Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240800094-6.doi: 10.11896/jsjkx.240800094
• Information Security • Previous Articles Next Articles
JIN Jiaobo1, ZHU Tiantian1,2
CLC Number:
[1]REIS R,WIRTH G,CAO Y. Circuit design for reliability [M]. CRC Press,2015. [2]RUBINSTEIN R Y,KROESE D P. Simulation and the Monte Carlo Method(Third Edition)[M].Wiley,2016. [3]CHOUDHURY M R,MOHANRAM K. Reliability analysis of logic circuits[C]//Proceedings of the IEEE Transactions on Computer-Aided Design of Integrated Circuitsand Systems.2009. [4]ROHANIPOOR M R,GHAVAMI B,RAJI M. Improving Com-binational Circuit Reliability against Multiple Event Transients via a Partition and Restructuring Approach [J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2020,39(5):1059-1072. [5]GE H,ASGARPOOR S. Parallel Monte Carlo simulation for reliability and cost evaluation of equipment and systems [J]. Electric Power Systems Research,2011,81(2):347-356. [6]WANG Z,ZHANG G,LIU P,et al. Accurate Reliability Boun-dary Evaluation of Approximate Arithmetic Circuit [J]. IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2022,30(10):1507-1518. [7]XIAO J,JIANG J H,ZHU X G. A circuit reliability evaluation method based on iterative PTM model[J]. Chinses Journal of Computers,2014,37(7):1508-1520. [8]OUYANG C T,JIANG J H,YUAN Y. Reliability Estimation Method of Sequential Circuits Based on Probability Transfer Matrix [J]. Acta Electronica Sinica,2013,41(1):171-181. [9]ZANDEVAKILI H,MAHANI A,SANEEI M. An accurate and fast reliability analysis method for combinational circuits [J]. COMPEL-The International Journal for Computation and Mathe-matics in Electrical and Electronic Engineering,2015,34(3):979-995. [10]WANG T,JIANG J,WANG Z. Reliability estimation of ap-proximate circuits based on probabilistic gate model[C]//Poceedings of the Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing(PRDC).2019 . [11]REJIMON T,LINGASUBRAMANIAN K,BHANJA S. Probabilistic error modeling for nano-domain logic circuits [J]. IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2009,17(1):55-65. [12]HAN J,CHEN H,LIANG J,et al. A stochastic computational approach for accurate and efficient reliability evaluation [J]. IEEE Transactions on Computers,2014,63(6):1336-1350. [13]XIAO J,LOU J,JIANG J. A fast and effective sensitivity calculation method for circuit input vectors [J]. IEEE Transactions on Reliability,2019,68(3):938-953. [14]IBRAHIM W. Identifying the Worst Reliability Input Vectors and the Associated Critical Logic Gates [J]. IEEE Transactions on Computers,2016,65(6):1748-1860. [15]XIAO J,SHI Z,YANG X,et al. BM-RCGL:Benchmarking Approach for Localization of Reliability-Critical Gates in Combinational Logic Blocks [J]. IEEE Transactions on Computers,2022,71(5):1063-1076. |
[1] | YIN Shiyu, ZHU Youwen, ZHANG Yue. Utility-optimized Local Differential Privacy Joint Distribution Estimation Mechanisms [J]. Computer Science, 2023, 50(10): 315-326. |
[2] | SHEN Xiang-pei, DING Yan-rui. Multi-detector Fusion-based Depth Correlation Filtering Video Multi-target Tracking Algorithm [J]. Computer Science, 2022, 49(8): 184-190. |
[3] | ZHANG Tian-rui, WEI Ming-qi, GAO Xiu-xiu. Prediction Model of Bubble Dissolution Time in Selective Laser Sintering Based on IPSO-WRF [J]. Computer Science, 2021, 48(11A): 638-643. |
[4] | GONG Xuan, LE Zi-chun, WNAG Hui, WU Yu-kun. Survey of Data Association Technology in Multi-target Tracking [J]. Computer Science, 2020, 47(10): 136-144. |
[5] |
HU Hai-gen, ZHOU Li-li, ZHOU Qian-wei, CHEN Sheng-yong, ZHANG Jun-kang.
Multi-target Tracking of Cancer Cells under Phase Contrast Microscopic Images Based on Convolutional Neural Network [J]. Computer Science, 2019, 46(5): 279-285. |
[6] | WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction [J]. Computer Science, 2018, 45(4): 89-93. |
[7] | YANG Yue-ping, WANG Jian and XUE Ming-fu. Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value [J]. Computer Science, 2017, 44(9): 156-161. |
[8] | DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144. |
[9] | CHEN Jin-guang, QIN Xiao-shan and MA Li-li. Fast GM-PHD Filter for Multi-target Tracking [J]. Computer Science, 2016, 43(3): 317-321. |
[10] | LUO Min-xia and CHENG Ze. Robustness of Interval-valued Triple I Algorithms [J]. Computer Science, 2016, 43(10): 277-281. |
[11] | ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171. |
[12] | JIANG Yu-fang and DENG Zuo-xiang. Comparison of Circuit Reliability Calculation Methods Based on PTM Model and BN Model [J]. Computer Science, 2015, 42(Z6): 115-117. |
[13] | ZHENG Jin,LV Peng-peng and GUO Shao-ming. Node Sensitivity-based Autonomous Decision-making Target Tracking Algorithm [J]. Computer Science, 2014, 41(6): 54-58. |
[14] | XING Lu,LIANG Hua-guo,YAN Lu-ming,ZHANG Li-na and YU Tian-song. Aging Path Reduction Algorithm for Type of Logic Gates [J]. Computer Science, 2014, 41(5): 24-26. |
[15] | ZHAI Jun-hai,HA Ming-guang,SHAO Qing-yan and WANG Xi-zhao. Architecture Selection for Single-hidden Layer Feed-forward Neural Networks Based on Sensitivity of Node [J]. Computer Science, 2014, 41(2): 153-156. |
|