At present, advanced computing and endogenous security technologies have entered a new era of revolution and development. Constantly, new concepts, new ideas, new methods and new technologies are emerging, such as Mimic Computing, Brain-like Computing, Graph Computing, Memory Computing, Biological Computing, Quantum Computing, as well as new computing and security technologies such as Cyberspace Mimic Defense, Trusted Computing 3.0 and Zero Trust. The 4th "Advanced Computing and Endogenous Security" academic conference focuses on new concepts, new theories, new methods and new technologies of advanced computing and endogenous security technology. The latest progress of technology development in related fields will be discussed, and the latest scientific research and academic research achievements will be shown. Experts and scholars from home and abroad are invited to make special reports, so as to accelerate the development of global advanced computing and endogenous security technology, enabling a new generation of information technology.
Advanced Computing
Z-level computing architecture and key technologies
Mimi computing, memory computing, graph computing, cloud computing, quantum computing, brain-like computing, superconducting computing and other new computing architectures and application systems
Software and hardware collaborative computing platform and innovative application system based on new architecture
New operating systems, runtime systems, data management systems, compilation and programming languages, programming environments, etc
Software/hardware co-design technology and ecological environment based on new computing architectures
New large-scale scientific and engineering software
Instruction sets for new processors and accelerators, microstructure, memory structure, interconnection and transmission technologies, programming mode,etc
RISC-V-based architecture design, hardware accelerator design
Soft and hard collaborative computing chip design based on Chiplet and wafer scale integration
Artificial intelligence chip brain, software defined chip, architecture for open source field, a heterogeneous system on a chip, saving calculation integration chip, perception fusion, lightweight edge intelligent chip, etc
Full-process EDA/IP tools, logic manufacturing technology, memory-specific manufacturing technology, power and analog chip technology, etc
Innovative technologies such as non Von Neumann computing architecture, software-defined chips, and AI-supported design automation (EDA), etc
New application technologies and systems such as photoelectric sensing and communication, photoelectric computing and storage, photoelectric imaging and display, etc
Intelligent computing systems and applications based on technologies such as software and hardware collaborative processing, dynamic resource combination, and network component reconstruction, etc
Endogenous Security
Mimic defense technology, moving target defense technology, design security technology, customized trusted space
Software defined security technology, AI-driven security technology, zero-trust security technology, secure multi-party computation technology
Next-generation network endogenous security technology, 5G endogenous security technology, Space-Ground Integrated Network endogenous security technology, artificial intelligence endogenous security technology, industrial Internet endogenous security technology, etc
Chip endogenous security technology, information system endogenous security technology, cloud computing and data center endogenous security technology
Application endogenous security design and implementation technology, network service endogenous security technology implementation technology
Design and implementation technology for industry specific applications and services endogenous security, such as telecommunications, IDC, finance, medical, special trade, etc
Key software and hardware components of endogenous security technology, such as I / O proxy, arbiter and scheduler that used mimic technology to enhance security, also include mimic acceleration and performance optimization technology and endogenous security co-design method of software and hardware
Endogenous security supported technology, endogenous security programming language, endogenous security tool chains and tool libraries, endogenous security compiler and development environment
Endogenous security open sources and platform construction technology
Measurement and evaluation model, performance quantitative design method, and test evaluation method of endogenous security technology
Endogenous security white box injection test and black box confrontation test method, endogenous security technology test site construction technology, etc
10月30日
2021
10月31日
2021
摘要截稿日期
注册截止日期
留言