Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Social and Behavioral Sciences

Thoughts On New It Technique System, Ninghui Sun Jan 2022

Thoughts On New It Technique System, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new period of information society dominated by digital economy. To adapt to the requirements of the new development stage of China, and to achieve the key technologies development, it is necessary to accelerate the construction of a new selfreliance and self-improvement IT technique system. The article gives some thoughts on the demand, principle, and key method on above issues, and the new paradigm of research at Institute of Computing Technology, Chinese Academy of Sciences.


Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun Jan 2022

Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

RISC-Ⅴ has been obtained huge attentions and extensively invested over the past decade due to its exciting slogan that "Instruction Sets Want to be Free". Based on RISC-Ⅴ, we are able to build a "human community with a shared future" in the CPU chip area, although there are still many challenges. China should explore its capability to make more contributions in building the open-source chip ecosystem.


Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang Jan 2022

Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Currently, network technology is deeply integrated with the physical world. Traditional network architectures cannot support the differentiated, customizable, and deterministic needs of industrial Internet and other services. Exploring new network architecture and core technology has officially become the strategic commanding heights of the global Internet competition. To this end, the paper reviews the evolution and trends of the network, analyzes how to achieve high-performance, low-cost, intelligent network development strategies for establishing an autonomous and controllable future network. Two conclusions are drawn as follows. (1) Through the exploration of network construction in recent decades, integration, openness, intelligence, customization and integration of …


Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang Jan 2022

Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, there are such significant improvements on the performance and efficiency of big data technology and system. As it is widely applied in various fields, big data has empowered industrial intelligence, and is the key step into the intelligent stage of information society. Therefore, we are facing greater challenges nowadays, such as the paradox of data flooding and high-value data lacking, the complexity and uncertainty of big data analysis, and the difficulty to balance the data on sharing and circulation, and trustworthiness and security. Moreover, these challenges will not only promote the innovation and change of big data …


Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun Jan 2022

Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

Self-reliance and self-strengthening at high level does not depend on a single technique, but on the formation of an advantageous national tech-system, so called "country-as-a-platform". Information tech-system refers to the whole one that closely connects devices, components, complete machine, system software, middleware, and application software with a series of technical standards and intellectual property rights. We are entering the IT 3.0 era characterized by integration of human-cyber-physical world. The IT 3.0 era will certainly produce a new tech-system different from the IT 1.0 and IT 2.0 eras, which is a rare opportunity for China to build a self-reliance and self-strengthening …


From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan Jan 2022

From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Chip is the foundation of the modern information society. As the world is entering a new era of human-cyber-physical ternary computing, with diverse intelligent applications over trillions of devices, chip with specialized architecture will be heavily demanded in both numbers and types. However, chip design is very costly, which usually requires a long design cycle, complicated process, and high professional developers. Hence, there is a large gap between the need of tremendous chips and the high cost of chip design in the new era. This study proposes Chip Learning, a learning-based method to perform the entire chip design, including logic …


Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie Jan 2022

Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie

Bulletin of Chinese Academy of Sciences (Chinese Version)

In response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing, a new kind of operating system named Ubiquitous Operating System (UOS) is emerging and under exploration for further development. The human-cyberphysical ternary ubiquitous computing has many new features, such as open and dynamic environment, diverse requirements, and complex application scenarios. New ubiquitous applications pose special demands on ubiquitous sensing and connection, lightweight computing and artificial intelligence, dynamic adaptation, feedback and control, natural human-computer-interaction, etc. To support these new requirements, a software definition mechanism is in need to flexibly control hardware, data resources, platforms, and applications. This …


Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun Jan 2022

Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new era of human-cyber-physical ternary computing with diverse intelligent applications over trillions of devices. This calls for a new type of cyberinfrastructure characterized by a planet-scale, high-goodput, low-entropy computing network, colloquially named Information Superbahn. This article highlights the vision of Information Superbahn, including fundamental requirements, key scientific problems, and a candidate system architecture. The goal of building the Information Superbahn is to natively support humancyber-physical systems and low-entropy computing modes, to reduce the effects of systems disorder. Compared with existing network computing systems, such as Internet, cloud computing, big data and Internet of Things, Information …


Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang Jan 2022

Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Cyberspace security has been an important part in ensuring economic development and supporting the progress of modern science and technology. As more and more applications are relying on information technology (IT), it becomes very important to improve the security situation of cyberspace. How to take effective measures to practically improve the cyberspace security situation has become the core problem disscussed in this paper. This paper addresses it from the perspectives of "talent, finance and infrastructure". First, on the premise of insufficient supply of cyberspace security talents, this paper proposes to establish the ability certification of talents transferred from other IT …