Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2022

Bulletin of Chinese Academy of Sciences (Chinese Version)

Computer Sciences

Keyword
File Type

Articles 1 - 17 of 17

Full-Text Articles in Social and Behavioral Sciences

Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan Dec 2022

Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan

Bulletin of Chinese Academy of Sciences (Chinese Version)

The rapid development of information technology has unprecedentedly created a prosperous cyber society and greatly enhanced productivity facilitated by social interaction. At the same time, many problems emerge in the cyber society, such as telecom fraud, privacy leakage, Internet pollution, and algorithmic discrimination. The problems bring new challenges to social order and security. In order to find the way of cyber society governance and promote the modernization of national governance, this paper first presents the analyses on the new problems encountered in the cyber society in three typical scenarios, i.e., identity governance, behavior governance, and algorithm governance, as well as …


Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li Dec 2022

Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …


Accurately Grasp The New Features Of Cybersecurity Technology Development And Fully Promote The Modernization Of National Security System And Capabilities, Dengguo Feng Nov 2022

Accurately Grasp The New Features Of Cybersecurity Technology Development And Fully Promote The Modernization Of National Security System And Capabilities, Dengguo Feng

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Studies On The Development Of China’S Network And Information Security, Jiwu Jing Nov 2022

Studies On The Development Of China’S Network And Information Security, Jiwu Jing

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao Oct 2022

Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao

Bulletin of Chinese Academy of Sciences (Chinese Version)

Protection of algorithm by intellectual property is a powerful way to stimulate innovation and regulate the risk of the algorithm. Algorithm that can be protected by intellectual property right is the program algorithm, which is compiled in computer language, in the form of coded instruction sequence, run by the computer and produce independent rational value results. The article is combed out that there are drawbacks to the traditional path of IP to protect program algorithms:it has conflict between program algorithm and copyright law system; the trade secret path is at odds with program algorithmic governance; and program algorithm can hardly …


Analysis Of Principles Of Development Of Key Technologies, Yungang Bao May 2022

Analysis Of Principles Of Development Of Key Technologies, Yungang Bao

Bulletin of Chinese Academy of Sciences (Chinese Version)

How to development key technologies requires understanding the principles of technology evolution. This study proposes that the development process of key technologies follows the Metcalf's Law. Furthermore, this paper presents two principles of the development of key technologies from different angles. Finally, several suggestions are raised.


Promoting Infrastructure Construction In Advance To Support Sci-Tech Self-Reliance And Self-Strengthening At Higher Level, Yang Wang, Yuanchun Zhou, Yanguang Wang, Jianhui Li, Fazhi Qi, Honglin He, Fangyu Liao May 2022

Promoting Infrastructure Construction In Advance To Support Sci-Tech Self-Reliance And Self-Strengthening At Higher Level, Yang Wang, Yuanchun Zhou, Yanguang Wang, Jianhui Li, Fazhi Qi, Honglin He, Fangyu Liao

Bulletin of Chinese Academy of Sciences (Chinese Version)

The research infrastructure is the basic and strategic platform of scientific and technological innovation. In the last decade, China's research infrastructure has achieved leapfrog development in the level of observation, manufacturing, management, data acquisition, data sharing and utilization, which supports China's scientific and technological innovation activities at a higher level. Looking into the future, the scientific research paradigm is transforming. The network, data, and computing platform will not only support the development of major science and technology infrastructure and field stations in larger, more accurate, and more advanced approach, but also contribute to the transformation of scientific research paradigm. It …


Thoughts On Data-Driven Discursive Logic And Triangulation Of Think Tank, Jianjun Sun, Lei Pei, Yaxue Ma, Yang Li Feb 2022

Thoughts On Data-Driven Discursive Logic And Triangulation Of Think Tank, Jianjun Sun, Lei Pei, Yaxue Ma, Yang Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

The rapid accumulation of data resources and the development of analysis technologies have expanded the scope of think tank research, and prompted think tanks to pay more attention to data intelligence. Meanwhile, higher requirements are put forward on the quality and innovation of the think tank. Facing the development needs of think tanks, i.e., modernization, innovation, and conscientization, this paper demonstrates the change of data-driven think tank researches from the perspective of the information chain. The paper analyzes the urgent need to reshape the discursive logic of the think tank, and discusses the construction scheme of triangulation for data-driven think …


Thoughts On New It Technique System, Ninghui Sun Jan 2022

Thoughts On New It Technique System, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new period of information society dominated by digital economy. To adapt to the requirements of the new development stage of China, and to achieve the key technologies development, it is necessary to accelerate the construction of a new selfreliance and self-improvement IT technique system. The article gives some thoughts on the demand, principle, and key method on above issues, and the new paradigm of research at Institute of Computing Technology, Chinese Academy of Sciences.


Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun Jan 2022

Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

RISC-Ⅴ has been obtained huge attentions and extensively invested over the past decade due to its exciting slogan that "Instruction Sets Want to be Free". Based on RISC-Ⅴ, we are able to build a "human community with a shared future" in the CPU chip area, although there are still many challenges. China should explore its capability to make more contributions in building the open-source chip ecosystem.


Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang Jan 2022

Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Currently, network technology is deeply integrated with the physical world. Traditional network architectures cannot support the differentiated, customizable, and deterministic needs of industrial Internet and other services. Exploring new network architecture and core technology has officially become the strategic commanding heights of the global Internet competition. To this end, the paper reviews the evolution and trends of the network, analyzes how to achieve high-performance, low-cost, intelligent network development strategies for establishing an autonomous and controllable future network. Two conclusions are drawn as follows. (1) Through the exploration of network construction in recent decades, integration, openness, intelligence, customization and integration of …


Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang Jan 2022

Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, there are such significant improvements on the performance and efficiency of big data technology and system. As it is widely applied in various fields, big data has empowered industrial intelligence, and is the key step into the intelligent stage of information society. Therefore, we are facing greater challenges nowadays, such as the paradox of data flooding and high-value data lacking, the complexity and uncertainty of big data analysis, and the difficulty to balance the data on sharing and circulation, and trustworthiness and security. Moreover, these challenges will not only promote the innovation and change of big data …


Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun Jan 2022

Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

Self-reliance and self-strengthening at high level does not depend on a single technique, but on the formation of an advantageous national tech-system, so called "country-as-a-platform". Information tech-system refers to the whole one that closely connects devices, components, complete machine, system software, middleware, and application software with a series of technical standards and intellectual property rights. We are entering the IT 3.0 era characterized by integration of human-cyber-physical world. The IT 3.0 era will certainly produce a new tech-system different from the IT 1.0 and IT 2.0 eras, which is a rare opportunity for China to build a self-reliance and self-strengthening …


From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan Jan 2022

From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Chip is the foundation of the modern information society. As the world is entering a new era of human-cyber-physical ternary computing, with diverse intelligent applications over trillions of devices, chip with specialized architecture will be heavily demanded in both numbers and types. However, chip design is very costly, which usually requires a long design cycle, complicated process, and high professional developers. Hence, there is a large gap between the need of tremendous chips and the high cost of chip design in the new era. This study proposes Chip Learning, a learning-based method to perform the entire chip design, including logic …


Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie Jan 2022

Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie

Bulletin of Chinese Academy of Sciences (Chinese Version)

In response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing, a new kind of operating system named Ubiquitous Operating System (UOS) is emerging and under exploration for further development. The human-cyberphysical ternary ubiquitous computing has many new features, such as open and dynamic environment, diverse requirements, and complex application scenarios. New ubiquitous applications pose special demands on ubiquitous sensing and connection, lightweight computing and artificial intelligence, dynamic adaptation, feedback and control, natural human-computer-interaction, etc. To support these new requirements, a software definition mechanism is in need to flexibly control hardware, data resources, platforms, and applications. This …


Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun Jan 2022

Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new era of human-cyber-physical ternary computing with diverse intelligent applications over trillions of devices. This calls for a new type of cyberinfrastructure characterized by a planet-scale, high-goodput, low-entropy computing network, colloquially named Information Superbahn. This article highlights the vision of Information Superbahn, including fundamental requirements, key scientific problems, and a candidate system architecture. The goal of building the Information Superbahn is to natively support humancyber-physical systems and low-entropy computing modes, to reduce the effects of systems disorder. Compared with existing network computing systems, such as Internet, cloud computing, big data and Internet of Things, Information …


Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang Jan 2022

Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Cyberspace security has been an important part in ensuring economic development and supporting the progress of modern science and technology. As more and more applications are relying on information technology (IT), it becomes very important to improve the security situation of cyberspace. How to take effective measures to practically improve the cyberspace security situation has become the core problem disscussed in this paper. This paper addresses it from the perspectives of "talent, finance and infrastructure". First, on the premise of insufficient supply of cyberspace security talents, this paper proposes to establish the ability certification of talents transferred from other IT …