)
- Multi-source heterogeneous, wuli-shili-renli (WSR), data fusion, big data (1)
- Open-source chip, RISC-Ⅴ,open-source ecosystem (1)
- RCEP, cross-border data flows, digital productivity, digital economic (1)
- Security situation, talent certification, network security insurance, cyber range, public testing (1)
- Technology innovation based on science, industry-university-research, large-scale innovation, chain reaction, dynamic mechanism (1)
- Ubiquitous computing, Ubiquitous Operating System, human-cyber-physical system, software definition (1)
Articles 1 - 15 of 15
Full-Text Articles in Computer Engineering
Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan
Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan
Bulletin of Chinese Academy of Sciences (Chinese Version)
By studying the technological innovation and industrial development process of semiconductor, digital computer and radio, this study analyzes the path, conditions and force of science-based technological innovation and its industrialization, establishes a chain reaction model of large-scale technological innovation and diffusion, and compares it with market-based technological innovation. It is found that the large-scale aggregation of scientific research institutions and industrial laboratories accelerates the speed of technological innovation, and diffuses along two paths of scientific research institutions to enterprises and enterprises to enterprises, forming a chain reaction of large-scale technological innovation. Strategic demand is the basic driving force for the …
On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao
On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao
Bulletin of Chinese Academy of Sciences (Chinese Version)
This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …
Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi
Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …
Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan
Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan
Bulletin of Chinese Academy of Sciences (Chinese Version)
Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
Bulletin of Chinese Academy of Sciences (Chinese Version)
In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li
Bulletin of Chinese Academy of Sciences (Chinese Version)
Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …
Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang
Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the process of comprehensively promoting Chinese-style modernization, we must adhere to scientific and technological selfreliance and self-improvement as the strategic support for national development, and scientific and technological innovation is the main driving force for high-quality economic development. As one of the carriers, the innovation consortium formed by enterprises as main entities aims to realize the deep integration of innovation chain and industrial chain, accelerating the transformation of scientific and technological achievements into real productivity, and solving the problem of disconnection between scientific research activities and industrial demand. On the basis of reviewing and summarizing the evolution of the …
Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun
Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun
Bulletin of Chinese Academy of Sciences (Chinese Version)
RISC-Ⅴ has been obtained huge attentions and extensively invested over the past decade due to its exciting slogan that "Instruction Sets Want to be Free". Based on RISC-Ⅴ, we are able to build a "human community with a shared future" in the CPU chip area, although there are still many challenges. China should explore its capability to make more contributions in building the open-source chip ecosystem.
Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun
Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun
Bulletin of Chinese Academy of Sciences (Chinese Version)
Self-reliance and self-strengthening at high level does not depend on a single technique, but on the formation of an advantageous national tech-system, so called "country-as-a-platform". Information tech-system refers to the whole one that closely connects devices, components, complete machine, system software, middleware, and application software with a series of technical standards and intellectual property rights. We are entering the IT 3.0 era characterized by integration of human-cyber-physical world. The IT 3.0 era will certainly produce a new tech-system different from the IT 1.0 and IT 2.0 eras, which is a rare opportunity for China to build a self-reliance and self-strengthening …
Thoughts On New It Technique System, Ninghui Sun
Thoughts On New It Technique System, Ninghui Sun
Bulletin of Chinese Academy of Sciences (Chinese Version)
The world is entering a new period of information society dominated by digital economy. To adapt to the requirements of the new development stage of China, and to achieve the key technologies development, it is necessary to accelerate the construction of a new selfreliance and self-improvement IT technique system. The article gives some thoughts on the demand, principle, and key method on above issues, and the new paradigm of research at Institute of Computing Technology, Chinese Academy of Sciences.
From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan
From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan
Bulletin of Chinese Academy of Sciences (Chinese Version)
Chip is the foundation of the modern information society. As the world is entering a new era of human-cyber-physical ternary computing, with diverse intelligent applications over trillions of devices, chip with specialized architecture will be heavily demanded in both numbers and types. However, chip design is very costly, which usually requires a long design cycle, complicated process, and high professional developers. Hence, there is a large gap between the need of tremendous chips and the high cost of chip design in the new era. This study proposes Chip Learning, a learning-based method to perform the entire chip design, including logic …
Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie
Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie
Bulletin of Chinese Academy of Sciences (Chinese Version)
In response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing, a new kind of operating system named Ubiquitous Operating System (UOS) is emerging and under exploration for further development. The human-cyberphysical ternary ubiquitous computing has many new features, such as open and dynamic environment, diverse requirements, and complex application scenarios. New ubiquitous applications pose special demands on ubiquitous sensing and connection, lightweight computing and artificial intelligence, dynamic adaptation, feedback and control, natural human-computer-interaction, etc. To support these new requirements, a software definition mechanism is in need to flexibly control hardware, data resources, platforms, and applications. This …
Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang
Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang
Bulletin of Chinese Academy of Sciences (Chinese Version)
Currently, network technology is deeply integrated with the physical world. Traditional network architectures cannot support the differentiated, customizable, and deterministic needs of industrial Internet and other services. Exploring new network architecture and core technology has officially become the strategic commanding heights of the global Internet competition. To this end, the paper reviews the evolution and trends of the network, analyzes how to achieve high-performance, low-cost, intelligent network development strategies for establishing an autonomous and controllable future network. Two conclusions are drawn as follows. (1) Through the exploration of network construction in recent decades, integration, openness, intelligence, customization and integration of …
Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun
Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun
Bulletin of Chinese Academy of Sciences (Chinese Version)
The world is entering a new era of human-cyber-physical ternary computing with diverse intelligent applications over trillions of devices. This calls for a new type of cyberinfrastructure characterized by a planet-scale, high-goodput, low-entropy computing network, colloquially named Information Superbahn. This article highlights the vision of Information Superbahn, including fundamental requirements, key scientific problems, and a candidate system architecture. The goal of building the Information Superbahn is to natively support humancyber-physical systems and low-entropy computing modes, to reduce the effects of systems disorder. Compared with existing network computing systems, such as Internet, cloud computing, big data and Internet of Things, Information …
Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang
Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang
Bulletin of Chinese Academy of Sciences (Chinese Version)
Cyberspace security has been an important part in ensuring economic development and supporting the progress of modern science and technology. As more and more applications are relying on information technology (IT), it becomes very important to improve the security situation of cyberspace. How to take effective measures to practically improve the cyberspace security situation has become the core problem disscussed in this paper. This paper addresses it from the perspectives of "talent, finance and infrastructure". First, on the premise of insufficient supply of cyberspace security talents, this paper proposes to establish the ability certification of talents transferred from other IT …